8:00
|
Registration & Networking
|
8:35
|
Opening Act
|
8:40
|
IDC Welcome Address
|
|
Jyoti Lalchandani
Group Vice President & Regional Managing Director (META), IDC
|
8:45
|
Opening Keynote (Government Affiliation)
|
9:00
|
IDC Keynote: Sustainable Value Creation in a Digital-First World
|
|
Digital is now a permanent, yet dynamic fixture of our world. Individuals in schools, companies, and governments are always asking whether there is some digital-based capability or enhancement that could improve lives and desired outcomes. For the enterprise, digital-first takes digital transformation to a different level — and the definition of value has been redefined. It is not just about the bottom or top line. There are also sustainability targets to be met, and organizations need to think about how they can deliver ecosystem value at scale. This session will highlight the action items that CIOs and their C-suite teams need to take, as well as the technologies that will most likely have the biggest impact as we look to drive sustainable value creation in a digital-first world.
Steven Frantzen
Senior Vice President & Regional Managing Director (EMEA), IDC
|
9:30
|
Partnering with Digital Natives
|
|
Start-ups of all kinds have been increasingly taking centre stage over the past decade, introducing a new breed of organization, dubbed ‘digital natives.’ Today, and following in the acceleration in technology adoption over the past few years, start-ups are becoming an example to follow for enterprises, due to their ability to be more agile and innovative using less capital by building their business model on the cloud. This allows them to instantly take advantage of the powerful tools and services cloud offers in terms of scalability, cost optimisation and massive computing power.
|
9:50
|
Implementing Effective Application Security Strategies
|
|
As more mobile and web-based apps become available and are increasingly in demand, app development has been steadily on the rise, becoming essential to both business and daily life. Alongside that, the proliferation of IoT devices and other emerging technologies has further enabled the automation of manual processes. Yet, this fast-growing ecosystem brings with it a host of new challenges, particularly security issues which organizations need to address immediately to avoid releasing vulnerable code on the market.
|
10:05
|
Q&A (Ask Questions, Rate Sessions & Stand a Chance to Win Raffle Prizes)
|
10:10
|
Developing Intelligent AIOps Strategies and Practices
|
|
With cloud being everywhere for everything, success depends on how well an organization operationalizes its hybrid multicloud strategy for business outcomes such as resiliency and innovation. This requires investments in intelligent CloudOps or AIOps, which is fast becoming a bedrock for optimized IT operations. In their resiliency journeys, organizations expect their IT infrastructure to be tightly aligned with business needs of innovation, risk reduction, and efficiency. As businesses view cloud migration and application modernization with a new lens — one focused on operations and efficiency — they want access to capabilities such as automation, observability, cost optimization, and infrastructure insights to meet core business objectives.
|
10:25
|
Q&A (Ask Questions, Rate Sessions & Stand a Chance to Win Raffle Prizes)
|
10:30
|
Strategies to Strengthen Future CIO Influence
|
|
As digital technologies have become the lifeblood of enterprises, the days of managing technology by fiat are long gone. Growing LOB technology budgets, increasing numbers of tech-savvy workers, and the maturation of shadow IT into formal LOB technology initiatives have taken the wind out of the sails for some CIOs as they see their authority diminish. Yet, if CIOs can influence digital business and technology strategies for the betterment of the enterprise, they reap the benefits of leveraging LOB budgets, staff, and resources to extend the reach and impact of IT while raising their visibility and status in the enterprise. The new role of the CIO is not to just manage IT; it's to influence others to manage their slices of IT in ways that create a dynamic and cohesive digital business.
|
10:45
|
Q&A (Ask Questions, Rate Sessions & Stand a Chance to Win Raffle Prizes)
|
10:50
|
Augment Critical Systems with Embedded Intelligence and Automated Technologies to Cope with Skills Shortages
|
|
Hiring talented IT workers with specialized skills has always been a challenge for CIOs. But the intersection of the Great Resignation, aging workforces, new IT disciplines and technologies, and burgeoning amounts of data needing deep analytics to unlock value has introduced new complications. CIOs must view the talent challenge from several intersecting angles. Skills shortages, coupled with rising demands for expertise in digital technologies, AI/ML, and data analytics, mean that CIOs must adopt a blended approach of leveraging technology to automate routine lower-level tasks while using training and development along with machine augmentation to move IT workers up the food chain of work value.
|
11:05
|
Q&A (Ask Questions, Rate Sessions & Stand a Chance to Win Raffle Prizes)
|
11:10
|
Evolution of the Human Species
|
|
Neil Harbisson
The World’s First Officially Recognized Human “Cyborg”
|
11:40
|
Tea/ Coffee & Networking Break
|
12:20
13:25
|
Platinum Partner Tracks (Parallel Sessions)
|
|
Platinum Track A: Shaping CISO Strategies for the Digital-First Organization
12:20 - 12:25
Start of Session Raffle
12:25 - 12:35
Enabling Cyber Security Resilience to keep pace with rapid digitalization and a shifting threat landscape
While the threat landscape shows no signs of slowing down its pace of change and introduction of new threats, organizations require models that ensure the security and resilience of core systems and infrastructure are reliably enforced while remaining sufficiently resilient for future-ready service expectations.
12:35 - 12:40
Q&A (Ask Questions & Stand a Chance to Win a Raffle)
12:40 - 12:50
Modernizing Access to Critical Infrastructure
The traditional approach to access security is outdated and no longer sufficient to address the challenges of today's complex IT environments. You need a newer, modern holistic approach using an intelligent identity and access security solution to secure every privilege, credential, endpoint, and remote access across your organization. What is needed today is a more modern, holistic approach that uses an intelligent identity and access security solution to secure every privilege, credential, endpoint, and remote access across the organization. This insightful discussion will explore the challenges of modern access security in complex IT environments and highlight the significance of dynamic, on-demand access for developers and cloud ops. Discover how you can secure and manage infrastructure access, customized to your unique needs and demands. Gain valuable insights into effective strategies for protecting privileges, credentials, endpoints, and remote access across your organization.
Layale Hachem
Senior Solutions Engineer, BeyondTrust
12:50 - 12:55
Q&A (Ask Questions & Stand a Chance to Win a Raffle)
12:55 - 13:05
Moving to the Cloud Securely with DevSecOps
Cloud technologies can bring great advantages from cost savings, to resilience, but these benefits can also come at a cost if every last detail is not managed with security in mind. With products, services, and projects being pushed to the cloud the concept of securing the cloud takes on a whole new meaning and requires innovative strategies.
13:05 - 13:10
Q&A (Ask Questions & Stand a Chance to Win a Raffle)
13:10 - 13:20
Why Intelligent Network Monitoring and Visibility Truly Matter
Today, network, application and security departments are struggling with massive network communication, hidden threats and misconfigurations which allows various vectors resulting in cyber security incidents. Network anomaly detection and response automation, deep network traffic analysis and data collection helps to get better insight into the organization’s current security posture. Why does network visibility really matter and how is it integral to building a resilient security architecture.
13:20 - 13:25
Q&A (Ask Questions & Stand a Chance to Win a Raffle)
Platinum Track B: Data and Platform-Led Strategies for Realizing Digital Outcomes
12:20 - 12:25
Start of Session Raffle
12:25 - 12:35
Navigating Change Management in Digital Transformation
As a digital first approach to business has become the norm and organizations accelerate digital initiatives, increasingly adopt cloud, and modernize their applications using best practices for addressing change management.
12:35 - 12:40
Q&A (Ask Questions & Stand a Chance to Win a Raffle)
12:40 - 12:50
Enterprise Service Management: Today and the Future
Enterprises have increasingly adopted service management to address cross-team requests for standard actions and information. This is expected to accelerate over the next five years, evolving as the interactions of data, people, process, partners, and technology become increasingly complex and unpredictable.
12:50 - 12:55
Q&A (Ask Questions & Stand a Chance to Win a Raffle)
12:55 - 13:05
Taking Your Regulatory Change Management to the Next Level
Legal and compliance teams spend countless hours and substantial costs interpreting regulations and related guidance to ensure their organizations meet regulatory requirements, working closely with IT leaders to meet them. This requires technologies and strategies for modernizing regulatory change management that fit into the organization's overall risk and compliance transformation strategy.
13:05 - 13:10
Q&A (Ask Questions & Stand a Chance to Win a Raffle)
13:10 - 13:20
Marketing Effectiveness and the Metrics That Matter in the Digital-First Era
We have entered a new era of marketing, one that is engaging a digital-first buyer and spurring marketing transformation. CMOs are under pressure to quickly evolve their approach and strategically drive business growth while managing costs. To achieve that, a genuine and value-based collaboration between the CMO and the CIO is critical. Marketing and technology leaders need to be fully aligned on the priorities for portfolio and data investments to deliver speed and agility for both programs and content. The rise of integrated, omni-channel business has moved from experimental to mainstream practices almost overnight. These emerging marketing imperatives will drive the CMO agenda to the heart of the overall digital agenda.
13:20 - 13:25
Q&A (Ask Questions & Stand a Chance to Win a Raffle)
|
13:25
|
Lunch
|
14:25
16:15
|
Technology Focus Group Tracks (Parallel Sessions)
|
|
Technology Focus Group Track A: Cyber Protection for Today, and Tomorrow’s Threats: Dynamic Security Strategies to Minimize Risk
14:25 - 14:30
Start of Session Raffle
14:30 - 14:40
Deploying AI Based Zero Trust Security Policies
Prevention against continuous malware attacks is critical, as is the augmentation of security operations with tools that ensure visibility across the entire estate while deploying prevention-first to safeguard business continuity. Teams are increasingly deploying AI and ML applications in and out of the cloud to ensure organizational cyber resilience via Zero Trust for a sustainable cyber-future of continuous and integrated protection.
14:40 - 14:45
Q&A (Ask Questions & Stand a Chance to Win a Raffle)
14:45 - 14:55
Cybersecurity Policies, Regulations and Compliance
Compliance requirements and cybersecurity are usually intertwined, making close collaboration between IT security teams and compliance teams a necessity. As regulatory frameworks and compliance policies continue to evolve constantly to keep up with digital innovation, teams must stay ahead of the market and work closely with vendors and service providers to ensure they are in full adherence to regulations.
14:55 - 15:00
Q&A (Ask Questions & Stand a Chance to Win a Raffle)
15:00 - 15:10
The Increasingly Complex Task of Cloud Security Services
With the rapid rise in cloud technology investments over the pandemic period, organizations now grapple with securing the additional layers of complex cloud platforms. At the same time, companies have a sustained need for secure cloud migration processes. Security service providers should emphasize their cloud security-focused services to address these needs.
15:10 - 15:15
Q&A (Ask Questions & Stand a Chance to Win a Raffle)
15:15 - 15:25
Extended Detection and Response (XDR) — The Must-Have Security Tool in a Digital-First World
Security operations center (SOC) analysts are taxed to meet the demands of an expanding network surface, investigating alerts, a motivated adversary, and changing tools and tactics used to find indicators of compromise. The extended detection and response (XDR) cybersecurity software stack could be the panacea that brings in telemetry from endpoint, logs, web/email, and threat intelligence on one dashboard. The open questions remain about what else should go onto the stack, if best-of-breed point products can be integrated successfully, and what can be done within compliance frameworks.
15:25 - 15:30
Q&A (Ask Questions & Stand a Chance to Win a Raffle)
15:30 - 15:40
Enhancing the Efficiency and Automation of SOC and Incident Response
When security teams can't see the wood for the trees and the number of security alerts leads to alarm fatigue and sluggish response times, it's time for more automation. Sandboxing-based solutions for the automated detection and analysis of advanced threats open up interesting possibilities here. Originally used as a special tool for incident response and digital forensics, modern sandboxing technologies have now become an important building block for process automation within the security environment. They provide significant integration and automation services and work in close cooperation with security operations technologies such as SIEM, SOAR, EDR, XDR and threat intelligence platforms.
15:40 - 15:45
Q&A (Ask Questions & Stand a Chance to Win a Raffle)
Technology Focus Group Track B: Connecting the Distributed Cloud – From the Edge to the Core
14:25 - 14:30
Start of Session Raffle
14:30 - 14:40
Plotting Your Journey to the Cloud
Most organizations, in their initial forays into cloud computing, have made inroads with the portion of their application or workload portfolio that "easily" lends itself to cloud-based solutions — software-as-a-service (SaaS) CRM or HR solutions, website innovations, and some customer experience innovations — but this is often only a piece of the entire digital infrastructure pie, and the question about what to do with all the remaining application workloads involves major investments, questions about added value, and many complex questions concerning how to deploy the cloud in a way that will avoid future problems.
14:40 - 14:45
Q&A (Ask Questions & Stand a Chance to Win a Raffle)
14:45 - 14:55
Cloud Point of View: Partners and Service Providers
There is no doubt that the future is in the cloud. But for IT leaders, this is only the beginning - as the cloud market matures, it is also becoming more complex. Organizations are turning to multicloud and hybrid strategies, making it imperative to choose the right service provider, operating model, and architecture that allows them to advance their business objectives.
14:55 - 15:00
Q&A (Ask Questions & Stand a Chance to Win a Raffle)
15:00 - 15:10
The Management Trends, Challenges, and Technology Building Blocks for Successful Hybrid Multicloud Environments
The journey to enable digitization through business transformation is exciting yet requiring cautious and methodical strategies to enable a hybrid cloud operating model to optimize cost and complexity and drive competitive value and agility. What are some of the best practices, lessons learnt, and solutions to lay a solid foundation for building your hybrid cloud strategy?
15:10 - 15:15
Q&A (Ask Questions & Stand a Chance to Win a Raffle)
15:15 - 15:25
The Future of Connectedness: Technology Priorities for an Agile Enterprise
Enterprises have been forced to adapt their business and operations to a new state of "normal," shifting from traditional office-based to distributed environments that must still provide the same level of connectivity, security, and efficiency across the organization. Keeping people, processes, applications, and "things" connected is now a focal point for organizations as they transform to adapt to these changing market conditions. Enterprises must have a cloud-driven strategy that keeps critical data in motion and maximizes investments in wireless and virtual networks and connected applications and tools to deliver business outcomes that improve business agility and maintain employee productivity and customer satisfaction.
15:25 - 15:30
Q&A (Ask Questions & Stand a Chance to Win a Raffle)
15:30 - 15:40
Foundational Cloud Services Driving Modern and Edge Application Development
Digital innovators are using foundational cloud services to deliver modern and edge applications because these cloud services enable fast access to innovative technologies along with the scalability, security, and governance capabilities needed in the digital-first world. Learn what platform areas of foundational cloud services are growing fastest and why it is important for organizations as they transform themselves into software innovation factories. Hear about the drivers for foundational cloud services adoption, maturity trends, and how innovative development and DevOps teams are using application development and deployment capabilities to improve the velocity of application delivery for application modernization, cloud-native applications, and edge applications.
15:40 - 15:45
Q&A (Ask Questions & Stand a Chance to Win a Raffle)
|
15:45
16:15
|
For The CIO-By The CIO (Parallel Sessions)
|
|
CIO Panel Discussion: Vendor Selection and Management: Best Practices and What to Look Out For
15:45 - 16:15
For the IT sourcing and procurement professional, demanding workloads and deadlines leave little time for an in-depth review of technology markets and vendors, sourcing best practices, and specific IT investment opportunities and partnerships. This session addresses key sourcing challenges related to digital transformation and the evolving role of vendor management within the enterprise, combined with actionable intelligence on best practice for driving better deals and reducing costs without risking vendor relationships.
Justin Kenny
Chief Operating Officer, CQUR Bank
CIO Panel Discussion: Alignment, Collaboration, and Co-Innovation with Lines of Business
15:45 - 16:15
CIOs need to acknowledge that technology initiatives will increasingly happen outside of the traditional IT organization as LOB executives gain digital savvy and cloud-based apps and services become more powerful and appealing. That means that traditional partnerships with LOB peers become more fragile and difficult to orchestrate. To maintain IT relevance and integration across functions, CIOs should adopt a strategy of building alliances with LOB organizations and ecosystem partners that transcend transactional project-focused efforts to build broad-based and programmatic support for the IT mission and goals.
|
16:15
|
Close of Summit
|