Agenda

Search by track

Search by tag

Apr 28 2015

Registration, Breakfast and Networking

Case Study: Cloud Computing for the Business – How to Implement and When?

RK Hiremane , Regional Director Datacenter and IoT Product Marketing - APJ, Intel Corporation

With increasing complexities in business needs, IT professionals are looking towards Cloud Computing as an alternative for better scalability, flexibility and more efficient use of OPEX. This is even more so with increasing business needs for big data analytics and mobility. In this case study, understand TCO and lifecycle models to determine how and when to move to Cloud computing, to formulate a business case to your management.


Morning Coffee Break

Enhancing Security Architecture in the Modern Data Center Through Network Virtualization

Davy A Trinugraha, Solutions Consultant, VMware Indonesia

The benefit of virtualization is clear; it creates a more dynamic and efficient data center. However, the road to virtualize and maintain such modern data center is one that faces many hurdles, including security challenges. Understand the common challenges in virtualization, and how they can be addressed through case studies, best practices and the adoption of VMware NSX.


The Storage Story, now till 2020 – Considering Hyperconverged Architectures, Deployment, Workloads and Efficiency

John C Phillips , Director, Product Management APJ, HP Helion Cloud

In the fast-paced IT environment, legacy enterprise storage, servers and networking infrastructure become rapidly obsolete. With virtualization, cloud computing and the deployment of new applications, IT organizations need to reassess their infrastructure, looking critically at service delivery requirements, efficiency, centralized management, scalability and business competitive advantage. This presentation looks into hyper-converged infrastructure and its future as the solution to storage performance problems through virtualization, server SAN, deduplication, and WAN optimization.


Networking Lunch

Expert Panel: Are Your Users the Biggest Security Threat To Your Organisation?

Aat Ruhimat, Country Lead - IT Governance, PT CIMB Securities Indonesia John Ellis, Chief Strategist, Cyber Security (APJ), Akamai Technologies Rahmat Mulyana , Government & Regulatory Advocacy SC1 / Vice President, ISACA Indonesia Chapter Yasser Hadiputra , Chief Editor & Founder, CISO Magazine

2014 was described as The Year of the Breach with high-profile organisations around the world falling victim to cyber criminals. But in fact, negligence of internal users was identified as the main threat to security. How can we align the trinity of technology, policy and management to give a maximum boost to secure our IT infrastructure? How must DC strategy adapt to mitigate risk and future threats?


Evening Drinks Reception

Back to main programme