Rick Mallon, Vice President, Marketing & Alliances (Sigma Systems)

Communications Service Providers (CSPs) are currently at an inflection point. Major trends are disrupting the industry: the Internet of Everything (IoE), mobile device technology and apps, cloud computing, information growth, and security most notably among others. We are in a new era of innovation, customer sophistication, competition and new digital native entrants. The strategic element of success is a laser-focus on the customer experience and unprecedented agility in launching and adapting digital products and services to customer expectations. Any service provider that is not pivoting to a customer-centric digitalized product and service delivery model faces a steep uphill climb. Learn about joint innovations enabling rapid launch and fulfillment of new products and services through the digitalization of the BSS and OSS, thereby transforming the traditional CSP into a digital service provider.
Adrian Alonso, Solutions Architect​ (gen-E)

With the overwhelming amount of data traffic being experienced, the telecommunication industry is faced with the challenge of scaling infrastructure seamlessly and adopting new technologies without causing customers any inconvenience. Continuous monitoring of applications, middleware, and infrastructure is required to optimize network performance and ensure customers receive the highest level of service. This requires extensive technological know-how, which is fundamental in analyzing customer issues and guaranteeing smooth service operations. In this session, gen-E CEO Marc Hayden will discuss advanced customer experience management amidst technology migrations leveraging data from across the entire enterprise.

Dushyant Sukhija, Author & Keynote Speaker

We're in an era of digital disruption, As leaders, if you don't transform to master the digital era to disrupt, you'll get disrupted. Dushyant Sukhija (, author of the recently published bestseller book “The Cisco Way” ( will lay out a simple five-step operational blueprint for CEOs and business leaders to navigate their organizations through the new digital era to a leadership position. Sukhija draws upon some of the best practices and key leadership lessons covered in his book, The Cisco Way, to prepare business leaders for the same agility that catapulted Cisco into the envious position of a global leader in the digital world.

Kurt Michel, Sr. Marketing Director (Ineoquest) and
Ed Haslam, CMO (Conviva)

Leveraging OTT Video Content: Start By Avoiding Buffer Rage
Video is a huge part of the content game today, but in order to leverage video content to maximum potential, it must play well. If it doesn't, it can annoy your viewers, and hurt your brand. In this session, you will learn about Video Intelligence – big data analytics that collects operational and experiential data about video playback sessions, and gives you the information you need to effectively use video content; who is watching what, where, when and why. And when quality issues get in the way, how to identify and diagnose them for rapid resolution.
Jonathan Redden, Director of Backbone Operations (Charter Communications) and
John English, Senior Marketing Manager (NETSCOUT)

Your Carrier WiFi experience is a key to your brand and your reputation and is a first step in the MSO mobile strategy. Having a Wifi network that is difficult to attach to, under delivers bandwidth, or offers mercurial service will annoy and irate users; it impacts churn, net promoter scores, and general market perception. There will always be the free or cheap, "best effort" Wifi services but as more business traffic and any premium offerings riding on the Wifi access subscribers will be less tolerant of a poor user experience. Delivering Carrier Class Wifi calls for a rigorous and holistic service delivery approach that involves pro-active early warning as well as troubleshooting, testing, and better upfront design. Wifi performance monitoring priorities that provide a comprehensive service assurance approach will be presented along with carrier use cases.
James Messer, CEO (goTransverse)

Enduring Success with Monetization Methodologies
It’s become an unfortunate trend: companies are launching products and services without a clear path to sustainability. So what’s to give? In order to turn your concept into cash, you need the ability to create a monetization strategy that is flexible and works for you in real-time. It should be flexible in packaging, with dynamic pricing and subsequent revenue recognition that will allow your company to flourish and adapt. In this session, attendees will learn how to create that clear path to sustainability by learning methodologies that can adapt immediately to new client requests or develop innovative approaches to monetization in advance of market needs.
Paul Hughes, Director of Strategy (Netcracker)

Managing the Actualized Customer in Today’s Digital Age
Welcome to the age of the ever connected consumer. Today's telecommunication service providers must address the entire customer experience across multiple channels and multiples services. Doing do requires a transformation of processes from marketing and discovery, through to delivery and support. This presentation will highlight some best practices that will help provide the right insights to the right customer at the right time.
Anand Thummalapalli, Head of Product Development​ (gen-E)

As the competition rises in the telecommunications industry, quality service is more critical than ever. Service providers require a common interface to assess their services for an optimal customer experience. Traditionally, the network operations team had to check service assurance platforms for issues and then act on it. Today’s technology innovations, companies can boost their efficiency by optimizing their services with real-time analysis and actionable insights. Companies are evolving the traditional service assurance approach and migrating to new technology and operational constructs. In this session, you’ll hear from industry veteran and gen-E CEO, Marc Hayden, regarding the need for service providers to access and correlate data across various domains to provide a greater degree of decision support.

Sandeep Raina, Product Marketing Director (MYCOM OSI)

Changing customer behavior and growing competition is compelling CSPs to evolve to digital business and digital networks, but the transition is challenging. Soon, networks will be more virtualized, delivering faster, dynamic, on-demand services, including IoT services. CSPs need reliable, automated and predictive OSS systems to deliver the promise of the digital environment.

In the presentation Sandeep will discuss the first steps of developing OSS for future digital networks and the use cases that will drive network evolution.

Mark Mortensen, Research Director (Analysys Mason)

The CSP to DSP Transformation and the Digital Experience Index:
The transformation of Communications Service Providers to Digital Services Providers is a fundamental shift in the industry. In this talk, Dr. Mark Mortensen, one of the leading analysts following this digital transformation, will outline the three steps necessary to become a DSP. He will also provide a review of Analysys Mason's Digital Experience Index that measures the degree of digitalisation of a CSP's operations and hence its digitalised user experience. Several case studies of leading DPSs will also be provided.
Télécharger      Map  65 ko
Dave Larson, Chief Operating Officer & Chief Technology Officer (Corero)

The Security Consideration for IOT
This era of the Internet of Things where digitally connected devices are becoming integral to our lives at our homes, offices and even in our cars. The benefit is that this paradigm shift allows consumers and businesses the ability to do things that we've never thought possible. When you begin to consider the tens of millions (or more) of "things" that allow us to maintain this interconnected network, you get a sense as to how vast the issue of securing the Internet of Things really is. What we don't hear about as often is how these vulnerable devices are the next frontier for cyber attackers. The average user of connected devices, whether deployed in your smart home, smart appliances, smart car or smart office, does not typically pay close attention to software updates or critical patching schedules or, as a matter-of-fact quite understand how these devices are connected or sharing data. How the human component contributes to an overall lack of security of the IoT is often underestimated. IoT devices are plug-and-play and the average user is incapable or uninterested in security and may never apply an upgrade or security patch to the device. So if an IoT device ships with an exploitable vulnerability, it will likely remain vulnerable throughout its lifecycle. The bad guys know this and gain access to these devices in droves using them for malicious intent.
Todd Peterson, Senior Product Marketing Manager (One Identity, formerly Dell)

Rethink your approach to security: How to become the Department of Yes
Businesses are ramping technology investments, new applications and data sources, expanding access types, and innovation faster than you can even keep pace. These investments can drive enormous value to the business, but can also increase IT complexity and add new security vulnerabilities. Today’s transformation age means that digital usages inherently enable new types of innovation and creativity in a particular domain, rather than simply enhance and support traditional methods. Yet what comes with this appeal are very real security requirements. What’s your approach to securing these digital transformations and how can you help your security teams transform to keep up with the digital wave? If it’s an undisciplined and piecemeal approach of “address issues as they come up”, it will not only counteract the benefits of your organizations’ digital transformation, but introduce extensive risk to your business. Your business can’t afford to fall behind and become an inhibitor to the very business-enabling benefits the new technologies you’ve invested in are meant to deliver. Security is a many-facetted discipline with lots of opportunity to say “no” while the business continues to ramp up technology investments and capabilities to foster business growth and employee productivity. One of the most critical aspects is the controlling, auditing, and tracking of administrator access and privileged accounts. With the right approach to privileged account management, organizations can transform security away from denial and restriction to the practice of connecting, permitting, uniting and enabling. This session will:
  • Offer tips that help security teams adopt a mindset of enablement vs. roadblock
  • Discuss security strategies that enable the business to advance in its digital maturity
  • Discuss the role privileged account management plays in securing digital technologies
  • Discuss the challenges and offer actionable advice on the right way to enable privileged access security, including service accounts, without obstructing the business
  • Explain the full range of practices and technologies available to help and the pros and cons of each
Cyril Doussau, Senior Director, Service Assurance Products and Markets (InfoVista)

Succeding Your Transition to NFV based Services
With NFV and SDN well on the way to being part of a communications service provider’s service offers, many are realizing that the leap from lab to production has some major implications beyond just an increase in scale… the OSS turns out to be a keystone in the foundation of these future NFV and/or SDN-based service offers. In particular, service assurance and performance quickly become the difference between market acceptance and market failure. In this presentation you’ll have the chance to explore the service assurance maturity model and the necessary steps to successfully transition to NFV and SDN.