Check out this Outstanding line-up of Keynote Speakers
SharePoint, Microsoft 365 and The Modern Workplace
Join Jeff Teper, Microsoft CVP for Office, OneDrive & SharePoint and explore the latest innovations and road map for Microsoft 365. Learn how to make the most of powerful new capabilities across Microsoft 365 experiences to empower teamwork and employee engagement, and to create a culture of open learning and sharing. They will showcase how you can unlock new scenarios to work together with people inside, outside, and across your organisation. Don’t miss this kick-off to ESPC18!
Building Engaging Solutions for Office 365
Office 365 provides the core creative tools for over 135 million monthly active users and while there are amazing out of the box capabilities, you can also increase the effectiveness and productivity of end users by providing additional extensions and apps. Join Vesa Juvonen and special guests as they cover the latest news and announcements around the different extensibility options in Office 365 platform. They’ll keep SharePoint as our primary focus, but will absolutely also touch topics such as Azure, Microsoft Graph and Microsoft Teams to show in practice different solution designs.
Microsoft Azure for Every Workload
Learn from the Manager for Azure Product Marketing about the latest innovations in Azure and get practical guidance on how you can accelerate your cloud journey. Learn about the broad range of Azure compute, storage, networking and container services for mission critical and everyday applications. You will also see the latest hybrid investments coming from Windows Server 2019 and Azure Stack.
Artificial Intelligence: Winning the Red Queen’s Race
Artificial Intelligence is popularised in fiction films such as “The Terminator” and “AI: Artificial Intelligence”. Now, artificial intelligence is becoming closer to being a part of our daily lives through the use of technologies like virtual assistants such as Cortana, smart homes, and automated customer service.
Now, we are running the Red Queen’s race not just to win, but to survive in a world where Artificial Intelligence is becoming the present as well as the future of technology, and futurist ideas are developing into reality at accelerated rates.
How can you help your your company to evolve, adapt and succeed using Artificial Intelligence to stay at the forefront of the competition, and win the Red Queen’s Race? What are the potential issues, complications and benefits that artificial intelligence could bring to us and our organisations?
In this keynote, Jen Stirrup will explain the quick wins to win the Red Queen’s Race, using demos from Microsoft technologies such as CNTK to help you and your organisation win the Red Queen’s race.
Be the Lord of Your OWN Rings
Have you ever wanted to be the Lord of the Rings? Well, today’s the day! You’ll learn how to run your OWN “Insider Program” within your organisation and use data backed decisions to be confident you’re ready for the next version of Windows (and other products). We’ll show you how we flight early builds of Windows, get pre-release feedback and talk to our community…and we’ll show you how you TOO can do the same within your organisation with a bunch of new tools that we can’t talk about publicly yet. You’ll hear from Insiders who did this in a way that was so legit and supported that they even told their bosses about it and emerged as tech heroes. BONUS: If you attend our session, you’ll have the opportunity to enter your organisation into a contest to win a visit from our team.
Attacks of the Industry: A View to the Future of Cybersecurity
Are there any attacks that are effective, reliable and almost always work? Of course! Even though an organization manages well the infrastructure, patches are regularly installed, network is monitored – there are attacks that are still working perfectly as it is really a matter of misconfiguration rather than serious security vulnerability. Could cloud technologies help it? Are Office 365, Azure, Amazon Web Services etc. secure? How to measure it? Is it worth to move some of the services to the cloud and mitigate the risk of breach? The problem is that some infrastructure mechanisms relay on type of communication used within the attacks and they use it for the normal communication: single sign-on authentication, service accounts, network sharing etc. and in vast majority of organizations that can be leveraged! Join us during this session to become familiar with the biggest mistakes in infrastructure security that, from the attacker perspective, can be pretty much always exploited. You will leave the keynote with suggestions & ideas on how to reach the next level of security in your workspaces.