Realize 2020

Virtual Event – Netherlands & Belgium
Tuesday 17 November

Agenda 17 November

Micro Focus Realize 2020 on Tuesday 17 November is a virtual event, held in a special digital venue. The agenda is split in a plenary session followed by four Digital Transformation streams. On 17 November you can choose to follow one of the four streams and watch the other three later that week.

Plenary Sessions

09:30 – 10:20

Keynote

The Race to Digital Transformation

Those who are successful in pursuing Digital transformation (DX) recognize that it is a race. Current and upstart competitors are pursuing similar projects, with a strong sense of urgency, intent on immediately capturing market share. Those who are successful over time also are conscious that changes made must be synergistic and sustainable versus a series of short-term fixes. Lasting success therefore requires a balanced and methodical approach, with a series of interconnected initiatives, which are bought into by senior management and supported by a strong culture and business case.

Most DX initiatives have a common thread. While organizations recognize that they must evolve their IT practices to stay competitive, they also know that the core business systems and supporting processes they have developed over time are their lifeblood. Instead of adopting a rip-and-replace strategy that can yield unacceptable risk, most organizations prefer to bridge the existing and the emerging. We call this smart digital transformation.

Micro Focus develops and delivers software that is optimized to help customers embark on this modernization journey. With an integrated and open portfolio Micro Focus helps customers run and transform the enterprise at the same time.

Four Digital transformation Streams

Speed

Accelerate secure innovation delivery

Agility

The impact of continuous change on user experience

Security

IT security in an always connected world

Insights

User behavior: your biggest risk?

10:30 – 12:00

Speed

Accelerate secure innovation delivery

Welcome – Setting the scene

Organizations today accelerate the development of new products, services and business models and create new ways for citizens and businesses to interact in their daily lives. With greater pressure to drive software innovation, application delivery teams must accelerate and adapt to meet existing and new demands. This session shows how to deliver at high speed with low risk, reliably scaling DevOps across all environments, from mainframe to cloud, quickly bringing innovative ideas to life. We will discuss how teams can effectively transform and leverage existing capabilities to keep pace with ever-changing business demands, using a systematic approach that coordinates DevOps not only with operations and infrastructure management, but also with quality, security and analytics. Real-life experiences from Micro Focus customers and application delivery experts will help highlight challenges and understand practical solutions.

How to ensure software quality while transforming to DevOps way of working

A Practical approach for implementation and enablement within teams

A typical DevOps team consists of business and IT roles that work together seamlessly to continuously operationalize new systems and functionality. This session shows how an agile way of working together means constantly evaluating short-term goals, using bi-weekly sprints, setting quarterly priorities, all in the light of an annual roadmap. It also shows how testing changes: test and development teams work closely together, sharing test data responsibility. The result of this way of working: more transparency and a single source of truth.

Client case: a large retail organization in the food and beverage industry

Creating a single view on DevSecOps and quality

How to reconnect security practices and quality aspects within the DevOps ecosystem

Embedding quality on a functional, performance or security level, has always been one of the most challenging aspects of software development. Now organizations are turning to DevOps the danger arises of a disconnect with security. This session shows you how to take ownership of all aspects regarding quality, from mainframe to mobile, from functional to security aspects, using Fortify and ALM Octane functionality. It also discusses, where to start your journey from where you are now to where you would like to be.

A secure DevOps pipeline

Shifting left: dynamic application security testing

In a DevOps environment security testing should be part of the testing cycle right from the start. In this way the amount of effort needed at the end can be reduced dramatically. This session shows you how to make dynamic security testing part of an automated test process, with an improved API that allows better integration with DevOps pipelines and reduced scan times to meet the nightly builds.

10:30 – 12:00

Agility

The impact of continuous change on user experience

Welcome – Setting the scene
In today’s fast-changing world keeping oneself up to date with the latest techniques and trends not only delivers a better user experience, but also gives you a leading edge over the competition. The challenge that customers now face is that Digital Transformation is fueling further acceleration of change. They have to run the business and keep up with the pace of change to be able to address the latest business demands. Diverse, unpredictable and constantly changing, hybrid IT requests come with a new level of complexity that cannot be controlled by conventional management methods. During this stream you will learn how our solutions can simplify that complexity and transform IT into an agile, services-driven organization, contributing to a better user experience.
Mitigating transformation and migration risks

Manage the impact of migrations and changes on the user experience

A new platform or an new software version should improve user experience. But what happens if a migration isn’t executed in the right way? If users cannot login or if buttons don’t work anymore? Migration success requires effective management and continuous testing. The implementation of a business system (e.g. SAP, Oracle or Microsoft Dynamics) on a new platform requires fundamental research of business processes, data and infrastructure. The unique Micro Focus Application Delivery Management (ADM) portfolio offers an end-to-end solution for managing platform lifecycles and is specially developed for DevOps. During this session you will see how our ADM products speed up transformations and implementations with focus on quality and user experience.

The epic deconstruction of value streams

Refining epics and features to build agile development value streams

Naast Operational Value streams en Operational Services zijn Development Value stream nodig om deze te te ontwikkelen en beheren. Om deze ontwikkeling vorm te geven op een agile manier dient een roadmap een driedimensionale aanpak te ondersteunen voor de opzet van epics en features door de combinatie van dienst, waardestroom en volwassenheid. Deze sessie geeft inzicht in hoe een dergelijke deconstructie gedaan kan worden en hoe een roadmap met waarde items gerealiseerd kan worden.

Lean automation for smarter service management

Smarter service management automation

Automation is een van de volwassenheidsstadia voor de uitvoering van processen. Naast integratie van system is het uitvoeren van processen op een geautomatiseerde manier dé mogelijkheid om de medewerkerseffectiviteit en -kwaliteit te verbeteren en de doorlooptijden voor waardestromen te verkorten. Deze sessie geeft inzicht in hoe lean automation trajecten goed opgezet kunnen worden en welke technieken gebruikt kunnen worden.

10:30 – 12:00

Security

IT security in an always connected world

Welcome – Setting the scene

How connected we all are we can experience in today’s pandemic world. Most of us work from home, keeping contact with our colleagues using apps on mobile devices. But there is more to this phenomenon. The development of open source software has turned application development into a ‘connected’ activity – using and connecting open source components to develop new applications. This stream addresses this new trend and its security implications.

Improve mobile user experience as a decentralized team

How to build a lab of mobile devices and emulators and enable your team to reserve and control remotely.

A mobile app for everything, also for all core business processes. How can a developer or tester keep pace with the speed of new releases across so many devices and operating systems? How can you deliver high-quality mobile apps and ensure a consistent, positive user experience under any circumstance? And how do you amplifiy your dev team’s productivity as they are decentralized digital nomads as well nowadays? In this session we show you, based on several customer cases how you can validate all aspects of the mobile user experience including functionality, performance, and security using services simulations and network virtualization.

Open Source Software and security

How can you be sure the software you use is safe?

Developing modern business applications is not an isolated activity. Developers use open source libraries that are built into their own software. In fact, typical applications consist of open source libraries for 80 to 90%. Only 10 to 20% of the code is being developed. However, open source software can contain security vulnerabilities that will make these developed applications vulnerable as well. How can you protect your software against this? During this session we will introduce you to ‘Software Composition Analysis’, a modern technique that enables organizations to analyze which open source libraries are in use and which vulnerabilities they contain. This new functionality has been added to the Micro Focus Fortify application security portfolio.

Working from anywhere: a new era comes with new challenges

How to reduce the risk caused by always-connected, mobile employees

Home or mobile workers need to have access to their data and applications any time. This new way of working means we are facing new kinds of security risks. End point data needs to be protected better, data in motion encrypted, application access needs te be secured, as well as e-mail communication. This session shows you how to facilitate your employees with the right tools anytime anywhere while protecting all company assets and data in the meantime.

10:30 – 12:00

Insights

User behavior: your biggest risk?

Welcome – Setting the scene

Secure what matters most: your apps, identities and data. 

In a world where all systems are connected many possible vulnerabilities exist and cybercriminals are very inventive in exploring these. Often criminals get in by using unsuspecting users: a phishing mail that results in a ransomware attack, an unreliable software download that contains malware. Humans errors, mistakes, accidental data loss, intentional data theft – how can you protect your data and digital assets against internal and external threats in this fast-changing world? This stream addresses user behavior and how to use analytics to monitor possible threats.

Protect and govern your sensitive data (in hybrid environment)

Reduce compliance risks with right tools and policies

To store and share data users often go for the easiest way. Sharing with tools like DropBox or WeTranfer, storing on endpoints – without any notice that the data might be sensitive. In this way sensitive data can be ‘wandering around’ anywhere in the organization, unprotected on risky locations like sharepoints and employee laptops. This session addresses these issues and the Micro Focus solutions that can help help you solve them by implementing the right tools and policies to analyze data and protect sensitive information.

Client case: IRENT.systems

What did your users do last week?

How User Behavior Analysis can help securing your IT environment

Modern IT environments have to deal with many different kinds of threats: malware, data theft, intentional breaches by disgruntled employees, hackers that breached an account and act from the inside. Rule-based Security Information and Event Management (SIEM) alone is not enough to monitor these risks and act on incidents, a smarter approach is needed. In this sessions you will learn how User Behavior Analysis (UBA) will help you secure your IT environment and why it is better than just SIEM.

Admin behaviour in a fast changing world

Admins are users too

(PAM) > Privileged access management

Beheer van onpremise, hybride en cloud omgevingen is een probleem en kost veel geld, zelfde beheerders moeten met nieuwe tools inzetten/leren.

Hoe hou je het overzicht tussen de verschillende omgevingen?

met een single tool to rule them all (DRA)

single pane of glass voor alle policies (UPA)

Inzicht en controle (Change Guardian)

Geen aparte teams voor onpremise, cloud of Linux, geen aparte tools, laten zien dmv dashboards en raportage

12:00

Closing