BUSSYNET ADVANCED SERVICES

  • Home
  • About Us
  • Events
  • Contacts
SEND ENQUIRY

BIG DATA AND ARTIFICIAL INTELLIGENCE CONFERENCE 2021

Download the brochure hereDownload

Background

Petroleum has always been the driver of the world economy; and whoever controlled it had the keys to the world. But Big data maybe about to change that. Big data could be the next petroleum.

The race for big data has corresponded with a spike in the demand for data collection and information management specialists; so much so that software giants like Software AG, Oracle, IBM, Microsoft, SAP, EMC, HP and Dell have spent more than $15 billion on software firms specialising in data management and analytics. In 2010, the big data market was worth more than $100 billion and was growing at almost 10 percent a year; about twice as fast as the software business as a whole. This is the age of creative big data disruption.

Governments and corporate organisations can use big data’s adoption of predictive analytics, user behaviour analytics and other advanced data analytics to spot business trends, prevent diseases, combat crime, among other operations. The applications of big data in governance in business operations was one of the reasons why the Big Data and Artificial Intelligence Conference was organised. Set to run on the 29th and 30th of July 2021 at the Emperors Palace Convention Centre in Johannesburg, the event will discuss how scientists, business executives, medical practitioners, advertising and governments can apply data analytics in areas including manufacturing, mining, financial technology, smart city and urban informatics, governance, meteorology, biology and environmental research.

Delegates to the conference will also get insights on how developed economies are increasingly using data-intensive technologies in their everyday operations and the results there of; as they will about the latest data mining sciences available; the ethical uses of data so acquired and how to keep the data safe in the world sophisticated cybercrime.

Objectives

  • To learn from industry experts and global business leaders and share real-world use cases, success stories, and best practices.
  • To tap into content helpful to your organisation in dedicated business and technology talks.
  • To swap ideas with the industry peers in the field of big data.
  • To understand the next generation technologies and techniques from the globe of Artificial Intelligence & Big Data
  • To get a chance to explore and find out the practical and successful implementation of AI & Big data in driving forward your business for a better future.

Target Audience

  • VP
  • Directors
  • Managers and Experts of IT
  • Analytics and business intelligence leaders
  • Analytics and BI practitioners
  • Business analysts
  • Data scientists
  • Analytics and BI program leaders
  • Information management and master data management
  • Enterprise information leaders
  • MDM program managers
  • Data/information governance leaders
  • Data management infrastructure managers
  • Senior IT and business leaders
  • Chief data officers (CDO Circle)
  • Chief analytics officers (CDO Circle)
  • Senior IT leaders
  • Senior business leaders
  • Architects
  • Information architects
  • Analytics and BI architects
  • Enterprise architects
  • Application architects and managers
  • Marketing & other line of business executives
  • CTO, CIO & technology executives
  • Technology strategists & enterprise architects
  • Business & technology leaders seeking to drive new business opportunities & outcomes through big data
  • Mid to large-sized companies
  • Enterprise spanning diverse major industries
  • Data Scientists
  • Data Engineers
  • Data Analysts
  • Software Developers
  • Technical Leads
  • Researchers
  • System Architects
  • Head Data Scientists
  • Head Researchers
  • IT Managers
  • Entrepreneurs
  • Business Analysts
  • Business Strategist’s
  • Consultants
  • Government
  • International development
  • Manufacturing
  • Healthcare
  • Education
  • Media
  • Insurance
  • Internet of Things (IoT)
  • Information Technology
  • Sports
  • Chief Information Officers
  • Chief Data Officers
  • Data Architects
  • Data Analysts
  • Data Scientists
  • Data Steward
  • Database Administrators
  • Information Architects
  • Metadata Modeler
  • Chief Data Officer
  • Data Modelers
  • Researchers and Students
  • Information Security Specialists
  • IT Directors and Managers
  • Database Administrators
  • Cloud Technology Experts
  • Application Developers
  • Software Engineers
  • Technology Specialists
  • Project Managers
  • Business Directors and Managers
  • Software developers
  • Business Development Executives
  • Business Intelligence Professionals
  • Advertising executives
  • Health Practitioners
  • Education professionals
  • Media Practitioners
  • Retail professionals
  • Telecommunications Specialists
  • Real Estate Managers
  • Banking and Finance Executives
  • Data Governance Managers
  • Key Account Managers
  • Account Managers
  • Municipalities
  • Universities
  • Finance and Banking
  • Telecommunications and Media
  • Manufacturing
  • Insurance
  • Utilities
  • Information Technology
  • Aviation
  • Transport and Logistics
  • Telematics
  • Advertising and Marketing
  • Wholesale and Retail
  • Health and Medicine

Topics of Discussion

  • Data and analytics strategy
  • Technology trends in data and analytics
  • Customer analytics
  • AI and machine learning
  • Internet of Things
  • Governance and trust
  • Self-service data and analytics capabilities
  • Data-driven culture
  • Role of the chief data officer and chief analytics officer
  • Data Science and Machine Learning
  • Data Engineering and Architecture
  • Streaming and IoT
  • Business Analytics and Visualization
  • Automation in data science and data
  • Security and Privacy
  • Case studies and best practices
  • Culture and organization
  • Visualization and UX
  • Law and Ethics
  • Anti-Forensics Techniques
  • Application Security
  • Authentication and Access Control Systems
  • Critical Infrastructure Protection
  • Cyber Warfare Trends and Approaches
  • Denial-of-Service Attacks and Countermeasures
  • Digital Forensics
  • Digital Rights Management
  • Distributed and Pervasive Systems Security
  • Embedded Systems Security
  • Enterprise Systems Security
  • Executable Content and Content Filtering
  • File and Files System Security
  • Fraud Management
  • Hardware Security
  • Human-Computer Interaction and Security
  • Identity Management
  • Intellectual Property Protection
  • Key Distribution and Management
  • Mobile System Security
  • Multimedia and Document Security
  • Network Infrastructure Security
  • Operating Systems and Database Security
  • Peer-to-Peer Security
  • Secure Communications and Information Flow
  • Secure Sensor Networks
  • Security for Grid Computing
  • Security in Cloud and Edge Computing/Social Networks
  • Security in e-services
  • Security of Web-Based Applications
  • Surveillance Systems
  • Accountability
  • Anonymity
  • Analysis of Network and Security Protocols
  • Authorship Analysis
  • Biometrics Standards and Standardization
  • Border Security
  • Business Continuity & Disaster Recovery Planning
  • Crowd Management
  • Emergency Response and Management
  • Encryption and Cryptography
  • Forecasting Terrorism
  • Incident Handling and Penetration Testing
  • Information Hiding
  • Intrusion and Anomaly Detection and Prevention
  • Investigation of Insider Attacks
  • Language-Based Security
  • Malware Forensics and Anti-Malware Techniques
  • Protocol Security- Secure Software Development
  • Security Architectures
  • Security Metrics
  • Self-Protecting and Self-Healing Systems
  • Social Engineering
  • Social Network Analysis
  • Template Protection and Liveliness Detection
  • Threats, Vulnerabilities, and Risk Management
  • Economics of Security
  • Laws and Regulations/Legal Issues
  • Security Policies and Trust Management
  • Security Education and Training
  • New Threats and Non-Traditional Approaches
  • Theories, Methods, and Tools in Managing Security
  • Cloud Security and Cryptography
  • Internet of Things Security and Privacy
  • Big Data Security and Privacy
  • Secure Network Protocols
  • Blockchain Security and Privacy

July 29 @ 08:00 — July 30 @ 15:00
08:00 — 15:00 (30h 59′)

EMPERORS PALACE CONVENTION CENTRE, JOHANNESBURG

BOOK NOW

Quick Navigation

  • Home
  • About Us
  • Events
  • Contacts

Contacts

Address: 50 Prairie Street
Johannesburg, Gauteng 2190, ZA
Tel: 011 000 000
Cell: 072 000 000

© 2021 - Bussynet Advanced Trading.

TOP