Nov14
Ways to convince Your Boss Ways to Save Submit Your Talk
X

Submit Your Talk

Overview of the event

Visualization is both an art and a science, in general terms it describes any effort to help people understand the significance of data by placing it in a visual context. A primary goal of data visualization is to communicate information clearly and efficiently via statistical graphics, plots and information graphics.

We intend to give a platform for users across all the various domains of data analysis to share their experiences, techniques, opportunities, challenges and exciting possibilities as well as highlight the most triumphs and potential pitfalls

Data Visualisation Conference in Auckland will bring together industry professionals and thought leaders from the field of Data Visualisation and Data Analytics. It will help you in understanding and implementing data visualization in your business/for your client. It will also provide an excellent opportunity to interact and network with some of the top minds.

Machine Learning is a field of artificial intelligence that uses statistical techniques to give computer systems the ability to "learn from data, without being explicitly programmed.

The "deep" in "deep learning" refers to the number of layers through which the data is transformed. Deep Learning is a new area of Machine Learning research, which has been introduced with the objective of moving Machine Learning closer to its original goals. In deep learning, each level learns to transform its input data into a slightly more abstract and composite representation.



Facts & Figures About The Event

7 Speakers
7 Topics
50 Tickets

Our Past Speakers


Dr. William Yeoh

Director

Deakin University


Louis Liu

Data Scientist

ANZ


Neel Bhattacharya

Sr. Management Consultant

Infosys


Prashant Natrajan

Transformational Tech Leader, Principal - AI & Analytics

Deloitte, Australia


Alexe Bojovschi

Innovation Mentor

University of Melbourne


Aram Cargill

Managing Director

LEDSEN

Conference Schedule

Machine Learning and Cyber Security Summit (14th November, 2019)
X Topic Abstract

Coca-Cola’s overarching mantra for data insights is simple - ONE source of truth. This ensures that all markets align their local consumer research and reporting metrics (across 330+ brands, 100+ data sources and 75+ agencies) to Coca-Cola’s global protocols, so they can deliver globally consistent results to their corporate team.
With the introduction of Data Visualisation and socialization tools over the last decade and an increased appetite for different reporting options, Coca-Cola and Infotools created a data-sharing framework to feed both internal and external reporting platforms.
This paper will share the journey from simple database transfers for specific markets to complex regional API uploads, examples of internal and external reporting, learnings along the way and plans for the future.
Along the way, we introduce the Infotools’ consiglieres who have ensured highest data quality and protocol compliance in Coca-Cola’s Global tracker since 2006.
Many of the issues and problems that we traditionally help to solve are behind the scenes and hardly ever get talked about. The local Coca-Cola research teams do not always have the expertise or the time to focus on how to resolve the challenges posed by any tracking study, such as unexplained jumps in the data, tracker results that are contrary to the business reality,or managing a change in the local field agency.
Field agencies from around the world benefit from learnings from different countries.Local markets save considerable amounts of money and human resources, and preserve their trends by not having to repeat other countries’ mistakes.
Using smart technology is future-proofing the global tracker and business insights.

Three Key Takeaways
Data quality is non-negotiable; one source of data truth ensures consistency; from data to delivery across multiple streams of data across borders, cultures and consumer groups
The presentation is a combination of two global papers we have previously presented – links to these are here

https://slideslive.com/38901564/what-the-godfather-has-to-do-with-cocacola-unveiling-the-protocol-quality-control-consigliere
https://www.infotools.com/our-resources/coca-cola-one-source-of-truth-iiex/

X Topic Abstract

In this session, different ways of creating a custom visual will be briefly presented. Then a deep discussion and demo on how to work with Chartivulator will be demonstrated. The audience will learn how to work with these tools and how to use the created visually in Power BI desktop as a new pbix file.

X Topic Abstract

In the presentation, I am hoping to cover the journey of a data science process and the process under the context of these 2 cases. Takeaway from the presentation would be methodologies participants can apply in their own business problems. I would like to use real world examples, data visualisations and simple scripts as well. This might make it slightly technical in some parts. But I feel with some intuitive explanation, it will benefit the audience.


X Topic Abstract


X Topic Abstract

One day, you will have a breach of security, be it in progress now, or in the future. I will present a real-world scenario, the lessons learned, and the approaches taken to prevent it from happening again. I will highlight the importance of analysing an attacker's payload and how this led to a more nuanced response to the compromise. Finally, this scenario illustrates a more modern attack technique, known as "living off the land". I will cover how this can be mitigated, logged, and combatted both in situ and at the source.


X Topic Abstract


X Topic Abstract

Most of the audit findings occur because of flaws in identity management, leading to remedial programs stretching over the years. Organisations often fail to make identity and access management a repeatable process for the business, thus reducing the visibility. Most of the times, they struggle to answer the critical question “Who has Access to What in my organisation?” The line between the employees’ work and personal lives, along with their increasing use of cloud services, BYOD devices, and social media, is getting more and more blurred. Also, due to the increased complexity of systems, specialists are frequently brought in to help. These specialists range from managed service providers (MSPs), partners, suppliers, vendors to people with specialist skills. Organisations are seeking more efficient ways to manage access and to be in control of all the provisioned identities and related access privileges. This includes automating the periodic user access review process by stakeholders like HR, Procurement, Projects Office, Business/Information Systems, line of business (LOB) managers and employees/contractors.

An Identity and Access Governance Platform (IAGP) tries to solve this problem for organisations. This talk is going to focus on panacea provided by a complete vs. an MVP IAGP with some scenarios. We will briefly touch upon the criteria matrix for a fit-for-purpose IAGP.

X Topic Abstract

New Zealand is not immune to cyber-attacks. It is common and a growing menace across the world. According to media reports, a recent cyber-attack on the New Zealand’s department of Health, records of millions of patients had been compromised. These attacks will continue to happen. But what innovative strategies organisations should adopt?

Traditionally, information/cyber security was the responsibility of the CIO. According to the size of the organisation, an information security officer was assigned, reporting to the CIO. Their focus was purely technological. Moreover, information security was given a lower priority, compared to other operational or marketing projects.

As we know, attackers are smarter today and strategically they penetrate to organisations’ networks or IT systems through the weakest link in the chain - People! The smarter way to address this is to create a robust cyber/information security culture. Every employee should know the essentials of cyber security and be aware of escalating promptly to the right people with the organisation, when they see anything abnormal. Education is the answer. Organisational reluctance to upskill staff on cyber awareness is no doubt is a big risk.



X Topic Abstract

I will look at how Fraedom has been using Data, Data Science and Data Visual to understand product usage and user behavior better, supporting product and customer experience (CX) initiatives, and improve the CX journey.

Our Sponsors

Use this opportunity to improve the visibility of your organization

Instant Sponsorship
Avail instant sponsorship at just USD 2000

Instant sponsorship includes
• Branding of your company as Bronze Sponsor – Company's Logo on the event page with cross link to your website.
• One Speaking Slot (45 min -non sales talk).
• 10% discount on registration fee for any delegate from your organization.
• Full day attendance at the event with lunch
• 1 x Roll up stand / Brochure distribution at the event
• Online Interview post of your company's senior executive at our media portal

For Silver, Gold Platinum & Titanium Sponsorship opportunites, please request for Sponsorship Brochure via email at contact@1point21gws.com, naveen@1point21gws.info

Our Sponsors


Media Partners


       

Digital Marketing Partner




Marketing Partner




Promotional & Media Partners


    

Our Past Sponsors


Media Partner



Sponsors









Our Speakers


Horst Feldhaeuser

Group Services Director

Infotools


Leila Etaati

Data Scientist and BI Consultant

RADACAD


Dr. David Duan

Data Science Stream Lead & Principal Data Scientist

Fraedom


Sanjid Rahman

Data Analyst

Office Products Depot (New Zealand)


David Keenleyside

Head Computer Technician

Glenfield College and Computer & Network Security Consultant


Andy Simpson

Head of Infrastructure & Security Netlogix, Cyber Security Principal

Cecuri


Nalin Wijetilleke

Managing Director

ContinuityNZ


David Eaton

Associate Director, Cybersecurity Services ANZ

Datacom


Jatinder Oberoi

founder and CEO

SeCompAss Limited

Want to become Speaker Please register here Register

Our Pricing

Group of three or more(Early Bird)

NZD 362

Till July 27
Group of three or more(Standard)

NZD 434

Till November 14
Individual(Early Bird)

NZD 577

Till October 14
Individual (Standard)

NZD 722

Till November 14


Our Testimonial

FAQs

Who can attend Machine Learning and Cyber Security Summit in Auckland?

• Data Engineers/Developers / Scientists
• Analytics Professionals
• Startup Professionals
• Scientists/Researchers
• Professors
• President/Vice president
• Chairs/Directors

And last but not the least……….
Anyone interested in Machine Learning & thrives to make the future developed and better

Why to attend Machine Learning and Cyber Security Summit?

Understand the state of development of Machine learning by exchanges, clearing houses, central counter parties and payment systems, and what it means for you.

What will you learn about?

Detecting where underlying problems and frictions exist in your organisation that will be alleviated by Machine learning technologies. Using Machine learning as a tool for innovation across your organisation

Are there any prerequisites to attend this program?

No

Do I need to register for the event?

Yes, all conference attendees must register in advance to attend the event.