20 - 21 SEPTEMBER 2017 / Stockholmsmässan

Here is a list of all confirmed Seminars for 2017. You can add these to your planner by clicking the 'add to schedule' button

  • Wed 20th Sep 10:00 - 10:40
  • Exclusive Address by Fredrik Reinfeldt Add to Schedule Fredrik Reinfeldt  |     |   Keynote

    Keynote Theatre

    Wed 20th Sep 10:00 to 10:40

    Speaker

    Photo Speaker Name Profile
    Fredrik Reinfeldt Fredrik Reinfeldt View Profile
  • Wed 20th Sep 11:40 - 12:10
  • Session with Monty Widenius Add to Schedule

    Keynote Theatre

    Wed 20th Sep 11:40 to 12:10

  • How does WatchGuard deliver a holistic security solution from beginning to end? Add to Schedule Andy Cespedes  |   Watchguard  |   Cyber Threat Protection

    Cyber Threat Protection Theatre

    Wed 20th Sep 11:40 to 12:10

    How does WatchGuard deliver a holistic security solution from beginning to end?

    How does Watchguard protect assets all the way from the cloud, through the perimeter and down to the client with visualization and automation in multiple layers?

    Speaker

    Photo Speaker Name Profile
    Andy Cespedes Andy Cespedes View Profile
  • Data Science in the Cloud Add to Schedule Margriet Groenendijk  |   IBM  |   AI, Analytics & IOT

    AI, Analytics & IOT Theatre

    Wed 20th Sep 11:40 to 12:10

    Data Science in the Cloud

    Data Science deals with the extraction of valuable insights from an incredible number of sources in an endless number of formats. This session will go through a typical workflow using practical tools and tricks. This will give you a basic understanding of Data Science in the Cloud. The examples will show the steps that are needed to build and deploy a model to predict traffic collisions with weather data.

    Speaker

    Photo Speaker Name Profile
    Margriet Groenendijk Margriet Groenendijk View Profile
  • Building WiFi networks for tomorrow’s needs Add to Schedule Jonas Mellander  |   Aerohive Networks   |   Cloud, Networks & Infrastructure

    Cloud, Networks & Infrastructure Theatre

    Wed 20th Sep 11:40 to 12:10

    Speaker

    Photo Speaker Name Profile
    Jonas Mellander Jonas Mellander View Profile
  • How to build a presence in open source Add to Schedule Bas Peters  |   Github  |   DevOps and Open Source

    DevOps and Open Source Theatre

    Wed 20th Sep 11:40 to 12:10

    How to build a presence in open source

    Today most software that has an impact in the world is open source. Building a presence in the open source community is a great way for organizations to attract and retain talent and to drive innovation. But where to start? In this talk Bas will share some best practices on how to join the open source community as an organization, how to create a governance structure for open source and how to build a welcoming community. At the end of the talk you will have an understanding of the importance of joining the open source community as an organization and how to start building a presence.

    Speaker

    Photo Speaker Name Profile
    Bas Peters Bas Peters View Profile
  • Hybrid Active Directory Security and Governance Add to Schedule Colin Truran  |   Quest Software  |   Cyber Threat Intelligence

    Cyber Threat Intelligence Theatre

    Wed 20th Sep 11:40 to 12:10

    Hybrid Active Directory Security and Governance

    Roughly 70% of Fortune 500 companies purchased Office 365 in the last year. But, many organizations don’t realize their on-premises Active Directory (AD) is still the authoritative source for authentication requests to Office 365 through Azure AD.

    To achieve a stable Azure AD, your on-premises AD must be streamlined with a normalised structure, consolidated OUs, good security delegation and solid provisioning. Otherwise your infrastructure becomes more vulnerable to a host of potential breaches, threats and disasters. 

    This session will tell you how to:

    • Make your hybrid directory environment manageable and available
    • Reduce your potential attack area
    • Bolster your cloud security posture

    Speaker

    Photo Speaker Name Profile
    Colin Truran Colin Truran View Profile
  • Wed 20th Sep 12:25 - 12:55
  • Reserved Session Add to Schedule

    Cyber Threat Protection Theatre

    Wed 20th Sep 12:25 to 12:55

  • Preparing for an AI-First Future Add to Schedule Anders Arpteg  |   Peltarion  |   AI, Analytics & IOT

    AI, Analytics & IOT Theatre

    Wed 20th Sep 12:25 to 12:55

    Preparing for an AI-First Future

    Something extraordinary has happened within AI and Machine Learning in recent years. Companies are starting talking about moving into an AI-first future, but what does that really mean? In order to stay one step ahead, we must be prepared for what’s coming next. What has really happened in recent years and what are the next steps and trends in machine learning? What should companies know to be prepared for the rapid development that is happening with ML and AI? This talk will allow the listener a glimpse into the future of AI and what possibilities it holds.

    Speaker

    Photo Speaker Name Profile
    Anders Arpteg Anders Arpteg View Profile
  • Reserved Session Add to Schedule

    Cloud, Networks & Infrastructure Theatre

    Wed 20th Sep 12:25 to 12:55

  • How to manage Compliance the DevOps Way Add to Schedule Simon Fisher  |   Chef Software   |   DevOps and Open Source

    DevOps and Open Source Theatre

    Wed 20th Sep 12:25 to 12:55

    How to manage Compliance the DevOps Way

    Compliance has never been so important, but for organisations struggling to innovate under the weight of technical debt, it can be increasingly difficult to manage. How can you manage both internal compliance requirements as well as mandated regulations such as GDPR?
    Is it possible to reconcile compliance and velocity? Is it a matter of the right tools or the right organisational culture?
    What steps do you need to take to implement an automation cycle that resolves the conflict and how can remediation be a baked in part of your approach?

    Speaker

    Photo Speaker Name Profile
    Simon Fisher Simon Fisher View Profile
  • Brought to you by Innosoft Add to Schedule

    Cyber Threat Intelligence Theatre

    Wed 20th Sep 12:25 to 12:55

  • Wed 20th Sep 13:30 - 14:00
  • Fascinating Tales of A Strange Tomorrow Add to Schedule Julien Simon  |   Amazon Web Services   |   Keynote

    Keynote Theatre

    Wed 20th Sep 13:30 to 14:00

    Fascinating Tales of A Strange Tomorrow

    AI has become the hottest topic in the IT industry. In this talk, we’ll explain how Deep Learning — a subset of AI — can help you solve complex problems. We’ll look at how you can add Deep Learning capabilities to your applications and why Cloud technology can get you there faster.

    Speaker

    Photo Speaker Name Profile
    Julien Simon Julien Simon View Profile
  • Beyond The Hype; How Attackers Win Add to Schedule Steve Manzuik  |   Duo  |   Cyber Threat Protection

    Cyber Threat Protection Theatre

    Wed 20th Sep 13:30 to 14:00

    Beyond The Hype; How Attackers Win

    Movies, TV and even some non-fictional press leads most to believe that a cyber attack is a complicated endeavor conducted by teams of highly skilled people. The reality is, that most successful attacks are not complicated in the least. This presentation will highlight real world attacks, why the attackers were successful and how they could have been stopped. Some new open source tools to battle phishing will be covered as well as a strategy to deal with disappearing network perimeter. 

    Speaker

    Photo Speaker Name Profile
    Steve Manzuik Steve Manzuik View Profile
  • Brought to you by Tableau Add to Schedule David Spezia  |   Tableau Software   |   AI, Analytics & IOT

    AI, Analytics & IOT Theatre

    Wed 20th Sep 13:30 to 14:00

    Speaker

    Photo Speaker Name Profile
    David Spezia David Spezia View Profile
  • Achieving IT Resilience Add to Schedule Egon van Dongen  |   Zerto   |   Cloud, Networks & Infrastructure

    Cloud, Networks & Infrastructure Theatre

    Wed 20th Sep 13:30 to 14:00

    Achieving IT Resilience

    Today, IT disruptions aren’t just weather-related disasters. Power outages, ransomware and even deploying new infrastructure can cause issues for IT. With the need for continuous availability organization need to be able to respond to a disruption so quickly that end-users and customers are not aware that a disruption occurred.

    Organizations that take a proactive approach to BC/DR, focus on continuous availability rather than recovery after the fact. Automation and simplification of replication and recovery are part of resilience, and ensure that companies can prove the availability of their applications and data at any time.

    Speaker

    Photo Speaker Name Profile
    Egon van Dongen Egon van Dongen View Profile
  • DevSecOps - Security at DevOps Speed Add to Schedule Ilkka Turunen  |   Sonatype  |   DevOps and Open Source

    DevOps and Open Source Theatre

    Wed 20th Sep 13:30 to 14:00

    DevSecOps - Security at DevOps Speed

    Software development is pressed for faster and faster release cycles with acceptable quality, budget and security. As movements like CI, CD and Devops aim to cut down on release cycles, it's security's job to help control the risk. The risk landscape is complex as modern development practices increasingly consume more and more third party code. Traditional methods do not cut it anymore - it's time for DevSecOps. This session gives an overview of how companies have implemented DevSecOps practices in their own delivery pipelines and how this can help increase developer awareness of risks affecting them. We'll walk an example CICD Pipeline and explore how security has been embedded as a part of it, how the movement is shaping up and how standards are starting to follow suite.

    Speaker

    Photo Speaker Name Profile
    Ilkka Turunen Ilkka Turunen View Profile
  • Brought to you by Flexera Add to Schedule

    Cyber Threat Intelligence Theatre

    Wed 20th Sep 13:30 to 14:00

  • Wed 20th Sep 14:10 - 14:40
  • The Enterprise Immune System: Using Machine Learning for Next-Generation Cyber Defense Add to Schedule Andrew Tsonchev  |   Darktrace   |   Keynote

    Keynote Theatre

    Wed 20th Sep 14:10 to 14:40

    The Enterprise Immune System: Using Machine Learning for Next-Generation Cyber Defense

    From insiders to sophisticated external attackers, the reality of cyber security today is that the threat is already inside. A fundamentally new approach to cyber defense is needed to detect and investigate these threats that are already inside the network - before they turn into a full-blown crisis. 

    Based on unsupervised machine learning and probabilistic mathematics developed by specialists from the University of Cambridge, new ‘immune system’ technologies are capable of learning the ‘self’ of an organization. By analyzing every network, device, and user, and modeling them as they go about their day-to-day activity, the Enterprise Immune System can establish a highly accurate understanding of normal behavior. It can therefore spot abnormal activity as it emerges, and even take precise, measured actions to automatically curb the threat.

    Rules and signatures are not keeping pace with today’s rapidly evolving cyber attacks. The Enterprise Immune System represents a fundamental step-change in automated cyber defense,  is relied upon by organizations around the world, and can cover up to millions of devices.  

    Speaker

    Photo Speaker Name Profile
    Andrew Tsonchev Andrew Tsonchev View Profile
  • Firewall-as-a-Service: Enterprise Grade Security for Everyone Add to Schedule Mark Bayne  |   Cato Networks   |   Cyber Threat Protection

    Cyber Threat Protection Theatre

    Wed 20th Sep 14:10 to 14:40

    Firewall-as-a-Service: Enterprise Grade Security for Everyone

    Firewalls and UTMs have been the cornerstone of network security for the past 20 years. Yet, deploying appliances at every remote office, creates multiple challenges for organizations: the capital needed to buy, upgrade and retire hardware solutions and the tough tradeoff between hardware capacity and strong security. Organizations end up compromising on strength of protection or the end user experience.

    Even when running smoothly, firewalls and UTMs are location bound and can't effectively protect the mobile users and cloud infrastructure that are now an integral part of the business.

    Speaker

    Photo Speaker Name Profile
    Mark Bayne Mark Bayne View Profile
  • Brought to you by Fingerprints Add to Schedule

    AI, Analytics & IOT Theatre

    Wed 20th Sep 14:10 to 14:40

  • Data Center Transformation – An Introduction to Hyperconverged Infrastructure Add to Schedule Bruce Milne  |   Pivot3  |   Cloud, Networks & Infrastructure

    Cloud, Networks & Infrastructure Theatre

    Wed 20th Sep 14:10 to 14:40

    Data Center Transformation – An Introduction to Hyperconverged Infrastructure

    With traditional data center infrastructure becoming more expensive and difficult to manage, IT organisations are looking for solutions that enable increased simplicity, agility, and improved economics. Today, organisations need to deploy applications faster to meet ever increasing end-user expectations for always-on data availability and instant access to information. In this session, Bruce Milne from Pivot3, will explore some of the core HCI concepts, and discuss how Pivot3’s pioneering Hyperconverged architecture can enable you to drive transformational business benefits as you move towards the next generation of data center.

    Speaker

    Photo Speaker Name Profile
    Bruce Milne Bruce Milne View Profile
  • DevOps By The Numbers Add to Schedule Maarten Kennis  |   XebiaLabs  |   DevOps and Open Source

    DevOps and Open Source Theatre

    Wed 20th Sep 14:10 to 14:40

    Speaker

    Speaker Name Profile
    Maarten Kennis View Profile
  • Reserved Session Add to Schedule

    Cyber Threat Intelligence Theatre

    Wed 20th Sep 14:10 to 14:40

  • Wed 20th Sep 14:50 - 15:10
  • Brought to you by Bitdefender Add to Schedule

    Cyber Threat Intelligence Theatre

    Wed 20th Sep 14:50 to 15:10

  • Humanity’s Most Serious Challenge Add to Schedule Jay Tuck  |     |   Keynote

    Keynote Theatre

    Wed 20th Sep 14:50 to 15:20

    Humanity’s Most Serious Challenge

    Artificial Intelligence is not science fiction. It is here and now, changing our world at breathtaking speed. We – as individuals and as institutions – must be informed, prepared and ready to redefine ourselves at breathtaking speeds as well.

    AI can help us digesting and analyzing big data, macro managing our resources, defining unseen challenges and securing our food chain, our environment and a sustainable future.

    AI can hurt us If we turn over too much responsibility too soon, we can lose control to a super intelligence which is learning at lightning speed.

    There is no guarantee that we will always be Darwin’s Darling.

    Speaker

    Photo Speaker Name Profile
    Jay Tuck Jay Tuck View Profile
  • GDPR, Petya & Wannacry: When things go wrong who is ultimately responsible - The Board or IT? Add to Schedule Sander Hofman  |   Mimecast  |   Cyber Threat Protection

    Cyber Threat Protection Theatre

    Wed 20th Sep 14:50 to 15:20

    GDPR, Petya & Wannacry: When things go wrong who is ultimately responsible - The Board or IT?

    As Petya and Wannacry have shown, organisations across the globe need to re-evaluate their readiness for the next wave of threats.  It is critical for companies to deploy a proactive cyber resilience strategy while remaining GDPR compliant.

    The time to up your defences is now.

    Speaker

    Photo Speaker Name Profile
    Sander Hofman Sander Hofman View Profile
  • New connectivity feature for IoT: API with multi-network SIM cards Add to Schedule Karina Popova  |   LINK Mobility GmbH  |   AI, Analytics & IOT

    AI, Analytics & IOT Theatre

    Wed 20th Sep 14:50 to 15:20

    New connectivity feature for IoT: API with multi-network SIM cards

    What would you think if you have the network coverage wherever your sensor are, your own independent cloud based network, extremely scalable and global. Nowadays SIM cards and endpoints can be easily managed in real-time via the intuitive user-interface or an easy-to-integrate API. The rapidly changing social and environmental order is becoming more complex as resources grow scarcer and populations increase, it requires just one technical integration point in IoT, which will provide technological fluency in the use big data for public benefit.

    Speaker

    Photo Speaker Name Profile
    Karina Popova Karina Popova View Profile
  • Agility of public cloud inside your four walls Add to Schedule Peter Eriksson   |   Tintri   |   Cloud, Networks & Infrastructure

    Cloud, Networks & Infrastructure Theatre

    Wed 20th Sep 14:50 to 15:20

    Agility of public cloud inside your four walls

    Tintri is built with the same Lego block design as public cloud for simple scale and agility. But it’s deployed in your data centre for total control of cost and performance. That’s how Tintri serves the needs of ALL your applications—cloud native or otherwise.

    Speaker

    Photo Speaker Name Profile
    Peter Eriksson Peter Eriksson View Profile
  • Continuous Delivery with CloudBees solutions Add to Schedule Andreas Lindh  |   Cloudbees  |   DevOps and Open Source

    DevOps and Open Source Theatre

    Wed 20th Sep 14:50 to 15:20

    Continuous Delivery with CloudBees solutions

    Creating and adopting a continuous delivery pipeline for a single team is pretty straight forward, but as adoption of grows within the enterprise, challenges emerge. Learn how to tackle those challenges and how to visualize the your software delivery lifecycle using CloudBees technology.

    Speaker

    Photo Speaker Name Profile
    Andreas Lindh Andreas Lindh View Profile
  • Wed 20th Sep 15:30 - 16:00
  • AI in the Workplace: Emergence of the Cognitive Room Add to Schedule Mary Ann de Lares Norris  |   Oblong Industries  |   Keynote

    Keynote Theatre

    Wed 20th Sep 15:30 to 16:00

    AI in the Workplace: Emergence of the Cognitive Room

    The physical world and the digital world are becoming more intertwined in all aspects of life. In the enterprise, this trend is exhibited by the emergence of the cognitive room. Cognitive rooms, which harness the power of the team as well as the power of AI, are poised to transform the future of work.

    Enterprises need to learn to capture the value in this new world order—and starting with the human element is key. Innovative human-centered UIs must be used to augment a user’s ability to gain insight from the massive amounts of unstructured data that are part of today’s enterprise workflow and the lifeblood of cognitive rooms.

    Mary Ann will be addressing the challenge organizations face today to transcend traditional, sequential analytical processes in favor of faster parallel and real-time working processes that deliver the greatest business impact.

    Speaker

    Photo Speaker Name Profile
    Mary Ann de Lares Norris Mary Ann de Lares Norris View Profile
  • IoT: Makers and Professionals Add to Schedule Valter Minute  |   Toradex AG  |   AI, Analytics & IOT

    AI, Analytics & IOT Theatre

    Wed 20th Sep 15:30 to 16:00

    IoT: Makers and Professionals

    Tools and technologies that in the past were accessible only for professionals now can be used by the wide audience of makers. And makers are driving innovation, creating new things, connecting devices to the network to do amazing things. But why so many projects that looks so cool on kickstarter never reach the market? Why many interesting project fail to meet the expectations of the real world? Why designing a device and bringing it to the market is not as easy as writing an app or developing a webserver? The speaker has quite some experience on devices and his good share of experience coming from failures and hopes to give you some hints about the most overlooked aspects of an IoT project. And many times not considering those aspects can have a dramatic impact on your project. Learn what are the issues that may prevent a nice prototype from becoming a successful product.

    Speaker

    Photo Speaker Name Profile
    Valter Minute Valter Minute View Profile
  • An Introduction to Rubrik - Don’t Backup. Go Forward Add to Schedule Nicolas Köllerstedt   |   Rubrik  |   Cloud, Networks & Infrastructure

    Cloud, Networks & Infrastructure Theatre

    Wed 20th Sep 15:30 to 16:00

    An Introduction to Rubrik - Don’t Backup. Go Forward

    In this session we will give you an introduction to Rubrik. Rubrik provides a beautifully simple solution for businesses to recover, manage and secure their apps and data. Everywhere. We blend expertise from both consumer and enterprise worlds to pioneer a fresh approach to an old problem. 

    Speaker

    Photo Speaker Name Profile
    Nicolas Köllerstedt Nicolas Köllerstedt View Profile
  • Brought to you by Splunk Add to Schedule

    DevOps and Open Source Theatre

    Wed 20th Sep 15:30 to 16:00

  • From APK to Golden Ticket: How we Became Domain Admins through a Secretary’s Phone Add to Schedule Giuseppe Trotta  |   FortConsult  |   Cyber Threat Intelligence

    Cyber Threat Intelligence Theatre

    Wed 20th Sep 15:30 to 16:00

    From APK to Golden Ticket: How we Became Domain Admins through a Secretary’s Phone

    In this session, Giuseppe Trotta will show how he got full access to a company’s corporate network by breaking in to an Android device…belonging to the receptionist. Using freely available information about the receptionist, he succeeded in luring her in to downloading an APK file with a reverse shell. With full access to the phone, he connected to the guest Wi-Fi of the company, and exploited unsafe configurations on the network to gain full access to the internal corporate network, including persistent access through domain admin credentials.

    Speaker

    Photo Speaker Name Profile
    Giuseppe Trotta Giuseppe Trotta View Profile
  • Wed 20th Sep 16:10 - 17:00
  • Privacy Program Management: How to capture the business value and stakeholders' enthusiasm Add to Schedule Sofia Edvardsen  |   Sharp Cookie Advisors  |   Keynote

    Keynote Theatre

    Wed 20th Sep 16:10 to 17:00

    Privacy Program Management: How to capture the business value and stakeholders' enthusiasm

    Learn how to proactively manage privacy in the GDPR era in your organisation with the tools and insights from Managing Partner Sofia Edvardsen's experience of setting up and managing privacy programs of leading enterprises. A key factor to success Sofia Edvardsen will shed light on, not often covered in privacy management, is how to perform and stay relevant in the eyes of top management.

    Speaker

    Photo Speaker Name Profile
    Sofia Edvardsen Sofia Edvardsen View Profile
  • Reserved Session Add to Schedule

    AI, Analytics & IOT Theatre

    Wed 20th Sep 16:10 to 17:00

  • Enterprise video mobility and the challenge of the virtual desktop Add to Schedule Tim Hoddy  |   Tripleplay   |   Cloud, Networks & Infrastructure

    Cloud, Networks & Infrastructure Theatre

    Wed 20th Sep 16:10 to 17:00

    Enterprise video mobility and the challenge of the virtual desktop

    Since the emergence of mobile IP technology a number of questions have been asked; How do I deliver quality? How do I properly protect and encrypt media content? How do I control re-distribution of my content? Can my virtual desktop users access content? Leaders in IPTV development, Tripleplay will discuss the challenges associated with delivering video to enterprise employees across multiple platforms and formats and will explain how its leading edge technology has been successfully deployed in Citrix VDI environments.

    Speaker

    Photo Speaker Name Profile
    Tim Hoddy Tim Hoddy View Profile
  • Reserved Session Add to Schedule

    Cyber Threat Intelligence Theatre

    Wed 20th Sep 16:10 to 17:00

  • Thu 21th Sep 10:00 - 10:40
  • Collaboration when Disruption is the New Normal Add to Schedule Snorre Kjesbu  |   Cisco  |   Keynote

    Keynote Theatre

    Thu 21th Sep 10:00 to 10:40

    Collaboration when Disruption is the New Normal

    Four of five CEOs question if their products will be relevant in three years, so it is no surprise that rapid innovation is at the top of the CEO agenda. With talent retention and revenue growth at stake, even traditional industries are facing disruption. But as Forbes reports, “businesses are finally realizing they need new ways to work, collaborate and meet”. What is this new way of working? How can IT leaders enable workforces to get more done, faster? We will demonstrate how IT leaders are using new collaboration tools to gain this competitive advantage.

    Speaker

    Photo Speaker Name Profile
    Snorre Kjesbu Snorre Kjesbu View Profile
  • Thu 21th Sep 11:40 - 12:10
  • Brought to you by Splunk Add to Schedule

    Cyber Threat Intelligence Theatre

    Thu 21th Sep 11:40 to 12:10

  • Architecting the Future: learnings from Google Add to Schedule Otso Juntunen  |   Google  |   Keynote

    Keynote Theatre

    Thu 21th Sep 11:40 to 12:10

    Architecting the Future: learnings from Google

    Cloud is a rising trend, but one that is really in its infancy. Google shares its view of the cloud as a platform-first mindset, opening the possibility of changing the fundamentals of computing to achieve new capabilities from compute architectures to data processing and machine learning. The next stage of machine intelligence offers both long and short term opportunities for those that can apply machine learning to analytics at web scale to relevant real world data that apply to your business.

    Speaker

    Photo Speaker Name Profile
    Otso Juntunen Otso Juntunen View Profile
  • Crossing the NIS and GDPR mine field Add to Schedule Jonas Dellenvall  |   Advenica AB  |   Cyber Threat Protection

    Cyber Threat Protection Theatre

    Thu 21th Sep 11:40 to 12:10

    Crossing the NIS and GDPR mine field

    In the wake of GDPR buzz it is now time for the next directive in the field of information security: the NIS Directive. The Directive on Security of Network and Information Systems is intended to raise Member States' level of protection of critical infrastructure.

    At first glance, it is easy to conclude that GDPR and NIS have a large overlap, but in fact, the differences are greater than the similarities. This session looks at the greatest initiatives in many years to raise the information security level and awareness within the European Union.

    Speaker

    Photo Speaker Name Profile
    Jonas Dellenvall Jonas Dellenvall View Profile
  • Artificial Intelligence, Machine Learning and Smart Things - IOT Add to Schedule Asif Kabani  |   Next Generation Leaders (NGLs)  |   AI, Analytics & IOT

    AI, Analytics & IOT Theatre

    Thu 21th Sep 11:40 to 12:10

    Artificial Intelligence, Machine Learning and Smart Things - IOT

    AI, machine learning and IOT have reached a critical point and will increasingly extend virtually every technology enabled application, service, and things. Since creating an intelligent systems that adapt and learn, with potential to act autonomously and simply execute predefined instructions is primary area for new and old technology vendors through at least 2020. The lines between the physical and digital world continue to shrink by creating new opportunities for digital business. Perhaps the digital world can have detailed reflection of the physical world for new business models and digitally enabled ecosystems. Review the dynamic connection of people, services, things and processes, with intelligent digital ecosystems for Artificial Intelligence System, Machine Learning and Smart Things - Internet of Things (IOT). 

    Speaker

    Photo Speaker Name Profile
    Asif Kabani Asif Kabani View Profile
  • Networking for the Cloud Era: Simplified cloud connectivity with SD-WAN. Add to Schedule George Konstantinidis  |   Riverbed Technology  |   Cloud, Networks & Infrastructure

    Cloud, Networks & Infrastructure Theatre

    Thu 21th Sep 11:40 to 12:10

    Networking for the Cloud Era: Simplified cloud connectivity with SD-WAN.

    Deploying SD-WAN ensures your wide-area network is future-proof for cloud computing and can adapt to rapidly changing application and business requirements.

    Speaker

    Photo Speaker Name Profile
    George Konstantinidis George Konstantinidis View Profile
  • The delivery of a fully automated software delivery pipeline Add to Schedule Michiel Sens   |   Xebia  |   DevOps and Open Source

    DevOps and Open Source Theatre

    Thu 21th Sep 11:40 to 12:10

    The delivery of a fully automated software delivery pipeline

    ABN AMRO, a leading Dutch bank, are working towards Continuous Delivery of new software to further streamline their online services. They asked Xebia to implement the (re)automation of their software delivery process as an end-to-end automated Continuous Delivery Pipeline as a Service (CDaaS). For the implementation, Xebia adopted base principles from the DevOps Agile Skills Association (DASA) with great success. In addition to technological details, Michiel will discuss how to implement a fully automated central delivery pipeline, focusing on topics like starting out as MVP, the importance of functional slicing, building high-performing teams, and automating delivery of the pipeline itself.

    Speaker

    Photo Speaker Name Profile
    Michiel Sens Michiel Sens View Profile
  • Thu 21th Sep 12:25 - 12:55
  • Reserved Session Add to Schedule

    Cyber Threat Protection Theatre

    Thu 21th Sep 12:25 to 12:55

  • Brought to you by Tableau Add to Schedule David Spezia  |   Tableau Software   |   AI, Analytics & IOT

    AI, Analytics & IOT Theatre

    Thu 21th Sep 12:25 to 12:55

    Speaker

    Photo Speaker Name Profile
    David Spezia David Spezia View Profile
  • Brought to you by Innosoft Add to Schedule

    Cloud, Networks & Infrastructure Theatre

    Thu 21th Sep 12:25 to 12:55

  • Security Implications of a DevOps Transformation Add to Schedule Kevin Reeuwijk  |   Puppet   |   DevOps and Open Source

    DevOps and Open Source Theatre

    Thu 21th Sep 12:25 to 12:55

    Security Implications of a DevOps Transformation

    The DevOps transformation that organisations go through comes with certain operational implications, such as Security. DevOps has different components: version control, package management, automated tested or infrastructure as code. How does security tie in with these components, and how are they inclusive of security?  Attend Puppet's presentation and find out. 

    Speaker

    Photo Speaker Name Profile
    Kevin Reeuwijk Kevin Reeuwijk View Profile
  • More Visibility or More Data? The CTI Conundrum Add to Schedule Darren Anstee  |   Arbor Networks  |   Cyber Threat Intelligence

    Cyber Threat Intelligence Theatre

    Thu 21th Sep 12:25 to 12:55

    More Visibility or More Data? The CTI Conundrum

    Security best practice tells us that defense in depth is the answer. Multiple layers of security designed to detect and contain attacks. CTI will help our technology identify and block the latest and greatest threats. But, what is the output from all of this?  People still make decisions in security and will do for at least next few years. Our security posture must deliver our analysts visibility - not just more and more data. Darren Anstee will discuss the need for better threat visibility, automated data collation and workflow to help us manage risk.

    Speaker

    Photo Speaker Name Profile
    Darren Anstee Darren Anstee View Profile
  • A Hacker’s Confessions Pt. II Add to Schedule Michael Moltke  |   FortConsult  |   Keynote

    Keynote Theatre

    Thu 21th Sep 12:25 to 13:15

    A Hacker’s Confessions Pt. II

    FortConsult's Head of Technical Security Consulting Michael Moltke will show how a hacker operates in real life and shed light on the bad guys’ attack methods. Besides showing various types of phishing and spear-phishing attacks, Michael will illustrate what the hacker can do once a device is compromised. You will witness the whole attack scenario from initiation to post-exploitation – including gaining complete control of the infected device, using it to move seamlessly through a corporate network, gaining domain admin privileges, and retaining persistent (and unnoticed) access to the network.

    Speaker

    Photo Speaker Name Profile
    Michael Moltke Michael Moltke View Profile
  • Thu 21th Sep 13:30 - 14:00
  • It's not only Hollywood... It's real life: Cyber Security - what to do when you find your business in the crosshair of a global threat group Add to Schedule Bulent Teksoz  |   BAE Systems Applied Intelligence  |   Keynote

    Keynote Theatre

    Thu 21th Sep 13:30 to 14:00

    It's not only Hollywood... It's real life: Cyber Security - what to do when you find your business in the crosshair of a global threat group

    There used to be a time when the movies pushed our imagination as to what is possible. Lucky for us, or unlucky depending on where you stand, what we see in real life in the cyber security world is nothing less exciting than a multimillion dollar Hollywood blockbuster.

    Join us for a thrilling journey as one Fortune 500 company finds themselves in the crosshair of a global threat group, how the attack evolves, how they push back and what they do to keep the business running. Hint: it wasn't about shutting down the internet.

    Speaker

    Photo Speaker Name Profile
    Bulent Teksoz Bulent Teksoz View Profile
  • How to Tackle the GDPR: A Typical Privacy & Security Roadmap Add to Schedule Ian Evans  |   OneTrust   |   Cyber Threat Protection

    Cyber Threat Protection Theatre

    Thu 21th Sep 13:30 to 14:00

    How to Tackle the GDPR: A Typical Privacy & Security Roadmap

    As a new era of privacy regulations approaches, security and compliance professionals need to make GDPR a top priority. It is essential to build a roadmap with both privacy and security in mind. In this session, we’ll discuss the importance of privacy management within the context of your existing security and compliance ecosystem –– how it fits into the larger puzzle, why it has been precariously overlooked in the past, and how it can be seamlessly integrated as a function among the information security, information technology, risk management, audit and compliance, as well as legal areas in your organization. We’ll address the importance of demonstrating on-going compliance with privacy regulations like GDPR, and how privacy management software can support security and GRC teams.

    Speaker

    Photo Speaker Name Profile
    Ian Evans Ian Evans View Profile
  • Big Data Visualization with Spark Add to Schedule Rockie Yang   |   ThinkBig  |   AI, Analytics & IOT

    AI, Analytics & IOT Theatre

    Thu 21th Sep 13:30 to 14:00

    Big Data Visualization with Spark

    Understanding data without easy visualization tool is hard. Convey insights without interactive charts is difficult. The presentation will share how to explore data visually without pre-aggregate data on Spark. And share insights by charts in a self-contained file without loss any of interactive function.

    Speaker

    Photo Speaker Name Profile
    Rockie Yang Rockie Yang View Profile
  • Achieving IT Resilience Add to Schedule Egon van Dongen  |   Zerto   |   Cloud, Networks & Infrastructure

    Cloud, Networks & Infrastructure Theatre

    Thu 21th Sep 13:30 to 14:00

    Achieving IT Resilience

    Today, IT disruptions aren’t just weather-related disasters. Power outages, ransomware and even deploying new infrastructure can cause issues for IT. With the need for continuous availability organization need to be able to respond to a disruption so quickly that end-users and customers are not aware that a disruption occurred.

    Organizations that take a proactive approach to BC/DR, focus on continuous availability rather than recovery after the fact. Automation and simplification of replication and recovery are part of resilience, and ensure that companies can prove the availability of their applications and data at any time.

    Speaker

    Photo Speaker Name Profile
    Egon van Dongen Egon van Dongen View Profile
  • Brought to you by Packer Add to Schedule

    DevOps and Open Source Theatre

    Thu 21th Sep 13:30 to 14:00

  • The Swedish IT Security Index – the tool to benchmark your capability Add to Schedule Anders Strömberg  |   Advenica AB  |   Cyber Threat Intelligence

    Cyber Threat Intelligence Theatre

    Thu 21th Sep 13:30 to 14:00

    The Swedish IT Security Index – the tool to benchmark your capability

    The digitalization wave affects all organisations. IoT, Big Data and Cloud bridges IT-systems and blurs borders when handling information. Meanwhile is the cybersecurity threat changing in shape, motive and means which requires better tools and insights to defend against these threats. 

    To assess the operative and strategic information security maturity there is an online tool that can be used. Advenica presents the result from the online tool showing some interesting findings that are worth noting. For instance, less than 15% handle cybersecurity on a Board level. Also, 20% of the respondents has not identified its protective assets.

    Speaker

    Photo Speaker Name Profile
    Anders Strömberg Anders Strömberg View Profile
  • Thu 21th Sep 14:10 - 14:40
  • Innovations fuelled by IoT and the cloud Add to Schedule Adrian Hornsby  |   Amazon Web Services  |   Keynote

    Keynote Theatre

    Thu 21th Sep 14:10 to 14:40

    Innovations fuelled by IoT and the cloud

    Speed and agility are essential with today’s businesses. The quicker you can get from an idea to first results, the more you can experiment and innovate with your data, perform ad-hoc analysis, and drive answers to new business questions. During this talk, Adrian will take in key features of the AWS IoT platform, latest developments and live demos & walk-throughs featuring Raspberry Pi. 

    Speaker

    Photo Speaker Name Profile
    Adrian Hornsby Adrian Hornsby View Profile
  • Brought to you by Innosoft Add to Schedule

    Cyber Threat Protection Theatre

    Thu 21th Sep 14:10 to 14:40

  • A Practical Data Governance Plan for GDPR Compliance Add to Schedule Armin Wallrab  |   Talend   |   AI, Analytics & IOT

    AI, Analytics & IOT Theatre

    Thu 21th Sep 14:10 to 14:40

    A Practical Data Governance Plan for GDPR Compliance

    When GDPR takes effect in May 2018, data governance may become one of the most important elements of your data integration architecture. Whether personal data comes from an online form, a business partner, an internal CRM or HR system, or your data lake, if it concerns an EU resident, it falls under GDPR.

     

    A strong data governance program ensures that you have the policies, standards, and controls in place to enforce compliance. This session will detail a step-by-step plan for meeting GDPR requirements with a strong data governance program to put into action immediately.

    Speaker

    Photo Speaker Name Profile
    Armin Wallrab Armin Wallrab View Profile
  • Reserved Seminar Add to Schedule

    Cloud, Networks & Infrastructure Theatre

    Thu 21th Sep 14:10 to 14:40

  • Reserved Session Add to Schedule

    Cyber Threat Intelligence Theatre

    Thu 21th Sep 14:10 to 14:40

  • Thu 21th Sep 14:50 - 15:20
  • Measuring Security Culture is more than just counting people Add to Schedule Kai Roer  |   CLTRe  |   Keynote

    Keynote Theatre

    Thu 21th Sep 14:50 to 15:20

    Measuring Security Culture is more than just counting people

    Much has been said about improving security culture, but nothing can be done unless we can prove the effectiveness of our programs. In this talk I will share how to measure security culture using available tools and techniques. 

    Speaker

    Photo Speaker Name Profile
    Kai Roer Kai Roer View Profile
  • From APK to Golden Ticket: How we Became Domain Admins through a Secretary’s Phone Add to Schedule Giuseppe Trotta  |   FortConsult  |   Cyber Threat Protection

    Cyber Threat Protection Theatre

    Thu 21th Sep 14:50 to 15:20

    From APK to Golden Ticket: How we Became Domain Admins through a Secretary’s Phone

    In this session, Giuseppe Trotta will show how he got full access to a company’s corporate network by breaking in to an Android device…belonging to the receptionist. Using freely available information about the receptionist, he succeeded in luring her in to downloading an APK file with a reverse shell. With full access to the phone, he connected to the guest Wi-Fi of the company, and exploited unsafe configurations on the network to gain full access to the internal corporate network, including persistent access through domain admin credentials.

    Speaker

    Photo Speaker Name Profile
    Giuseppe Trotta Giuseppe Trotta View Profile
  • Reserved Session Add to Schedule

    AI, Analytics & IOT Theatre

    Thu 21th Sep 14:50 to 15:20

  • How to turn 25 years of ITSM experience into an app? Add to Schedule Neven Zitek  |   Span   |   Cloud, Networks & Infrastructure

    Cloud, Networks & Infrastructure Theatre

    Thu 21th Sep 14:50 to 15:20

    How to turn 25 years of ITSM experience into an app?

    The story about changing trends and constants within the IT industry, and how those trends may shape the future of your business without you even realising it.

    Short and inspiring story about how adoption of best ITSM practices (ITIL) and norms (ISO 20000) enabled our sustainable growth in IT business to the point where we felt competent and confident enough to venture into development of fully fledged Service Management System to be used by us and our Customers. Goal is to enable our Customers to use our experience and know-how for adoption of best ITSM practices, while maintaining growth in our core business of providing IT integration, software solutions, and best in class support for those.

    Speaker

    Photo Speaker Name Profile
    Neven Zitek Neven Zitek View Profile
  • DevOps in a Box - Build Early, Integrate Easily & Deploy Swiftly Add to Schedule Nishanth Sridharan  |   Cognizant Technology Solutions  |   DevOps and Open Source

    DevOps and Open Source Theatre

    Thu 21th Sep 14:50 to 15:20

    DevOps in a Box - Build Early, Integrate Easily & Deploy Swiftly

    DevOps adoption is resistance to a new culture and is designed to evangelize automation initiatives driving Sustainable Delivery, Competitiveness, Elasticity and Business Values with HighROI. Deliver a Federated Platform fulfilling traceability, security /compliance, integration and enterprise class capabilities with the RIGHT Approach. Organizations scuffle to deal with the changing IT and business landscapes, the conception of DevOps creates solution to transform smoothly and benefit the business.

    The pioneers in the industry have always invested in different approaches and always have the silo-based knowledge.

    DevOps focuses on fast-paced Virtual release platform delivering demanding requirements into fast, secure, reliable and scalable pipeline models.

    Speaker

    Photo Speaker Name Profile
    Nishanth Sridharan Nishanth Sridharan View Profile
  • Reserved Session Add to Schedule

    Cyber Threat Intelligence Theatre

    Thu 21th Sep 14:50 to 15:20

  • Thu 21th Sep 15:30 - 16:00
  • Tools and techniques to make GDPR compliance work across your organisation Add to Schedule Karen Lawrence Öqvist  |     |   Keynote

    Keynote Theatre

    Thu 21th Sep 15:30 to 16:00

    Tools and techniques to make GDPR compliance work across your organisation

    Cut the ”legal speak” and find a language, and tools/techniques which works across your organization on compliance with the General Data Protection Regulation (GDPR). The GDPR will replace existing EU data protection laws on 25th May 2018 in Sweden and every EU member state. and heavy fines await companies that do not comply. 

    It all seems so complicated, but in fact if you dig deep enough you will find hidden simplicity. Data privacy rules, at least the lowest common denominator in privacy have been around since 1980. There are quite simply 8 privacy principles. Privacy laws globally are all founded on these 8 principles, including the GDPR. By taking the lowest common denominator in privacy you can build a global privacy program using the GDPR as your privacy standard.

    Speaker

    Photo Speaker Name Profile
    Karen Lawrence Öqvist Karen Lawrence Öqvist View Profile
  • Förvaltningsmodeller Add to Schedule Hillar Loor  |   Open Source Sweden  |   DevOps and Open Source

    DevOps and Open Source Theatre

    Thu 21th Sep 15:30 to 16:00

    Speaker

    Photo Speaker Name Profile
    Hillar Loor Hillar Loor View Profile

Your schedule where you can plan your day, viewing all your scheduled seminars print or email them to yourself

Top