Program

Wednesday, June 15

Time Title
10.30 - 11.00 hrs

How Cisco SDN will secure your Data Center


Cisco’s Application Centric Infrastructure (ACI) solution enables customers to simplify and secure their Data Center. How can we monitor individual apps? How can we make sure the network policies and segments behave as you have configured them (proof it). In this presentation Jan Heijdra (Product Specialist – ACI) will discuss the security and segmentation benefits that ACI will deliver.

By Anna Shepelenko, Technical Solutions Architect - ACI and N9K EMEAR, Cisco

11.15 - 11.45 hrs

Datacenter converged infrastructure: What’s next?


After the birth of Cisco UCS in 2009, Cisco entered successfully the converged infrastructure market in 2010. Since then we have seen a lot of developments like solutions for Big Data, Software Defined, hyper convergence, automation and the most recent hype: composable infrastructure. During this session we look at these trends and the future of converged, and how Cisco addresses these opportunities with its portfolio.

By Tomas Van Beek, Data Center Systems Engineer, Cisco

12.00 - 12.30 hrs

The importance of end-point protection in an end-2-end security strategy


We believe that our vision of delivering end-to-end security solutions – from the cloud to the network to the endpoint – is essential to reduce risk, gain competitive advantage and make security a growth engine for organisations. We offer end-to-end security solutions which delivers deep endpoint visibility into application flows, allowing security administrators to extend visibility down to the device and track behavior off and on premise and quickly spot and scope internal threats arising from compromised systems or inappropriate insider behavior. The key point here is deep endpoint visibility. During the session we will explain why that is.

By Henrik Collin, Security Evangelist , Cronos Security

12.45 - 13.15 hrs

Cloud Accelerated by Cisco ACI


A journey to the Next Generation Cloud:

  • A real case
  • A real success

By Frederic Munster, IT Strategy Consultant - Cloud Architect - Dimension Data

13.30 - 14.00 hrs

Cisco’s Secret Security Weapon “TALOS” and the evolving threat landscape


Talos is Cisco’s Threat Research group.  Today's IT organizations need security solutions relying on leading threat intelligence to effectively safeguard their extended networks. Creating leading threat intelligence is the focus of the Cisco Talos Security Intelligence and Research Group.

In this session, you will learn:

  • What is Talos? What can it mean to you?
  • Learn about the scale and severity of the current threat landscape
  • Discover how attackers target specific organizations and users
  • Understand changes in attack behavior, including innovation in the shadow economy

By Holger Unterbrink, Technical Lead, Engineering, Talos

14.15 - 14.45 hrs

Logical Next Step in Security - Network as a Sensor


Lancope enhances Cisco’s Security Everywhere strategy, enabling the network to become a security sensor, delivering continuous visibility, and accelerating incident response across the extended enterprise.  Lancope provides deep understanding of network traffic, continuously monitoring and analyzing network flows to establish a security baseline, detect anomalous threats, and enable rapid containment.

By Daniel Tulen Senior Channel SE, Europe from Lancope, part of Cisco

15.00 - 15.30 hrs

Why every business needs a Cloud of Clouds


  • Over 40% of CIOs expect to manage a hybrid multi-cloud environment within two years, but are they making most of the potential?
  • How do I manage multiple suppliers  across multiple clouds? How do I ensure compliance? Who will be in control? How do I future-proof?

The cloud computing idea is simple but, in the future, no business will be successful unless it has a Cloud of Clouds strategy.

By Robbert Vogel, Head of BT Compute

15.45 - 16.15 hrs

Data breach Detection - Leverage your existing infrastructure to get more visibility


Fighting against the current cyber threats it is a hard challenge in the current World - lack of resources, lack of skills, Cloud adoption and mobility which make the IT perimeter difficult to define.

During this presentation Christophe will present different ways to leverage your existing infrastructure to be able to detect the malicious activities and put in place in few steps the foundation for improving your detection but also
your reaction capabilities.

We will look for a typical framework of controls and technologies which should be part of your reflexion based on the malicious landscape companies faced nowadays

By Christophe Bianco, Managing Partner, Excellium Services

Thursday, June 16

Time Title
10.30 - 11.00 hrs

Cisco’s Secret Security Weapon “TALOS” and the evolving threat landscape


Talos is Cisco’s Threat Research group.  Today's IT organizations need security solutions relying on leading threat intelligence to effectively safeguard their extended networks. Creating leading threat intelligence is the focus of the Cisco Talos Security Intelligence and Research Group. 

In this session, you will learn:

  • What is Talos? What can it mean to you?
  • Learn about the scale and severity of the current threat landscape
  • Discover how attackers target specific organizations and users
  • Understand changes in attack behavior, including innovation in the shadow economy

By Holger Unterbrink, Technical Lead, Engineering, Talos

11.15 - 11.45 hrs

Logical Next Step in Security - Network as a Sensor

Lancope enhances Cisco’s Security Everywhere strategy, enabling the network to become a security sensor, delivering continuous visibility, and accelerating incident response across the extended enterprise.  Lancope provides deep understanding of network traffic, continuously monitoring and analyzing network flows to establish a security baseline, detect anomalous threats, and enable rapid containment.

By Daniel Tulen Senior Channel SE, Europe from Lancope, part of Cisco

12.00 - 12.30 hrs

Data breach Detection - Leverage your existing infrastructure to get more visibility


Fighting against the current cyber threats it is a hard challenge in the current World - lack of resources, lack of skills, Cloud adoption and mobility which make the IT perimeter difficult to define

During this presentation Christophe will present different ways to leverage your existing infrastructure to be able to detect the malicious activities and put in place in few steps the foundation for improving your detection but also
your reaction capabilities.

We will look for a typical framework of controls and technologies which should be part of your reflexion based on the malicious landscape companies faced nowadays

By Christophe Bianco, Managing Partner, Excellium Services

12.45 - 13.15 hrs

Why every business needs a Cloud of Clouds


  • Over 40% of CIOs expect to manage a hybrid multi-cloud environment within two years, but are they making most of the potential?
  • How do I manage multiple suppliers  across multiple clouds? How do I ensure compliance? Who will be in control? How do I future-proof?

The cloud computing idea is simple but, in the future, no business will be successful unless it has a Cloud of Clouds strategy.

By Robbert Vogel, Head of BT Compute

13.30 - 14.00 hrs

How Cisco SDN will secure your Data Center


Cisco’s Application Centric Infrastructure (ACI) solution enables customers to simplify and secure their Data Center. How can we monitor individual apps? How can we make sure the network policies and segments behave as you have configured them (proof it). In this presentation Jan Heijdra (Product Specialist – ACI) will discuss the security and segmentation benefits that ACI will deliver.

By Anna Shepelenko, Technical Solutions Architect - ACI and N9K EMEAR, Cisco

14.15 - 14.45 hrs

Datacenter converged infrastructure: What’s next?


After the birth of Cisco UCS in 2009, Cisco entered successfully the converged infrastructure market in 2010. Since then we have seen a lot of developments like solutions for Big Data, Software Defined, hyper convergence, automation and the most recent hype: composable infrastructure. During this session we look at these trends and the future of converged, and how Cisco addresses these opportunities with its portfolio.

By Tomas Van Beek, Data Center Systems Engineer, Cisco

15.00 - 15.30 hrs

Cloud Accelerated by Cisco ACI


A journey to the Next Generation Cloud:

  • A real case
  • A real success

By Frederic Munster, IT Strategy Consultant - Cloud Architect - Dimension Data

15.45 - 16.15 hrs

The importance of end-point protection in an end-2-end security strategy


We believe that our vision of delivering end-to-end security solutions – from the cloud to the network to the endpoint – is essential to reduce risk, gain competitive advantage and make security a growth engine for organisations. We offer end-to-end security solutions which delivers deep endpoint visibility into application flows, allowing security administrators to extend visibility down to the device and track behavior off and on premise and quickly spot and scope internal threats arising from compromised systems or inappropriate insider behavior. The key point here is deep endpoint visibility. During the session we will explain why that is.

By Henrik Collin, Security Evangelist , Cronos Security