Back to Events

JuiceIT 2025 Adelaide

Event Details
Tuesday, 18th March 20258am - 5pm, Adelaide Convention CentreThis event has now concluded

Simplify. Connect. Protect.

Data#3 and our world leading vendor partners will be hosting Australia’s largest free IT Solutions & Services conference in Adelaide, Brisbane, Perth, Fiji, and Sydney in March and May 2025.

At JuiceIT, we’re not just talking about technology; we’re talking about real solutions for real people. It’s about building meaningful connections – whether that’s within your team, with your customers, or across your entire business and technology ecosystem – and, of course, it’s about protecting what matters most in an increasingly complex world.

JuiceIT is designed to help technology leaders cut through the noise and find practical ways to streamline and simplify your current environment for future advancements – helping you stay competitive and achieve your business objectives while securing complex environments. Leveraging what you have and enhancing it to progress on your technology journey is crucial. ​

At JuiceIT, you’ll have the opportunity to engage with experts from Data#3 and our world-leading technology partners. Together, we’ll help you balance progress with risk, while ensuring, no matter where you are on your technology journey, AI becomes is an integral part of your success story. ​

Are you ready to Simplify, Connect, and Protect?

Need help justifying your attendance? Download our attendance justification document here.

Highlights from JuiceIT 2024

ADL Tradeshow 083 scaled     hZSbf1Z6 scaled

An informative day, with interesting presentations and solutions showcased. My colleagues and I enjoyed the discussions with peers and subject matter experts alike.

JuiceIT attendee

Keynote

Meet Dr Michelle Dickinson

DICKINSON Michelle pic

Innovator, Adventurer, Keynote Speaker

Dr Michelle Dickinson (MNZM) is a passionate researcher and teacher with a love of tech, science and engineering.

With a PhD in Biomedical and Materials Engineering, Michelle has combined her interests to give her a unique insight into how nature and technology can learn from each other for scientific developments.

As co-founder of Nanogirl Labs Ltd and an honorary academic in Engineering at the University of Auckland, New Zealand, Michelle has always followed her dreams and never let traditional stereotypes scare her.

With this belief she is passionate about shaping technology to make the world better, technology trends, and innovating for the future of tomorrow.

Adelaide Convention Centre

Agenda

08:00am – 08:30am

Hall C&D

Registration and sponsor showcase opens

08:30am – 09:50am

Hall G

Welcome and keynote with sit down breakfast

Dr Michelle Dickinson (MNZM) is a passionate researcher and teacher with a love of tech, science and engineering.

With a PhD in Biomedical and Materials Engineering, Michelle has combined her interests to give her a unique insight into how nature and technology can learn from each other for scientific developments.

As co-founder of Nanogirl Labs Ltd and an honorary academic in Engineering at the University of Auckland, New Zealand, Michelle has always followed her dreams and never let traditional stereotypes scare her.

With this belief she is passionate about shaping technology to make the world better, technology trends, and innovating for the future of tomorrow.

Presenter
Dr Michelle Dickinson
Dr Michelle Dickinson Innovator, Adventurer, Keynote Speaker

09:50am – 10:20am

Hall C&D

Networking morning tea and sponsor showcase

10:20am – 11:00am

Session 1
Hall E2

Data#3 – Revolutionise your business with AI

A Data#3 Showcase: Join us for an eye-opening presentation that demonstrates how off-the-shelf AI tools can transform your business technology landscape. In this session, tailored for IT Managers, we’ll explore the power of AI integration and its potential to solve real-world business challenges.
We’ll dive into a compelling case study showcasing our recent collaboration with the Brisbane Convention & Exhibition Centre (BCEC). Learn how Data#3 leveraged Microsoft Copilot Studio and SharePoint to deliver transformational change, addressing specific business problems by using simple off the shelf technology and some progressive use of AI.
Presenters
Adam Rappaport
Adam Rappaport Solution Specialist – AI Data#3
Mark Pattie
Mark Pattie Solution Specialist – Modern Workplace Data#3
Hall E1

Microsoft – 1,000+ Microsoft security conversations, here’s what matters most.

Is your organisation falling into the same security traps as everyone else?

After countless discussions with businesses navigating Microsoft Security, Data#3 Solution Architect (Security) Mark Hindson has repeatedly seen the same vulnerabilities, misconfigurations, and missed opportunities that put organisations at risk. Attend this session to uncover the most common security pitfalls from cloud security to data protection; and how you can avoid these using threat defence and Microsoft Sentinel.

Presenter
Mark Hindson
Mark Hindson Solution Architect (Security) Data#3
Hall E3

Cisco – A New Era of AI-Native Security for Data Centers and Cloud

Explore a groundbreaking new architecture for advanced cyber defence in hybrid environments, focusing on the unified management of security across various domains. It integrates eBPF technology and AI-driven automation to enforce consistent policies and enhance operational efficiency. Bringing the power of hyperscaler technology to the enterprise, introducing a groundbreaking security architecture designed to defend modern, AI-scale data centers. This session will cover two use cases: exploit protection and segmentation.

Presenter
Luke Silverback
Luke Silverback Leader – Regional Sales – Cyber Security Cisco
Gilbert Suite

Adobe – Generative AI and automation solutions for both marketing communications and document processes

Generative AI and Automation have changed how we all can engage, create, and manage content, responsibly and safely. Learn how Adobe enables organisations to create Marketing Communications at scale that are ethical and safe for commercial use with Firefly Services (APIs), and, how Adobe helps knowledge workers understand, analyse, generate and protect content with Acrobat and its solutions whilst complementing your current Microsoft investments. The world has changed, see what is now real, simple, connected, protected and safe.

Presenter
Matt Davis
Matt Davis Principal Solutions Consultant Adobe

11:10am – 11:50am

Session 2
Hall E2

Data#3 – Behind the firewall: the economics of cyber crime

Step into the hidden world of cybercrime and uncover the forces driving this shadow economy. In this presentation, we will explore how cybercriminals profit while shedding light on the financial and operational toll cybercrime takes on individuals and businesses alike.
Unlike the high-profile breaches dominating headlines, this session dives into real-world incidents from our customers and partners.

You’ll learn:
• How Cybercriminals Profit: The tactics and strategies that fuel their operations.
• The Ripple Effects of Cybercrime: From financial losses to reputational damage, the cascading impacts on victims.
• Behind the Scenes: A breakdown of incidents—how they happened, the vulnerabilities exploited, and the aftermath.
• Resilience in Action: The remediation steps and practical solutions to minimise risks for others.

This presentation combines compelling stories, actionable insights, and a focus on the economic realities of cybercrime, delivering lessons to protect your organisation and navigate the evolving cyber landscape. Prepare to demystify the economics of cybercrime and emerge equipped with strategies to stay one step ahead.

Presenter
Richard Dornhart
Richard Dornhart National Practice Manager – Security Data#3
Hall E1

Microsoft – Azure cloud for modernization of apps, data, and AI – are you ready?

The Azure cloud provides a dizzying set of services across compute services, data and analytics, AI, security, identity, networking, and management. We see many customers who have grown their Azure footprint organically over time, and are looking to understand how they can take advantage of advanced services like OpenAI available in Azure whilst staying secure, compliant, and well governed.

Are you ready? This session will provide you the map of how to ensure you are ready to consume these advanced services by having your Azure estate in order so you obtain maximum value.

Presenter
John Thiele
John Thiele Azure Solution Specialist Data#3
Hall E3

Cisco – From Complexity to Clarity: Optimising Data Centers for the Future

In the rush to AI, companies will over-invest and risk not delivering a business return.

Because decisions made today affect your ability to be fast, resilient, and scalable, this session will explore simplifying and optimising your data centre to support modern workloads while preparing for the inevitable adoption of AI.

Join this session to learn what’s really important and how to reduce the time to value on your data centre investments.

Presenter
Chris Gascoigne
Chris Gascoigne Principal Solutions Engineer, APJC Cloud and AI Infrastructure Cisco
Gilbert Suite

Lenovo – Bring the power of your cloud to the edge

Would you like to know how your edge locations can have the best of both world: fast local infrastructure deployed and managed via the cloud with applications running locally and data synchronised to the cloud. Lenovo will present on a recent 700+ retail deployment that coupled edge specific hardware with Azure automation and management. Topics included will be the business requirements, the solution provided, and the challenges encountered while deploying this ambitious project.

Presenter
Andrew Shoosmith
Andrew Shoosmith Solution Consultant Lenovo

12:00pm – 12:40pm

Session 3
Hall E2

F5 – Securing AI in an Evolving Landscape: The Case for an AI Gateway

AI is transforming industries and driving innovation, but its rapid adoption introduces significant risks, including security vulnerabilities and exposure to sophisticated cyber threats. As organizations scale AI operations, protecting sensitive data and critical workflows becomes essential. An AI Gateway offers a vital solution by enabling secure, high-performance AI operations, safeguarding data, and ensuring compliance. This session explores how you can fortify AI pipelines, prevent malicious interference, and support seamless, secure scaling in an increasingly hostile digital landscape.

Presenter
Michael Christie
Michael Christie Senior Director of Solutions Engineering F5
Hall E1

Microsoft – Copilot Agents: Personal Productivity to Process Transformation

What if your organisation’s knowledge and data were effortlessly connected, and AI-driven agents could streamline tasks, surface insights, and enhance decision-making?

Join Data#3 Solution Specialists, Genevieve Wood and Steve Bedwell, to discover the power of Microsoft Copilot Agents. From simple data retrieval to advanced AI automation, explore how these agents can be tailored to your needs, boosting efficiency, driving innovation, and transforming the way you work. Don’t miss this opportunity to unlock the full potential of AI in your business.

Presenters
Steve Bedwell
Steve Bedwell Technical Specialist – Modern Work Data#3 Limited
Genevieve Wood
Genevieve Wood Functional Consultant Data#3 Limited
Hall E3

Silverfort – Stopping Scattered Spider with an Identity-First IR Approach

Scattered Spider is redefining cyber threats with MFA fatigue, SIM swapping, and social engineering to bypass traditional defenses. By the time alerts surface, they’ve already escalated privileges and moved laterally—leaving organizations scrambling.

Learn how an Identity-First IR approach can detect compromised accounts early, enforce adaptive access controls, and automate containment to reduce dwell time and blast radius.

Join us for a live response walkthrough and gain actionable insights to outmaneuver modern attackers with an identity-first defense.

Presenter
Abbas Kudrati
Abbas Kudrati Chief Identity & Security Advisor Silverfort
Gilbert Suite

Synology – From DR to CR: master the 6 key elements for a comprehensive enterprise data protection strategy

As cyber threats grow more sophisticated and relentless, a reactive approach is no longer enough. It’s time to evolve from Disaster Recovery to Cyber Recovery. Join us for From DR to CR: Master the 6 Key Elements for a Comprehensive Enterprise Data Protection Strategy, where we’ll explore the future of data protection. Discover how to design a scalable, secure, and resilient strategy with native immutability, centralised protection, and diverse restoration capabilities. Gain the vision and tools to transform your organisation’s cyber resiliency and lead with confidence in the modern data era.

Presenter
Jasmine Chiu
Jasmine Chiu Account Manager Synology

12:40pm – 1:30pm

Hall C&D

Networking lunch and sponsor showcase

1:30pm – 2:00pm

Session 4
Hall E2

Dell Technologies – Mastering Multicloud Management with Dell Technologies

In an ever-evolving technology landscape, Dell Technologies leads with innovative solutions that modernise your data center and advance your multicloud strategy. We accelerate AI adoption by integrating it with your data, modernise application platforms for evolving workloads, and optimise multicloud and edge operations. Additionally, we enhance data centre efficiency and cyber resilience, ensuring your infrastructure meets today’s needs and is prepared for tomorrow’s challenges.

Presenter
Jamie Humphrey
Jamie Humphrey General Manager, ANZ Specialty Sales – Compute, Storage Platforms and Solutions Dell Technologies
Hall E1

NetApp – Safeguarding business operations: embracing ‘secure by demand’

In the current cybersecurity landscape, organizations are increasingly concerned about cyber threats impacting their business operations, particularly in the wake of high-profile data breaches involving major companies. Cyber threats remain a top concern for businesses in Australia and globally, emphasizing the need for robust cybersecurity measures to safeguard competitive advantage and reputation.

The Australian Cyber Security Centre (ACSC) has introduced the “Secure By Demand” guidelines, which provide priority considerations for operational technology (OT) owners and operators when selecting digital products. These guidelines aim to ensure that products and software remain secure throughout their lifecycle, mitigating cyber threats and enhancing security resilience.

NetApp’s commitment to security ensures that its products align with the Secure By Demand principles, providing robust security measures for OT owners and operators. By adhering to these guidelines, organizations can enhance their cybersecurity posture and protect their critical infrastructure from emerging cyber threats.

Come and hear more detailed information and discussion on how the most secure storage on the planet can help your business implement security right at your most valuable asset, your data.

Presenter
Chris Anders
Chris Anders Technical Lead NetApp
Hall E3

HP – The World will be (Hybrid)² – Cloud and Edge – The New Era of PCs by HP

As the digital landscape continually evolves, HP is at the forefront of ushering in a new era of computing that harmonizes the power of the cloud with the robustness of edge computing. In “The World will be (Hybrid)²,” HP explores how hybrid solutions are revolutionizing the traditional PC landscape, offering unprecedented flexibility, performance, and connectivity.

Presenter
Carlin Diprose
Carlin Diprose ANZ BPS HP & Intel Ambassador HP
Gilbert Suite

Mimecast – Human error: your biggest cyber threat?

68% of cyber incidents are caused by human error – a sobering statistic! This session will show you how to go beyond the “check-the-box” approach and identify the individuals truly at risk within your organisation. Learn how Mimecast’s Connected Human Risk Management Platform can help you:

• Pinpoint your riskiest employees with advanced risk scoring and analytics.
• Empower your workforce with the knowledge, tools and skills to confidently navigate today’s complex threat landscape.
• Reduce your risk of phishing, social engineering, and other human-driven attacks.

Join us to discover a proactive, data-driven approach to security awareness designed to engage users and deliver measurable results.

Presenter
Scott Jenner
Scott Jenner Senior Sales Engineer Mimecast

2:10pm – 2:40pm

Session 5
Hall E2

Veeam – Radical Resilience: Ensuring Business Continuity

In today’s digital landscape, disruptions aren’t a matter of if—but when. Cyber threats, outages, and unexpected disasters can strike at any time, making resilience a critical priority for every organization. But resilience isn’t just about recovery—it’s about ensuring your business can continue operating with minimal impact.

So how do you prepare? We’ll explore strategies to strengthen your cyber resilience, improve alignment with Essential 8 Maturity, and build a framework that keeps your data protected and accessible. By taking proactive steps, you can reduce risk, improve recovery times, and ensure business continuity—no matter the challenge.

Presenter
John Wood
John Wood Head of Systems Engineering Veeam
Hall E1

SentinelOne – Outsmart Threats, Outpace Risks: The Intelligent SOC Revolution

This session explores the transformative potential of Generative AI, machine learning, and hyper automation in cybersecurity. We’ll delve into how these advanced technologies are reshaping Security Operations Centers by enabling intelligent threat detection, automated incident response, and predictive risk management. By leveraging AI-driven analytics, continuous learning algorithms, and seamless workflow integration, organizations can dramatically enhance their defensive capabilities, reduce response times, and proactively mitigate emerging cyber risks with unprecedented precision and efficiency.

Presenter
Wayne Phillips CISSP, CCSP
Wayne Phillips CISSP, CCSP SentinelOne Field CTO, Asia-Pacific & Japan SentinelOne
Hall E3

Logic Monitor – Transform Your Operations with Next-Gen Observability

AI driven Observability —delivering real-world outcomes today. Australian businesses are leveraging AI-driven observability to drastically reduce costs, eliminate downtime, and redirect IT resources toward innovation.
Join Data#3 and LogicMonitor as we explore how AI-powered observability is transforming IT operations. Discover how unifying event data, automating root-cause analysis, and harnessing predictive insights can accelerate resolution times by up to 70%, maximize ROI, and turn IT teams from firefighters into strategic enablers.

Through real-world case studies, including a leading Australian retailer that used LogicMonitor’s AI-driven event intelligence and predictive analytics to:
● Slash alert noise by 88%,
● Reduce critical incidents by 22%, and
● Boost productivity while elevating customer satisfaction,
…we’ll demonstrate how intelligent observability drives measurable business impact.
Lets explore how you can harness the full potential of AI to unlock growth, reduce risk, and enhance competitive advantage.

Presenter
Tim Kozak
Tim Kozak Technical Lead LogicMonitor
Gilbert Suite

Airlock Digital – Taking back control: eliminating shadow IT and securing your endpoints

Shadow IT and unmanaged software deployments have eroded IT’s control over endpoints, leading to security risks, compliance headaches, and operational inefficiencies. With modern IT teams stretched thin, it’s time to regain control without creating unnecessary friction.

In this session, we’ll explore practical strategies to eliminate shadow IT, streamline patching and procurement, and enforce security policies without locking users out of productivity. We’ll discuss how application allowlisting can complement your existing IT investments (like Intune), provide visibility into what’s actually running in your environment, and prevent security gaps caused by rogue software.

Presenter
Josh Schwarz
Josh Schwarz Senior Sales Engineer Airlock Digital

2:50pm – 3:20pm

Session 6
Hall E2

Rubrik – Securing your data: simplify the path to cyber resilience and defence

In today’s interconnected world, ransomware attacks are no longer a matter of “if” but “when.” Businesses need solutions that not only safeguard their critical assets but also reduce costs and improve operational efficiency. Join Rubrik as we delve into the critical need for a modern cyber resilience strategy.

Simplify. This session will break down the anatomy of a ransomware attack, exposing the vulnerabilities that legacy backup solutions simply can’t address. We’ll explore why traditional backups are no longer enough to guarantee recovery in the face of sophisticated cyber threats. By consolidating, simplifying and automating data protection, you can dramatically reduce the total cost of ownership.

Discover how Rubrik’s platform empowers you to simplify your data management, connect your critical systems, and ultimately protect your business from the devastating impact of a cyber incident. And in a world where data is increasingly moving to the cloud, ensure your cloud data is protected and managed as seamlessly as on-premises data.

Protect. Learn how to achieve true cyber resilience and ensure business continuity, even in the face of a successful attack.
Ask yourself…
• What measures should you put in place to minimise the impact of any cyber incident?
• Have you implemented an assumed breach mindset?
• Do you have a single view of your backup operations across data centres, SaaS and cloud today?
• Can you discover and gain visibility into your sensitive data?
• Can you identify threats, and quarantine infected data during recovery from a cyber attack?
• What potential could be realised when all organisations operated with cyber confidence?
• When was the last time you tested your cyber recovery capability?

Presenter
Ian Morris
Ian Morris Channel Director ANZ Rubrik
Hall E1

Nerdio – Unlock the full potential of Microsoft modern work technologies with Nerdio

Manage & Cost Optimise Microsoft’s Modern Work technologies, with Nerdio’s modern, unified management platform for Microsoft DaaS and physical endpoints.

Nerdio Manager for Enterprise allows customers to leverage the significant investments Microsoft is making into Azure Virtual Desktop, Intune, and Windows 365 services. Unlike other virtual desktop solutions, Nerdio Manager for Enterprise does not replace Microsoft’s native components but enhances them with best-in-class enterprise capabilities and extends native admin experience.

Nerdio delivers hundreds of features that simplify management, ensure efficient operations, and lower Azure compute and storage costs by up to 80% via automation.

Enterprise IT professionals can deliver and maintain a wide range of virtual Windows endpoints and Windows applications across hybrid workforces with ease and fine-tune end-user computing (EUC) approaches for maximum effectiveness using powerful monitoring and analytics.

Presenter
Jarred Foley
Jarred Foley Regional Manager (APAC) Nerdio
Hall E3

Nitro – One equation changing how businesses think about PDF & eSign

The discussion begins by addressing a critical challenge: many organisations restrict access to productivity tools like PDFs and eSignatures due to high costs. This creates a “productivity gap,” leaving large portions of the workforce without the resources they need to collaborate effectively. Using compelling data, we’ll explore the tangible impact this has on efficiency, workflows, and business outcomes.

Attendees will learn how Nitro’s solutions make these tools accessible to every employee at half the cost of legacy vendors, breaking down the barriers that hinder productivity. By offering affordable and intuitive PDF and eSign solutions, Nitro enables organisations to create faster, more collaborative workflows and empower their teams to focus on meaningful work.

The presentation also highlights Nitro’s analytics capabilities, which provide actionable insights into document usage, eSign adoption, and paper consumption. This visibility not only helps optimise workflows but also aligns with sustainability initiatives, enabling businesses to track and reduce their environmental footprint while meeting corporate social responsibility goals.

Another key focus is the significant cost savings achieved by switching to Nitro. Organizations can reinvest the resources saved from overpriced solutions into strategic initiatives like innovation and training, fuelling growth and boosting outcomes.

Finally, we explore how PDFs and eSignatures are the backbone of modern workflows. As one of the most widely used file types globally, PDFs are integral to communication, collaboration, and decision-making across industries. Nitro transforms these tools into enablers of innovation and agility, ensuring businesses stay competitive in today’s fast-paced environment.

This presentation provides real-world data and actionable insights, helping attendees discover how rethinking PDFs and eSignatures can transform productivity, drive sustainability, and create lasting value. The numbers are compelling—Nitro is the smarter choice for businesses looking to achieve more with less.

Presenter
Michael Helder
Michael Helder VP APAC Nitro
Gilbert Suite

CoreView – M365 governance: cyber compliance insights & optimise your Microsoft security posture

Microsoft 365 is the core of Australian businesses today, it is essential that your implementation is both security compliant to industry standards as well as ensuring your investment is fully deployed to take advantage of all Microsoft services for your business. This session will brief on how companies can audit report on their current implementation’s status, identify areas of concern or non-compliance against common industry standards & how to resolve and optimize your Microsoft 365 deployments licenses, services and security standards.

Presenter
Kris Hansen
Kris Hansen Global Managed Services Director CoreView

3:30pm – 4:15pm

Hall E2

Data#3 Closing Panel – Transforming IT service delivery

In today’s rapidly evolving technological landscape, customers are increasingly shifting towards As-a-Service and subscription-based models to deliver technology to their business. This presentation will explore these changing procurement methods and their impact on budgeting, technology management, and operating models. We will be giving real world advice on how to revolutionise your approach to partner and vendor management and show you how progressive customers are transforming the way they decide on the technology they buy, how they procure and implement it and ultimately manage the technology to deliver on their business requirements.

Presenters
Mark Sydney
Mark Sydney Queensland Practice Lead – Transformation & Governance Business Aspect
Michael de Broughe
Michael de Broughe State General Manager Data#3
Richard Dornhart
Richard Dornhart National Practice Manager – Security Data#3
Scott Gosling
Scott Gosling National Practice Manager – Microsoft Data#3
Dorothee Hartmann
Dorothee Hartmann Principal Consultant Business Aspect

4:15pm – 5:00pm

Hall C&D

Sponsor showcase and post-event networking

Speakers

Dr Michelle Dickinson

Dr Michelle Dickinson

Innovator, Adventurer, Keynote Speaker Connect
Chris Anders

Chris Anders

Technical Lead NetApp Connect
Steve Bedwell

Steve Bedwell

Technical Specialist – Modern Work Data#3 Limited Connect
Jasmine Chiu

Jasmine Chiu

Account Manager Synology Connect
Michael Christie

Michael Christie

Senior Director of Solutions Engineering F5
Michael de Broughe

Michael de Broughe

State General Manager Data#3 Connect
Matt Davis

Matt Davis

Principal Solutions Consultant Adobe Connect
Carlin Diprose

Carlin Diprose

ANZ BPS HP & Intel Ambassador HP Connect
Richard Dornhart

Richard Dornhart

National Practice Manager – Security Data#3 Connect
Jarred Foley

Jarred Foley

Regional Manager (APAC) Nerdio Connect
Chris Gascoigne

Chris Gascoigne

Principal Solutions Engineer, APJC Cloud and AI Infrastructure Cisco Connect
Scott Gosling

Scott Gosling

National Practice Manager – Microsoft Data#3 Connect
Kris Hansen

Kris Hansen

Global Managed Services Director CoreView Connect
Dorothee Hartmann

Dorothee Hartmann

Principal Consultant Business Aspect Connect
Michael Helder

Michael Helder

VP APAC Nitro Connect
Mark Hindson

Mark Hindson

Solution Architect (Security) Data#3 Connect
Jamie Humphrey

Jamie Humphrey

General Manager, ANZ Specialty Sales – Compute, Storage Platforms and Solutions Dell Technologies Connect
Scott Jenner

Scott Jenner

Senior Sales Engineer Mimecast Connect
Tim Kozak

Tim Kozak

Technical Lead LogicMonitor
Abbas Kudrati

Abbas Kudrati

Chief Identity & Security Advisor Silverfort Connect
Ian Morris

Ian Morris

Channel Director ANZ Rubrik Connect
Mark Pattie

Mark Pattie

Solution Specialist – Modern Workplace Data#3 Connect
Wayne Phillips CISSP, CCSP

Wayne Phillips CISSP, CCSP

SentinelOne Field CTO, Asia-Pacific & Japan SentinelOne
Adam Rappaport

Adam Rappaport

Solution Specialist – AI Data#3 Connect
Josh Schwarz

Josh Schwarz

Senior Sales Engineer Airlock Digital Connect
Andrew Shoosmith

Andrew Shoosmith

Solution Consultant Lenovo Connect
Luke Silverback

Luke Silverback

Leader – Regional Sales – Cyber Security Cisco Connect
Mark Sydney

Mark Sydney

Queensland Practice Lead – Transformation & Governance Business Aspect Connect
John Thiele

John Thiele

Azure Solution Specialist Data#3 Connect
Genevieve Wood

Genevieve Wood

Functional Consultant Data#3 Limited Connect
John Wood

John Wood

Head of Systems Engineering Veeam Connect