EVENT REVIEW: IP Expo grows attendance by 30%

The event, which ran in April, saw over 6,000 visitors across the two days at Manchester Central

IP EXPO Manchester has further cemented its place as a must attend IT event with a 30% growth in attendance.

The event, which ran in April, saw over 6,000 visitors across the two days at Manchester Central who were treated to 104 unique seminar sessions and more than 100 exhibitors.

Designed to guide those looking to find out how the latest IT innovations can drive their business forward, IP EXPO Manchester 2017 provided delegates with seminar content across six high-growth technology sectors all under one roof.

What we learnt from the FBI's former most wanted hacker, Kevin Mitnick

Day One of the free-to-attend event opened with a keynote speech from Kevin Mitnick, the world’s most famous hacker who formerly took the top spot on the FBI’s Most Wanted list.

Mitnick spoke in front a packed audience, educating them on the realities of the cyber security landscape.

Speaking about why visitors should attend the event more broadly, Mitnick said: “You’re going to get a lot of valuable information from people who deal with these issues head-on on a daily basis.”

Other high-profile seminars included from Mike Hobday of IBM Watson on the future and AI; James Akrigg of Microsoft, on today’s challenging business environments; Matt McNeill of Google, on how Google are building for the future; and a panel discussion on the future of IoT.

This nice review and other great news can be found at the source.

Source: Manchester Evening News

Topics: Speaking Engagements, Google, England, business environments, cyber security, FBI, IBM Watson, IoT, James Akrigg, Manchester, Manchester Central, IP Expo, IT innovations, Mike Hobday, AI, Kevin Mitnick, Matt McNeill

Latest Posts

Kevin offers three excellent presentations, two are based on his best-selling books. His presentations are akin to technology magic shows that educate and inform while keeping people on the edge of their seats. He offers expert commentary on issues related to information security and increases “security awareness.”

The Growth of Third-Party Software Supply Chain Cyber Attacks

When testing your employees' social engineering readiness, your teams need simulated attacks that feel as if they’re coming from a nefarious engineer...

Read more ›

Bypassing Key Card Access: Shoring Up Your Physical Security

As you build additional layers of defense into your cybersecurity framework, it's important to implement physical security strategies as well.

Read more ›

How to Prioritize Your Pentesting Report’s Remediation Recommendations

If you recently received a penetration test, you’re on the right track to improving your cybersecurity posture. However, you may be wondering what the..

Read more ›
tech-texture-bg