Data#3 and our world leading vendor partners will be hosting Australia’s largest free IT Solutions & Services conference in Adelaide, Brisbane, Perth, Fiji, and Sydney in March and May 2025.
At JuiceIT, we’re not just talking about technology; we’re talking about real solutions for real people. It’s about building meaningful connections – whether that’s within your team, with your customers, or across your entire business and technology ecosystem – and, of course, it’s about protecting what matters most in an increasingly complex world.
JuiceIT is designed to help technology leaders cut through the noise and find practical ways to streamline and simplify your current environment for future advancements – helping you stay competitive and achieve your business objectives while securing complex environments. Leveraging what you have and enhancing it to progress on your technology journey is crucial.
At JuiceIT, you’ll have the opportunity to engage with experts from Data#3 and our world-leading technology partners. Together, we’ll help you balance progress with risk, while ensuring, no matter where you are on your technology journey, AI becomes is an integral part of your success story.
Are you ready to Simplify, Connect, and Protect?
Need help justifying your attendance? Download our attendance justification document here.
An informative day, with interesting presentations and solutions showcased. My colleagues and I enjoyed the discussions with peers and subject matter experts alike.
JuiceIT attendee
Dr Michelle Dickinson (MNZM) is a passionate researcher and teacher with a love of tech, science and engineering.
With a PhD in Biomedical and Materials Engineering, Michelle has combined her interests to give her a unique insight into how nature and technology can learn from each other for scientific developments.
As co-founder of Nanogirl Labs Ltd and an honorary academic in Engineering at the University of Auckland, New Zealand, Michelle has always followed her dreams and never let traditional stereotypes scare her.
With this belief she is passionate about shaping technology to make the world better, technology trends, and innovating for the future of tomorrow.
Dr Michelle Dickinson (MNZM) is a passionate researcher and teacher with a love of tech, science and engineering.
With a PhD in Biomedical and Materials Engineering, Michelle has combined her interests to give her a unique insight into how nature and technology can learn from each other for scientific developments.
As co-founder of Nanogirl Labs Ltd and an honorary academic in Engineering at the University of Auckland, New Zealand, Michelle has always followed her dreams and never let traditional stereotypes scare her.
With this belief she is passionate about shaping technology to make the world better, technology trends, and innovating for the future of tomorrow.
Is your organisation falling into the same security traps as everyone else?
After countless discussions with businesses navigating Microsoft Security, Data#3 Solution Architect (Security) Mark Hindson has repeatedly seen the same vulnerabilities, misconfigurations, and missed opportunities that put organisations at risk. Attend this session to uncover the most common security pitfalls from cloud security to data protection; and how you can avoid these using threat defence and Microsoft Sentinel.
In the rush to AI, companies will over-invest and risk not delivering a business return.
Because decisions made today affect your ability to be fast, resilient, and scalable, this session will explore simplifying and optimising your data centre to support modern workloads while preparing for the inevitable adoption of AI.
Join this session to learn what’s really important and how to reduce the time to value on your data centre investments.
Generative AI and Automation have changed how we all can engage, create, and manage content, responsibly and safely. Learn how Adobe enables organisations to create Marketing Communications at scale that are ethical and safe for commercial use with Firefly Services (APIs), and, how Adobe helps knowledge workers understand, analyse, generate and protect content with Acrobat and its solutions whilst complementing your current Microsoft investments. The world has changed, see what is now real, simple, connected, protected and safe.
Step into the hidden world of cybercrime and uncover the forces driving this shadow economy. In this presentation, we will explore how cybercriminals profit while shedding light on the financial and operational toll cybercrime takes on individuals and businesses alike.
Unlike the high-profile breaches dominating headlines, this session dives into real-world incidents from our customers and partners.
You’ll learn:
• How Cybercriminals Profit: The tactics and strategies that fuel their operations.
• The Ripple Effects of Cybercrime: From financial losses to reputational damage, the cascading impacts on victims.
• Behind the Scenes: A breakdown of incidents—how they happened, the vulnerabilities exploited, and the aftermath.
• Resilience in Action: The remediation steps and practical solutions to minimise risks for others.
This presentation combines compelling stories, actionable insights, and a focus on the economic realities of cybercrime, delivering lessons to protect your organisation and navigate the evolving cyber landscape. Prepare to demystify the economics of cybercrime and emerge equipped with strategies to stay one step ahead.
The Azure cloud provides a dizzying set of services across compute services, data and analytics, AI, security, identity, networking, and management. We see many customers who have grown their Azure footprint organically over time, and are looking to understand how they can take advantage of advanced services like OpenAI available in Azure whilst staying secure, compliant, and well governed.
Are you ready? This session will provide you the map of how to ensure you are ready to consume these advanced services by having your Azure estate in order so you obtain maximum value.
Explore a groundbreaking new architecture for advanced cyber defense in hybrid environments, focusing on the unified management of security across various domains. It integrates eBPF technology and AI-driven automation to enforce consistent policies and enhance operational efficiency. Bringing the power of hyperscaler technology to the enterprise, introducing a groundbreaking security architecture designed to defend modern, AI-scale data centers. This session will cover two use cases: exploit protection and segmentation.
Would you like to know how your edge locations can have the best of both world: fast local infrastructure deployed and managed via the cloud with applications running locally and data synchronised to the cloud. Lenovo will present on a recent 700+ retail deployment that coupled edge specific hardware with Azure automation and management. Topics included will be the business requirements, the solution provided, and the challenges encountered while deploying this ambitious project.
The convergence of reliability and sustainability offers a significant opportunity for organisations. This session highlights promoting both operational reliability and sustainable practices throughout the IT lifecycle. It examines actionable strategies for businesses to embark on their journey toward an effective integration of reliability and sustainability within their IT environments, ensuring positive sustainability outcomes at every level. The session aims to empower with innovative solutions that foster transformative change, enabling companies to enhance their IT operations while advancing their sustainability goals.
What if your organisation’s knowledge and data were effortlessly connected, and AI-driven agents could streamline tasks, surface insights, and enhance decision-making?
Join Data#3 Solution Specialists, Genevieve Wood and Steve Bedwell, to discover the power of Microsoft Copilot Agents. From simple data retrieval to advanced AI automation, explore how these agents can be tailored to your needs, boosting efficiency, driving innovation, and transforming the way you work. Don’t miss this opportunity to unlock the full potential of AI in your business.
Scattered Spider is redefining cyber threats with MFA fatigue, SIM swapping, and social engineering to bypass traditional defenses.
By the time alerts surface, they’ve already escalated privileges and moved laterally—leaving organisations scrambling.
Learn how an Identity-First IR approach can detect compromised accounts early, enforce adaptive access controls, and automate containment to reduce dwell time and blast radius. Join us for a live response walkthrough and gain actionable insights to outmaneuver modern attackers with an identity-first defense.
As cyber threats grow more sophisticated and relentless, a reactive approach is no longer enough. It’s time to evolve from Disaster Recovery to Cyber Recovery. Join us for From DR to CR: Master the 6 Key Elements for a Comprehensive Enterprise Data Protection Strategy, where we’ll explore the future of data protection. Discover how to design a scalable, secure, and resilient strategy with native immutability, centralised protection, and diverse restoration capabilities. Gain the vision and tools to transform your organisation’s cyber resiliency and lead with confidence in the modern data era.
In an ever-evolving technology landscape, Dell Technologies leads with innovative solutions that modernise your data center and advance your multicloud strategy. We accelerate AI adoption by integrating it with your data, modernise application platforms for evolving workloads, and optimise multicloud and edge operations. Additionally, we enhance data centre efficiency and cyber resilience, ensuring your infrastructure meets today’s needs and is prepared for tomorrow’s challenges.
In the current cybersecurity landscape, organisations are increasingly concerned about cyber threats impacting their business operations, particularly in the wake of high-profile data breaches involving major companies. Cyber threats remain a top concern for businesses in Australia and globally, emphasising the need for robust cybersecurity measures to safeguard competitive advantage and reputation.
The Australian Cyber Security Centre (ACSC) has introduced the “Secure By Demand” guidelines, which provide priority considerations for operational technology (OT) owners and operators when selecting digital products. These guidelines aim to ensure that products and software remain secure throughout their lifecycle, mitigating cyber threats and enhancing security resilience.
NetApp’s commitment to security ensures that its products align with the Secure By Demand principles, providing robust security measures for OT owners and operators. By adhering to these guidelines, organisations can enhance their cybersecurity posture and protect their critical infrastructure from emerging cyber threats.
Come and hear more detailed information and discussion on how the most secure storage on the planet can help your business implement security right at your most valuable asset, your data.
As the digital landscape continually evolves, HP is at the forefront of ushering in a new era of computing that harmonises the power of the cloud with the robustness of edge computing. In “The World will be (Hybrid)²,” HP explores how hybrid solutions are revolutionising the traditional PC landscape, offering unprecedented flexibility, performance, and connectivity.
68% of cyber incidents are caused by human error – a sobering statistic! This session will show you how to go beyond the “check-the-box” approach and identify the individuals truly at risk within your organisation. Learn how Mimecast’s Connected Human Risk Management Platform can help you:
• Pinpoint your riskiest employees with advanced risk scoring and analytics.
• Empower your workforce with the knowledge, tools and skills to confidently navigate today’s complex threat landscape.
• Reduce your risk of phishing, social engineering, and other human-driven attacks.
Join us to discover a proactive, data-driven approach to security awareness designed to engage users and deliver measurable results.
This session explores the transformative potential of Generative AI, machine learning, and hyper automation in cybersecurity. We’ll delve into how these advanced technologies are reshaping Security Operations Centers by enabling intelligent threat detection, automated incident response, and predictive risk management. By leveraging AI-driven analytics, continuous learning algorithms, and seamless workflow integration, organisations can dramatically enhance their defensive capabilities, reduce response times, and proactively mitigate emerging cyber risks with unprecedented precision and efficiency.
AI driven Observability —delivering real-world outcomes today. Australian businesses are leveraging AI-driven observability to drastically reduce costs, eliminate downtime, and redirect IT resources toward innovation.
Join Data#3 and LogicMonitor as we explore how AI-powered observability is transforming IT operations. Discover how unifying event data, automating root-cause analysis, and harnessing predictive insights can accelerate resolution times by up to 70%, maximise ROI, and turn IT teams from firefighters into strategic enablers.
Through real-world case studies, including a leading Australian retailer that used LogicMonitor’s AI-driven event intelligence and predictive analytics to:
● Slash alert noise by 88%,
● Reduce critical incidents by 22%, and
● Boost productivity while elevating customer satisfaction,
…we’ll demonstrate how intelligent observability drives measurable business impact.
Lets explore how you can harness the full potential of AI to unlock growth, reduce risk, and enhance competitive advantage.
Shadow IT and unmanaged software deployments have eroded IT’s control over endpoints, leading to security risks, compliance headaches, and operational inefficiencies. With modern IT teams stretched thin, it’s time to regain control without creating unnecessary friction.
In this session, we’ll explore practical strategies to eliminate shadow IT, streamline patching and procurement, and enforce security policies without locking users out of productivity. We’ll discuss how application allowlisting can complement your existing IT investments (like Intune), provide visibility into what’s actually running in your environment, and prevent security gaps caused by rogue software.
In today’s interconnected world, ransomware attacks are no longer a matter of “if” but “when.” Businesses need solutions that not only safeguard their critical assets but also reduce costs and improve operational efficiency. Join Rubrik as we delve into the critical need for a modern cyber resilience strategy.
Simplify. This session will break down the anatomy of a ransomware attack, exposing the vulnerabilities that legacy backup solutions simply can’t address. We’ll explore why traditional backups are no longer enough to guarantee recovery in the face of sophisticated cyber threats. By consolidating, simplifying and automating data protection, you can dramatically reduce the total cost of ownership.
Connect. Discover how Rubrik’s platform empowers you to simplify your data management, connect your critical systems, and ultimately protect your business from the devastating impact of a cyber incident. And in a world where data is increasingly moving to the cloud, ensure your cloud data is protected and managed as seamlessly as on-premises data.
Protect. Learn how to achieve true cyber resilience and ensure business continuity, even in the face of a successful attack.
Ask yourself…
• What measures should you put in place to minimise the impact of any cyber incident?
• Have you implemented an assumed breach mindset?
• Do you have a single view of your backup operations across data centres, SaaS and cloud today?
• Can you discover and gain visibility into your sensitive data?
• Can you identify threats, and quarantine infected data during recovery from a cyber attack?
• What potential could be realised when all organisations operated with cyber confidence?
• When was the last time you tested your cyber recovery capability?
Manage & Cost Optimise Microsoft’s Modern Work technologies, with Nerdio’s modern, unified management platform for Microsoft DaaS and physical endpoints.
Nerdio Manager for Enterprise allows customers to leverage the significant investments Microsoft is making into Azure Virtual Desktop, Intune, and Windows 365 services. Unlike other virtual desktop solutions, Nerdio Manager for Enterprise does not replace Microsoft’s native components but enhances them with best-in-class enterprise capabilities and extends native admin experience.
Nerdio delivers hundreds of features that simplify management, ensure efficient operations, and lower Azure compute and storage costs by up to 80% via automation.
Enterprise IT professionals can deliver and maintain a wide range of virtual Windows endpoints and Windows applications across hybrid workforces with ease and fine-tune end-user computing (EUC) approaches for maximum effectiveness using powerful monitoring and analytics.
In an increasingly digital-first world, productivity and efficiency hinge on the tools we use every day. Among these tools, PDFs and eSignatures are pivotal to workflows across industries, yet their true potential often remains untapped due to cost and accessibility barriers. This presentation uncovers how businesses can unlock significant opportunities by rethinking their approach to these essential tools.
The discussion begins by addressing a critical challenge: many organisations restrict access to productivity tools like PDFs and eSignatures due to high costs. This creates a “productivity gap,” leaving large portions of the workforce without the resources they need to collaborate effectively. Using compelling data, we’ll explore the tangible impact this has on efficiency, workflows, and business outcomes.
Attendees will learn how Nitro’s solutions make these tools accessible to every employee at half the cost of legacy vendors, breaking down the barriers that hinder productivity. By offering affordable and intuitive PDF and eSign solutions, Nitro enables organisations to create faster, more collaborative workflows and empower their teams to focus on meaningful work.
The presentation also highlights Nitro’s analytics capabilities, which provide actionable insights into document usage, eSign adoption, and paper consumption. This visibility not only helps optimise workflows but also aligns with sustainability initiatives, enabling businesses to track and reduce their environmental footprint while meeting corporate social responsibility goals.
Another key focus is the significant cost savings achieved by switching to Nitro. Organisations can reinvest the resources saved from overpriced solutions into strategic initiatives like innovation and training, fuelling growth and boosting outcomes.
Finally, we explore how PDFs and eSignatures are the backbone of modern workflows. As one of the most widely used file types globally, PDFs are integral to communication, collaboration, and decision-making across industries. Nitro transforms these tools into enablers of innovation and agility, ensuring businesses stay competitive in today’s fast-paced environment.
This presentation provides real-world data and actionable insights, helping attendees discover how rethinking PDFs and eSignatures can transform productivity, drive sustainability, and create lasting value. The numbers are compelling—Nitro is the smarter choice for businesses looking to achieve more with less.
Microsoft 365 is the core of Australian businesses today, it is essential that your implementation is both security compliant to industry standards as well as ensuring your investment is fully deployed to take advantage of all Microsoft services for your business. This session will brief on how companies can audit report on their current implementation’s status, identify areas of concern or non-compliance against common industry standards & how to resolve and optimise your Microsoft 365 deployments licenses, services and security standards.
In today’s rapidly evolving technological landscape, customers are increasingly shifting towards As-a-Service and subscription-based models to deliver technology to their business. This presentation will explore these changing procurement methods and their impact on budgeting, technology management, and operating models. We will be giving real world advice on how to revolutionise your approach to partner and vendor management and show you how progressive customers are transforming the way they decide on the technology they buy, how they procure and implement it and ultimately manage the technology to deliver on their business requirements.