Content created by the Industry for the Industry
Our Headline Themes have been determined by the Digital Manufacturing Strategies Summit’s Advisory Committee. These themes form the cornerstone of your learning at the Summit.
The topics that sit under the Headline Themes are determined by you, our attendees, and gathered through the information you provide via the registration link.
Once all your information has been collated the Committee are then instrumental in curating the content for the interactive panels, circle challenges, and workshops that you will attend over the two days.
The result of this is that all topics discussed throughout the Summit are highly relevant and timely for the industry.
Your Personal Agenda
Every attendee is given a personal agenda based on the information provided during registration. Each attendee only participates in workshops, meetings, and circle challenges relevant to their current requirements.
Headline Themes
The Advisory Committee for the Digital Manufacturing Strategies Summit have selected three Headline Themes that will be addressed in detail.
Challenges of IT for the Manufacturing Industry
- Human-Machine Collaboration
- Supply Chain Management & Distribution
- Integration with Legacy Systems
- Interoperability, Scalability & Futureproofing
- Low-Code Application Platforms
- Automation – Increase Efficiency
- Accelerating Product Development
- Value Chain Management.
- Workforce & Skills Development
Digitization in Manufacturing – Managing your Transformation
- Cloud & Edge Computing
- Industrial IoT (IioT)
- Big Data & Analytics
- Digital Transformation to meet Customer Demands
- Proactive Data Analysis
- Robotics & Automation
- Predictive Maintenance
- Product life cycle management
- Industry 4.0 Digital Twins
- AI & ML
Manufacturing Landscape – Compliance & Security Challenges
- OT Cybersecurity
- IoT Security
- Cyber Resilience
- Connectivity & Communication
- Messaging Protocols – Secure Communication between Devices
- Data Security & Privacy Concerns
- Sustainability & Energy Efficiency
- Identifying Security Vulnerabilities
- Safe Integration of the Network of Systems, Applications, Tools, and Resources to Drive Efficiency