IoT Security Leaders’ Summit
Tuesday 5th March 2019,
Security is a fundamental problem for the Internet of Things. Before the IoT, businesses had to worry about updating their servers, content management systems, and desktop computers. Today, they have to worry about updating everything from connected coffee machines to security cameras. Businesses are bringing insecure devices into their networks, and then failing to update the software. Failing to apply security patches is not a new phenomenon, but insecure IoT devices with a connection to the open internet are a disaster waiting to happen!
But for all the conveniences IoT devices afford us, there's still one major concern that users need to consider: Security. Anything that's connected to the internet has the potential to be hacked and misused. This is especially unsettling considering the amount of personal data IoT devices collect and use.
Join us at the IoT Security Summit where we will be discussing how you can protect your business and customers from major IoT vulnerabilities.
Topics to be addressed:
• Setting clear policies on anonymizing user data, as well as data retention, to help limit potential problems
• The impact of digital business and globalisation on IoT security
• Cyber Security in Automotive Production, Manufacturing, Healthcare & Transportation
• Security of Industrial Control Systems
• Navigating the Regulatory Landscape of Blockchain Powered IoT Transactions
• Emerging Trends in IoT Security
• Evaluating how IoT devices and the data they collect can be used to endanger people as part of a modern-day risk assessment
• Is Artificial Intelligence the future of Cyber Security or are AI Cyber Attacks the next generation of threat to IoT
• Identity Based Lifecycle Management for Trusted IoT Supply Chain
• The Emerging Battle for the IoT Edge: How Security can be Used to Gain Competitive Advantage and Protect the Next Wave of Innovation
• Using Blockchain to secure the Internet of things: Authentication, Mitigating Central Point of Failure & beyond
• Securing the Internet of Things: Edge Device, Network & Cloud Security challenges & solutions
• Industrial & Consumer IoT Leveraging New & Emerging Technology
17th/18th June 2019
As businesses continue to reinvent their technology strategies in the age of digital transformation and customer-centricity, unified communications is becoming an increasingly important part of their end-to-end business processes. Unified communications is about much more than being able to make and receive calls from mobile devices, or being able access email and other corporate resources remotely. These are merely a few fragments of the many that create a unified experience and break down traditional communications gaps in siloed business structures.
UCC Confex is designed to provide Heads of IT and Communication Executives all the insight/knowledge and technology needed to build a world-class UCC strategy. Learn from top UCC experts to streamline tech deployments, optimise collaboration and adopt flexible, mobile working The event features senior IT & Telecom executives from a wide range of enterprises who will describe their migration strategies, decision criteria and the lessons learned from installing state-of-the-art communications and collaboration systems and applications.
The Middle East’s must attend event, specifically focusing on the business objectives of key decision makers in enterprise communications and collaboration. It's the ideal platform for meeting with your peers and learning how other organisations are adopting UCC into their business. UCC Agenda will discuss the latest systems, software, services and applications for enterprise communications and collaboration. The event is designed to help you maximize your investments in communications and collaboration systems, software and services, enabling:Greater Business Efficiency, Increased Customer Satisfaction, More Engaged Employees, & Revenue Growth.
(Meet the cutting edge technology providers and experience the latest collaboration and conferencing products in the Unified Communications and Collaboration Expo)
Vendors will include:
Enterprise communication services
Remote worker / teleworker technologies
Cloud services/Artificial Intelligence/Security
Unified communications and collaboration technologies
Networked interactive whiteboards
Unified communications as a service (UCaaS) providers
Videoconferencing and telepresence systems
Videoconferencing as a service (VCaaS) providers
Managed services providers
Collaboration systems integrators
ICT service providers
UC Networks/SIP trunking
Who should Attend:
Cross Industry Enterprises:
IT Directors/Managers, CIO’s, CTO’s, ITO’s, CISO’s, Heads of IT, Heads of Infrastructure, Solution & Enterprise Architects, Network and System Engineers, and Unified Communications Specialists, Network Managers, CFO’s, CEO’s
VAR’s, Distributors, System Integrators,
Cloud Migration & Risk Management Summit
City of London
Enterprises need to move to cloud to stay agile, flexible and competitive, but they need to do it without risking business disruption, security, compliance or performance.
The Cloud Migration & Risk Management Summit will bring together a unique combination of real-world user experiences and case studies, as well as practical, technical debates focused on specific approaches and skills for migrating and maintaining a secure cloud infrastructure. As an attendee, you’ll explore current approaches, tools, and techniques with fellow practitioners facing similar cloud-related migration & security challenges.
IEEE conducted a survey to explore the challenges, strategies, and awareness of Cloud professionals when it comes to Cloud migration and monitoring; and to surface top priorities for effective deployment, performance and security as they adopt cloud as a key IT initiative for the business!Some of the key findings include:
• 56% of companies surveyed have started migrating to the cloud and their top priorities include visibility for end-to-end service assurance, optimizing cost and ensuring security of data.
• 45% of respondents say visibility throughout the migration is critical. Understanding how services perform before, during and after cloud deployments is the best strategy for realizing the benefits of cloud adoption.
• 40% of DevOps teams say performance monitoring is a key concern. Implementing pervasive visibility of traffic flows on-premises and in private and public clouds – is the top strategy for service assurance.A snap-shot of “Topics” to be addressed:
• Key Considerations of an Effective Cloud Strategy
• Evaluating the best mix of private and public cloud options for your business
• How enterprises are dealing with legacy applications versus cloud-native applications with each approach
• How to migrate legacy backups to the cloud
• Building a private cloud infrastructure
• How to achieve the optimum “Hybrid IT” model?
• How to design “Hybrid Cloud” for consolidation of enterprise workloads & Infrastructure
• Securing the “Hybrid Environment”
• What a typical private and hybrid cloud journey looks like and how it might modify your organization IT’s landscape
• How to gain comprehensive visibility and security for your “Hybrid Environment”
• Next Steps in Digital Transformation
• Data protection’s role in cloud migration and IT modernization
• Challenges and tips for securing your evolving “Cloud Footprint”
• Journey from initial adoption of DevOps to full implementation
• Integrating Security into your cloud applications & DevOps processes
• Strategies for Managing Compliance and Security in the Cloud
• What is driving enterprises to use multi-cloud?
• Best practices for maximizing flexibility in a multi-cloud environment
• How to secure a multi-cloud architecture?