↓ Agenda Key
Visionary speaker presents to entire audience on key issues, challenges and business opportunities
Keynote Presentations give attending delegates the opportunity to hear from leading voices in the industry. These presentations feature relevant topics and issues aligned with the speaker's experience and expertise, selected by the speaker in concert with the summit's Content Committee." title="Keynote Presentations give attending delegates the opportunity to hear from leading voices in the industry. These presentations feature relevant topics and issues aligned with the speaker's experience and expertise, selected by the speaker in concert with the summit's Content Committee.
Panel moderated by Master of Ceremonies and headed by four executives discussing critical business topics
Executive Visions sessions are panel discussions that enable in-depth exchanges on critical business topics. Led by a moderator, these sessions encourage attending executives to address industry challenges and gain insight through interaction with expert panel members." title="Executive Visions sessions are panel discussions that enable in-depth exchanges on critical business topics. Led by a moderator, these sessions encourage attending executives to address industry challenges and gain insight through interaction with expert panel members.
Solution provider-led session giving high-level overview of opportunities
Led by an executive from the vendor community, Thought Leadership sessions provide comprehensive overviews of current business concerns, offering strategies and solutions for success. This is a unique opportunity to access the perspective of a leading member of the vendor community." title="Led by an executive from the vendor community, Thought Leadership sessions provide comprehensive overviews of current business concerns, offering strategies and solutions for success. This is a unique opportunity to access the perspective of a leading member of the vendor community.
End user-led session in boardroom style, focusing on best practices
Think Tanks are interactive sessions that place delegates in lively discussion and debate. Sessions admit only 15-20 participants at a time to ensure an intimate environment in which delegates can engage each other and have their voices heard." title="Think Tanks are interactive sessions that place delegates in lively discussion and debate. Sessions admit only 15-20 participants at a time to ensure an intimate environment in which delegates can engage each other and have their voices heard.
Interactive session led by a moderator, focused on industry issue
Led by an industry analyst, expert or a member of the vendor community, Roundtables are open-forum sessions with strategic guidance. Attending delegates gather to collaborate on common issues and challenges within a format that allows them to get things done." title="Led by an industry analyst, expert or a member of the vendor community, Roundtables are open-forum sessions with strategic guidance. Attending delegates gather to collaborate on common issues and challenges within a format that allows them to get things done.
Overview of recent project successes and failures
Case Studies allow attending executives to hear compelling stories about implementations and projects, emphasizing best practices and lessons learned. Presentations are immediately followed by Q&A sessions." title="Case Studies allow attending executives to hear compelling stories about implementations and projects, emphasizing best practices and lessons learned. Presentations are immediately followed by Q&A sessions.
Discussion of business drivers within a particular industry area
Focus Groups allow executives to discuss business drivers within particular industry areas. These sessions allow attendees to isolate specific issues and work through them. Presentations last 15-20 minutes and are followed by Q&A sessions." title="Focus Groups allow executives to discuss business drivers within particular industry areas. These sessions allow attendees to isolate specific issues and work through them. Presentations last 15-20 minutes and are followed by Q&A sessions.
Analyst Q&A Session
Moderator-led coverage of the latest industry research
Q&A sessions cover the latest industry research, allowing attendees to gain insight on topics of interest through questions directed to a leading industry analyst." title="Q&A sessions cover the latest industry research, allowing attendees to gain insight on topics of interest through questions directed to a leading industry analyst.
Several brief, pointed overviews of the newest solutions and services
Taking the form of three 10-minute elevator pitches by attending vendors, these sessions provide a concise and pointed overview of the latest solutions and services aligned with attendee needs and preferences." title="Taking the form of three 10-minute elevator pitches by attending vendors, these sessions provide a concise and pointed overview of the latest solutions and services aligned with attendee needs and preferences.
Pre-determined, one-on-one interaction revolving around solutions of interest
Executive Exchanges offer one-on-one interaction between executives and vendors. This is an opportunity for both parties to make key business contacts, ask direct questions and get the answers they need. Session content is prearranged and based on mutual interest." title="Executive Exchanges offer one-on-one interaction between executives and vendors. This is an opportunity for both parties to make key business contacts, ask direct questions and get the answers they need. Session content is prearranged and based on mutual interest.
Open Forum Luncheon
Informal discussions on pre-determined topics
Led by a moderator, Open Forum Luncheons offer attendees informal, yet focused discussions on current industry topics and trends over lunch." title="Led by a moderator, Open Forum Luncheons offer attendees informal, yet focused discussions on current industry topics and trends over lunch.
Unique activities at once relaxing, enjoyable and productive
Networking opportunities take various unique forms, merging enjoyable and relaxing activities with an environment conducive to in-depth conversation. These gatherings allow attendees to wind down between sessions and one-on-one meetings, while still furthering discussions and being productive." title="Networking opportunities take various unique forms, merging enjoyable and relaxing activities with an environment conducive to in-depth conversation. These gatherings allow attendees to wind down between sessions and one-on-one meetings, while still furthering discussions and being productive.
3:00 pm - 4:30 pm
4:30 pm - 6:00 pm
Communication,” “business acumen,” and “relationship building” are all familiar entries on every “Top IT Leadership Skills” list ever written. While these attributes continue to be important in our current climate of risk, innovation and IT opportunity, they are just a drop in the bucket. In an era where technology belongs to everyone, the technology executive must have so much more. In this newly updated presentation, Martha Heller, an IT executive recruiter and author of The CIO Paradox and Be the Business: CIOs in the New Era of IT (fall 2016) presents a list of new skills critical to any IT leader working today. Drawing on personal interviews with more than 400 successful CIOs, Heller, a master storyteller, offers case studies, anecdotes, advice and impressions to arm attendees with the skills they need to bring their companies into the future.
Martha Heller, President , Heller Search Associates
6:00 pm - 7:00 pm
7:00 pm - 8:30 pm
8:30 pm - 10:00 pm
7:00 am - 7:55 am
8:00 am - 8:10 am
8:10 am - 8:50 am
Since the inception of the role, the focus of the CIO has primarily been one of Technologist and IT Operations Manager; selecting the tools and services necessary to support the business, and then efficiently and effectively operating them. This is a future of declining organizational value however as technology becomes increasingly democratized and other organizational groups take control over individual systems and data sets. CIOs need to recast themselves instead as Strategists and Business Innovators; leveraging their unique position at the crux of the organization to propose alternatives to the accepted way of doing things, and to drive organizational growth through business alignment and organizational change.
Ed McLaughlin, Chief Information Officer, Mastercard
8:55 am - 9:35 am
The accepted number for the amount of the IT budget that is tied up in operational spend, in paying to maintain technology that has already been purchased, is 80% leaving only 20% for the IT department to use to drive new projects. Because this level of funding is so low, as much as 70% of IT sponsored projects fail. Yet IT departments are being constantly pushed to be innovative, to find a way to embrace new technologies and leverage them to drive business change. How can you do that when your time, money, and effort goes to just keeping the lights on? Join us as we collectively explore this issue and examine some of the successful strategies that are being leveraged by top IT leaders.
9:45 am - 10:15 am
There has been much discussion over the last couple of years about the development and adoption of Mobile or Digital Wallets, yet the pace of development and adoption continues to be slow. As Near Field Communications (NFC) becomes more ubiquitous across mobile devices, the discussion of e-Wallet development and adoption will only increase. Will the future be client-side wallets or provider-side wallets, will it be individual wallets offered by individual retailers, or amalgamated wallets offered by consortia?
David Hopkins, Managing Director IT (Divisional CIO), American Airlines
Big Data initiatives have become a reality among almost every company today, however, what we have seen is lots of initiatives have become just science projects and did not deliver on early expectations. This situation needs to reversed quickly because those organizations that are being successful with Big Data and analytics programs are rapidly leaving those that are unsuccessful in their wake. Big Data and analytics has the potential to be transformational for the enterprise, but IT leaders need to be making the right investments, in the right areas, to ensure optimal success. This panel discussion will focus on how to use data and analytics to drive true business success and show some real examples of companies and individuals who made a difference.
Mano Mannoochahr, Global IT Director of Data, Analytics and Enterprise, John Deere
10:20 am - 10:50 am
More and more organizations are embracing the cloud and mobility to improve productivity and make their business more competitive. This is turning the current security landscape upside down. At the same time newer, more advanced threats are creating new risks that traditional security appliances struggle to keep up with. CIOs and CISOs are looking for new approaches to securely adopt cloud and mobility.
In this session Zscaler will discuss why many IT organizations are choosing to adopt a cloud-based approach to securely enable mobility, cloud applications and social media, while ensuring compliance and reducing risk. The audience will learn how a cloud security strategy can help them. Protect users from advanced threats:
10:55 am - 11:25 am
The promise of the cloud is almost beyond compare; infinite computing resources, unmatched reliability and uptime, instantaneous service availability, simplistic self-service and provisioning, and the low-low prices of a “buy by the drink” model. These are the reasons behind the rush to the cloud that we are currently experiencing, but the wholesale adoption does bring a downside – as more and more capability is moved to the cloud, more and more cloud providers are utilized since, for the most part, each provider offers only a limited suite of services. The MultiCloud environment that creates a new set of challenges that IT leaders need to overcome, notably resiliency, interoperability/integration, and security and compliance through careful planning and the lessons learned from building complex on premise distributed systems.
TEAM International Services, Inc
11:30 am - 12:00 pm
From a technology standpoint, as a “society” the world of business has gone through two distinct stages in the evolution of its information security focus. The first addressed network based protection and preventative controls such as firewalls and anti-malware. The second looked at data-centric and detective controls such as encryption and intrusion/extrusion monitoring. Since breaches continue to occur at a record pace, what is need new is clearly a new evolution, one that pushes towards individual focused security through granular user monitoring and management as provided by solutions such as Identity and Access Management. While IAM isn’t a new technology field, it is one whose time has come and CISO need to begin investing in modern-day, light-weight, easy to implement IAM solutions now to stay ahead of the curve, and reduce enterprise threats.
• The breach onslaught demonstrates that existing security solutions are incapable of defending current threats
• Enterprises need to begin looking at security from an activity perspective rather than an artifact perspective
• IAM provides activity insight, and therefore threat awareness, no other platform can equal
12:05 pm - 12:35 pm
The banking industry is one that rarely would be described as “innovative”, with all players seemingly taking a “what’s good for one is good for all” approach where no-one particularly upsets the status quo in anything but small and incremental ways. If the latest evidence from the European market is anything to go by, however, the potential exists that a major shakeup could be in the offing as a host of so-called “Challenger” banks are bursting onto the scene. Whether from upstart financial services organizations, of companies entrenched in non-related fields such as retail, new entrants are coming to market that having nothing invested in old school processes, not in the semi-competitive landscape that currently exists. Change is coming and Financial Services CIOs need to look to their own house to ensure the people, processes, and technologies are in place to respond to this new threat.
Steven Daniels, SVP EDM, eCRM, Architecture, Strategy & Innovation, U.S. Bank
The promise of the cloud is almost beyond compare; infinite computing resources, unmatched reliability and uptime, instantaneous service availability, simplistic self-service and provisioning, and the low-low prices of a buy by the drink model. These are the reasons behind the rush to the cloud that we are currently experiencing, but has the hype overshadowed the process for successful migrations? Setting the right expectations inside and outside of the IT function is critical for success – it’s not just porting over applications, but it’s requiring applications to be cloud aware. It’s educating inside and outside of IT on behavioral shifts to gain adoption and preparing to re-structure in order to have the right resources in place.
Andrew Zitney, SVP, Infrastructure Services, McKesson
12:40 pm - 1:40 pm
1:45 pm - 2:15 pm
As insurers of all shapes and sizes stare down the time-consuming and inherently risky proposition of a core systems replacement, increasingly they are beginning to consider the adoption of public cloud to facilitate this. As SaaS solutions become available they offer the possibility of a plug-and-play end-to-end solution while IaaS allows insurers to maintain a greater measure of control while deploying a new system in parallel minimizing risk and simultaneously controlling cost. Cloud migrations are never completely straightforward however, and many of the tools targeted at insurers are still in their early days. Insurance, by definition, is an industry focused on the mitigation of risk and insurance IT leaders need to be vigilant as they consider their cloud options for core systems replacement.
Cloud has changed the way we build back-end systems, mobility has changed the way we build the front end too, and now the combination of Network Functions Virtualization (NFV) and Software Defined Networking (SDN) is going to change the way we build networks. By allowing for the separation of control plane and data plane while simultaneously migrating both of those pieces to inexpensive commodity hardware we allow for the creation of more redundant, more dynamic, more efficient, and far less costly networks, eliminating a major bottle-neck to IT and service innovation. CIOs must begin investigating and implementing these technologies now to ensure they are on the leading edge of service delivery.
2:20 pm - 2:50 pm
2:55 pm - 3:25 pm
Application integration is a challenging task no matter what the platform being used. Finding a way to have various enterprise applications communicate and work together cleanly and efficiently requires dedication and focus. Mobile apps stand on the precipices of disrupting everything that enterprises have done so far to manage application integration by throwing new platforms, new communication methodologies, new coding languages and new APIs into the mix. As mobile apps increasingly become the primary enterprise apps as opposed to simplified extensions of existing ones, CIOs and IT departments will need to look at application integration with fresh eyes to ensure that both utmost performance and rock solid operability continues to be offered across the entire integrated application suite.
3:30 pm - 4:00 pm
It’s no secret that Big Data is a big deal, but just how big is it? Some estimates show that while we have a massive 2 Zettabytes under collective corporate management, that this represents one ten thousandth of a percent of the data that has been created. Fortunately, those other “nexus” technologies are providing the opportunity to make use of these untapped data resources – mobile is providing a ubiquitous input channel, cloud a dynamically scalable processing capability, and social the community involvement to process and find value. Leveraged well Big Data can solve a wealth of corporate challenges, ranging from improving efficiency, through mitigating risk, to actually growing bottom line revenue.
One of the key areas for early IoT projects is in the area of industrial automation, as an extension of existing, older M2M type technologies. In many cases these older industrial automation initiatives used proprietary communications protocols and dedicated sensors that interfaced with controllers that could manage communications between IT and OT platforms. Fast forward to an IoT world however and these sensors and controllers will need to natively speak IP, natively integrate to back-end enterprise systems beyond just simple controllers, systems such as ERP, BI and other core platforms. Navigating the complexity of process, data, security, and functionality implications has the potential to be a minefield for the unwitting IT executive that goes in without eyes wide open.
4:05 pm - 4:35 pm
Across all channels, the retail market continues to be strong, as evidenced by the nearly $5 trillion-dollar market valuation. And while online retailing has shown steady and continued growth of nearly 20% year over year, it itself is now facing pressure from upstart mobile retailing which is more than doubling in value year over year. Though those growth rates will slow as total mobile sales volume increase, any retailer that does not have a mobile specific channel initiative in place, or at least in development, is likely to miss out on the crest of the wave. Efforts must begin now to develop mobile apps or mobile enabled online channels, to provide a consistent and integrated experience, and to facilitate simple payment via mobile-based payment systems.
Tammylynne Jonas, VP, IT, Kohl\'s Department Stores
In today’s environment there can be no arguing that a comprehensive IT Security program is a de facto requirement for every organization. Such a program needs to address the full range of security threats that can be leveraged against an organization, needs to be integrated into whatever regulatory and governance requirements exist, but beyond that it needs to be accessible, consumable, and actionable by everyone that is influenced by it, or interacts with it. Building a program that is shared through social channels and relies on the collaborative input of employees and constituents for not only creation but enforcement will drive higher levels of adoption, responsiveness and, ultimately, protection.
John Kirkwood, VP Chief Information Security Officer , Albertsons-Safeway
4:40 pm - 5:20 pm
Best practice in most enterprises, at least as far as the CIO and CISO goes, is to squash Shadow IT wherever it is encountered. Shadow IT, the argument goes, leads to a world of data and integration problems for the IT department, and significant amounts of unknown and unquantifiable risk for the information security group. A small but vocal minority however is beginning to advocate for Shadow IT as a catalyst of innovation, citing the increases in productivity and creativity by allowing enterprise staff to find their own out of the box solutions to organizational problems. CISOs can allow their organizations to have their cake (Shadow IT) and eat it too (still be secure) by following a few simple steps that allow them to build in security regardless of user activity.
Paul Moulton, EVP & CIO, Costco Wholesale
Vish Narendra, VP & CIO, Graphic Packaging International
David Hopkins, Managing Director IT (Divisional CIO), American Airlines
David Jarvis, CIO, Honeywell
5:20 pm - 6:30 pm
6:30 pm - 8:00 pm
8:00 pm - 10:00 pm
7:00 am - 8:00 am
8:10 am - 8:50 am
Many organizations are discovering that adopting service catalogues, curated collections of business and IT services, can both enhance IT-business relationships (by clearly outlining capabilities and expectations as well service costs) and improve operational competency (by standardizing service offerings). Service catalogues are only as useful as their accuracy however and a service catalogue with service levels that cannot be met can in many have a greater negative impact than not having a service catalogue at all. To ensure that service levels are set appropriately it is important to understand the capabilities of the people, processes, and tools that underlie them and this requires measurement up front to eliminate guess work.
8:55 am - 9:35 am
Organizational complexity is the single most significant impediment that enterprises are dealing with today; it underlies every business problem enterprises faces and undermines every effort to address them. Organizational complexity is grounded in cumbersome processes, but those poor processes exist only because enterprise applications themselves, including those that are customer facing, as well as those that are not, are complex and unwieldy. To address cultural complexity then, enterprises must eliminate the complexity in their application suite by either building new, buying new, or more efficiently simplifying what they already have. Only by simplification can enterprises eliminate complexity in an efficient and effective way and position themselves for success.
9:45 am - 10:15 am
Data quality has long been one of the most challenging issues that IT organizations and the enterprises that are hoe to them have had to deal with. Everyone knows that these data quality issues exist, but the cost and complication of addressing them has pushed them to the back burner. We stand however at a precipice, one that has been brought on us by mobile computing – as more devices enter the hands of more users, more data is being created and consumed, making the data quality issue more pressing, more relevant, and more urgent to solve. IT leaders can no longer ignore data quality issues for the good of their companies and the good of their careers and need to bring this issue to the fore and get it resolved before the avalanche sweeps them under.
While the hardware, software, and general capability of enterprise information technology (IT) systems has grown at an ever accelerating pace, the same cannot be said for enterprise operational technology (OT) because the systems controlled by this computing capability tend to be relatively static. However as utility companies begin to enter into a period marked by radical innovation, expansion, and change, the needs demanded of the enterprise OT are exploding. Increasingly enterprises are seeing greater benefit in migrating operational management responsibilities to more mature and capable IT systems than they are in investing in OT enhancement. To realize the expected benefits IT departments must ensure tight alignment and integration of these two disparate platforms.
10:20 am - 10:50 am
As with all things in life, the focus on how to conduct enterprise security ebbs and flows between varying degrees of reactivity and proactivity. In the old school “Security 1.0” world, where the focus was almost completely on network security, efforts were in general proactive in nature with firewalls and anti-malware seeking to prevent threats before they even occurred. This didn’t work so well and so “Security 2.0” focused on reactivity, wrapping things like encryption around the data so that even if a breach occurred, the loss would be mitigated. Yet breaches, and losses, continue to occur. So if primarily proactive security doesn’t work, and if primarily reactive security also doesn’t work, how then do we find the right balance between the two to find a security posture that does work?
10:55 am - 11:25 am
The hype around the cloud is pervasive and can be potentially overwhelming but numerous studies have shown that tangible benefits can be had, whether in cost savings, efficiency improvements, or flexibility enhancements. That said numerous impediments exist to not just realizing that value, but even considering adoption; regulatory issues, integration challenges, business process revamp, and a dozen other challenges can halt cloud projects in their tracks before they get off the ground. In this group discussion we’ll explore those inhibitors, understanding which challenges prevent adoption and what can be done to overcome them.
Each era of the digital economy has introduced innovations that fostered new forms of interaction; we've gone from connecting machines and people so they can share information to online collaboration and real-time participation. Just as PCs, networks, and Web apps revolutionized previous digital eras, interconnection is this era's game-changer. In the workplace of the future, customers, employees and partners will be dispersed over more geographic locations, using more devices and expecting more than ever, but current IT architectures that were built for a different time are in conflict with many of the core requirements of future computing. An interconnected enterprise directly connects its employees, partners and customers to what they need, in the right context, using the devices, channels and services. The result: extraordinary experiences for your customers, high engagement for your employees, top value for your shareholders and exponential growth for your business.
11:30 am - 12:00 pm
The explosive growth of data volume and data variety that have characterized this new Big Data era are set to head in a steeper upward trajectory as enterprises collectively begin to exploit the massive data flows that are coming out of mobile devices. As the volume of mobile devices eclipses that of human beings on the planet, just imagine the data volume that can be captured when every device and every individual is streaming a constant set of contextual “status” information. Data growth by itself however is only a small portion of the story, as to have value this data must be analysed in essentially real-time in order to create actionable outcomes.
As IT Leaders, we have all been aware of the impending need to move from IPv4 to IPv6 protocols as the number of available IP addresses withers to next to nothing. Many have deferred this task however, simply making use of private internal address spaces to defer the inevitable work. As IoT becomes a fait accompli however, ignoring the issue is no longer a viable alternative; to be able to connect and access the vast number of public sensors and other IoT devices IPv6 must be adopted wholesale. CIOs that have not yet done so must begin IPv6 migration projects now to ensure that they are not roadblocks to growth and innovation as a result of IoT adoption.
12:05 pm - 12:45 pm
The importance technology plays within an enterprise will only continue to gain momentum as more developers, engineers, and programmers enter the workforce. As these segments continue to grow, so does the diversity of the workforce within the technology field. For a field that is severely constrained by a talent and skills gap, this influx of bodies can only be a good thing. Beyond the basic ability to deliver of identified capabilities a diverse workforce, whether cultural or gender influenced offers a whole that is more than the sum of the parts. Finding ways to drive and increase diversity in IT then should be a key focus for every IT executive.
Rashmi Kumar, VP, CTO, McKesson
12:45 pm - 12:55 pm
1:00 pm - 1:30 pm
1:30 pm - 2:00 pm
2:00 pm - 5:00 pm
5:00 pm - 5:30 pm
5:30 pm - 6:30 pm
6:30 pm - 8:00 pm
8:00 pm - 10:00 pm