26-27 November, 2018 AUDI Forum Neckarsulm, Germany
|
|
- Ginger Wheeler
- 5 years ago
- Views:
Transcription
1 26-27 November, 2018 AUDI Forum Neckarsulm, Germany
2 Transform Now! The automotive industry is undergoing the biggest change in its entire history. Germany will ban the sale of new cars with internal combustion engines from 2030, as well as recently French government has stated to restrict the sale of petrol and diesel cars by 2040 after Volvo has announced they will only sell electric and hybrid vehicles from as early as Market Research Future predicts the Autonomous Vehicle market is projected to reach USD $65.3 billion by 2027 with 26.2% CAGR during the review period of All of this creates a crucial challenge for the car companies. Like, how to stay competitive on the market in a such a quick transformation? Or, what is needed to gain from this transformation? The Automotive Innovation Summit 2018 in Neckarsulm will attempt to answer this with the help of leading professionals and experts from around the world. Over the two days, at Audi Forum in Neckarsulm, Germany the summit will cover discussions, real-life case studies and workshops about the fast transforming and innovating trends in the automotive industry. This is the summit where the industry-leaders, car manufacturers, suppliers, experts and entrepreneurs meet and intimately discuss and present their ideas on the future trends in the automotive industry.
3 Theme Topics Conference Chairman Autonomous Driving Cyber Security Issues created by Digital, Connected Manufacturing Systems Chris Davis Chairman of the board & CEO Dunlop Systems & Components, United Kingdom Connected and scalable electronic control unit development Speakers Edge Computing and 5G technologies supporting automotive services Threat Modeling for Automotive Cyber Security in Manufacturing Robert C. Bush Jr. Horizon 2020 SME Innovation Advisor European Commission, Belgium Ralf Leiter Engineering Director ESC Mando Corp, Germany Joachim Leder Future GA at Opel, Senior Consultant at KnüvenerMackert, Germany Dario Sabella Senior Manager Standards and Research Intel, Germany MEC Secretary and Lead of Industry Groups ETSI, Germany
4 Francisco Marco Rius Data Science Team Leader Faurecia, Spain Kai Pinnow Project Manager Etas Group (a Robert Bosch Company), Germany Steven Wierckx Security Consultant Toreon, Belgium Tim LeBeau Chief Commercial Officer Seek Thermal, United States Jürgen Großmann Senior Researcher & Project Manger, Fraunhofer FOKUS, Germany
5 DAY ONE - November 26th 8:30 9:00 Registration and Welcoming Breakfast (please use your QR code to register) 9:00 9:10 Opening Speech from the Conference Chair 9:10 9:50 KEYNOTE: Back To the Future How our Analog Lives Create Challenges for the Digital Future Robert C. Bush Jr. The Automobile Industry: On Status, Culture and Ethics. We will explore the role that cars have had on creating culture, encouraging identity, and reflecting societal ethics. Horizon 2020 SME Innovation Advisor European Commission, Belgium Autonomous Mobility 9:50 10:30 KEYNOTE: Autonomous Driving What are the top challenges concerning autonomous driving? Tim LeBeau Chief Commercial Officer Seek Thermal, United States 10:30 11:00 Networking Break (with coffee, tea and refreshments) 11:00 11:40 KEYNOTE: Edge Computing and 5G technologies supporting automotive services Dario Sabella Senior Manager Standards & Research Intel, Germany MEC Secretary and Lead of Industry Groups ETSI, Germany Edge computing is a commonly recognized key technology supporting 5G systems. Currently ETSI MEC is the only international standard available for edge computing, addressing many vertical market segments like automotive. The presentation will provide an overview of Edge Computing and how this technology is related to 5G systems, and the involvement of Intel in the MEC standard and industry groups, with particular reference to 5GAA (5G automotive association).
6 Big Data 11:40 12:20 KEYNOTE: Connected and scalable electronic control unit development Kai Pinnow Project Manager Etas Group (a Robert Bosch Company), Germany Information technology advances in the past ten years enable streamlined and powerful cloud-based development environments. Big data analytics and computing scalability in such systems allow for continuous integration and testing and together with over-the-air connectivity new options for validation emerge. While standards may be seen as progressing too slowly to keep pace with shortened innovation cycles, they do provide the necessary flexibility for the alliances required to cope with the demanding situations. 12:20 13:20 Networking Lunch 13:20 14:00 KEYNOTE: Challenges and answers for big data analytics in manufacturing Challenges that Faurecia has faced to deal with the data coming from different technologies. Focused mainly in manufacturing, I will go through the different phases of the analytical part finishing in the deployment of solutions. Francisco Marco Rius Data Science Team Leader Faurecia, Spain How these activities are adding value to the company in very different ways, like prevention of breakdowns, the root cause of quality issues and prevention of delivery issues. Research and development branch where we use different machine learning algorithms applied to manufacturing to explore new boundaries of added value using big data. 14:00 14:40 KEYNOTE: Cyber Security Issues Created by Digital, Connected Manufacturing Systems Analyze the need for collaboration and data sharing throughout the value chain to enhance product validity Ralf Leiter Engineering Director ESC Mando Corp, Germany Understand the additional degree of protection necessary to address the cyber-threats that concentrate on an interconnected system of suppliers and customers Explore the best practices for security management of cyber-physical systems that brings together operations technology with information technology
7 14:40 15:10 Networking Break (with coffee, tea and refreshments) 15:10 17:10 WORKSHOP: Threat modeling for automotive In this workshop we will first introduce threat modeling as it is known for software development. We will discuss how automotive design/manufacturing processes are similar and where they differ. In smaller groups we will do a threat model exercise and figure out how threat modeling can be fit into the automotive design processes. Steven Wierckx Security Consultant Toreon, Belgium 17:10 18:00 Kai Pinnow Project Manager Etas Group (a Robert Bosch Company), Germany Tim LeBeau Chief Commercial Officer Seek Thermal, United States 18:00 20:00 20:00 PANEL DISCUSSION: Connected and Autonomous Vehicles: The Journey So Far and The Road Ahead What do we believe is the public perception and how can we establish what it is if not already done? What will the connected and autonomous vehicles market look like in the future - is this the end of the traditional car manufacturer? How will the growth of the autonomous vehicle market change car ownership? Evening Reception End of Day One
8 DAY TWO - November 27th 09:00 11:00 AUDI Production Plant Tour 11:30 13:00 Networking Lunch 13:00 13:10 Introduction Speech from the Conference Chair 13:10 13:50 KEYNOTE: Ahead of The Curve Chris Davis Chairman of the board & CEO Dunlop Systems & Components, United Kingdom Technology is moving at an incredible pace. It is more important than ever to understand innovation. The aim of this keynote is to give insight into how to be more innovative. We will consider some of the barriers to creativity and how we can overcome them. Also some use of diagnostics and finally tools designed to aid the creative process. It will be shown that creativity positivity are learnable skills Automotive Security 13:50 14:30 KEYNOTE: EU-SEC The European Certification Framework Jürgen Großmann Senior Researcher & Project Manger Fraunhofer FOKUS, Germany The provision of a trustworthy and certified cloud services is a necessary condition to provide trustworthy infrastructure for other added value services. While Cloud Service Providers are pushed to invest resources in compliance audits, the proliferation of certification schemes is leading to increased assessment costs, confusion of users and market barriers for SMEs. The EU Project EU-SEC
9 14:30 15:10 KEYNOTE: Cyber security in Manufacturing Joachim Leder Future GA at Opel, Senior Consultant at KnüvenerMackert, Germany Goals of Security - CIA Triad The Evolving Vulnerable Flanks - Possible attack goals - From single parts to complete vehicle Security Needs of Manufacturing - Security Lifecycle Establishing Security in Manufacturing - Major tasks Outlook for the Future - Next security focus 15:10 15:40 Networking Break (with coffee, tea and refreshments) 15:40 17:00 PANEL DISCUSSION: Cyber Security Joachim Leder Future GA at Opel, Senior Consultant at KnüvenerMackert, Germany Jürgen Großmann Senior Researcher & Project Manger Fraunhofer FOKUS, Germany How can we make a system simple and universal so when consumers look they understand what is on offer? Is a cyber rating organization needed for the automotive industry? What role would this organization play, and what degree of influence would they have in the industry? What role should the government play in automotive cybersecurity? Is this an example of thoughtful legislation or government overreach? Should there be (or already is) a minimum industry-accepted standard for cybersecurity practices that automotive groups must follow? 17:00 End of the summit
10 Venue AUDI Forum Neckarsulm, Germany AUDI Production Plant Tour Your tour begins in the press shop, followed by the highly automated body shop. In perfect harmony, around 1620 robots enable the bodywork to be made from steel and aluminium in the shortest possible time and with high precision. The path continues into the assembly where special highlights are waiting for you: From the installation of the front end module, the vehicle front end with the typical Audi single-frame grille to the ultra-modern logistics. The highlight is bringing the body and powertrain together.
11 26-27 November, 2018 AUDI Forum Neckarsulm, Germany Event Frontiers s.r.o About Us Jaurisova 515/4 Prague, Czech Republic IČO: (420) eventfrontiers.com Event Frontiers is an established event organizer based in Prague, Czech Republic. Our business events and various international B2B conferences consist of case studies, workshops, seminars, panel discussions and plant tours. We are keen to deliver unique networking experience, industry insights, and advanced training by bringing together professionals, innovators, and market leaders.
Build confidence in the cloud Best practice frameworks for cloud security
Build confidence in the cloud Best practice frameworks for cloud security Cloud services are rapidly growing and becoming more of a focus for business. It s predicted that more than $1 trillion in IT spending
More informationLeading the Digital Transformation from the Centre of Government
37th Meeting of Senior Officials from Centres of Government Leading the Digital Transformation from the Centre of Government Dublin, Ireland, 8-9 November 2018 Agenda 2 GOV/PGC/MPM/A(2018)1/REV1 19.00
More informationCybersecurity. Securely enabling transformation and change
Cybersecurity Securely enabling transformation and change Contents... Cybersecurity overview Business drivers Cybersecurity strategy and roadmap Cybersecurity in practice CGI s cybersecurity offering Why
More informationSPONSORSHIP OPPORTUNITIES JULY 25-26, 2018 SANTIAGO, CHILE #ISC2CONGRESSLATAM LATAMCONGRESS.ISC2.ORG
SPONSORSHIP OPPORTUNITIES JULY 25-26, 2018 SANTIAGO, CHILE #ISC2CONGRESSLATAM LATAMCONGRESS.ISC2.ORG THE WORLD S LEADING CYBERSECURITY AND IT SECURITY PROFESSIONAL ORGANIZATION How to face the immense
More informationInnovation policy for Industry 4.0
Innovation policy for Industry 4.0 Remarks from Giorgio Mosca Chair of Cybersecurity Steering Committee Confindustria Digitale Director Strategy & Technologies - Security & IS Division, Leonardo Agenda
More informationENISA EU Threat Landscape
ENISA EU Threat Landscape 24 th February 2015 Dr Steve Purser ENISA Head of Department European Union Agency for Network and Information Security www.enisa.europa.eu Agenda ENISA Areas of Activity Key
More informationOPERATIONAL ANALYTICS AND ACQUISITION FOCUS DAY MONDAY, APRIL 30
OPERATIONAL ANALYTICS AND ACQUISITION FOCUS DAY MONDAY, APRIL 30 Operational Analytics is an interactive day dedicated to delivering overmatch capabilities and actionable intelligence to decision makers.
More informationIMPLEMENTING SECURITY, PRIVACY, AND FAIR DATA USE PRINCIPLES
IMPLEMENTING SECURITY, PRIVACY, AND FAIR DATA USE PRINCIPLES Introductions Agenda Overall data risk and benefit landscape / shifting risk and opportunity landscape and market expectations Looking at data
More informationINDUSTRY 4.0 Summit 2018
EVENT BROCHURE 12th 13th July 2018 JW Marriott Hotel Hanoi INDUSTRY 4.0 Summit 2018 HOSTED & ORGANIZED BY EVENT OVERVIEW Industry 4.0 Summit 2018 hosted by the Government of the Socialist Republic of Viet
More informationOpportunities for collaboration in Big Data between US and EU
Opportunities for collaboration in Big Data between US and EU Vasilis Papanikolaou ATC ilab, Greece ICT Policy, Research and Innovation for a Smart Society www.picasso-project.eu PICASSO has received funding
More informationMapping Your Requirements to the NIST Cybersecurity Framework. Industry Perspective
Mapping Your Requirements to the NIST Cybersecurity Framework Industry Perspective 1 Quest has the solutions and services to help your organization identify, protect, detect, respond and recover, better
More informationExperience Security, Risk, and Governance
Experience Security, Risk, and Governance Agenda and recommended event path 26 28 March Vienna, Austria Contents 3 Welcome 4 Overview 5 Evening Programs 6 Sessions at-a-glance 11 Digital Transformation
More informationBringing cyber to the Board of Directors & C-level and keeping it there. Dirk Lybaert, Proximus September 9 th 2016
Bringing cyber to the Board of Directors & C-level and keeping it there Dirk Lybaert, Proximus September 9 th 2016 Dirk Lybaert Chief Group Corporate Affairs We constantly keep people connected to the
More informationSecuring Your Digital Transformation
Securing Your Digital Transformation Security Consulting Managed Security Leveraging experienced, senior experts to help define and communicate risk and security program strategy using real-world data,
More informationModern Database Architectures Demand Modern Data Security Measures
Forrester Opportunity Snapshot: A Custom Study Commissioned By Imperva January 2018 Modern Database Architectures Demand Modern Data Security Measures GET STARTED Introduction The fast-paced, ever-changing
More informationNetwrix Virtual. Customer Summit 2016
Netwrix Virtual Customer Summit 2016 Welcome Michael Fimin Chief Executive Officer Phone: 1.949.407.5125 x1057 Email: Michael.Fimin@netwrix.com linkedin.com/in/michaelfimin Agenda Michael Fimin Chief Executive
More informationDefensible and Beyond
TELUS Defensible and Beyond Mike Vamvakaris Director and Head of Cyber Security Consulting November 2017 Digital transformation brings many benefits Communication and Collaboration Autonomous and Artificial
More informationWelcome to the Second Annual Intelligence & National Security Forum
Welcome to the Second Annual Intelligence & National Security Forum Today s Agenda 0800 0900 Registration and Light Breakfast 0900 0910 Opening Remarks Mr. Paul J. Geraci, Senior Director Intelligence
More informationSecurity and resilience in Information Society: the European approach
Security and resilience in Information Society: the European approach Andrea Servida Deputy Head of Unit European Commission DG INFSO-A3 Andrea.servida@ec.europa.eu What s s ahead: mobile ubiquitous environments
More informationMaking hybrid IT simple with Capgemini and Microsoft Azure Stack
Making hybrid IT simple with Capgemini and Microsoft Azure Stack The significant evolution of cloud computing in the last few years has encouraged IT leaders to rethink their enterprise cloud strategy.
More informationYour Challenge. Our Priority.
Your Challenge. Our Priority. Building trust and Confidence. When Federal managers and military leaders face tough challenges in cyber, data collection & analytics, enterprise IT or systems and software
More informationTitle of the presentation Date # EU-CHINA (Qingdao) Business and Technology Cooperation Fair
EU-CHINA (Qingdao) Business and Technology Cooperation Fair EU-CHINA Business and Technology Cooperation Fair Title of the presentation Date # Introduction The EU-China Business & Technology Cooperation
More informationGOVERNMENT IT: FOCUSING ON 5 TECHNOLOGY PRIORITIES
GOVERNMENT IT: FOCUSING ON 5 TECHNOLOGY PRIORITIES INSIGHTS FROM PUBLIC SECTOR IT LEADERS DISCOVER NEW POSSIBILITIES. New network technology is breaking down barriers in government offices, allowing for
More informationCENTRAL TAKE THE STAGE REGIONAL CONFERENCE MAY 1 4, 2016 / NASHVILLE, TN
CENTRAL REGIONAL CONFERENCE MAY 1 4, 2016 / NASHVILLE, TN TAKE THE STAGE Members: Register by Feb. 29 to save US$100. Take the Stage The IIA and IIA Nashville Chapter are excited to host the 2016 Central
More informationEuropean Cybersecurity PPP European Cyber Security Organisation - ECSO November 2016
European Cybersecurity PPP European Cyber Security Organisation - ECSO November 2016 Présentation Géraud Canet geraud.canet@cea.fr ABOUT THE CYBERSECURITY cppp 3 AIM 1. Foster cooperation between public
More informationOperations & Technology Seminar. Tuesday, November 8, 2016 Crowne Plaza Monroe, Monroe Township, NJ
Operations & Technology Seminar Tuesday, November 8, 2016 Crowne Plaza Monroe, Monroe Township, NJ Operations & Technology Roundtable Crowne Plaza Monroe, Monroe Township, NJ Tuesday, November 8, 2016
More informationBetter skilled workforce
Better skilled workforce for the New Style of Business HPE Education Services November 20, 2015 Education is the most powerful weapon which you can use to change the world Nelson Mandela The New Style
More information2016 SPONSORSHIP OPPORTUNITIES
14 TH ANNUAL ARCHITECTING ENTERPRISE TRANSFORMATION SEPTEMBER 21, 2016 RENAISSANCE WASHINGTON DC DOWNTOWN HOTEL 2016 SPONSORSHIP OPPORTUNITIES One-On-One Access to Government s Enterprise Architects EDUCATION
More informationGujarat Forensic Sciences University
Gujarat Forensic Sciences University Knowledge Wisdom Fulfilment Cyber Security Consulting Services Secure Software Engineering Infrastructure Security Digital Forensics SDLC Assurance Review & Threat
More informationRobotics and Autonomous Systems for Rolling Stock Maintenance. 20 October 2015
Robotics and Autonomous Systems for Rolling Stock Maintenance 20 October 2015 Exercise - Match your expertise to the challenges Pantographs Toilets Doors Axles Other components: Drives/transmission, lighting,
More informationREGISTER NOW SUMMIT 2017 COPENHAGEN TIVOLI HOTEL & CONGRESS CENTER JUNE 8 9, 2017
SUMMIT 2017 COPENHAGEN TIVOLI HOTEL & CONGRESS CENTER JUNE 8 9, 2017 REGISTER NOW TECHNOLOGY & MARKET TRENDS BROUGHT TO MANAGEMENT & BOARD-ROOM ATTENTION WWW.SMARTINDUSTRYFORUM.ORG SUMMIT 2017 IT S ALL
More informationSOLUTION BRIEF RSA ARCHER IT & SECURITY RISK MANAGEMENT
RSA ARCHER IT & SECURITY RISK MANAGEMENT INTRODUCTION Organizations battle growing security challenges by building layer upon layer of defenses: firewalls, antivirus, intrusion prevention systems, intrusion
More informationEUROPEAN ICT PROFESSIONAL ROLE PROFILES VERSION 2 CWA 16458:2018 LOGFILE
EUROPEAN ICT PROFESSIONAL ROLE PROFILES VERSION 2 CWA 16458:2018 LOGFILE Overview all ICT Profile changes in title, summary, mission and from version 1 to version 2 Versions Version 1 Version 2 Role Profile
More informationIoT Security Policy and Regulation Initiatives in China. Fan Dongyang, Huawei
IoT Security Policy and Regulation Initiatives in China Fan Dongyang, Huawei China Economy Facilitating High-quality Growth The new norm Going digital GDP Growth Rate Supply-side reform E-commerce is on
More informationCHAIR S SUMMARY: G7 ENERGY MINISTERS MEETING
CHAIR S SUMMARY: G7 ENERGY MINISTERS MEETING 1 CHAIR S SUMMARY: G7 ENERGY MINISTERS MEETING Under Canada s G7 presidency, Energy Ministers or their representatives from Canada, France, Germany, Italy,
More informationAddress C-level Cybersecurity issues to enable and secure Digital transformation
Address C-level Cybersecurity issues to enable and secure Digital transformation We support cybersecurity transformations with assessments, diagnosis and audits of your organization, the protection mechanisms
More informationCEN and CENELEC Position Paper on the draft regulation ''Cybersecurity Act''
CEN Identification number in the EC register: 63623305522-13 CENELEC Identification number in the EC register: 58258552517-56 CEN and CENELEC Position Paper on the draft regulation ''Cybersecurity Act''
More informationCyber Security Congress 2017
Cyber Security Congress 2017 A rich agenda covering both technical and management matters with targeted presentations and hands on workshops. Day 1 Conference Morning Session 8.30 9.00 Registration & Coffee
More informationDIGITAL TRUST Making digital work by making digital secure
Making digital work by making digital secure MARKET DRIVERS AND CHALLENGES THE ROLE OF IT SECURITY IN THE DIGITAL AGE 2 In today s digital age we see the impact of poor security controls everywhere. Bots
More informationsafely connecting to future smart hospital & healthcare
Organizer Funding Organization Sponsors CYBER SECURITY ON MEDICAL AND HEALTHCARE SYSTEM safely connecting to future smart hospital & healthcare SYMPOSIUM CUM WORKSHOP Workshop: 30 November 2017 Symposium:
More informationMAY. (Tue) Hong Kong. CYBERSECURITY & RISK MANAGEMENT How to preempt cybersecurity challenges in the digital world
8 MAY 2018 (Tue) Hong Kong CYBERSECURITY & RISK MANAGEMENT How to preempt cybersecurity challenges in the digital world CYBERSECURITY AND RISK MANAGEMENT By HKUST Business School Executive Education Office
More informationFriedrich Smaxwil CEN President. CEN European Committee for Standardization
Friedrich Smaxwil CEN President CEN European Committee for Standardization www.cen.eu www.cencenelec.eu Friedrich Smaxwil, CEN President 1. Standards & standardization 2. CEN s role in European Standardization
More informationPaul Shillcock Transport for London, UK
Building Information Modeling for Infrastructure Paul Shillcock Transport for London, UK CI3836 The United Kingdom (UK) is experiencing an exponential demand for rail travel, combined with demands from
More informationSix Weeks to Security Operations The AMP Story. Mike Byrne Cyber Security AMP
Six Weeks to Security Operations The AMP Story Mike Byrne Cyber Security AMP 1 Agenda Introductions The AMP Security Operations Story Lessons Learned 2 Speaker Introduction NAME: Mike Byrne TITLE: Consultant
More informationCloud. Cloud. Digital Customer Experience. Cyber Security. Digital Employee Experience. IP Solutions. Digital Insight. Payments. Internet of Things
Cloud Digital Customer Experience Digital Employee Experience Digital Insight Internet of Things Payments IP Solutions Cyber Security Cloud 2015 CGI IT UK Ltd Contents... Digital transformation in the
More informationThe Role of Public Sector Audit and Risk Committees in Cybersecurity & Digital Transformation. ISACA All Rights Reserved.
The Role of Public Sector Audit and Risk Committees in Cybersecurity & Digital Transformation Tichaona Zororo CIA, CISA, CISM, CRISC, CRMA, CGEIT, COBIT 5 Certified Assessor B.Sc. Honours Information Systems,
More informationSecuring intelligent networks: a guide for CISO and CIOs
Securing intelligent networks: a guide for CISO and CIOs 2 Securing intelligent networks: a guide for CISO and CIOs 3 93% say security is a must have or should have for customers of SD-WAN technology;
More informationERCI cybersecurity seminar Guildford ERCI cybersecurity seminar Guildford
Cybersecurity is a EU strategic priority DG CONNECT* > The Digital Single Market strategy aims to open up digital opportunities for people and business and enhance Europe's position as a world leader in
More informationIntroduction to the Export Services Branch Programmes and Services Ministry of International Trade
Introduction to the Export Services Branch Programmes and Services Ministry of International Trade 10/25/2017 Export Services Branch Overview Branch Mandate: To support/assist Small and Medium Enterprises
More informationBENEFITS of MEMBERSHIP FOR YOUR INSTITUTION
PROFILE The Fiduciary and Investment Risk Management Association, Inc. (FIRMA ) is the leading provider of fiduciary and investment risk management education and networking to the fiduciary and investment
More informationIncentives for IoT Security. White Paper. May Author: Dr. Cédric LEVY-BENCHETON, CEO
White Paper Incentives for IoT Security May 2018 Author: Dr. Cédric LEVY-BENCHETON, CEO Table of Content Defining the IoT 5 Insecurity by design... 5 But why are IoT systems so vulnerable?... 5 Integrating
More informationSecurity Asia The biggest breaches and cyber-attacks of 2017, and what threats to expect in 2018
Looking Back 2017 2018 Looking Ahead IT industry leaders, experts and analysts share their insights and opinions as they look back at key developments in 2017, as well as technology and market trends they
More informationMAY PRAGATI MAIDAN, NEW DELHI, INDIA
17-19 MAY PRAGATI MAIDAN, NEW DELHI, INDIA www.power-genindia.com Renewables Fossil Fuels Nuclear YOUR GUIDE TO INDIA'S LEADING CLEAN ENERGY EVENT 5,000+ Attendees 180+ Exhibitors 75+ Speakers 20+ Conference
More informationSmart Manufacturing in the Food & Beverage Industry
Smart Manufacturing in the Food & Beverage Industry PUBLIC Copyright 2016 Rockwell Automation, Inc. All Rights Reserved. 1 Rockwell Automation at a Glance $5.9B FISCAL 2016 SALES 22,000 EMPLOYEES 80+ COUNTRIES
More informationHannover Declaration
Hannover Declaration On 28 April 2016, the Ministry of Economy, Trade and Industry (METI) of Japan and the Federal Ministry for Economic Affairs and Energy (BMWi) of the Federal Republic of Germany released
More informationTransformation in Technology Barbara Duck Chief Information Officer. Investor Day 2018
Transformation in Technology Barbara Duck Chief Information Officer Investor Day 2018 Key Takeaways 1Transformation in Technology driving out cost, supporting a more technologyenabled business Our new
More informationHow the WAN is Driving Digital Transformation. An IDC InfoBrief, Sponsored by
How the WAN is Driving Digital Transformation Executive Summary Digital transformation needs to go hand in hand with an evolution of the wide area network (WAN). IDC has built a comparison framework to
More informationNational Cyber Security and Cyber Terrorism Summit
Ottawa Ontario November 12-13 2014 National Cyber Security and Cyber Terrorism Summit SUPPORTERS Developing a Roadmap to Address the Pervasive Growth of Cyber Crime SUPPORTER RATE CARD Background The growing
More informationRisk advisory Services Technology risk assurance. November 2016 THE POWER OF BEING UNDERSTOOD AUDIT TAX CONSULTING
Risk advisory Services Technology risk assurance Risk advisory Services Technology risk assurance November 2016 THE POWER OF BEING UNDERSTOOD AUDIT TAX CONSULTING 2 contents 1. Data advisory and analytics
More informationManaged Services.
Global IT Infrastructure and Deployment Specialists Managed Services Delivering proactive technology support to give you complete confidence in the essentials of your business and the power of your competitive
More informationEUROPEAN PLATFORMS AND INITIATIVES FOR C-ITS DEPLOYMENT
EUROPEAN PLATFORMS AND INITIATIVES FOR C-ITS DEPLOYMENT Dr. Angelos Amditis Research Director, ICCS OUTLINE Introduction C-ITS Platform GEAR2030 Digital Transport & Logistics Forum (DTLF) EC Directive
More informationAccelerating CCUS: A Global Conference to Progress CCUS
Accelerating CCUS: A Global Conference to Progress CCUS 28-29 November 2018 EDINBURGH, SCOTLAND, UNITED KINGDOM There is broad international consensus that CCUS has a vital role to play in meeting global
More informationA Global Look at IT Audit Best Practices
A Global Look at IT Audit Best Practices 2015 IT Audit Benchmarking Survey March 2015 Speakers Kevin McCreary is a Senior Manager in Protiviti s IT Risk practice. He has extensive IT audit and regulatory
More informationHow to Leverage Containers to Bolster Security and Performance While Moving to Google Cloud
PRESENTED BY How to Leverage Containers to Bolster Security and Performance While Moving to Google Cloud BIG-IP enables the enterprise to efficiently address security and performance when migrating to
More informationW3C CASE STUDY. Teamwork on Open Standards Development Speeds Industry Adoption
January 2017 W3C CASE STUDY Teamwork on Open Standards Development Speeds Industry Adoption Like driving a long stretch of open road alone, standards development work can be a lonely endeavor. But with
More informationSECURING THE DIGITAL ECONOMY. Reinventing the Internet for Trust
SECURING THE DIGITAL ECONOMY Reinventing the Internet for Trust The Internet Just Can t Keep Up Companies Are Increasingly Dependent on the Internet for Business Growth 90% 76% 18% 35% to rank business
More informationIDC FutureScape: Worldwide Security Products and Services 2017 Predictions
IDC FutureScape: Worldwide Security Products and Services 2017 Predictions Sean Pike, Program Vice President, Robert Ayoub, Research Director IDC Web Conference December, 7, 2016 Logistics Submit any questions
More informationTEL AVIV
28-30.1.2019 Conference Chairman // DR. YOSSI VARDI CYBERTECH 2018 FIGURES: 15,000 attendees at the Cybertech 2018 conference and exhibition 170 local and international speakers discussed the latest innovations
More informationThe Factory of the future : Collaboration and Digitalization to deliver smarter packaging solutions Hispack 2018
_ The Factory of the future : Collaboration and Digitalization to deliver smarter packaging solutions Hispack 2018 Sergio Martin, Director ABB Robotics Spain . May 25, 2018 YuMi May 25, 2018 YuMi May 25,
More informationData Management and Security in the GDPR Era
Data Management and Security in the GDPR Era Franck Hourdin; Vice President, EMEA Security Russ Lowenthal; Director, Database Security Product Management Mike Turner; Chief Operating Officer, Capgemini
More informationIntegrated Security Management Framework
Integrated Security Management Framework Critical for Securing the Future of IoT Nampuraja Enose Principal Consultant- Industry 4.0 / Industrial Internet 17 Nov 2016 Internet Of Things The Vision 2 Instrumented
More informationData privacy and cloud security
Data privacy and cloud security Abstract The use of cloud computing is rapidly evolving in many Arab & African countries due to its costefficiency and flexibility. This technology holds the potential to
More informationThe NIS Directive and Cybersecurity in
The NIS Directive and Cybersecurity in ehealth Dr. Athanasios Drougkas Officer in NIS Belgian Hospitals Meeting on Security Brussels 13 th October European Union Agency For Network And Information Security
More informationEuropean Cybersecurity PPP European Cyber Security Organisation - ECSO
European Cybersecurity PPP European Cyber Security Organisation - ECSO Luigi Rebuffi CEO, EOS Secretary General, ECSO European Cyber Security Organisation Objectives of the cppp Gather industrial and public
More informationMicro Focus Partner Program. For Resellers
Micro Focus Partner Program For Resellers Contents Micro Focus Today About Micro Focus Our solutions for digital transformation Products and Solutions Program Membership Tiers Become a Portfolio Expert
More informationTXF TRAINING 2018 ECA FINANCE
TXF TRAINING 2018 ECA FINANCE ECA FINANCE TRAINING TXF is teaming up with CC Solutions once again Our training courses deliver a core understanding of the fundamentals of ECA finance with real life case
More informationIBM Security Systems. IBM X-Force 2012 & CISO Survey. Cyber Security Threat Landscape IBM Corporation IBM Corporation
IBM X-Force 2012 & CISO Survey Cyber Security Threat Landscape 1 2012 IBM Corporation IBM X-Force 2011 Trend and Risk Report Highlights The mission of the IBM X-Force research and development team is to:
More informationAccelerating Cloud Adoption
Accelerating Cloud Adoption Ron Stuart July 2016 Disruption Disruption is the new normal Globally interconnected, convenient and more efficient than ever before NZ Government challenge is to use disruptive
More information#EcoConnectNordic. Overall Plan v3.0
Overall Plan v3.0 INVITATION Dear Mr. /Ms The fourth revolution of science and technology has arrived, and we are at the threshold of a fully connected, intelligent world. The role of Artificial Intelligence
More informationContents. viii. List of figures. List of tables. OGC s foreword. 3 The ITIL Service Management Lifecycle core of practice 17
iii Contents List of figures List of tables OGC s foreword Chief Architect s foreword Preface vi viii ix x xi 2.7 ITIL conformance or compliance practice adaptation 13 2.8 Getting started Service Lifecycle
More informationState of the Cyber Training Market January 2018
State of the Cyber Training Market January 2018 2018 by CYBERBIT 2018 by CYBERBIT Proprietary CYBERBIT Proprietary Cybersecurity Market Worth 202.36 Billion USD by 2021 Marketandmarkets analysis, 2017
More informationTHE STATE OF IT TRANSFORMATION FOR TELECOMMUNICATIONS
THE STATE OF IT TRANSFORMATION FOR TELECOMMUNICATIONS An Analysis by Dell EMC and VMware Dell EMC and VMware are helping IT groups at telecommunication organizations transform to business-focused service
More informationThe conclusions a SUMMARY
ETSI SUMMIT: 5G FROM MYTH TO REALITY The conclusions a SUMMARY Presented by Simon Hicks, ETSI General Assembly Chairman SESSION A Policy aims and expectations European Digital Single Market (DSM) highlights
More informationExamining future priorities for cyber security management
Examining future priorities for cyber security management Cybersecurity Focus Day Insurance Telematics 16 Andrew Miller Chief Technical Officer Thatcham Research Owned by the major UK Motor Insurers with
More informationEvolve Your Security Operations Strategy To Account For Cloud
Evolve Your Security Operations Strategy To Account For Cloud GET STARTED The growth of cloud computing and proliferation of complex service delivery models continue to accelerate as companies recognize
More informationDoug Couto Texas A&M Transportation Technology Conference 2017 College Station, Texas May 4, 2017
Cyber Concerns of Local Government and What Does It Mean to Transportation Doug Couto Texas A&M Transportation Technology Conference 2017 College Station, Texas May 4, 2017 Transportation and Infrastructure
More informationSage Data Security Services Directory
Sage Data Security Services Directory PROTECTING INFORMATION ASSETS ENSURING REGULATORY COMPLIANCE FIGHTING CYBERCRIME Discover the Sage Difference Protecting your business from cyber attacks is a full-time
More informationDATA SHEET RSA NETWITNESS PLATFORM PROFESSIONAL SERVICES ACCELERATE TIME-TO-VALUE & MAXIMIZE ROI
DATA SHEET RSA NETWITNESS PLATFORM PROFESSIONAL SERVICES ACCELERATE TIME-TO-VALUE & MAXIMIZE ROI EXECUTIVE SUMMARY The shortage of cybersecurity skills Organizations continue to face a shortage of IT skill
More informationSDI, Containers and DevOps - Cloud Adoption Trends Driving IT Transformation
SDI, Containers and DevOps - Cloud Adoption Trends Driving IT Transformation Research Report August 2017 suse.com Executive Summary As we approach 2020, businesses face a maelstrom of increasing customer
More informationData-Driven Policing Summit
Reduce Crime and Manage Risk in Policing with Data Analysis Data-Driven Policing Summit Using Data Analytics and Predictive Modeling to Mitigate Risk and Reduce Crime September 18-19, 2017 Washington,
More informationSan Francisco November 3rd IT ROADMAP Coming to you
moscone west convention center IT ROADMAP 2010 returns TO SAN FRANCISCO! The annual, one-day conference & expo that costs nothing to attend. That s close to home, brings out IT s best and brightest and
More informationSales Presentation Case 2018 Dell EMC
Sales Presentation Case 2018 Dell EMC Introduction: As a member of the Dell Technologies unique family of businesses, Dell EMC serves a key role in providing the essential infrastructure for organizations
More informationGlobal Optical Connectors Market: Analysis By Type (Board to Board, Edge Card, Mid Board), By Application, By Region, By Country ( )
Global Optical Connectors Market: Analysis By Type (Board to Board, Edge Card, Mid Board), By Application (Data Centre, Telecom, Automotive, Others), By Region, By Country: Opportunities and Forecast (2017-2022)
More informationThe impact of digital transformation on industries
Headline Verdana Bold The impact of digital transformation on industries Tim Hanley, Deloitte Global Leader, Consumer & Industrial Products Industry group March 2017. Sao Paolo, Brazil What we will cover
More informationDynamic Transformation of the Energy Industry JUNE 25-27, 2019 COEUR D ALENE, IDAHO REGISTRATION
9 th ANNUAL A select group of C-suite panelists and key stakeholders will engage participants in dynamic discussion and debate about the transformational change taking place in today s energy industry.
More informationCBCI Certification Course (GPG)
CBCI Certification Course (GPG) 5 Days with Examination Course Description This course offers a solid description of the methods, techniques and approaches used by business continuity (BC) professionals
More informationElectronic Warfare: Innovation & Evolution in Global Electromagnetic Operations
Image Source: blueskyrotor.com 5-7 June 2018 Congrès Beaulieu, Lausanne Electronic Warfare: Innovation & Evolution in Global Electromagnetic Operations 2018 Exhibiting and ship Opportunities www.eweurope.com
More informationCyber Risk Program Maturity Assessment UNDERSTAND AND MANAGE YOUR ORGANIZATION S CYBER RISK.
Cyber Risk Program Maturity Assessment UNDERSTAND AND MANAGE YOUR ORGANIZATION S CYBER RISK. In today s escalating cyber risk environment, you need to make sure you re focused on the right priorities by
More informationSmart Manufacturing and Standards: The NIST Role
Smart Manufacturing and Standards: The NIST Role Al Wavering, Chief Intelligent Systems Division Engineering Laboratory National Institute of Standards and Technology U.S. Department of Commerce October
More informationLeasing Life Conference & Awards 30 th November 2017 Hotel Krasnapolsky Amsterdam, Netherlands
Leasing Life Conference & Awards 30 th November 2017 Hotel Krasnapolsky Amsterdam, Netherlands Leasing Life s conference provides the ideal setting for the industry to come together to discuss its progress
More information