Session one – the future of enterprise cloud computing
- Cloud migration strategy: lessons from the coalface
- Getting what you want: mastering contracted cloud services
- Cloud management platform: make the right choice
- Infrastructure-led positive disruption: cloud centre of excellence
- How to advance you AI infrastructure
- Embracing Agile and SecDevOps
- DevOps and Security: when two tribes come together
Conference Chair’s Opening Address
Dr Gilad Rosner, Founder: IoT Privacy Forum; Expert in Public Policy of IoT & Identity Management; Privacy and Technology Policy Researcher
Cloud migration strategy: lessons from the coalface
Sarah Lucas, Head of Platforms and Infrastructure, William Hill
Getting what you want: mastering contracted cloud services
Whether due to a poorly formulated and executed cloud strategy, inadequately implemented legacy cloud projects, providers who fail to deliver on their promises or the disruption that comes with changing workforce structures and personnel, many organisations suffer from difficult third-party agreements which fall short of expectations.
We address, how best to arrest, resolve and move on from contracting failures.
Using cloud to drive business agility
Karen McDonagh Reynolds, Global Cloud Transformation and Acceleration Programme Director, Willis Towers Watson
One of the greatest innovations brought about by the digital age is our ability to work anywhere at any time without being limited by our location, ability to communicate or the tools at our disposal.
In the age of COVID, our ability to operate anywhere has become a business imperative.
We address, how to enable the seamless transition to remote operationalisation with a secure, flexible cloud and digital services platform with balance, adaptability, and coordination baked into its core.
Infrastructure-led positive disruption: cloud centre of excellence
Cloud adoption represents a major IT transformation, a shift in culture and a new way of financing your infrastructure.
It presents new cost and security challenges, requiring governance and control across the organization. It also needs a proactive team to take ownership and direction of the migration process.
- What to look for when building your CCoE team
- How to run through the planning phase of a cloud migration
- Examine the challenges and responsibilities of your CCoE
How to easily escalate privileges and own an AWS account
Raul Lapaz, Cloud security engineer Blue Team, Roche
As a live demo, we illustrate how an end-to-end credentials compromise and privilege escalation can create persistence and finally ex-filtration of newly created credentials which can be sent to an attacker’s system.
• How to steal users/employees’ credentials
• Using those credentials to elevate privileges to Full admin on AWS
• Back-dooring other users or role to maintain persistence
• Configuring serverless function to send new user’s credentials to the attacker machine
• Lessons learnt and recommendations to defenders
Questions to the Panel of Speakers
Refreshment Break Served in the Exhibition Area
Delivering Environments as-a-Service
Sanjeev Kumar, Head of Environments & DevOps, JPMorgan Chase and Co.
Overview on how infra as code (IaC) has developed & evolved in delivering environments across the non-prod estate – the integration of servers and application code packaged as a single release. The benefits of improved environment availability, cost reduction with pay as you go, improved developer efficiencies and automate everything.
• Environment Request & Application releases separate entities
• Build once and deploy many
• Numerous tool integration
• Single-click deployment
DevOps and Security: when two tribes come together
A single misconfiguration of code can produce an anarchic environment in which anyone can gain access to your cloud and take over a production system.
We will highlight real-world examples of cloud security issues centred on migration projects and operational cloud applications for both public and private sector organisations.
We will address the root causes of the problems encountered, and map out how best to mitigate cloud security risks.
Questions to the Panel of Speakers and Delegates move to the Seminar Rooms
Networking Lunch Served in the Exhibition Area
Session two – the building blocks for implementing, managing, and advancing your cloud architecture and infrastructure
- Using cloud to drive business agility
- From legacy lag to successful microservices implementation
- The future will be distributed
- Keeping pace with architectural change: make your data do the work
- How to build your hybrid cloud platform
- When disaster strikes: recovering your cloud-based workloads
Conference Chair’s Afternoon Address
Paved Roads with Guardrails- Cloud Adoption in a regulated Financial Services environment
Gerum Haile, Vice President, Technical Fellow-Chief Cloud and Platform Architect, USAA
As financial services adopt cloud for operational/transactional and data & analytics workloads, how the FSI’s cloud environment is defined, architected, governed, and operated becomes as critical as the actual workloads.
In this presentation, audiences will gain insights into:
• Enterprise cloud platform as a product-centric approach
• How to govern and architect compliant and secure cloud-based FSI workloads
From legacy lag to successful microservices implementation
In this session, we will explore how to successfully the transition from a data centre with monolithic legacy applications to an off-prem cloud hosted collection of microservices.
We will list the reasons why to move, detailing the how, what and when of implementation, as well as map out who you need to make the move and what lessons can be learned and what to look out for or to avoid.
- Moving to Microservices
- The why
- The who
- The how
- Lessons Learned
- Was it worth it?
How Kohler successfully navigated its way through the global pandemic
Owen John, Senior Enterprise Cybersecurity Architect, Kohler Co.
At the start of 2020, as a global organisation, Kohler was able to make use of its international presence to monitor the developing situation in China and assess the likely impact of the pandemic as operations and businesses across the country began to shut down.
The rapid adoption of capabilities in the M365 ecosystem enabled Kohler to support secure remote working at scale. They were able to maintain business continuity and reduce reliance on VPN by using Azure to present Window’s Virtual Desktops and enable an agile workforce to connect from anywhere on any device and maintain a strong cybersecurity posture.
As the pandemic began to spread from Asia to the rest of the globe, Kohler was able to scale this solution out and add a capability to a global workforce.
- The reasons why Kohler chose this path on a risk-based approach
- How it was achieved, with global teamwork and effective relationships
- The people, process and technology needed to succeed
Questions to the Panel of Speakers
Afternoon Networking and Refreshments served in the Exhibition Area
Keeping pace with architectural change: make your data do the work
Fabrizio Di Carlo, Information Security Architect, Deutsche Borse
For many, existing data architectures are failing to keep pace with developments in the cloud. This misalignment leads to data-led cloud initiatives, such as moving data into the cloud for core applications, not moving beyond the piloting stage.
We provide a detailed account of how to avoid vendor lock-in whilst still benefiting from the dynamism, agility, and flexibility that the cloud brings.
How to build your hybrid cloud platform
It seems every organisation is engaged in the pursuit of digital transformation in some form or another, and for such efforts to positively impact ever element of how they operate. What is needed to support the various initiatives is a dynamic platform capable of delivering on the needs of today’s complex business environment.
By adopting a hybrid cloud, you will advance your digital transformation ambitions no matter the use case.
- Operating across the cloud
- Streamlining data pipelines
- Move seamlessly between public and private cloud data centres
- Accommodate differentiated security needs
- Support deployments to multi clouds
- The people and cultural changes required
When disaster strikes: recover your cloud-based workloads
Having a robust and agreed upon disaster recovery plan is vital for business continuity. This is especially true for public cloud-based workloads which are more vulnerable than other models due to traditional tools and processes typically deployed on-prem not being transferable to the public cloud.
We address, how to design and implement a disaster recovery solution for public cloud-based workloads.