VELOCITY - DATA AND ANALYTICS SUMMIT

Data

5 Steps to Strengthen Security Workflow in the Middle East

5 Steps to Strengthen Security Workflow in the Middle East

How Middle East security chiefs can bolster their remediation workflows in the face of an escalating threat landscape. Explore expert insights from Hadi Jaafarawi,...
Is it Possible to Lower Cyber Insurance Costs – Without Compromising on Policy Quality

Is it Possible to Lower Cyber Insurance Costs – Without Compromising...

How to strategically lower cyber insurance costs without compromising policy quality. Explore key steps to improve your cybersecurity posture, from risk identification to incident...
Embracing-Zero-Trust-Network-Access-A-Safer-Alternative-to-VPNs

Embracing Zero Trust Network Access: A Safer Alternative to VPNs

Explore the shift from VPNs to Zero Trust Network Access (ZTNA) for enhanced cybersecurity. Learn how ZTNA ensures secure access with the principle of...
Strategies for Ensuring Flexibility and Control in the Hybrid Cloud Era

Strategies for Ensuring Flexibility and Control in the Hybrid Cloud Era

Discover strategies to ensure flexibility and control, including embracing hybrid and multi-cloud environments, implementing abstraction layers, and prioritising cloud agnosticism. Navigate the complexities of...
Seven Phases of a Successful Analytics Project

Seven Phases of a Successful Analytics Project

Learn the seven crucial phases for a successful analytics project, whether integrating Generative AI or not. From data-gathering techniques to effective visualisation and predictive...
Securing Endpoints: A Three-phase Strategy for Defending Against Ransomware Attacks

Securing Endpoints: A Three-phase Strategy for Defending Against Ransomware Attacks

Learn how to fortify your cybersecurity against ransomware attacks with Vibin Shaju, VP of Solutions Engineering EMEA at Trellix. Explore a three-phase strategy covering...
LC20-Sponsor--How-Data-Storytelling-Changes-Behavior

How Data Storytelling Changes Behaviour

How data storytelling revolutionises communication and influences customer behaviour. Learn the art of crafting compelling narratives from complex data, ensuring your message resonates.  Having all...
Velocity-KSA-Vox-pop---How-can-businesses-increase-employee-adoption-of-technology

How Can Businesses Increase Employee Adoption of Technology?

From user-friendly interfaces to ongoing support, learn how to seamlessly integrate tech for productivity options from the data leaders at Velocity - Data and...
Velocity KSA Vox-pop - How Teams Can Align People and Processes to Maximise Tech Investments

How Can Teams Align People and Processes to Maximise Tech Investments?

Companies require a granular strategic approach to ensure that investments yield maximum returns. Datatechvibe spoke with industry experts on aligning teams, processes and vision...
How-Cybersecurity-Should-Bolster-Personal-Data-Protection-Efforts

How Cybersecurity Should Bolster Personal Data Protection Efforts

Explore the synergy between personal data protection and cybersecurity. Genie Sugene Gan, Head of Government Affairs & Public Policy in APJ and META at...

Latest Posts