↓ Agenda Key
Visionary speaker presents to entire audience on key issues, challenges and business opportunities
Keynote Presentations give attending delegates the opportunity to hear from leading voices in the industry. These presentations feature relevant topics and issues aligned with the speaker's experience and expertise, selected by the speaker in concert with the summit's Content Committee." title="Keynote Presentations give attending delegates the opportunity to hear from leading voices in the industry. These presentations feature relevant topics and issues aligned with the speaker's experience and expertise, selected by the speaker in concert with the summit's Content Committee.
Panel moderated by Master of Ceremonies and headed by four executives discussing critical business topics
Executive Visions sessions are panel discussions that enable in-depth exchanges on critical business topics. Led by a moderator, these sessions encourage attending executives to address industry challenges and gain insight through interaction with expert panel members." title="Executive Visions sessions are panel discussions that enable in-depth exchanges on critical business topics. Led by a moderator, these sessions encourage attending executives to address industry challenges and gain insight through interaction with expert panel members.
Solution provider-led session giving high-level overview of opportunities
Led by an executive from the vendor community, Thought Leadership sessions provide comprehensive overviews of current business concerns, offering strategies and solutions for success. This is a unique opportunity to access the perspective of a leading member of the vendor community." title="Led by an executive from the vendor community, Thought Leadership sessions provide comprehensive overviews of current business concerns, offering strategies and solutions for success. This is a unique opportunity to access the perspective of a leading member of the vendor community.
End user-led session in boardroom style, focusing on best practices
Think Tanks are interactive sessions that place delegates in lively discussion and debate. Sessions admit only 15-20 participants at a time to ensure an intimate environment in which delegates can engage each other and have their voices heard." title="Think Tanks are interactive sessions that place delegates in lively discussion and debate. Sessions admit only 15-20 participants at a time to ensure an intimate environment in which delegates can engage each other and have their voices heard.
Interactive session led by a moderator, focused on industry issue
Led by an industry analyst, expert or a member of the vendor community, Roundtables are open-forum sessions with strategic guidance. Attending delegates gather to collaborate on common issues and challenges within a format that allows them to get things done." title="Led by an industry analyst, expert or a member of the vendor community, Roundtables are open-forum sessions with strategic guidance. Attending delegates gather to collaborate on common issues and challenges within a format that allows them to get things done.
Overview of recent project successes and failures
Case Studies allow attending executives to hear compelling stories about implementations and projects, emphasizing best practices and lessons learned. Presentations are immediately followed by Q&A sessions." title="Case Studies allow attending executives to hear compelling stories about implementations and projects, emphasizing best practices and lessons learned. Presentations are immediately followed by Q&A sessions.
Discussion of business drivers within a particular industry area
Focus Groups allow executives to discuss business drivers within particular industry areas. These sessions allow attendees to isolate specific issues and work through them. Presentations last 15-20 minutes and are followed by Q&A sessions." title="Focus Groups allow executives to discuss business drivers within particular industry areas. These sessions allow attendees to isolate specific issues and work through them. Presentations last 15-20 minutes and are followed by Q&A sessions.
Analyst Q&A Session
Moderator-led coverage of the latest industry research
Q&A sessions cover the latest industry research, allowing attendees to gain insight on topics of interest through questions directed to a leading industry analyst." title="Q&A sessions cover the latest industry research, allowing attendees to gain insight on topics of interest through questions directed to a leading industry analyst.
Several brief, pointed overviews of the newest solutions and services
Taking the form of three 10-minute elevator pitches by attending vendors, these sessions provide a concise and pointed overview of the latest solutions and services aligned with attendee needs and preferences." title="Taking the form of three 10-minute elevator pitches by attending vendors, these sessions provide a concise and pointed overview of the latest solutions and services aligned with attendee needs and preferences.
Pre-determined, one-on-one interaction revolving around solutions of interest
Executive Exchanges offer one-on-one interaction between executives and vendors. This is an opportunity for both parties to make key business contacts, ask direct questions and get the answers they need. Session content is prearranged and based on mutual interest." title="Executive Exchanges offer one-on-one interaction between executives and vendors. This is an opportunity for both parties to make key business contacts, ask direct questions and get the answers they need. Session content is prearranged and based on mutual interest.
Open Forum Luncheon
Informal discussions on pre-determined topics
Led by a moderator, Open Forum Luncheons offer attendees informal, yet focused discussions on current industry topics and trends over lunch." title="Led by a moderator, Open Forum Luncheons offer attendees informal, yet focused discussions on current industry topics and trends over lunch.
Unique activities at once relaxing, enjoyable and productive
Networking opportunities take various unique forms, merging enjoyable and relaxing activities with an environment conducive to in-depth conversation. These gatherings allow attendees to wind down between sessions and one-on-one meetings, while still furthering discussions and being productive." title="Networking opportunities take various unique forms, merging enjoyable and relaxing activities with an environment conducive to in-depth conversation. These gatherings allow attendees to wind down between sessions and one-on-one meetings, while still furthering discussions and being productive.
3:00 pm - 4:30 pm
4:30 pm - 6:00 pm
There is an urgent need to innovate on the part of the business. The reality of today's business mandates a more agile and innovative approach to security. The old guard of draconian security focused on technology, compliance, and boundaries of protection is no longer effective and has prevented security from having a seat at the business table. All this, when a shift in the threat landscape, and a real impact to the bottom line have negatively affected most organizations. This presentation will deep dive into practical, attainable and effective methods to shift the mentality and allow security organizations to function at the speed of business. Such important topics include the use of practical lightweight risk management, the need for a dynamic workforce, and material shift in focus from technology to business alignment.
Juan Gomez-Sanchez, Chief Security Officer, Lennar Corp.
6:00 pm - 7:00 pm
7:00 pm - 8:30 pm
8:30 pm - 10:00 pm
8:00 am - 12:00 pm
12:30 pm - 1:30 pm
1:35 pm - 1:45 pm
1:50 pm - 2:20 pm
Technology has always had a transformative impact on business, and perhaps nowhere is this ongoing evolution more keenly apparent than in pervasive connectivity. Today's extreme connectedness is the primary force shaping the strategic and tactical outlooks of all enterprises. Embracing the potential in an intertwined reality demands superior engineering and architecture that thrives in this environment of modern methodologies and modern technologies of the new digital world.
Ken Spangler, SVP & CIO, FedEx
2:25 pm - 2:55 pm
3:00 pm - 3:25 pm
Progressive companies are leveraging cloud, a powerful business enabler, to transform their business and make it more competitive. But cloud and mobility significantly impacts the current IT infrastructure - security, network traffic flow, applications, user experience and cost. As CIOs and CISOs embrace this transformation, they look for opportunities to exchange ideas with their peers who have gone through this journey.
At this session, Zscaler, will share experience of leading the massive network, security and datacenter application transformation that he managed across all business units of GE.
Example topics will include:
3:30 pm - 3:55 pm
Whether it is from server virtualization, or private cloud delivery, everyone thinks that non-physical infrastructure delivery eliminates the needs for capacity planning, rendering the practice obsolete and irrelevant. The fact of the matter is that nothing could be further from the truth for multiple reasons. Firstly the needs of the physical infrastructure that hosts the virtual/cloud deployment still needs to be carefully managed, and secondly the risks of virtual server sprawl / cloud infrastructure over-provisioning are all too real and more likely than equivalent issues in the physical world. Join our panel of experts as we investigate the implications of capacity planning for non-physical infrastructure, explore collective experiences, and dive into lessons learned to determine best practices.
When it comes to implementing network security infrastructure there are two schools of thought: use best-of-breed point solutions, or go with all round consolidated platforms. Pros and cons abound for either approach revolving around varying levels of protection, integration, and administrative overhead but the increasing complexity of current security infrastructure is showing a winning approach. Even though consolidated solutions may offer greater benefits in the long run, no one exists in a green-field situation when it comes to network and infrastructure security so careful planning is required to ensure the necessary protection.
We have moved from an information-poor to an information-rich society. Practically unlimited availability of data, computing, networking, and socio-mobile connectivity are fundamentally altering our world. In particular, they are enabling businesses to become more effective and efficient by using big data analytics - collecting all relevant data and automating their processing to drive decision-making. This represents a fundamental shift from traditional business analytics where limited amount of structured data is batch-processed to produce standard Business Intelligence reports. We will assess the current state of big data analytics, technology and business trends, and their enormous implications to the future of all businesses.
4:00 pm - 4:10 pm
4:15 pm - 4:40 pm
M2M type technologies. In many cases these older industrial automation initiatives used proprietary communications protocols and dedicated sensors that interfaced with controllers that could manage communications between IT and OT platforms. Fast forward to an IoT world however and these sensors and controllers will need to natively speak IP, natively integrate to back-end enterprise systems beyond just simple controllers, systems such as ERP, BI and other core platforms. Navigating the complexity of process, data, security, and functionality implications has the potential to be a minefield for the unwitting IT executive that goes in without eyes wide open.
Victor Ventura, Global CIO, Babcock & Wilcox
Security situational awareness is an essential building block in order to estimate security level of systems and to decide how to protect networked systems from cyber-attacks. Thus it could be a great tool to use against ransomware attacks. Paying the ransom to regain access to data carries unacceptable risks. The attacker could refuse to unencrypt the data, or the payment could encourage additional malicious activity. Organizations of all sizes can take several actions to mitigate the threat of ransomware. We will look at situational awareness as one proactive tool.
Jim Kastle, Chief Information Security Officer, Conagra Foods
Leading companies are disrupting the status quo by using data to inform business strategy and create new business models that fuel growth. CIOs have the power to uncover the insight that drives disruption and speeds transformation. Learn how leading IT organizations are maximizing the use of open source and cloud technologies alongside on-premises investments to accelerate innovation. And understand how CIOs are embracing new cloud-enabled consumption models while helping ensure data privacy, security and sovereignty.
Krishna Nathan, EVP CIO, S&P Global
4:45 pm - 5:10 pm
Running your business "live" based on true data-driven decisions, and managing your performance with automated and integrated core business processes requires a modern ERP system. Learn how SAP S/4HANA can help transform your business by reducing IT complexity and increasing business productivity. We will also explore the tactical steps leading companies are taking today to unite enterprise-wide processes into a synergistic digital core.
5:15 pm - 6:15 pm
The role of the modern IT Executive is more complex than it has ever been before, not just because the technology landscape has become more complex, but also because increasingly IT execs have had to become a business-focused executive, not just a technologist. Long have we talked about the CIO and CISO getting a seat at the table but modern businesses are now demanding that their technology impresario join them and leverage his deep and rich technical acumen to allow the organization as a whole to better position itself for market-place success. To be successful, CxOs need to invest in themselves, in their personnel, and in the right technologies to allow them to position the IT department to proactively address business needs as an innovator and driver, rather than order-taker and enabler.
Vish Narendra, VP & CIO, Graphic Packaging International, Inc.
Sherry Aaholm, Chief Information Officer, Cummins Inc
Terry West, Chief Information Officer, Performance Food Group Co
Kevin Neifert, Chief Information Officer, Raytheon
Daniel Krantz, SVP Process & (CIO) IT, Volvo Group
6:15 pm - 6:30 pm
6:30 pm - 8:00 pm
8:00 pm - 10:00 pm
7:00 am - 8:00 am
8:10 am - 8:40 am
No phrase carries more meaning and weight in today's digital economy than 'fail fast', the ability to pilot ideas quickly, and separate the wheat from the chaff even quicker, according to CIOs. IT blurs the line between what's real and what's computer-generated by enhancing what we see, hear, feel and smell. Both video games and cell phones are driving the development of augmented reality. Everyone from tourists, to soldiers, to someone looking for the closest subway stop can now benefit from the ability to place computer-generated graphics in their field of vision. Any organization undergoing a digital transformation owes it to themselves to investigate the applicability of Augmented Reality to their prototyping processes. How can augmented reality allowed for direct interaction within your organization?
8:45 am - 9:15 am
There's a general anxiety that has settled over much of the IT profession in recent years. At one time, IT was held up as one of the professions of the future, where more and more of the best jobs would be migrating as computer-automated processes replacing manual ones. Unfortunately, that idea of the future has disappeared, or at least morphed into something much different. Most IT departments drastically reduced the number of tech support professionals, or outsourced the help desk entirely. They have a lot fewer administrators running around to manage the network and the servers, or they've outsourced much of the data center altogether.
The IT environment has changed dramatically. More and more of traditional software has moved to the web, or at least to internal servers and served through a web browser. We've entered the age where Millennials who not only don't need as much tech support, but often want to choose their own equipment and view the IT department as an obstacle to productivity. In other words, today's users don't need as much help as they used to. So where does that leave today's IT professionals? Where will the IT jobs of the future be? Consultants, Project Managers, and Developers!
9:20 am - 9:45 am
Join Equinix to explore how renovating the IT core with an Interconnection Oriented Architecture is empowering enterprises to directly connect partners, customers and employees across geographies, devices and cloud services to deliver maximum growth, speed, security, scale and engagement.
9:50 am - 10:15 am
There's been a definite emphasis on the demand for digital transformation in recent years, and it's a virtual guarantee that as a CIO you have been bombarded with information about its importance in your industry. Are you asking, 'Why DevOps' What problems are we trying to solve? One of the foundations of digital transformation is using applications to constantly create new channels - both to engage customers and to keep employees productive. In a way, every company is now a software company, and you should be aware that DevOps is critical for application strategy success, meaning it's also an essential element of digital transformation.
Building security into your enterprise processes, and integrating it with your existing technology investments has never been more critical or complicated than it is in this era of decentralized computing, and ever-tightening compliance requirements. Furthering this complication is the impact that partnering deals can have since infrastructure, applications, and even data may now longer be under your direct control. To be able to ensure efficient and effective security capabilities you need to understand the nature of the threats that exist today, the impact a sourcing relationship can have on these threats, and the mitigation strategies and tools key industry leaders are using to address the challenge.
Data quality has long been one of the most challenging issues that IT organizations and the enterprises that are hoe to them have had to deal with. Everyone knows that these data quality issues exist, but the cost and complication of addressing them has pushed them to the back burner. We stand however at a precipice, one that has been brought on us by mobile computing " as more devices enter the hands of more users, more data is being created and consumed, making the data quality issue more pressing, more relevant, and more urgent to solve. IT leaders can no longer ignore data quality issues for the good of their companies and the good of their careers and need to bring this issue to the fore and get it resolved before the avalanche sweeps them under.
10:20 am - 10:30 am
10:35 am - 11:00 am
We all know that ROI calculations, on the surface, are simple mathematical formulas: compare the cost of investment against the value of the return over a given and agreed upon period. But determining exactly what each side of the equation entails and totals is the challenging part, and nowhere moreso than in burgeoning areas such as IoT adoption where use cases are still not clearly understood, and technology costs are highly variable, and all the components related to cost may not yet be quantifiable. The benefits are there, as a number of enterprises are discovering with early pilot programs, but CIOs must enter this area with their eyes wide open to ensure that early IoT implementations have the ROI necessary to keep more complex projects moving forward.
As with all things in life, the focus on how to conduct enterprise security ebbs and flows between varying degrees of reactivity and proactivity. In the old school Security 1.0 world, where the focus was almost completely on network security, efforts were in general proactive in nature with firewalls and anti-malware seeking to prevent threats before they even occurred. This didn't work so well and so Security 2.0 focused on reactivity, wrapping things like encryption around the data so that even if a breach occurred, the loss would be mitigated. Yet breaches, and losses, continue to occur. So if primarily proactive security doesn't work, and if primarily reactive security also doesn't work, how then do we find the right balance between the two to find a security posture that does work?
The explosive growth of data volume and data variety that have characterized this new Big Data era are set to head in a steeper upward trajectory as enterprises collectively begin to exploit the massive data flows that are coming out of mobile devices. As the volume of mobile devices eclipses that of human beings on the planet, just imagine the data volume that can be captured when every device and every individual is streaming a constant set of contextual status information. Data growth by itself however is only a small portion of the story, as to have value this data must be analysed in essentially real-time in order to create actionable outcomes.
11:05 am - 11:30 am
Despite millions of dollars of investments and countless hours of implementation and support, employees are not using the enterprise software provided by their employers to do their jobs. Why? Because today's systems are hard to use, they trap data in silos, and have a poor user experience with limited mobile support. What's needed is a new way of delivering information and tasks to employees so they can work faster, make better decisions, and be more productive. In this session, Sapho CTO Peter Yared will talk about his experience with this exact problem when he was a CIO, which lead him to start Sapho. He will also invite Steve Comstock, CIO of CBS Interactive to join him in a discussion around:
Peter Yared, CTO, Sapho
Steve Comstock, CIO, CBS Interactive
Just like other emerging technologies, RFID technology will continue to evolve. Market adoption will grow as companies become familiar with this new way of sharing information and experience the bottom-line benefits and increase in efficiency it can provide. Still, as with any new business process, there are ways to make sure your company's experience with RFID is a successful one.
Companies in all segments of the supply chain are proving the business value of RFID every day. A company can wisely use the capabilities of RFID to improve the accuracy, speed and responsiveness of your entire business operation.
The hype around the cloud is pervasive and can be potentially overwhelming but numerous studies have shown that tangible benefits can be had, whether in cost savings, efficiency improvements, or flexibility enhancements. That said numerous impediments exist to not just realizing that value, but even considering adoption; regulatory issues, integration challenges, business process revamp, and a dozen other challenges can halt cloud projects in their tracks before they get off the ground. In this group discussion we'll explore those inhibitors, understanding which challenges prevent adoption and what can be done to overcome them.
11:35 am - 12:00 pm
The promise of the cloud is almost beyond compare; infinite computing resources, unmatched reliability and uptime, instantaneous service availability, simplistic self-service and provisioning, and the low-low prices of a buy by the drink model. These are the reasons behind the rush to the cloud that we are currently experiencing, but the wholesale adoption does bring a downside " as more and more capability is moved to the cloud, more and more cloud providers are utilized since, for the most part, each provider offers only a limited suite of services. The MultiCloud environment that creates a new set of challenges that IT leaders need to overcome, notably resiliency, interoperability/integration, and security and compliance through careful planning and the lessons learned from building complex on premise distributed systems.
From a technology standpoint, as a society the world of business has gone through two distinct stages in the evolution of its information security focus. The first addressed network based protection and preventative controls such as firewalls and anti-malware. The second looked at data-centric and detective controls such as encryption and intrusion/extrusion monitoring. Since breaches continue to occur at a record pace, what is need new is clearly a new evolution, one that pushes towards individual focused security through granular user monitoring and management as provided by solutions such as Identity and Access Management. While IAM isn't a new technology field, it is one whose time has come and CISO need to begin investing in modern-day, light-weight, easy to implement IAM solutions now to stay ahead of the curve, and reduce enterprise threats.
The breach onslaught demonstrates that existing security solutions are incapable of defending current threats
Enterprises need to begin looking at security from an activity perspective rather than an artifact perspective
IAM provides activity insight, and therefore threat awareness, no other platform can equal
The explosive growth of data volume and data variety that have characterized this new big data era are set to head in a steeper upward trajectory as IoT moves from being a fringe technology, to a mainstream capability. When a single Boeing 787 is able to capture 70Tb of data per flight from thousands of individual sensors throughout the vehicle, just imagine the data volume that can be captured when not just every plane, or even every vehicle, but every device and every individual is streaming a constant set of status information. Data growth by itself however is only a small portion of the story, as to have value this data must be analysed in essentially real-time in order to create actionable outcomes.
12:05 pm - 12:30 pm
Building a Disruptive Technology Digital team. To become fully digital enterprises, you need to shift the focus inward and innovate the employee experience. Is this defined as how employees feel about their organizations with regard to both opportunities for growth/skills development, and employees' willingness to continue to work for their current firms? Use digital DNA behaviors.
Greg Ericson, CIO, Essilor
For several years, IT professionals identified the importance and need for Corporate Boards to receive the story directly from the CISO. First problem, not every organization had a CISO. Second problem many CISOs could only communicate with their Board through a proxy, like the CIO or CFO or through a canned compliance-level briefing. During the last 2-3 years, the headlines began to announce data breaches involving millions of data records. The federal government has negotiated settlements of millions of dollars in fines. One of the intentional consequences is governing boards are increasingly motivated to learn more and provide more influence on their organization's security management. All Boards understand or are beginning to understand their responsibilities around preventing and properly handling data breaches. That understanding begins with more involvement with their CISO. However, now that CISOs have seemingly got their wish to have a direct and frequent avenue to their Boards, what is effective to tell them? What do CISOs need to ask from their Boards? In this session, we will share some lessons learned and describe the journey one takes with the Board as that relationship grows. This is designed as a collaborative, participative forum and audience participation is encouraged to share ideas, frustrations, and common understanding.
Customer intimacy is an imperative for companies who are struggling with increasing commoditization of goods and services and an explosive growth in the channels of engagement. Digital organizations have a head start and have disrupted traditional customer interfaces to gain competitive advantage. As a result, organizations across industries are now exploring ways to energize the customer experience and fill the digital gap. This session will present practical ways in which leaders in digital customer experience are leveraging Big Data to harvest customer insights, create new business applications and enable digital transformation within sales and marketing.
12:35 pm - 1:20 pm
1:25 pm - 1:50 pm
Over the last 20 years enterprises and CIOs have focused significant resources and funding towards ERP deployments. While the ERP journey has often been challenging, it is clear today, if not obvious, that every enterprise of any scale requires an integrated system to manage its core business functions. For manufacturers, a common and comprehensive operating model has remained elusive, until now. Beyond the traditional manufacturing and quality requirements, the need for speed and agility to meet faster product cycle times, customer demand changes as well as the pressure of competition and continuous improvement means that the manufacturing operating system must meet the highest standards of integration, flexibility, and time to value. In short, what is required is a future ready solution.
In todays environment there can be no arguing that a comprehensive IT Security program is a de facto requirement for every organization. Such a program needs to address the full range of security threats that can be leveraged against an organization, needs to be integrated into whatever regulatory and governance requirements exist, but beyond that it needs to be accessible, consumable, and actionable by everyone that is influenced by it, or interacts with it. Building a program that is shared through social channels and relies on the collaborative input of employees and constituents for not only creation but enforcement will drive higher levels of adoption, responsiveness and, ultimately, protection.
Paul Black, VP Cyber Security Operations (Interim CISO), McKesson
Once upon a time applications ran directly on physical hardware. Then the boxes got bigger and more capable and multiple applications were run on the same hardware. There were some resource constraints, but things in general became more efficient. Time passed, things evolved and virtualization was introduced, allowing enterprises to run even more applications even more efficiently on the same hardware. And then the cloud came on the scene, extending the virtualization model to the point that it looked like something completely different, to the point that it became true utility computing. Cloud computing is not just virtualization on a bigger scale and as CIOs prepare their organizations to dive into private clouds at an increasing rate, it is very important to understand what they are and are not, and how they differ from their forbear computer models with which we are all familiar.
1:55 pm - 2:20 pm
Today's modern CIO is embarking on a digital transformation journey exploring radical hybrid IT strategies and leveraging new technologies like Cloud, Social, Mobile and Big Data. However, with 'keeping the lights on' legacy IT components costing nearly 90% of a typical IT budget, how can IT make powerful advancements and lead business change?
Join this interactive session to learn how award-winning CIOs are successfully tipping the balance by liberating people, time and money from costly ongoing maintenance of their ERP systems including SAP and Oracle, to invest in strategic initiatives that create real-world competitive advantage.
2:25 pm - 2:50 pm
The Burdens and Constraints of the data center is among the greatest reasons why businesses are increasingly migrating to cloud. Moving to cloud, for many organizations, can bring complex challenges and concerns of cost. To address the challenges of cloud, tech companies are taking a step back to better understand the problems faced by large corporations to solve the most complex problems and provide new innovative solutions. By automating cloud operations companies can now ease difficulties within compliance of both private and public sector while simplifying lifecycle management of infrastructure service stacking allowing for faster innovation and company efficiencies.
2:55 pm - 3:20 pm
Over the last 20 years enterprises and CIOs have focused significant resources and funding towards ERP deployments. While the ERP journey has often been challenging, it is clear today, if not obvious, that every enterprise of any scale requires an integrated system to manage its core business functions. For manufacturers, a common and comprehensive operating model has remained elusive, until now. Beyond the traditional manufacturing and quality requirements, the need for speed and agility to meet faster product cycle times, customer demand changes as well as the pressure of competition and continuous improvement means that the manufacturing operating system must meet the highest standards of integration, flexibility, and time to value. In short, what is required is a future ready solution. The rapid development of technologies across a wide range of disciplines has coalesced into Industry 4.0. While the vision of Industry 4.0 is still largely aspirational, one example is the use of big data tools to realize value from structured and unstructured data that are efficiently absorbed through traditional integration of IIoT. In this session, Patel will discuss how Sanmina implemented a cloud manufacturing solution to meet its demands of operations excellence and deep functionality within and across plant operations while maintaining a high level of agility and cost efficiency, quickly enable process controls, and provide data collection and visibility at specific work centers across a whole plant or even product lines that cross multiple plants.
Manesh Patel, Senior Vice President and Chief Information Officer, Sanmina Corporation
A very short time ago, we saw the introduction of the Internet, smartphone, and tablet. All disruptive technologies that sparked billions in new revenue and changed the way we live and communicate, along with how we work and operate on a daily basis. These technologies paved the path for what we are about to see in retail over the coming years.
However, customers and the preferences are becoming more diverse, their expectations are growing higher, and their loyalties are at all-time lows. In the face of these dynamic market forces, building organizational customer centricity, then is essential for long-term success and this is best achieved by creating programs that equally focus on customer acquisition and customer retention. So who drives the organization to translate the voice of the people's direct feedback, social media postings etc.
Does your organization prioritize it differently across departments? Does marketing take the lead..IT leaders, or senior management? Meeting consumer expectations requires a cohesive strategy and an appropriate IT infrastructure.
So we will have a roundtable brainstorming session around these issues.
Financial fraud is, unfortunately a huge business, with annual losses so massive that were Fraud a country, it would have the fifth highest global GDP. While enterprises in the financial services sector have always used analytical processes to detect and limit those losses, as technology moves forward the analytical capabilities that can be brought to bear increase in exponentially in capability and those on the leading edge are able to see, and stop, more fraud in less time. Just as Big Data capabilities are bringing significant business benefit to other aspects of the business, they can to fraud mitigation but several challenges need to be overcome for maximum efficiency. Only by addressing quality, volume, security, and integration challenges and by further ensuring the right staff with the right skills are in place can benefits actually be realized.
3:25 pm - 3:35 pm
3:40 pm - 4:05 pm
4:10 pm - 4:35 pm
Most research indicates that M&A activity has an overall success rate of about 50%--basically a coin toss. Yet it is the CIO that is expected to assume the mantle of responsibility for ensuring not only the availability of IT services necessary to support businesses capabilities, but often those businesses capabilities themselves. The difficulty increases exponentially during a merger or acquisition because now, not only are IT leaders trying to ensure the availability of the systems they've built and capabilities that they rely on, but those systems and capabilities of the acquired company which they didn't build, and need to integrate.
Vikas Parikh, CTO and M&A Leader, GE Oil & Gas
Android represents the most common and most popular mobile device operating system and any businesses developing for an external audience absolutely must ensure that Android is a supported platform in the capabilities it offers. However, Android is also the most unsecure platform with as much as 95% of all mobile malware inexistence targeting that platform and so businesses that allow mobility within their organization must very carefully consider that threat before they allow Android devices to connect. Rationalizing that dichotomy of a device that will be common and popular amongst the workforce yet at the same time represents a dire threat to enterprise security is an issue that every CIO and CISO must address.
The days of "first touch" attribution are long gone. Today there is an intense focus for predictable revenue results, to know customer acquisition costs (CAC) and to understand the Customer Journey. Because of the Internet, the balance of power has shifted from Brands to customers with customers able to search myriad sources of information about a company and their products before ever engaging them with a phone call or a webform. This has led to the ongoing need to follow the Customer through multiple paths including SEM, SEO, Social, Display and more. Marketers and Customer Experience professionals are working side by side with IT professionals to move from Multi-Channel marketing to Cross-Channel Marketing to now Omni-Channel Marketing. We will discuss how critical it is for Marketers, Customer Experience and Information Technology to work closely together to ensure the production of accurate data on the Customer Journey.
4:40 pm - 5:20 pm
Robots and automation systems are no longer limited by onboard resources in computation, memory, or software. "Cloud Robotics and Automation" is where robots and automation systems share data and code and perform computation via networks building on emerging research in cloud computing. Teleoperation and cloud technologies will cause mass consumerization of robotics over the next five years. Between 2017 and 2022, Cloud Robotics will facilitate a major shift of manufacturing into cloud infrastructure The combined Cloud Robotics market will reach $18.2 billion by 2022 .
Becky Wanta, Former Senior Vice President/Global Chief Technology & Innovation Officer, RSW1C Consulting
Dave Hudson, Chief Information Officer, Veritiv
Krishna Nathan, EVP CIO, S&P Global
Paul Moulton, EVP & CIO, Costco Wholesale
Rajesh Nagarajan, Chief Information Officer, Celanese
David Jarvis, CIO, Honeywell
5:20 pm - 5:30 pm
5:30 pm - 6:30 pm
6:30 pm - 8:00 pm
8:00 pm - 10:00 pm