PDF Download October 24-25, 2016 Agenda (PDF)

CIO Summit Africa
October 24-25, 2016

↓ Agenda Key

View detailsKeynote Presentation

Visionary speaker presents to entire audience on key issues, challenges and business opportunities

View detailsExecutive Visions

Panel moderated by Master of Ceremonies and headed by four executives discussing critical business topics

View detailsThought Leadership

Solution provider-led session giving high-level overview of opportunities

View detailsThink Tank

End user-led session in boardroom style, focusing on best practices

View detailsRoundtable

Interactive session led by a moderator, focused on industry issue

View detailsExecutive Exchange

Pre-determined, one-on-one interaction revolving around solutions of interest

View detailsFocus Group

Discussion of business drivers within a particular industry area

View detailsAnalyst Q&A Session

Moderator-led coverage of the latest industry research

View detailsVendor Showcase

Several brief, pointed overviews of the newest solutions and services

View detailsCase Study

Overview of recent project successes and failures

View detailsOpen Forum Luncheon

Informal discussions on pre-determined topics

View detailsNetworking Session

Unique activities at once relaxing, enjoyable and productive

Monday, October 24, 2016 - CIO Summit Africa

7:00 am
-
7:55 am

Registration and Networking Breakfast

8:00 am
-
8:10 am

Welcome Address and Opening Remarks

Presented by:

View detailsJames Quin, VP, Events , CDM MediaCDM Media

8:10 am
-
8:50 am

Keynote Presentation

Moving from Operations to Transformations

The accepted number for the amount of the IT budget that is tied up in operational spend, in paying to maintain technology that has already been purchased, is 80% leaving only 20% for the IT department to use to drive new projects. Because this level of funding is so low, as much as 70% of IT sponsored projects fail. Yet IT departments are being constantly pushed to be innovative, to find a way to embrace new technologies and leverage them to drive business change. How can you do that when your time, money, and effort goes to just keeping the lights on? Join us as we collectively explore this issue and examine some of the successful strategies that are being leveraged by top IT leaders.

Takeaways:

  • The pressure on CIO’s to drive change has never been higher, but fortunately neither has the opportunity to do so
  • Disruptive technologies don’t just have the power to disrupt IT for the worse, they have the power to disrupt the business for the better
  • Fortune favors the bold; now is the time to take a leap into new modes of business to break the operational spend stranglehold

8:55 am
-
9:35 am

Keynote Presentation

Becoming A Service-Oriented Enterprise

Many organizations are discovering that adopting service catalogues, curated collections of business and IT services, can both enhance IT-business relationships (by clearly outlining capabilities and expectations as well service costs) and improve operational competency (by standardizing service offerings). Service catalogues are only as useful as their accuracy however and a service catalogue with service levels that cannot be met can in many have a greater negative impact than not having a service catalogue at all. To ensure that service levels are set appropriately it is important to understand the capabilities of the people, processes, and tools that underlie them and this requires measurement up front to eliminate guess work.

Takeaways:

  • Service catalogues have a demonstrated value within enterprises to manage costs, improve service delivery, and enhance relationships
  • As important as service definition is to success, service level definition may be even more so to avoid “over-commit, under-deliver” situations
  • Without good performance metrics, the kind derived from an IT Service Optimization platform, establishing appropriate service levels is nothing more than a shot in the dark with a low probability of success

9:45 am
-
10:15 am

Executive Exchange

Think Tank

Preparing for a Wireless Broadband Future

Perhaps no technology has defined the rapid proliferation and adoption of information technology more than broadband Internet. While IT certainly existed long before broadband Internet came along, this singular technological advancement has allowed for greater information sharing due to greater levels of interconnectedness. It is partially why Western economies have boomed while African economies scuffle. The cost and complexity of wireline infrastructure has long held Africa back but advancements in wireless technologies, specifically 4G and proposed 5G technologies promise to rewrite this bleak history by making reliable and cost-effective broadband a reality. While much work is still to be done, IT executives can expedite efforts by leveraging self-managed 4G infrastructure for communications between sites across distance.

Takeaways:

  • Broadband availability in Africa is limited by distribution, reliability, and cost and relying on wireline infrastructure to address these concerns is a fool’s game
  • Wireless technologies have finally reached the level of sophistication and speed that they can supplant wireline as viable options
  • Though wireless infrastructure is still sparse and costs still high, expect significant investment in the coming years to address both issues

Think Tank

Making ITIL Work – Moving Beyond Frameworks and Getting to Action

In order to deal with the increasing pressure to increase service delivery, service efficiency, and service effectiveness, IT departments are adopting the ITIL framework. While ITIL adoption has lots of press around the benefits that it can deliver, it doesn’t do so without hard work, and it doesn’t do so without the tools that activate, measure, and validate adopted frameworks and processes. In order to achieve the four goals of ITIL adoption – reduced cost of operations, improved service delivery, improved user satisfaction, improved compliance – IT leaders need to be prepared to move beyond just the process and invest in the technology solutions that make them work.

Takeaways:

  • IT departments are under increasing pressure to improve effectiveness and help overcome core business challenges
  • Standardized process frameworks, such as those provided by ITIL, are a tried and true way to become more effective
  • Frameworks by themselves are about as useful as the paper they are written on and tools are required to make them work

10:20 am
-
10:50 am

Executive Exchange

Thought Leadership

From Monitoring To Monetization With The Data Lake

The rise of big data, the ubiquity of always-connected mobile devices, the power of social networking and the new capabilities enabled by cloud computing are reshaping industries, redefining experiences and fortifying sustainable businesses. IT and Business leaders recognize that the convergence of new technological capabilities and customer expectations have ushered in a fundamentally new reality for businesses looking for ways to mine the potential value of their customer, product, brand or operations.

This highly animated session will include live demo's of wearable tech and give you practical ideas for:

  • Fostering a culture of data-driven decision-making
  • Understanding how a data lake supports an organization’s business transformation efforts
  • Accelerating strategic initiatives and big data maturity

You will leave this session with insight into how to build a roadmap and project charter for a big data solution and highly energised through seeing it in action!

Sponsored by:

View detailsEMCEMC

10:55 am
-
11:25 am

Executive Exchange

Roundtable

Defining Data Governance

Data volume, data variety, and data velocity have all grown exponentially over the last few years, the so-called “Big Data” explosion. And while this increased organizational focus on data, the information it contains, and the insights that can be gleaned from it promises tremendous opportunity, that opportunity isn’t achieved without overcoming significant challenges. Whether it be the increased need for better data quality (an issue unresolved from the “small” data days), more efficient and effective data management, answering questions around data ownership vs. stewardship, or even increased regulatory pressure as a result of data security and data privacy, this increased focus on data has created an increased need for Data Governance. Join our panelists as we discuss the thorny issue of Data Governance: what it is, how it works, why you need it, and who should be responsible for it.

Takeaways:

  • Data management issues have existed as long as data has existed but the Big Data boom has increased these challenges exponentially
  • Resolving data management issues requires a strong data governance program to make rules, resolve issues, and enforce compliance
  • Determining “what” to about data governance is the easy part, determining how and by whom it should be done will be the real challenge facing IT

Roundtable

Multi-Platform Mobile Development

As enterprises take that deep dive into mobile computing, they move from simply allowing mobile devices into their environment towards leveraging those devices to fulfill roles and functions otherwise unaddressable by traditional devices. This means developing and deploying apps, but things aren’t as simple as “write once, publish many”. Leaving the issue of platform variability to the side, one of the biggest issues in app development is form factor differentiation and the clearest expression of that issue is the difference between smartphones and tablets. While Android co-founder Andy Rubin is on record as saying form factor should have no bearing, there is a strong body of evidence that says apps should be developed differently for different devices if the goal is the utmost usability and productivity. As IT leaders invest more heavily in mobile application development, this is an issue that requires significant deliberation to ensure development time and money is not squandered.

Takeaways:

  • Tablets are not simply Smartphones made bigger; they are unique devices with unique properties and unique capabilities
  • Users do not use tablets and smartphones to do the same things because they way they interact with them is different
  • Mobile development needs to determine if distinct tablet and smartphone apps are required by understanding use cases and device capabilities

11:30 am
-
12:00 pm

Executive Exchange

Roundtable

Planning for a MultiCloud Future

The promise of the cloud is almost beyond compare; infinite computing resources, unmatched reliability and uptime, instantaneous service availability, simplistic self-service and provisioning, and the low-low prices of a “buy by the drink” model. These are the reasons behind the rush to the cloud that we are currently experiencing, but the wholesale adoption does bring a downside – as more and more capability is moved to the cloud, more and more cloud providers are utilized since, for the most part, each provider offers only a limited suite of services. The MultiCloud environment that creates a new set of challenges that IT leaders need to overcome, notably resiliency, interoperability/integration, and security and compliance through careful planning and the lessons learned from building complex on premise distributed systems.

Takeaways:

  • As enterprises move to the cloud, MultiCloud environments will increasingly become the norm, not the exception
  • Consistent planning and thoughtful architecture will be essential to efficient and effective cloud deployments
  • IT leaders do not need to be alarmed, they’ve been down the complex environment path before, but they do need to be careful

Roundtable

Identity and the New Age of Enterprise Security

From a technology standpoint, as a “society” the world of business has gone through two distinct stages in the evolution of its information security focus. The first addressed network based protection and preventative controls such as firewalls and anti-malware. The second looked at data-centric and detective controls such as encryption and intrusion/extrusion monitoring. Since breaches continue to occur at a record pace, what is need new is clearly a new evolution, one that pushes towards individual focused security through granular user monitoring and management as provided by solutions such as Identity and Access Management. While IAM isn’t a new technology field, it is one whose time has come and CISO need to begin investing in modern-day, light-weight, easy to implement IAM solutions now to stay ahead of the curve, and reduce enterprise threats. 

Takeaways: 

• The breach onslaught demonstrates that existing security solutions are incapable of defending current threats 

• Enterprises need to begin looking at security from an activity perspective rather than an artifact perspective 

• IAM provides activity insight, and therefore threat awareness, no other platform can equal

12:05 pm
-
12:35 pm

Executive Exchange

Think Tank

IT’s Role in Self-Generated Electricity

Power delivery in sub-Saharan Africa is spotty at best and the impact that this can have on IT delivery is significant; if power cannot be relied upon, in many case service can’t be delivered. Technological advances however are making self-generation increasingly feasible, even in far-flung locales. Though self-generation is still in its early phases in even technologically advanced locations like the western United States, it’s promise of not just cheap, but reliable power delivery could have the biggest impact in areas like Africa where public utilities don’t have the stability to meet enterprise IT demands. IT leaders need to be working with business partners now to investigate and begin the implementation of self-generation capacity to allow technology adoption to flourish.

Takeaways:

  • Distributed or self-generation is set to become a robust market the world over and while the price stability it offers mature markets is a nice to have the delivery stability it offers to immature markets is a must have
  • Initial investments in self-generation capability do not need to be bank-breaking; costs have come down radically in the last few years
  • IT will be the biggest beneficiary of self-generation and so CIOs need to take the lead in pushing for these projects.

Think Tank

Letting Go: A First Timer’s Guide to Sourcing

For those that have not yet entered into a sourcing relationship, it often seems that the hardest work occurs up front, in the time before the contract is signed, when differing models, differing capabilities, and differing partners all must be carefully weighed, evaluated and selected from. It is the next phase the “Transition and Transformation” phase that occurs thereafter wherein the enterprise actually undergoes the sourcing migration that often proves the most troublesome however and it is here that the real challenges are exposed and must be overcome. Understanding this journey, and the steps on the path, by sharing in the experiences of others, is key to ensuring that the time between contract signature and complete migration is smooth, quick, and event free.

Takeaways:

  • Reaching a go/no-go decision on a sourcing relationship is not the end of the journey; indeed, it is just the beginning
  • The time between contract signature and service turn-up can typically take as much as a full year
  • That year is critical because it is foundational for how the partnering relationship is established and works for the life of the agreement

12:40 pm
-
1:40 pm

Networking Luncheon


1:45 pm
-
2:15 pm

Executive Exchange

Think Tank

Disaster Recovery and Preparing for the Inevitable

Like death and taxes, IT outages are an inevitability whether as the result of power loss, telecommunications outage, or any one of a myriad other potential technical and non-technical issues. In this environment, the savvy CIO knows that what matters most is preparation – being ready for that next outage with an IT infrastructure that is both resilient and flexible and Disaster Recovery procedures that allow for efficient and effective recovery, balancing Recovery Time and Recovery Point objectives with appropriate cost. Disasters happen but with proper planning they don’t have to be disastrous to your business.

Takeaways:

  • In the event of a severe outage, businesses without a Disaster Recovery plan are at a significant disadvantage when it comes to recoverability and viability
  • DR planning cannot be an “at all costs” proposition and appropriate planning must take into account reasonable Recovery Time and Recovery Point objectives
  • Catastrophic outages get the press but are the thin end of the wedge – minor service interruptions are far more common and must be planned for as well

Think Tank

NFV and SDN – Building the Network of the Future

Cloud has changed the way we build back-end systems, mobility has changed the way we build the front end too, and now the combination of Network Functions Virtualization (NFV) and Software Defined Networking (SDN) is going to change the way we build networks. By allowing for the separation of control plane and data plane while simultaneously migrating both of those pieces to inexpensive commodity hardware we allow for the creation of more redundant, more dynamic, more efficient, and far less costly networks, eliminating a major bottle-neck to IT and service innovation. CIOs must begin investigating and implementing these technologies now to ensure they are on the leading edge of service delivery.

Takeaways:

  • The traditional way of building networks is archaic and its lifespan limited – NFV and SDN promise far greater flexibility of cost effectiveness
  • These technologies are admittedly early phase, but so were cloud and mobility when they began radically changing the technology landscape
  • Now is the time to begin to invest in pilot projects, to develop the knowledge and skills necessary to leverage the technologies as they mature

2:20 pm
-
2:50 pm

Executive Exchange

Thought Leadership

Big Data, Small Data, and all the Data in Between

Increasingly over the last several years the term “Big Data” has become prevalent, to the point that it is invariably all anyone thinks of when data is mentioned at all. Often what we think of when we use the term “Big Data” is actually unstructured data – all the new data forms that enterprises have never collected before and are being overwhelmed by the possibilities of. But big/unstructured data is by no means the only data enterprises have and core structured or “small” data is often still the most relevant and valuable data an enterprise owns. As we collectively push forward into a more analytics-centric and therefore data-centric world what we need is a considered all-data strategy, one that incorporates big data, small data, master data, and meta data.

Takeaways:

  • While Big Data is valuable, so is the rest of the data that an enterprise owns and consistent focus must be applied to all data forms and types
  • A holistic data strategy that considers and the balances the needs of all data structures, types, needs, uses, and owners is essential for efficient and effective data operations
  • For business that have not yet invested in Master Data Management, such a program is the ideal foundation for building a comprehensive data program

2:55 pm
-
3:25 pm

Executive Exchange

Roundtable

Embrace the Cloud: Adopting a Brokerage Model

The allure of the Cloud is three-fold: the widely seen benefits are reduced cost, increased flexibility, and enhanced time to market. As a result, business are rushing to the Cloud in ever increasing droves. In many cases, however, the rush is omitting the IT department until it is too late, and the specter of incompatible data and communications standards, of an inability to integrate with existing on-premise systems hangs over these deployments. To combat these issues, IT leaders need to recognize the value provided by the Cloud and develop a brokerage model whereby IT can direct business peers to the right Cloud delivered service.

Takeaways:

  • Learn what the benefits of the cloud are, and why estimates are being missed
  • Understand the drivers of these misses and why they are a problem
  • Determine the best approach for IT to take to head those problems off while offering an even higher level of service and value

Roundtable

Making Mobile Apps Enterprise Apps with Clean Integration

Application integration is a challenging task no matter what the platform being used. Finding a way to have various enterprise applications communicate and work together cleanly and efficiently requires dedication and focus. Mobile apps stand on the precipices of disrupting everything that enterprises have done so far to manage application integration by throwing new platforms, new communication methodologies, new coding languages and new APIs into the mix. As mobile apps increasingly become the primary enterprise apps as opposed to simplified extensions of existing ones, CIOs and IT departments will need to look at application integration with fresh eyes to ensure that both utmost performance and rock solid operability continues to be offered across the entire integrated application suite.

Takeaways:

  • Application integration is a complex challenge at the best of times; the introduction of an increasing number of enterprise mobile apps will only complicate things further
  • Application integration is the key to efficient application, and therefore business, operations and so cannot simply be ignored or pushed to the back burner
  • Businesses that do not tightly integrate enterprise mobile apps with core enterprise applications run significant risks

3:30 pm
-
4:00 pm

Executive Exchange

Roundtable

Cloud, Crowd, Content: Changing the Big Data Game

It’s no secret that Big Data is a big deal, but just how big is it? Some estimates show that while we have a massive 2 Zettabytes under collective corporate management, that this represents one ten thousandth of a percent of the data that has been created. Fortunately, those other “nexus” technologies are providing the opportunity to make use of these untapped data resources – mobile is providing a ubiquitous input channel, cloud a dynamically scalable processing capability, and social the community involvement to process and find value. Leveraged well Big Data can solve a wealth of corporate challenges, ranging from improving efficiency, through mitigating risk, to actually growing bottom line revenue.

Takeaways:

  • Understand how big Big Data really is and where the value to your organization lies
  • Learn what problems Big Data solves and how it achieves value
  • Be challenged to think about the future of Big Data in your organization

Roundtable

IoT and IT/OT

One of the key areas for early IoT projects is in the area of industrial automation, as an extension of existing, older M2M type technologies. In many cases these older industrial automation initiatives used proprietary communications protocols and dedicated sensors that interfaced with controllers that could manage communications between IT and OT platforms. Fast forward to an IoT world however and these sensors and controllers will need to natively speak IP, natively integrate to back-end enterprise systems beyond just simple controllers, systems such as ERP, BI and other core platforms. Navigating the complexity of process, data, security, and functionality implications has the potential to be a minefield for the unwitting IT executive that goes in without eyes wide open.

Takeaways:

  • IT/OT integration is a low-hanging fruit area for IoT adoption
  • Existing investments into older M2M IT/OT integrations however can erode any potential value
  • Before investing in IoT enabled IT/OT integration careful consideration must be made of the implications and whether value can be realized – does the investment justify the returns over what is already in place?

4:05 pm
-
4:35 pm

Executive Exchange

Think Tank

Addressing the Impact of Geopolitical Instability

For significant portions of its history, Africa has faced overwhelming political instability, unsurprising given the ethnic diversity, the waves of colonization, and the distribution of wealth. This instability is bad for not only the people that call Africa home, but also the businesses as it lowers confidence and limits investment in both people and infrastructure. Lowered investment in turn leads to lowered operational capability and lowered returns creating a lose-lose situation where bad goes to worse. Fortunes for businesses however may be turning as new phase disruptive technologies such as cloud (for infrastructure and applications), mobility (for telecommunications and end user interfaces) and social (for ready access to non-local expertise and knowledge) stand ready to bypass the issues tied to political unrest. CIOs must look quickly to these disruptive technologies to facilitate a phase shift in IT approach to allow their businesses to become more capable, more responsive, and more effective.

Takeaways:

  • The political climate in Africa has long repressed the investment necessary to spur the economic growth that could in turn quell some of the instability
  • Disruptive technologies require significantly less investment while radically driving down the potential of infrastructure loses
  • Businesses stand at the brink of ushering in a new era of productivity for Africa, one that will be driven economically rather than politically, and technology will be its basis

Think Tank

Leadership Considerations in a Multi-Generational World

Executives are currently facing a difficult challenge in terms of personnel management because they are dealing with three very different generational groups of workers – Baby Boomers, Gen Xers, and Millennials. These three groups all have very different outlooks on the world and on work, and all have very different work styles and capabilities. These differences lead to lack of understanding and conflict in a lot of cases, conflict that leaders must learn how to overcome. Smart leaders know that they need to leverage the differences between generations rather than expecting, and trying to force, everyone to be the same, and that building an integrated workforce, with complimentary skills and abilities, is the key to long-term workforce stability.

Takeaways:

  • Boomers (1946 to 1964), Gen Xers (1965 to 1980), and Millennials (1981-2000) have had different life experiences which has given them different outlooks
  • Each group has specific and unique strengths that can and should be brought to bear to improve the enterprise
  • Building an integrated team that recognizes and rewards differences yields greater success than trying to homogenize everyone to the same standard

4:40 pm
-
5:20 pm

Executive Visions

Facilitating Technology-Enabled Business Transformation

The role of the modern CIO is more complex than it has ever been before, not just because the technology landscape has become more complex, but also because increasingly the CIO has had to become a business-focused executive, not just a technologist. Long have we talked about the CIO “getting a seat at the table” but modern businesses are now demanding that their technology impresario join them and leverage his deep and rich technical acumen to allow the organization as a whole to better position itself for market-place success. To be successful, CIOs need to invest in themselves, in their personnel, and in the right technologies to allow them to position the IT department to proactively address business needs as an innovator and driver, rather than order-taker and enabler.

Takeaways:

  • IT leadership can no longer be simply technology focused, but must instead take their visibility into business process and become business focused
  • A broader business-focus does not preclude maintaining technology excellence however and indeed may demand more of it than ever before
  • Success for CIOs will be measured not in how they can enable enterprise decisions, but in how they can drive growth

5:20 pm
-
6:30 pm

Cocktail Reception

6:30 pm
-
8:00 pm

Networking Dinner

8:00 pm
-
10:00 pm

After Dinner Networking

Tuesday, October 25, 2016 - CIO Summit Africa

7:00 am
-
8:00 am

Networking Breakfast

8:10 am
-
8:50 am

Keynote Presentation

The Role of the CIO: Business Challenger, Innovation Driver

Since the inception of the role, the focus of the CIO has primarily been one of Technologist and IT Operations Manager; selecting the tools and services necessary to support the business, and then efficiently and effectively operating them. This is a future of declining organizational value however as technology becomes increasingly democratized and other organizational groups take control over individual systems and data sets. CIOs need to recast themselves instead as Strategists and Business Innovators; leveraging their unique position at the crux of the organization to propose alternatives to the accepted way of doing things, and to drive organizational growth through business alignment and organizational change.

Takeaways:

  • CIO’s are at a fork in the road; they can continue to be Operational or evolve and become Transformational
  • Transformation efforts cannot stop at the boundaries of the IT department, they must reach into the business as a whole, addressing process and defining new capability
  • Visionary CIOs will move their departments from cost centers to value creators, and move themselves from executive afterthoughts to true organization leaders

8:55 am
-
9:35 am

Keynote Presentation

Implementing Business Simplification for Success and Growth

Organizational complexity is the single most significant impediment that enterprises are dealing with today; it underlies every business problem enterprises faces and undermines every effort to address them. Organizational complexity is grounded in cumbersome processes, but those poor processes exist only because enterprise applications themselves, including those that are customer facing, as well as those that are not, are complex and unwieldy. To address cultural complexity then, enterprises must eliminate the complexity in their application suite by either building new, buying new, or more efficiently simplifying what they already have. Only by simplification can enterprises eliminate complexity in an efficient and effective way and position themselves for success.

Takeaways:

  • Enterprises live and breath by the speed with which regular transactions occur – turning these into one minute transactions is the key to success
  • Complexity must be eliminated in all applications customer-facing, core internal, and internal supporting alike
  • Building or buying new, less complex applications offers limited gains because eventually all introduce complexities of their own; only simplified applications offer long term, sustained elimination of complexity

9:45 am
-
10:15 am

Executive Exchange

Think Tank

Solidifying the Role of the CIO

According to CIO Magazine’s most recent State of the CIO survey, nearly 50% of CIO’s feel that they are still viewed as order takers, or executors of other people’s visions, while only 25% say that they are recognized as true business peer and strategic game changer. Compounding this issue is the expansion on the C-Suite with roles such as the Chief Digital Officer, the Chief Marketing Officer, and the Chief Data Officer; roles that are being filled by tech savvy digital natives who are challenging the reach and the relevance of the CIO. To survive and subsequently prosper CIO’s must invest in three areas – building an innovation center of excellence, breaking the “keeping-the-lights-on” operational spend cycle, and migrating the IT department away from cost center towards value center.

Takeaways:

  • Learn what an innovation culture looks like and how to build one
  • Understand how the operations spend cycle can be broken with disruptive technology
  • Determine what unique areas of value IT can offer to become a business driver

Think Tank

Evolution of the Data Center and the Interconnected Enterprise

Each era of the digital economy has introduced innovations that fostered new forms of interaction; we've gone from connecting machines and people so they can share information to online collaboration and real-time participation. Just as PCs, networks, and Web apps revolutionized previous digital eras, interconnection is this era's game-changer. In the workplace of the future, customers, employees and partners will be dispersed over more geographic locations, using more devices and expecting more than ever, but current IT architectures that were built for a different time are in conflict with many of the core requirements of future computing. An interconnected enterprise directly connects its employees, partners and customers to what they need, in the right context, using the devices, channels and services. The result: extraordinary experiences for your customers, high engagement for your employees, top value for your shareholders and exponential growth for your business.

Takeaways:

  • Organizations today are increasingly focused on achieving growth through new products, services, and markets in an ever-evolving digital economy
  • The rate of business change today is accelerating and technology leaders need to differentiate themselves by reimagining their approach
  • Enterprise that embrace advanced interconnection strategies are discovering that the challenges of growth, speed, scale, security, and engagement can be effectively addressed

10:20 am
-
10:50 am

Executive Exchange

Thought Leadership

Balancing Reactivity and Proactivity in Enterprise Security

As with all things in life, the focus on how to conduct enterprise security ebbs and flows between varying degrees of reactivity and proactivity. In the old school “Security 1.0” world, where the focus was almost completely on network security, efforts were in general proactive in nature with firewalls and anti-malware seeking to prevent threats before they even occurred. This didn’t work so well and so “Security 2.0” focused on reactivity, wrapping things like encryption around the data so that even if a breach occurred, the loss would be mitigated. Yet breaches, and losses, continue to occur. So if primarily proactive security doesn’t work, and if primarily reactive security also doesn’t work, how then do we find the right balance between the two to find a security posture that does work?

Takeaways:

  • Proactive security measures, those that prevent a threat from occurring are valuable and necessary but haven’t proven effective
  • Reactive security measures, those that mitigate a threat that has occurred are also valuable but complicated a limit enterprise efficiency and efficacy
  • A new approach is needed, but is that one that blends techniques or one that finds new approaches (whether they be reactive, proactive, or both)?

10:55 am
-
11:25 am

Executive Exchange

Roundtable

Cloud Adoption Challenges on a Macro Level

The hype around the cloud is pervasive and can be potentially overwhelming but numerous studies have shown that tangible benefits can be had, whether in cost savings, efficiency improvements, or flexibility enhancements. That said numerous impediments exist to not just realizing that value, but even considering adoption; regulatory issues, integration challenges, business process revamp, and a dozen other challenges can halt cloud projects in their tracks before they get off the ground. In this group discussion we’ll explore those inhibitors, understanding which challenges prevent adoption and what can be done to overcome them.

Takeaways:

  • The cloud presents a significant opportunity to organizations and while most have adopted in some form or other, wholesale adoption still lags
  • To realize benefits enterprises must deal with a variety of challenges each one requiring different solutions
  • Industry by industry adoption is constrained for different reasons but do common solutions exist that can resolve issues across the board?

Roundtable

Mobile Data Quality

Data quality has long been one of the most challenging issues that IT organizations and the enterprises that are hoe to them have had to deal with. Everyone knows that these data quality issues exist, but the cost and complication of addressing them has pushed them to the back burner. We stand however at a precipice, one that has been brought on us by mobile computing – as more devices enter the hands of more users, more data is being created and consumed, making the data quality issue more pressing, more relevant, and more urgent to solve. IT leaders can no longer ignore data quality issues for the good of their companies and the good of their careers and need to bring this issue to the fore and get it resolved before the avalanche sweeps them under.

Takeaways:

  • Data quality is hard and unappealing and so in many case it is simply not done, or not done effectively
  • Enterprises have been scuffling by with poor data quality capabilities and may be convinced that the situation is manageable
  • Even though data volumes have grown quickly over the last few years, mobility is set to give data volume a near vertical growth curve which will compound and highlight this fundamental issue

11:30 am
-
12:00 pm

Executive Exchange

Roundtable

Big Data and Analytics at the Scale of Mobility

The explosive growth of data volume and data variety that have characterized this new Big Data era are set to head in a steeper upward trajectory as enterprises collectively begin to exploit the massive data flows that are coming out of mobile devices. As the volume of mobile devices eclipses that of human beings on the planet, just imagine the data volume that can be captured when every device and every individual is streaming a constant set of contextual “status” information. Data growth by itself however is only a small portion of the story, as to have value this data must be analysed in essentially real-time in order to create actionable outcomes.

Takeaways:

  • Big Data today may be big, but every single one of the “v’s” that compose it (Volume, Variety, Velocity, Veracity and Value) is set to increase exponentially as a result of wholesale mobility adoption
  • The ability to analyse, interpret, and find meaning in this vast sea of data will be single biggest differentiator in enterprise success
  • Enterprises will have to walk a fine line when it comes to privacy of the information they collect to ensure the continued ability to do so.

Roundtable

IPv6 Adoption

As IT Leaders, we have all been aware of the impending need to move from IPv4 to IPv6 protocols as the number of available IP addresses withers to next to nothing. Many have deferred this task however, simply making use of private internal address spaces to defer the inevitable work. As IoT becomes a fait accompli however, ignoring the issue is no longer a viable alternative; to be able to connect and access the vast number of public sensors and other IoT devices IPv6 must be adopted wholesale. CIOs that have not yet done so must begin IPv6 migration projects now to ensure that they are not roadblocks to growth and innovation as a result of IoT adoption.

Takeaways:

  • Understand whether to build net new in parallel, or upgrade existing networks
  • Changes will extend beyond just the infrastructure – internal and external applications will be affected as will WAN service providers
  • IPv6 migration is not a trivial effort; significant upfront planning is required and this initiative cannot be handled in a reactionary manner

12:05 pm
-
12:45 pm

Executive Visions

Diversity in IT

The importance technology plays within an enterprise will only continue to gain momentum as more developers, engineers, and programmers enter the workforce. As these segments continue to grow, so does the diversity of the workforce within the technology field. For a field that is severely constrained by a talent and skills gap, this influx of bodies can only be a good thing. Beyond the basic ability to deliver of identified capabilities a diverse workforce, whether cultural or gender influenced offers a whole that is more than the sum of the parts. Finding ways to drive and increase diversity in IT then should be a key focus for every IT executive.

Takeaways:

  • Identify the importance behind diversity in technology, opportunities, and capabilities
  • Discuss the importance of cultivating diversity at the grass-roots level and building post-secondary programs that drive awareness of and interest in IT
  • Understand the hurdles that exist that limit the prevalence of diversity in IT, and what steps must be taken to lower, if not eliminate, them

12:45 pm
-
12:55 pm

Thank You Address and Closing Remarks

Presented by:

View detailsJames Quin, VP, Events , CDM MediaCDM Media

1:00 pm
-
2:00 pm

Grab and Go Luncheon