Registration, Breakfast and Networking
Apr 28 2015
RK Hiremane , Regional Director Datacenter and IoT Product Marketing - APJ, Intel Corporation
With increasing complexities in business needs, IT professionals are looking towards Cloud Computing as an alternative for better scalability, flexibility and more efficient use of OPEX. This is even more so with increasing business needs for big data analytics and mobility. In this case study, understand TCO and lifecycle models to determine how and when to move to Cloud computing, to formulate a business case to your management.
Davy A Trinugraha, Solutions Consultant, VMware Indonesia
The benefit of virtualization is clear; it creates a more dynamic and efficient data center. However, the road to virtualize and maintain such modern data center is one that faces many hurdles, including security challenges. Understand the common challenges in virtualization, and how they can be addressed through case studies, best practices and the adoption of VMware NSX.
John C Phillips , Director, Product Management APJ, HP Helion Cloud
In the fast-paced IT environment, legacy enterprise storage, servers and networking infrastructure become rapidly obsolete. With virtualization, cloud computing and the deployment of new applications, IT organizations need to reassess their infrastructure, looking critically at service delivery requirements, efficiency, centralized management, scalability and business competitive advantage. This presentation looks into hyper-converged infrastructure and its future as the solution to storage performance problems through virtualization, server SAN, deduplication, and WAN optimization.
Aat Ruhimat, Country Lead - IT Governance, PT CIMB Securities Indonesia John Ellis, Chief Strategist, Cyber Security (APJ), Akamai Technologies Rahmat Mulyana , Government & Regulatory Advocacy SC1 / Vice President, ISACA Indonesia Chapter Yasser Hadiputra , Chief Editor & Founder, CISO Magazine
2014 was described as The Year of the Breach with high-profile organisations around the world falling victim to cyber criminals. But in fact, negligence of internal users was identified as the main threat to security. How can we align the trinity of technology, policy and management to give a maximum boost to secure our IT infrastructure? How must DC strategy adapt to mitigate risk and future threats?