Data#3 and our world leading vendor partners will be hosting Australia’s largest free IT Solutions & Services conference in Adelaide, Brisbane, Perth, Fiji, and Sydney in March and May 2025.
At JuiceIT, we’re not just talking about technology; we’re talking about real solutions for real people. It’s about building meaningful connections – whether that’s within your team, with your customers, or across your entire business and technology ecosystem – and, of course, it’s about protecting what matters most in an increasingly complex world.
JuiceIT is designed to help technology leaders cut through the noise and find practical ways to streamline and simplify your current environment for future advancements – helping you stay competitive and achieve your business objectives while securing complex environments. Leveraging what you have and enhancing it to progress on your technology journey is crucial.
At JuiceIT, you’ll have the opportunity to engage with experts from Data#3 and our world-leading technology partners. Together, we’ll help you balance progress with risk, while ensuring, no matter where you are on your technology journey, AI becomes is an integral part of your success story.
Are you ready to Simplify, Connect, and Protect?
Need help justifying your attendance? Download our attendance justification document here.
An informative day, with interesting presentations and solutions showcased. My colleagues and I enjoyed the discussions with peers and subject matter experts alike.
JuiceIT attendee
Dr Michelle Dickinson (MNZM) is a passionate researcher and teacher with a love of tech, science and engineering.
With a PhD in Biomedical and Materials Engineering, Michelle has combined her interests to give her a unique insight into how nature and technology can learn from each other for scientific developments.
As co-founder of Nanogirl Labs Ltd and an honorary academic in Engineering at the University of Auckland, New Zealand, Michelle has always followed her dreams and never let traditional stereotypes scare her.
With this belief she is passionate about shaping technology to make the world better, technology trends, and innovating for the future of tomorrow.
Dr Michelle Dickinson (MNZM) is a passionate researcher and teacher with a love of tech, science and engineering.
With a PhD in Biomedical and Materials Engineering, Michelle has combined her interests to give her a unique insight into how nature and technology can learn from each other for scientific developments.
As co-founder of Nanogirl Labs Ltd and an honorary academic in Engineering at the University of Auckland, New Zealand, Michelle has always followed her dreams and never let traditional stereotypes scare her.
With this belief she is passionate about shaping technology to make the world better, technology trends, and innovating for the future of tomorrow.
Join us for an eye-opening presentation that demonstrates how off-the-shelf AI tools can transform your business technology landscape. In this session, tailored for IT Managers, we’ll explore the power of AI integration and its potential to solve real-world business challenges.
We’ll dive into a compelling case study showcasing our recent collaboration with the Brisbane Convention & Exhibition Centre (BCEC). Learn how Data#3 leveraged Microsoft Copilot Studio and SharePoint to deliver transformational change, addressing specific business problems by using simple off the shelf technology and some progressive use of AI.
Is your organisation falling into the same security traps as everyone else?
After countless discussions with businesses navigating Microsoft Security, Mark has seen the same vulnerabilities, misconfigurations and missed opportunities repeatedly that put organisations at risk. This session uncovers the most common security pitfalls from cloud security to data protection, threat defence and Microsoft Sentinel. Learn how to fully leverage Microsoft 365’s built in security features without unnecessary upgrades and see real world examples of organisations strengthening their defences. Whether you’re a business leader or a technical expert, discover how Data#3 helps organisations take control of their security posture with strategies that work.
In the rush to AI, companies will over-invest and risk not delivering a business return.
Because decisions made today affect your ability to be fast, resilient, and scalable, this session will explore simplifying and optimising your data centre to support modern workloads while preparing for the inevitable adoption of AI.
Join this session to learn what’s really important and how to reduce the time to value on your data centre investments.
Generative AI and Automation have changed how we all can engage, create, and manage content, responsibly and safely. Learn how Adobe enables organisations to create Marketing Communications at scale that are ethical and safe for commercial use with Firefly Services (APIs), and, how Adobe helps knowledge workers understand, analyse, generate and protect content with Acrobat and its solutions whilst complementing your current Microsoft investments. The world has changed, see what is now real, simple, connected, protected and safe.
Step into the hidden world of cybercrime and uncover the forces driving this shadow economy. In this presentation, we will explore how cybercriminals profit while shedding light on the financial and operational toll cybercrime takes on individuals and businesses alike.
Unlike the high-profile breaches dominating headlines, this session dives into real-world incidents from our customers and partners.
You’ll learn:
• How Cybercriminals Profit: The tactics and strategies that fuel their operations.
• The Ripple Effects of Cybercrime: From financial losses to reputational damage, the cascading impacts on victims.
• Behind the Scenes: A breakdown of incidents—how they happened, the vulnerabilities exploited, and the aftermath.
• Resilience in Action: The remediation steps and practical solutions to minimise risks for others.
This presentation combines compelling stories, actionable insights, and a focus on the economic realities of cybercrime, delivering lessons to protect your organisation and navigate the evolving cyber landscape. Prepare to demystify the economics of cybercrime and emerge equipped with strategies to stay one step ahead.
Session details coming soon.
Explore a groundbreaking new architecture for advanced cyber defense in hybrid environments, focusing on the unified management of security across various domains. It integrates eBPF technology and AI-driven automation to enforce consistent policies and enhance operational efficiency. Bringing the power of hyperscaler technology to the enterprise, introducing a groundbreaking security architecture designed to defend modern, AI-scale data centers. This session will cover two use cases: exploit protection and segmentation.
Session details coming soon.
The convergence of reliability and sustainability offers a significant opportunity for organisations. This session highlights promoting both operational reliability and sustainable practices throughout the IT lifecycle. It examines actionable strategies for businesses to embark on their journey toward an effective integration of reliability and sustainability within their IT environments, ensuring positive sustainability outcomes at every level. The session aims to empower with innovative solutions that foster transformative change, enabling companies to enhance their IT operations while advancing their sustainability goals.
What if your organisation’s knowledge and data were effortlessly connected, and AI-driven agents could streamline tasks, surface insights, and enhance decision-making?
Join Data#3 Solution Specialists, Genevieve Wood and Steve Bedwell, to discover the power of Microsoft Copilot Agents. From simple data retrieval to advanced AI automation, explore how these agents can be tailored to your needs, boosting efficiency, driving innovation, and transforming the way you work. Don’t miss this opportunity to unlock the full potential of AI in your business.
Session details coming soon.
As cyber threats grow more sophisticated and relentless, a reactive approach is no longer enough. It’s time to evolve from Disaster Recovery to Cyber Recovery. Join us for From DR to CR: Master the 6 Key Elements for a Comprehensive Enterprise Data Protection Strategy, where we’ll explore the future of data protection. Discover how to design a scalable, secure, and resilient strategy with native immutability, centralised protection, and diverse restoration capabilities. Gain the vision and tools to transform your organisation’s cyber resiliency and lead with confidence in the modern data era.
Session details coming soon.
In the current cybersecurity landscape, organizations are increasingly concerned about cyber threats impacting their business operations, particularly in the wake of high-profile data breaches involving major companies. Cyber threats remain a top concern for businesses in Australia and globally, emphasizing the need for robust cybersecurity measures to safeguard competitive advantage and reputation.
The Australian Cyber Security Centre (ACSC) has introduced the “Secure By Demand” guidelines, which provide priority considerations for operational technology (OT) owners and operators when selecting digital products. These guidelines aim to ensure that products and software remain secure throughout their lifecycle, mitigating cyber threats and enhancing security resilience.
NetApp’s commitment to security ensures that its products align with the Secure By Demand principles, providing robust security measures for OT owners and operators. By adhering to these guidelines, organizations can enhance their cybersecurity posture and protect their critical infrastructure from emerging cyber threats.
Come and hear more detailed information and discussion on how the most secure storage on the planet can help your business implement security right at your most valuable asset, your data.
Session details coming soon.
68% of cyber incidents are caused by human error – a sobering statistic! This session will show you how to go beyond the “check-the-box” approach and identify the individuals truly at risk within your organisation. Learn how Mimecast’s Connected Human Risk Management Platform can help you:
• Pinpoint your riskiest employees with advanced risk scoring and analytics.
• Empower your workforce with the knowledge, tools and skills to confidently navigate today’s complex threat landscape.
• Reduce your risk of phishing, social engineering, and other human-driven attacks.
Join us to discover a proactive, data-driven approach to security awareness designed to engage users and deliver measurable results.
In today’s digital landscape, disruptions aren’t a matter of if—but when. Cyber threats, outages, and unexpected disasters can strike at any time, making resilience a critical priority for every organization. But resilience isn’t just about recovery—it’s about ensuring your business can continue operating with minimal impact.
So how do you prepare? We’ll explore strategies to strengthen your cyber resilience, improve alignment with Essential 8 Maturity, and build a framework that keeps your data protected and accessible. By taking proactive steps, you can reduce risk, improve recovery times, and ensure business continuity—no matter the challenge.
Session details coming soon.
Session details coming soon.
Shadow IT and unmanaged software deployments have eroded IT’s control over endpoints, leading to security risks, compliance headaches, and operational inefficiencies. With modern IT teams stretched thin, it’s time to regain control without creating unnecessary friction.
In this session, we’ll explore practical strategies to eliminate shadow IT, streamline patching and procurement, and enforce security policies without locking users out of productivity. We’ll discuss how application allowlisting can complement your existing IT investments (like Intune), provide visibility into what’s actually running in your environment, and prevent security gaps caused by rogue software.
In today’s interconnected world, ransomware attacks are no longer a matter of “if” but “when.” Businesses need solutions that not only safeguard their critical assets but also reduce costs and improve operational efficiency. Join Rubrik as we delve into the critical need for a modern cyber resilience strategy.
Simplify. This session will break down the anatomy of a ransomware attack, exposing the vulnerabilities that legacy backup solutions simply can’t address. We’ll explore why traditional backups are no longer enough to guarantee recovery in the face of sophisticated cyber threats. By consolidating, simplifying and automating data protection, you can dramatically reduce the total cost of ownership.
Connect. Discover how Rubrik’s platform empowers you to simplify your data management, connect your critical systems, and ultimately protect your business from the devastating impact of a cyber incident. And in a world where data is increasingly moving to the cloud, ensure your cloud data is protected and managed as seamlessly as on-premises data.
Protect. Learn how to achieve true cyber resilience and ensure business continuity, even in the face of a successful attack.
Ask yourself…
• What measures should you put in place to minimise the impact of any cyber incident?
• Have you implemented an assumed breach mindset?
• Do you have a single view of your backup operations across data centres, SaaS and cloud today?
• Can you discover and gain visibility into your sensitive data?
• Can you identify threats, and quarantine infected data during recovery from a cyber attack?
• What potential could be realised when all organisations operated with cyber confidence?
• When was the last time you tested your cyber recovery capability?
Manage & Cost Optimise Microsoft’s Modern Work technologies, with Nerdio’s modern, unified management platform for Microsoft DaaS and physical endpoints.
Nerdio Manager for Enterprise allows customers to leverage the significant investments Microsoft is making into Azure Virtual Desktop, Intune, and Windows 365 services. Unlike other virtual desktop solutions, Nerdio Manager for Enterprise does not replace Microsoft’s native components but enhances them with best-in-class enterprise capabilities and extends native admin experience.
Nerdio delivers hundreds of features that simplify management, ensure efficient operations, and lower Azure compute and storage costs by up to 80% via automation.
Enterprise IT professionals can deliver and maintain a wide range of virtual Windows endpoints and Windows applications across hybrid workforces with ease and fine-tune end-user computing (EUC) approaches for maximum effectiveness using powerful monitoring and analytics.
In an increasingly digital-first world, productivity and efficiency hinge on the tools we use every day. Among these tools, PDFs and eSignatures are pivotal to workflows across industries, yet their true potential often remains untapped due to cost and accessibility barriers. This presentation uncovers how businesses can unlock significant opportunities by rethinking their approach to these essential tools.
The discussion begins by addressing a critical challenge: many organisations restrict access to productivity tools like PDFs and eSignatures due to high costs. This creates a “productivity gap,” leaving large portions of the workforce without the resources they need to collaborate effectively. Using compelling data, we’ll explore the tangible impact this has on efficiency, workflows, and business outcomes.
Attendees will learn how Nitro’s solutions make these tools accessible to every employee at half the cost of legacy vendors, breaking down the barriers that hinder productivity. By offering affordable and intuitive PDF and eSign solutions, Nitro enables organisations to create faster, more collaborative workflows and empower their teams to focus on meaningful work.
The presentation also highlights Nitro’s analytics capabilities, which provide actionable insights into document usage, eSign adoption, and paper consumption. This visibility not only helps optimise workflows but also aligns with sustainability initiatives, enabling businesses to track and reduce their environmental footprint while meeting corporate social responsibility goals.
Another key focus is the significant cost savings achieved by switching to Nitro. Organizations can reinvest the resources saved from overpriced solutions into strategic initiatives like innovation and training, fuelling growth and boosting outcomes.
Finally, we explore how PDFs and eSignatures are the backbone of modern workflows. As one of the most widely used file types globally, PDFs are integral to communication, collaboration, and decision-making across industries. Nitro transforms these tools into enablers of innovation and agility, ensuring businesses stay competitive in today’s fast-paced environment.
This presentation provides real-world data and actionable insights, helping attendees discover how rethinking PDFs and eSignatures can transform productivity, drive sustainability, and create lasting value. The numbers are compelling—Nitro is the smarter choice for businesses looking to achieve more with less.
Microsoft 365 is the core of Australian businesses today, it is essential that your implementation is both security compliant to industry standards as well as ensuring your investment is fully deployed to take advantage of all Microsoft services for your business. This session will brief on how companies can audit report on their current implementation’s status, identify areas of concern or non-compliance against common industry standards & how to resolve and optimize your Microsoft 365 deployments licenses, services and security standards.
Step into the hidden world of cybercrime and uncover the forces driving this shadow economy. In this presentation, we will explore how cybercriminals profit while shedding light on the financial and operational toll cybercrime takes on individuals and businesses alike.
Unlike the high-profile breaches dominating headlines, this session dives into real-world incidents from our customers and partners. You’ll learn:
• How Cybercriminals Profit: The tactics and strategies that fuel their operations.
• The Ripple Effects of Cybercrime: From financial losses to reputational damage, the cascading impacts on victims.
• Behind the Scenes: A breakdown of incidents—how they happened, the vulnerabilities exploited, and the aftermath.
• Resilience in Action: The remediation steps and practical solutions to minimise risks for others.
This presentation combines compelling stories, actionable insights, and a focus on the economic realities of cybercrime, delivering lessons to protect your organisation and navigate the evolving cyber landscape.
Prepare to demystify the economics of cybercrime and emerge equipped with strategies to stay one step ahead.