IP EXPO Nordic 2018 - Seminars 2018
19 - 20 SEPTEMBER 2018 / Stockholmsmässan

Here is a list of all confirmed Seminars for 2018. You can add these to your planner by clicking the 'add to schedule' button

  • Wed 19th Sep 09:00 - 09:50
  • Microsoft Keynote - AI & Future of Tech Add to Schedule

    Keynote Theatre

    Wed 19th Sep 09:00 to 09:50

  • Wed 19th Sep 10:00 - 10:30
  • The Next Generation of Wi-Fi, 802.11ax Add to Schedule Jonas Mellander  |   Aerohive Networks   |   Cloud, Network & Infrastructure

    Cloud, Network & Infrastructure Theatre

    Wed 19th Sep 10:00 to 10:30

    The Next Generation of Wi-Fi, 802.11ax

    With the advent of the next standard in Wi-Fi, 802.11ax, possibly the biggest change in Wi-FI and 802.11 ever is taking place. Through a range of different techniques, the new standard  is aiming at further improving efficiency in what today is most people’s primary access network.

    Speaker

    Photo Speaker Name Profile
    Jonas Mellander Jonas Mellander View Profile
  • Automate for quality, consistency and confidence Add to Schedule Bas Peters  |   GitHub  |   DevOps and Serverless

    DevOps and Serverless Theatre

    Wed 19th Sep 10:00 to 10:30

    Automate for quality, consistency and confidence

    When we think about automation in our development workflows, the first things that come to mind are continuous integration and continuous delivery. If you work in operations you might also think of infrastructure as code. However, there are other automation best practices that can help you to improve the quality of your software, to bring consistency in your work and give developers confidence to contribute.

    In this talk Bas will discuss the benefits of automation, when to automate and he will provide examples on how GitHub supports automating parts of your workflow and share best practices we follow at GitHub to build GitHub.

    Speaker

    Photo Speaker Name Profile
    Bas Peters Bas Peters View Profile
  • Enterprise computation: the next frontier in AI and Data Science Add to Schedule Conrad Wolfram  |   Wolfram Research  |   Keynote

    Keynote Theatre

    Wed 19th Sep 10:00 to 10:30

    Enterprise computation: the next frontier in AI and Data Science

    Organisations are investing heavily in data science and AI to empower a new era of analytics driven decision-making, but are often disappointed with the results. Why? A key cause has been ineffective use of today’s multi-paradigm computation. Common problems include fixation on one domain/approach, limited workflow automation, different computation tools for similar tasks, non-computable data and legacy interfaces. Given the needs of computation today’s data-rich organisations, the formation of an Enterprise-wide Computation Strategy is crucial. Conrad Wolfram will discuss what’s involved and demo live how the Wolfram Technology Stack—developed over 30 years—uniquely supports Enterprise Computation.

    Speaker

    Photo Speaker Name Profile
    Conrad Wolfram Conrad Wolfram View Profile
  • Demystifying the AI black box ACCESS PLUS Add to Schedule Adrian Hornsby  |   Amazon Web Services  |   Access Plus: AI, Analytics, IOT & Blockchain

    Access Plus: AI, Analytics, IOT & Blockchain Theatre

    Wed 19th Sep 10:00 to 10:30

    Demystifying the AI black box

    Self-Driving cars. Commercial drones. Smart cameras. Movie and music creation. Powerful & intelligent robots. Over the past few years, a new revolution has brought AI almost to the level of science-fiction. However, most companies are not worried about far-off futuristic applications of AI, they want to know what AI can do - today - for their organisations. Distinguishing the hype from reality can be a bit confusing, especially when you consider the attention that AI gets from the media and commentators. So, how can your organisation get started and put AI to work for you? That is the question I will answer in this talk. From greater customer intimacy, increasing competitive advantage and improving efficiency, I will discuss and show how AI can be used today and help the organisation in more impactful ways.

    Speaker

    Photo Speaker Name Profile
    Adrian Hornsby Adrian Hornsby View Profile
  • Brought to you by Flexera Add to Schedule

    Cyber Strategies Theatre

    Wed 19th Sep 10:00 to 10:30

  • Leveraging Identity Management to Achieve Acceptable Losses Add to Schedule Karl Lankford  |   Bomgar   |   Cyber Technologies

    Cyber Technologies Theatre

    Wed 19th Sep 10:00 to 10:30

    Leveraging Identity Management to Achieve Acceptable Losses

    When you’re under attack, being able to block intrusions with aggressive and automated identity management makes a huge difference in minimizing your losses and keeping your organization’s name out of the data breach headlines. During this session, Karl will explain how to redesign and automate your organization’s identity management to achieve acceptable losses, even during a cyberattack.

    Speaker

    Photo Speaker Name Profile
    Karl Lankford Karl Lankford View Profile
  • Wed 19th Sep 11:00 - 11:30
  • Zero Trust & The Flaming Sword of Justice Add to Schedule Dave Lewis  |   Duo Security  |   Keynote

    Keynote Theatre

    Wed 19th Sep 11:00 to 11:30

    Zero Trust & The Flaming Sword of Justice

    Security breaches pervade the headlines. What was seen as a rare instance just 5 years ago now seems to occupy the daily news cycle. A lot of these data breaches are made possible due to missteps and misconfigurations. There are many security issues that are introduced into website authentication mechanisms that further compound the security issues in addition to enforcing bad behavior by the end users. Security debt is a real problem for the vast majority of organizations in the world today and the attackers will utilize this to their advantage. In addition to keeping system hygiene at front of mind defenders need to focus on proper network zone segmentation or, as it more popular term these days, zero trust networks. The old conceptual style of a castle wall and moat to defend a network was deprecated several years ago. As a result of the dissolution of the traditional perimeter a stronger focus has to be placed on the strength of authentication, authorization and trust models for the users. 
The antiquated notion of an information security practitioner running through the office brandishing their flaming sword of justice above their heads screaming “thou shall not pass” has at long last reached it’s denouement. Whether you are responsible for the security in a financial organization or one that makes teddy bears it is necessary to adapt and learn to trust but, verify. 

    Speaker

    Photo Speaker Name Profile
    Dave Lewis Dave Lewis View Profile
  • Predictive security in a changing world Add to Schedule Erkan Djafer  |   Cisco  |   Cloud, Network & Infrastructure

    Cloud, Network & Infrastructure Theatre

    Wed 19th Sep 11:00 to 11:30

    Predictive security in a changing world

    The internet can no longer be viewed as a static entity, it is by its very nature a living organism. It grows and evolves just like a human being. Most security today focuses on static protection, a living dynamic entity such as the internet requires protection that also lives and grows dynamically. This presentation will cover mega trends in security, including how the evolution makes it more difficult to protect us and what predictive security intelligence can do to cope with the modern threats that lie ahead.

    Speaker

    Photo Speaker Name Profile
    Erkan Djafer Erkan Djafer View Profile
  • Get started with DevOps in government Add to Schedule Mieke Deenen  |   UWV, Netherlands  |   DevOps and Serverless

    DevOps and Serverless Theatre

    Wed 19th Sep 11:00 to 11:30

    Get started with DevOps in government

    It is about how you get started with DevOps when you are a government agency or a process oriented enterprise organization. I created a model based on our experiences to guide people from start at zero to results and beyond.

    The talk will be about our journey, why we started and how we are transforming into a DevOps organization, with all the hiccups we suffered and approaches to manage them. It is about the important pillars of DevOps and about using the strength of the organization to create technical and organizational confidence and to overachieve business and financial expectations.

    Speaker

    Photo Speaker Name Profile
    Mieke Deenen Mieke Deenen View Profile
  • HACKING EXPOSED: REAL WORLD TRADECRAFT OF BEARS, PANDAS AND KITTENS Add to Schedule Gavin Jay  |   CrowdStrike   |   Cyber Strategies

    Cyber Strategies Theatre

    Wed 19th Sep 11:00 to 11:30

    HACKING EXPOSED: REAL WORLD TRADECRAFT OF BEARS, PANDAS AND KITTENS

    This session explores the evolution of threats- from discrete criminal events to an offensive weapon. We’ll lift the lid on the latest attack techniques, adopted by nation state actors, which invariably find their way into the mainstream criminal world and are therefore an indicator of what to prepare for.
    Gavin will reference who the most active and advanced adversaries are, what attack vectors they typically employ, and how we can apply this intelligence to prevent, protect and respond.  Using simulated attack scenarios and personal examples of the speaker’s experience, attendees will learn how to spot indicators of compromise and attack, and how to safeguard their organisation accordingly.

    What attendees will learn:

    • How nation-state threats are crafted and how their Tactics, Techniques, and Procedures (TTPs) help identify them from more routine advanced attacks
    • Who are today’s most notable adversaries and the key European security themes based on the latest intelligence compiled across CrowdStrike’s global intelligence gathering operation
    • What are the indicators of attack and how you can apply them to defeat the adversary?

    Speaker

    Photo Speaker Name Profile
    Gavin Jay Gavin Jay View Profile
  • Channel Focused BDR Solution – Replibit DRaaS - Chain Free Backup! Add to Schedule Josh Chrisman  |   eFolder/Axcient  |   Cyber Technologies

    Cyber Technologies Theatre

    Wed 19th Sep 11:00 to 11:30

  • Microsoft Technical Track ACCESS PLUS Add to Schedule

    Access Plus: AI, Analytics, IOT & Blockchain Theatre

    Wed 19th Sep 11:00 to 11:30

  • Wed 19th Sep 11:40 - 12:10
  • The Intrapreneurs’ Survival Guide: The 10 questions every Intrapreneur should be ready to answer Add to Schedule Brian Curran  |   Oracle  |   Keynote

    Keynote Theatre

    Wed 19th Sep 11:40 to 12:10

    The Intrapreneurs’ Survival Guide: The 10 questions every Intrapreneur should be ready to answer

    Congratulations! You’ve volunteered (or you’ve been volunteered) to lead innovation in your company. Now comes the hard part. Your organization, despite its best intentions and efforts, may not be well designed to embrace innovation and the people who are changing “business as usual”. We know innovation is hard, so Intrapreneurs need a survival guide.

    Join Oracle's Brian J. Curran, Vice President of Innovation & Design, as he shares the 10 Questions every intrapreneur must be prepared to answer in order to survive the corporate gauntlet trying to kill them and their innovations.

    Speaker

    Photo Speaker Name Profile
    Brian Curran Brian Curran View Profile
  • Automation is more than just an IT trend Add to Schedule Kevin Reeuwijk  |   Puppet   |   DevOps and Serverless

    DevOps and Serverless Theatre

    Wed 19th Sep 11:40 to 12:10

    Automation is more than just an IT trend

    Automating infrastructure configuration and application release management at scale is the new competitive edge. Catching up means starting the journey toward pervasive automation. How does your enterprise compare and how does the journey begin?

    Speaker

    Photo Speaker Name Profile
    Kevin Reeuwijk Kevin Reeuwijk View Profile
  • The Convergence of Data Science and Software Development ACCESS PLUS Add to Schedule Margriet Groenendijk  |   IBM  |   Access Plus: AI, Analytics, IOT & Blockchain

    Access Plus: AI, Analytics, IOT & Blockchain Theatre

    Wed 19th Sep 11:40 to 12:10

    The Convergence of Data Science and Software Development

    In order to move past the hype and achieve the full potential of machine learning, data scientists and software developers need to work more closely together towards their common goal of delivering well-architected, data-driven applications. Every industry is in the process of being transformed by software and data. It is in the collaboration between data scientists and software developers where the real value can be found by creating integrated data workflows that benefit from the unique knowledge and skill sets of each discipline.

    Speaker

    Photo Speaker Name Profile
    Margriet Groenendijk Margriet Groenendijk View Profile
  • The New Era of Cyber-Threats: The Shift to Self-Learning, Self-Defending Networks Add to Schedule Suzette Loubser  |   Darktrace  |   Cyber Strategies

    Cyber Strategies Theatre

    Wed 19th Sep 11:40 to 12:10

    The New Era of Cyber-Threats: The Shift to Self-Learning, Self-Defending Networks

    In this session Suzette will discuss:

    ·         Leveraging machine learning and AI algorithms to defend against advanced, never-seen-before, cyber-threats

    ·         How new immune system technologies enable you to pre-empt emerging threats and reduce incident response time

    ·         How to achieve 100% visibility of your entire business including cloud, network and IoT environments

    ·         Why automation and autonomous response is enabling security teams to neutralize in-progress attacks, prioritise resources, and tangibly lower risk

    ·         Real-world examples of subtle, unknown threats that routinely bypass traditional controls

    Speaker

    Photo Speaker Name Profile
    Suzette Loubser Suzette Loubser View Profile
  • Ask not what the cloud can do for you – tell the cloud what you want. Add to Schedule Anna Rehnström  |   Basefarm  |   Cloud, Network & Infrastructure

    Cloud, Network & Infrastructure Theatre

    Wed 19th Sep 11:40 to 12:10

    Ask not what the cloud can do for you – tell the cloud what you want.

    In 2018, we have seen the use of cloud services increase like an avalanche. Applications created for the cloud that can scale themselves according to load. This imposes a different set-up of the control mechanisms throughout the organization. How do you know if your services running in the cloud matches your security expectations?

    The IT department is shifting its focus from traditional infrastructure to development of digital services, and the daily balance act of security versus "Faster time to market" and flexibility can sometimes be more reactive than proactive.

    Be prepared! Involuntary surprises are not an option any longer for you and your organization.

    Become the world class jumper horse who knows and respects the obstacles enough to be able to overcome them.

    Speaker

    Photo Speaker Name Profile
    Anna Rehnström Anna Rehnström View Profile
  • Turtles, Trust and the Future of Cybersecurity Add to Schedule Jeremy Agenais  |   Varonis   |   Cyber Technologies

    Cyber Technologies Theatre

    Wed 19th Sep 11:40 to 12:10

    Turtles, Trust and the Future of Cybersecurity

    Faith in our institutions is collapsing, and GDPR is here. What would cybersecurity look like if we started from scratch, right now, in our hybrid, interdependent world?  It would focus relentlessly on data. Learn how a data-centric security approach can reduce risk, increase efficiency and re-engineer trust in a society where faith has been shaken by unstoppable breaches.

    Speaker

    Photo Speaker Name Profile
    Jeremy Agenais Jeremy Agenais View Profile
  • Wed 19th Sep 13:20 - 13:50
  • The Perfect Storm: How wireless mini-sensors and simple, scalable IoT are changing everything Add to Schedule Erik Fossum Færevaag  |   Disruptive Technologies  |   Keynote

    Keynote Theatre

    Wed 19th Sep 13:20 to 13:50

    The Perfect Storm: How wireless mini-sensors and simple, scalable IoT are changing everything

    IoT holds great promise; over 40% of global CIOs believe that IoT will disrupt their business models within five years. And it will… Now with wireless mini-sensors the size of a keyboard key and with ultra-long battery life, organizations have access to an unprecedented amount of data to optimize their operations and reduce costs.

    Erik Fossum Færevaag reveals the recent breakthroughs in IoT you need to know for a successful IoT program. He’ll also share use cases for key industries from real estate and manufacturing to energy and healthcare.

    Speaker

    Photo Speaker Name Profile
    Erik Fossum Færevaag Erik Fossum Færevaag View Profile
  • Managing and protecting Data in Cloud-based infrastructures Add to Schedule

    Cloud, Network & Infrastructure Theatre

    Wed 19th Sep 13:20 to 13:50

    Managing and protecting Data in Cloud-based infrastructures

    The technical landscape is changing as organizations are redefining what hybridity means. Whether an application is running on-premises or in the public cloud, it’s important to ensure every application is easily and quickly protected, secured, and restored without sacrificing the scale-out. Learn how to manage all your data in this new reality that needs unlimited scale, API integration, automated control and global visibility.

  • What you see is what you get… for AWS infrastructure Add to Schedule Anton Babenko  |   Anton Babenko  |   DevOps and Serverless

    DevOps and Serverless Theatre

    Wed 19th Sep 13:20 to 13:50

    What you see is what you get… for AWS infrastructure

    Cloud solution architects and DevOps engineers want to have a faster conversion from idea to product. What if there would be a way to draw an architecture online and get the infrastructure for it implemented as code automatically. This is the reality.

    Speaker

    Photo Speaker Name Profile
    Anton Babenko Anton Babenko View Profile
  • The Artificial Intelligence race is on, and much bigger than you think ACCESS PLUS Add to Schedule Dr. Christian Guttmann  |   Nordic AI Institute  |   Access Plus: AI, Analytics, IOT & Blockchain

    Access Plus: AI, Analytics, IOT & Blockchain Theatre

    Wed 19th Sep 13:20 to 13:50

    The Artificial Intelligence race is on, and much bigger than you think

    Every business turns their eyes to new markets and opportunities in the area of Artificial Intelligence (AI), but very few business are really ready to seize these opportunities. I will outline how you move from your initial AI baby steps to capturing emerging markets, what is required to position yourself well, and what competencies you need to bring globally competitive products and services to your current and future customers.

    Speaker

    Photo Speaker Name Profile
    Dr. Christian Guttmann Dr. Christian Guttmann View Profile
  • Lessons from a red team exercise Add to Schedule Rob Shapland  |   Falanx Group  |   Cyber Technologies

    Cyber Technologies Theatre

    Wed 19th Sep 13:20 to 14:10

    Lessons from a red team exercise

    Ethical hackers from Falanx Group conduct red team tests to help organisations understand where they are vulnerable to advanced attacks. This presentation describes each step of a real-world exercise: planning and recon, spear phishing, telephone social engineering, building access, network exploitation and data exfiltration.As the story develops, you will discover how an attacker thinks, why they choose a particular strategy and what you can do to minimise your organisation’s vulnerability to advanced threats.

    Speaker

    Photo Speaker Name Profile
    Rob Shapland Rob Shapland View Profile
  • The future of authentication. Secure passwordless login for employees and customers. Add to Schedule

    Cyber Strategies Theatre

    Wed 19th Sep 13:20 to 13:50

    The future of authentication. Secure passwordless login for employees and customers.

    Interested in learning more about how you could transform your users experience and reduce IT support costs with secure passwordless authentication?

    Unlike early predecessors, newly-developed open authentication standards, such as FIDO U2F and FIDO 2, provide strong authentication and high privacy with characteristics that have eluded previous hardware tokens – elegance and simplicity. Impossible you think?

    This session will change your perceptions and eventually protect your online accounts.

  • Wed 19th Sep 14:00 - 14:30
  • GDPR - the calm after the storm Add to Schedule Karen Lawrence Öqvist  |   Privasee  |   Keynote

    Keynote Theatre

    Wed 19th Sep 14:00 to 14:30

    GDPR - the calm after the storm

    The 25th May has come and gone, but the storm is still in full swing. What is there more to do? How long will it last? And what kind of animal will privacy compliance within the EU -and beyond- grow into over the next 5 years?
     
    Privasee was the ‘first on the block’ founded to address the 6 most important words in the GDPR, “data protection by design by default”. Karen Lawrence Öqvist is founder/CEO and calls herself a ‘Privacy Practitioner’. She is a privacy advocate, author and speaker. She has hosted a privacy blog since 2007, published 2 books: ‘Virtual Shadows: Your Privacy in the Information Society’ (published by the British Computer Society, 2009), and ‘A Hands on Approach to GDPR Compliance’ (International Association of Privacy Professionals, 2018).

    Speaker

    Photo Speaker Name Profile
    Karen Lawrence Öqvist Karen Lawrence Öqvist View Profile
  • Brought to you by Netscout Add to Schedule

    Cloud, Network & Infrastructure Theatre

    Wed 19th Sep 14:00 to 14:30

  • Data Driven DevOps: Measure What Matters. Innovate Faster. Add to Schedule Eveline Oehrlich  |   New Relic Inc.  |   DevOps and Serverless

    DevOps and Serverless Theatre

    Wed 19th Sep 14:00 to 14:30

    Data Driven DevOps: Measure What Matters. Innovate Faster.

    DevOps adoption varies across industries and enterprises of all size.  Its promise of speed, agility and better software however is not just interesting for unicorns anymore.  Many challenges exist but the biggest challenge is data silos which limits the DevOps culture to thrive and be actionable. Successful DevOps journeys have mastered and optimized for the right culture; have adopted various automation technologies; leverage the concept of lean and have mastered measuring its success with full-stack visibility understanding real-time impact of their work. This session will explore the necessary evil of real-time analytics for the entire DevOps team.

    Speaker

    Photo Speaker Name Profile
    Eveline Oehrlich Eveline Oehrlich View Profile
  • Delivering Analytics at Scale with a Governed Data Lake ACCESS PLUS Add to Schedule Jean-Michel Franco  |   Talend   |   Access Plus: AI, Analytics, IOT & Blockchain

    Access Plus: AI, Analytics, IOT & Blockchain Theatre

    Wed 19th Sep 14:00 to 14:30

    Delivering Analytics at Scale with a Governed Data Lake

    Data privacy is on everyone's mind right now. Regulations such as GDPR, as well as public sentiment, mean that governance and compliance are must-have capabilities for data lakes. Learn how to curate meaningful data from your data lake, accelerate governance and compliance, and enable your organization with searchable, trusted datasets.

    Speaker

    Photo Speaker Name Profile
    Jean-Michel Franco Jean-Michel Franco View Profile
  • Common encryption myths busted Add to Schedule Jorgen Jansson  |   Gemalto  |   Cyber Strategies

    Cyber Strategies Theatre

    Wed 19th Sep 14:00 to 14:30

    Common encryption myths busted

    Gemalto will dispel some common encryption myths and reveal some easy encryption approaches that can be applied by any size organisation.

    Speaker

    Speaker Name Profile
    Jorgen Jansson View Profile
  • Wed 19th Sep 15:00 - 15:30
  • Work Smart and Stay Safe Add to Schedule Pritam Pabla  |   Google  |   Keynote

    Keynote Theatre

    Wed 19th Sep 15:00 to 15:30

    Work Smart and Stay Safe

    Google Chrome Enterprise offers proactive protections, granular policy controls and continuous vulnerability management. Join us to learn how to protect users and data at every cloud entry point with Chrome OS and Chrome Browser.

    Speaker

    Photo Speaker Name Profile
    Pritam Pabla Pritam Pabla View Profile
  • Data privacy & protection: A logical extension to DevOps Add to Schedule Chris Kerswell  |   Redgate Software   |   DevOps and Serverless

    DevOps and Serverless Theatre

    Wed 19th Sep 15:00 to 15:30

    Data privacy & protection: A logical extension to DevOps

    As a data professional you are likely responsible, in some part, for ensuring that your organization meets their data privacy and protection obligations. You are also familiar with the positive impact that standardizing your Database DevOps processes has for ensuring greater productivity and increased speed of delivery.

    But are you also considering data privacy and protection as part of your DevOps process? 

    In light of legislation like GDPR, making sure that any personally identifiable information (PII) is protected as it moves through your development and testing environments, is now an essential part of the process to ensure that your Database DevOps practices are compliant.

    Speaker

    Photo Speaker Name Profile
    Chris Kerswell Chris Kerswell View Profile
  • Can the Nordics Keep Up with AI Investments Around the World? ACCESS PLUS Add to Schedule Anders Arpteg  |   Peltarion  |   Access Plus: AI, Analytics, IOT & Blockchain

    Access Plus: AI, Analytics, IOT & Blockchain Theatre

    Wed 19th Sep 15:00 to 15:30

    Can the Nordics Keep Up with AI Investments Around the World?

    We have seen a large number of AI investments around the world recently, both from industry and from governments that are building nationwide AI programs. The United States are leading today, but China has declared its intention to become "the world's primary AI innovation center" by 2030. The European Commission has outlined a three-pronged approach to increase public and private investment in AI. Countries such as France, Germany, Finland, and now also Sweden are building nation-wide AI programs. Why are we seeing all these investments now, what are the most recent AI advances, and can the Nordics keep up?

    Speaker

    Photo Speaker Name Profile
    Anders Arpteg Anders Arpteg View Profile
  • How to Tackle the GDPR: A Typical Privacy & Security Roadmap Add to Schedule Ian Evans  |   OneTrust   |   Cyber Strategies

    Cyber Strategies Theatre

    Wed 19th Sep 15:00 to 15:30

    How to Tackle the GDPR: A Typical Privacy & Security Roadmap

    As a new era of privacy regulations is upon us, security and compliance professionals must make GDPR a top priority. It is essential to build a roadmap with both privacy and security in mind. In this session, we’ll discuss the importance of privacy management within the context of your existing security and compliance ecosystem –– how it fits into the larger puzzle, why it has been precariously overlooked in the past, and how it can be seamlessly integrated as a function among the information security, information technology, risk management, audit and compliance, as well as legal areas in your organization. We’ll address the importance of demonstrating on-going compliance with privacy regulations like GDPR, and how privacy management software can support security and GRC teams.

    Speaker

    Photo Speaker Name Profile
    Ian Evans Ian Evans View Profile
  • Privileged Account Management, Ensuring Least Privilege – a highly practical guide Add to Schedule Scott Shields  |   Thycotic Software   |   Cyber Technologies

    Cyber Technologies Theatre

    Wed 19th Sep 15:00 to 15:30

    Privileged Account Management, Ensuring Least Privilege – a highly practical guide

    Recent reports show 85% of reported breaches involve compromised endpoints, and 80% of breaches involve Privileged Credentials. Traditional Antivirus and Anti-malware blacklisting can’t keep up with new and advanced threats targeting desktops, laptops and servers. Whilst if you are storing privileged account passwords and credentials in spreadsheets, you will have no doubt this poses a serious security risk.
     
    Join us as we take you through a number of tools and techniques that you can implement in order to quickly cut down your excess privilege exposure and take back full control of your most precious and important privileged accounts. Register today!
     

    Speaker

    Photo Speaker Name Profile
    Scott Shields Scott Shields View Profile
  • Wed 19th Sep 15:40 - 16:10
  • Brought to you by Fingerprints ACCESS PLUS Add to Schedule

    Access Plus: AI, Analytics, IOT & Blockchain Theatre

    Wed 19th Sep 15:40 to 16:10

  • Brought to you by Microsoft Add to Schedule

    Cyber Strategies Theatre

    Wed 19th Sep 15:40 to 16:10

  • The Secret World of the Formula 1 pit lane Add to Schedule Marc Priestley   |   Independent  |   Keynote

    Keynote Theatre

    Wed 19th Sep 15:40 to 16:10

    The Secret World of the Formula 1 pit lane

    Marc spent ten years as a mechanic on the McLaren Formula One pit crew. Looking at every aspect of F1, he explains the communication, teamwork, pressure and strategy to secure marginal gains. With each car generating 10mb of data per lap, analysts look ever more closely at competitors’ decisions in an effort to optimise their own team performance. Marc also provides insight for Sky Sports, and is part of the ITV team covering the electrically-powered Formula E, showcasing the latest British racing technology.

    Speaker

    Photo Speaker Name Profile
    Marc Priestley Marc Priestley View Profile
  • Analytics through the DevOps lifecycle Add to Schedule Ulf Thornander  |   Splunk   |   DevOps and Serverless

    DevOps and Serverless Theatre

    Wed 19th Sep 15:40 to 16:10

    Speaker

    Photo Speaker Name Profile
    Ulf Thornander Ulf Thornander View Profile
  • Futureproof with Immediate Impact Add to Schedule Imran Idrees  |   Cisco Meraki   |   Cloud, Network & Infrastructure

    Cloud, Network & Infrastructure Theatre

    Wed 19th Sep 15:40 to 16:10

    Futureproof with Immediate Impact

    For a business the network is ultimately a tool that’s used to deliver an objective. In today’s digital world business are vying to roll out new initiatives to gain a competitive edge. During this session we will cover how Cisco Meraki technology can help organisations be first to achieve their digital ambitions whilst also providing an immediate impact to their bottom line in the form of operational savings.

    Attendees will receive a free Cisco Meraki Access Point

    Speaker

    Speaker Name Profile
    Imran Idrees View Profile
  • The importance of Data Availability and Data Recovery Add to Schedule Helen McHugh  |   eFolder/Axcient  |   Cyber Technologies

    Cyber Technologies Theatre

    Wed 19th Sep 15:40 to 16:10

    Speaker

    Photo Speaker Name Profile
    Helen McHugh Helen McHugh View Profile

Your schedule where you can plan your day, viewing all your scheduled seminars print or email them to yourself

Top