Future Networks LIVE is a curated event designed for network professionals who want to stay ahead of the latest developments shaping the industry.
The event will explore thought leadership, best practices from end-users, incoming security industry compliance insights, and offer demonstrations of the latest advantage-driven technologies. Further details on the topics covered are outlined below.
9:30-10:00 - Registration and Refreshments
A chance to get settled, grab a coffee and network with peers.
10:00-10:30 - The Three Pillars of the Future Network: Transparency, Intelligence, and Agility
In this session, Rob explores what we can realistically expect from network technology over the next three years, not the usual “it’s new, so you need it” narrative, but insights shaped by real customer conversations and real-world challenges. Drawing directly from what organisations are actually asking for, Rob will cover key areas including performance, connectivity, security, and more.
The session will examine several emerging technologies and, more importantly, focus on the practical, grounded questions you should be asking when evaluating new solutions, helping you distinguish meaningful innovation from unnecessary complexity.
Rob Pocock
10:35-11:05 - Confronting the truth about centralised Vs regionalised solutions for network- and application performance management
Centralised and regionalised approaches to network and application performance management involve trade-offs that are often overlooked. This session examines their impact on visibility, scalability and troubleshooting in hybrid environments. Attendees will learn how packet-based monitoring with full Layer 2–Layer 7 visibility provides end-to-end insight across data centres, remote sites and users, enabling faster root-cause analysis, clearer accountability, and more consistent application performance, regardless of location.
Rob Earley
11:10-11:25 - SBOMs as a foundation for product transparency, risk management, and compliance
As digital products increasingly span software, firmware, operating systems, containers, and connected devices, understanding what is inside them is critical for security, compliance, and operational resilience. This session explains Software Bills of Materials (SBOMs) as a foundational transparency mechanism for both product producers and product deployers. Attendees will gain clarity on what makes an SBOM effective in practice, including key requirements for accurate generation, meaningful consumption, and scalable management to support supply chain risk management, vulnerability impact analysis, and regulatory readiness.
Zahra Khani
11:25-11:40 - Seeing More, Acting Faster: The Future of Trading Infrastructure and Analytics
Trading today isn’t just about speed, it is about seeing everything, acting faster, and staying resilient under pressure. This session explores how smarter infrastructure choices unlock visibility, accelerate execution, and strengthen resilience while offering practical insights into balancing latency, compliance and innovation to stay ahead in modern markets.
Diana Stanescu
12:00-12:45 - Lunch
A chance to recharge, network and explore the demonstration space.
12:45-1:15 - From Noise to Knowledge: Can you imagine waking up to a day with no security alerts?
Traditional network security operations are reactive by design, leaving analysts buried under alerts and always one step behind attackers. It doesn’t have to be this way. This session examines how threat intelligence can serve as the foundation for proactive, preemptive network defense. Learn how leading teams are improving detection quality, operational efficiency, and long-term resilience by putting intelligence first.
Dave Silke
1:20-1:50 - AI-Ready in Two Steps: How IT and Security Leaders Can Revolutionise Their Approach to Data and Intelligence
Everyone is racing to add AI to their IT and security operations - but most are attempting to build it on fragmented, incomplete data, guaranteeing bad answers (hallucinations), slow response, and incomplete recommendations. In this talk, Nik Pruthi will showcase how any organisation, no matter their size or industry, can finally achieve true AI-readiness that changes the game in their IT and security operations. Nik will explore how consolidating all IT and OT data into a single, unified foundation is a prerequisite for AI that actually works in the real world. Learn how a full-context approach transforms detection, response, governance, and analyst productivity - turning AI from a risk into a trusted, always-on assistant.
Nik Pruthi
1:55-2:25 - How automated pure optical switches can improve speed, reliability, and scalability in modern networks
Optical switching improves network efficiency by enabling fast, reliable, all-optical signal routing without manual intervention. This presentation explores how centralised control and full-architecture visibility further enhance signal management, making networks more automated, scalable, and reliable.
Richard Hutchinson
2:30-3:00 - AI and the Future of Ethernet
As the world’s most ubiquitous networking technology enters the era of terabit networking, Ethernet is also being challenged to handle the unique demands of AI. This presentation will explain those challenges and evaluate the different strategies for optimizing existing and future networks so businesses can reap the full benefits of their AI investments.
Martin Qvist Olsen
3:05-3:35 - Pulling the Plug on Manual Fibre Switching
As network demands grow, operators must optimise fibre switching, reduce manual intervention, and ensure seamless connectivity while maintaining uptime and controlling costs. We will discuss how this can be achieved.
Nati Neuberger
3:40-4:10 - Feeding the AI: Why Contextual Network Intelligence Is Critical for Modern Threat Hunting
As network encryption has become the norm, effective cyber threat hunting increasingly depends on extracting rich, contextual intelligence from network behaviour rather than payload inspection. This session explores the types of protocol-aware network context available within modern telecom environments—including application-layer identification, JA4 fingerprints, DNS interactions, signalling protocols, and routing intelligence—and how these datasets expose botnets, command-and-control activity, and coordinated malicious behaviour. Attendees will learn how structuring live network context into analytics-ready datasets forms the foundation for scalable, AI-driven threat hunting and intelligence operations.
Gene Litt
Registration
Places are limited to ensure a highly interactive experience. An early registration is therefore highly recommended. Attendance is complimentary, with no charge to register or attend.