PDF Download October 24-25, 2016 Agenda (PDF)

CIO Summit Africa
October 24-25, 2016

↓ Agenda Key

View detailsKeynote Presentation

Visionary speaker presents to entire audience on key issues, challenges and business opportunities

View detailsExecutive Visions

Panel moderated by Master of Ceremonies and headed by four executives discussing critical business topics

View detailsThought Leadership

Solution provider-led session giving high-level overview of opportunities

View detailsThink Tank

End user-led session in boardroom style, focusing on best practices

View detailsRoundtable

Interactive session led by a moderator, focused on industry issue

View detailsExecutive Exchange

Pre-determined, one-on-one interaction revolving around solutions of interest

View detailsFocus Group

Discussion of business drivers within a particular industry area

View detailsAnalyst Q&A Session

Moderator-led coverage of the latest industry research

View detailsVendor Showcase

Several brief, pointed overviews of the newest solutions and services

View detailsCase Study

Overview of recent project successes and failures

View detailsOpen Forum Luncheon

Informal discussions on pre-determined topics

View detailsNetworking Session

Unique activities at once relaxing, enjoyable and productive

Monday, October 24, 2016 - CIO Summit Africa

7:00 am
-
8:00 am

Registration & Networking Breakfast

8:00 am
-
8:10 am

Welcome Address and Opening Remarks

8:10 am
-
8:55 am

Opening Keynote Presentation

Solidifying the Role Of the CIO

According to CIO Magazines most recent State of the CIO survey, nearly 50% of CIOs feel that they are still viewed as order takers, or executors of other peoples visions, while only 25% say that they are recognized as true business peer and strategic game changer. Compounding this issue is the expansion on the C-Suite with roles such as the Chief Digital Officer, the Chief Marketing Officer, and the Chief Data Officer; roles that are being filled by tech savvy digital natives who are challenging the reach and the relevance of the CIO. To survive and subsequently prosper CIOs must invest in three areas " building an innovation center of excellence, breaking the keeping-the-lights-on operational spend cycle, and migrating the IT department away from cost center towards value center.

Takeaways:

  • Learn what an innovation culture looks like and how to build one
  • Understand how the operations spend cycle can be broken with disruptive technology
  • Determine what unique areas of value IT can offer to become a business driver

9:05 am
-
9:35 am

Executive Exchange

Thought Leadership

From Monitoring To Monetization With The Data Lake
The rise of big data, the ubiquity of always-connected mobile devices, the power of social networking and the new capabilities enabled by cloud computing are reshaping industries, redefining experiences and fortifying sustainable businesses. IT and Business leaders recognize that the convergence of new technological capabilities and customer expectations have ushered in a fundamentally new reality for businesses looking for ways to mine the potential value of their customer, product, brand or operations. This highly animated session will include live demo's of wearable tech and give you practical ideas for: 

  • Fostering a culture of data-driven decision-making 
  • Understanding how a data lake supports an organization’s business transformation efforts 
  • Accelerating strategic initiatives and big data maturity 

You will leave this session with insight into how to build a roadmap and project charter for a big data solution and highly energised through seeing it in action!

Sponsored by:

View detailsEMCEMC

9:40 am
-
10:10 am

Executive Exchange

Think Tank

Big Data Analytics and the Impact on Fraud

Financial fraud is, unfortunately a huge business, with annual losses so massive that were “Fraud” a country, it would have the fifth highest global GDP. While enterprises in the financial services sector have always used analytical processes to detect and limit those losses, as technology moves forward the analytical capabilities that can be brought to bear increase in exponentially in capability and those on the leading edge are able to see, and stop, more fraud in less time. Just as Big Data capabilities are bringing significant business benefit to other aspects of the business, they can to fraud mitigation but several challenges need to be overcome for maximum efficiency. Only by addressing quality, volume, security, and integration challenges and by further ensuring the right staff with the right skills are in place can benefits actually be realized. 

Takeaways: 

• The increased use of unmanned technology combined with ever quicker financial transaction processing has created a world ripe for the proliferation of fraud 

• In a “fight fire with fire” approach, those same machine learning approaches can be repurposed to analyze transactions looking for the needle in the needlestack that is the illicit one 

• A Big Data approach only works with the right foundation; garbage in garbage out has never been more true and data and process rigor is essential to success

Think Tank

Avoiding ERM for the Sake of ERM

In many ways ERM, or Enterprise Risk Management, has become just another buzz word that is bandied around without any clear understanding of it’s meaning, any clear understanding of it’s value, or any clear understanding of how it can be achieved. ERM is not a project or a task on a list to be checked off. Instead it is a fundamental change in how an enterprise approaches the way it conducts it’s business to ensure that all possible impacts to it’s capital and earnings are identified, quantified, and mitigated. Such a sweeping paradigmatic shift isn’t something that can be taken on lightly and enterprises seeking to just place a check mark next to a to do list line item will be sorely disappointed in their results. 

Takeaways: 

• ERM is a way of life, not a one-time effort and the only way to value is to come to that realization early 

• To be successful, an ERM deployment must be sponsored from the top and have the involvement of every level and every department 

• Even though ERM initiatives are all-encompassing it’s best to start small; trying to boil the ocean is the surest way to failure and loss of good will and buy-in

10:15 am
-
10:30 am

Networking Break

10:35 am
-
11:05 am

Executive Exchange

Thought Leadership

Data Fabric Enablement

Data fabric is the utilization of one interface/operating platform across all data. Customers enjoy having a common interface that enables a unified view of data allowing for increased transparency. As the widespread adoption of virtualization continues, more hybridized systems are being developed. Complexity and implementation are at infancy stages and so scaling and implementing data fabric utilization across multiple channels becomes a challenge. Data fabric enablement provides cross functional transparency, however security measures need to be implemented to mitigate data loss and extraction. 

Takeaways: 

• Data fabric enablement provides cross functional transparency 

• Implementing data fabric utilization across multiple channels is challenging 

• Understanding the increased importance of virtualization, coupled by the adoption will provide insight on implementation

11:10 am
-
11:40 am

Executive Exchange

Think Tank

Implementing Effective Mobile Device Management

Though Mobile Device Management (MDM) has become the de facto mobile computing security platform offering the ability to control devices, and contain critical data, only 50% of organizations have deployed an MDM platform. Not all MDM platforms are equal, nor are the needs of individual adopters. How then should the enterprise make the best of us of the selected tool, ensuring the right level of protection while avoiding the infringement of individual rights? The key to efficient and effective deployment is balancing the protection you need, the capabilities of the tool selected, and the demands to be placed on mobile users. 

Takeaways: 

• Discover the costs and benefits and of MDM deployment 

• Determine the capability differences between common MDM platforms 

• Learn about common deployment patterns; what works and what doesn’t

Think Tank

Data Centric Security

For years the security focus of the enterprise was to build a hardened perimeter at the edge of the network, an impenetrable shell that kept the good out and the bad in. Over the last few years this model has fallen by the wayside. Technologies such as Cloud and Mobility have pushed the enterprise beyond its traditional perimeter while increased levels of partnership have created inroads through that shell. As a result, infrastructure based security is no longer sufficient or appropriate and enterprises everywhere are having to make the shift to a new security paradigm, one that is centered on the data itself, not on the infrastructure that houses it. 

Takeaways: 

• Learn the principles of data centric security 

• Understand the role encryption plays and how it should be integrated 

• Determine when and where data monitoring tools make sense

11:45 am
-
12:15 pm

Executive Exchange

Roundtable

Securing the Mobile Workforce

As enterprise IT is increasingly being delivered by mobile computing platforms, the nature of security threats, as well as the manner in which security is delivered is changing. Mobility pushes computing well beyond the traditional network perimeter meaning not only are new security paradigms are required to protect devices and data from direct threats, but the network itself from threats leveraged through those devices. While traditional security measures aren’t dead, by themselves they are certainly no longer sufficient, and IT departments must invest in new technologies, new processes, and new approaches to ensure sufficient levels of enterprise protection.

Takeaways:

  • Understand the nature and magnitude of the new threat landscape
  • Discover the tools and techniques best suited to address these new threats
  • Learn how to best protect your business in an ever more connected world

Roundtable

Making Mobile Apps Enterprise Apps with Clean Integration

Application integration is a challenging task no matter what the platform being used. Finding a way to have various enterprise applications communicate and work together cleanly and efficiently requires dedication and focus. Mobile apps stand on the precipices of disrupting everything that enterprises have done so far to manage application integration by throwing new platforms, new communication methodologies, new coding languages and new APIs into the mix. As mobile apps increasingly become the primary enterprise apps as opposed to simplified extensions of existing ones, CIOs and IT departments will need to look at application integration with fresh eyes to ensure that both utmost performance and rock solid operability continues to be offered across the entire integrated application suite.

Takeaways:

  • Application integration is a complex challenge at the best of times; the introduction of an increasing number of enterprise mobile apps will only complicate things further
  • Application integration is the key to efficient application, and therefore business, operations and so cannot simply be ignored or pushed to the back burner
  • Businesses that do not tightly integrate enterprise mobile apps with core enterprise applications run significant risks

12:20 pm
-
12:50 pm

Executive Exchange

Thought Leadership

De-Mystifying SDN

SDN or Software Defined Networking utilizes processes of engineering data traffic ensuring optimum bandwidth, cost effectiveness, and network adaptability. Understanding this new type of Architecture – and the framework behind use cases is still in that analysis stage for many and so implementation is yet to be instituted. Further understanding behind SDN, accompanied by continued use cases will provide increased insight for enterprises to determine if implementation will expand, increasing overall enterprise process and value. 

 Takeaways: 

• SDN is relatively new framework, understanding key components is crucial 

• Develop insight on scalability, network adaptability, and security measures to properly implement SDN architecture 

• Understand how SDN integrates with IT Architecture, accompanied by adoption

12:55 pm
-
1:55 pm

Networking Luncheon

2:00 pm
-
2:30 pm

Executive Exchange

Think Tank

Stop Being a Speed Bump on the Highway of Success: Switch from an Integration to an Innovation Focus

Since almost the very beginning of the IT department, much of the focus of IT professionals has been on integrating systems, applications, and data sets; on tying together the various components of the enterprise to drive single versions of the truth, and streamlined operational capabilities. As IT becomes more complex however, IT Leaders need to find a way to break this cycle or risk becoming mired in ever increasing integration webs, webs that demand 100% of their time and 100% of their budget. Future-proofed CIOs will break this cycle by deploying solutions that are inherently integrated because they are engineered to be integrated from the ground up. With integration a non-issue, these CIOs will be free to focus time and resources on the real challenges of the enterprise: driving growth. 

Takeaways: 

  • Understand the nature of the integration cycle – how it came to be and how problematic it really is 
  • Learn about the new technology paradigms that offer integration out of the box 
  • Develop a plan of attack that will leverage your time and your budget to allow you invest in business value growth

Think Tank

Using Cloud Delivered Services to Enable Business Transformation

As IT leaders begin to make the Cloud an inherent component of their long-term plans, they face the risk of falling into old habits and simply approaching the Cloud from a purely tech-centric perspective. While addressing the technology questions presented by increased Cloud adoption is important, more important is understanding the business enablement opportunities offered by broader Cloud adoption strategies. Innovative CIOs will need to see the Cloud for what it is; a way to change the conversation and focus away from the bits and bytes to an evaluation of what capability enables optimized business initiatives. 

Takeaways: 

• Learn why viewing the Cloud as an alternate technology delivery channel only is career suicide 

• Understand the real value of the Cloud, and that it goes beyond surface metrics like cost savings 

• Develop, instead of a Cloud adoption strategy, a Cloud/Business enablement strategy

2:35 pm
-
3:05 pm

Executive Exchange

Roundtable

Mobile Data Quality

Data quality has long been one of the most challenging issues that IT organizations and the enterprises that are hoe to them have had to deal with. Everyone knows that these data quality issues exist, but the cost and complication of addressing them has pushed them to the back burner. We stand however at a precipice, one that has been brought on us by mobile computing – as more devices enter the hands of more users, more data is being created and consumed, making the data quality issue more pressing, more relevant, and more urgent to solve. IT leaders can no longer ignore data quality issues for the good of their companies and the good of their careers and need to bring this issue to the fore and get it resolved before the avalanche sweeps them under.

Takeaways:

  • Data quality is hard and unappealing and so in many case it is simply not done, or not done effectively
  • Enterprises have been scuffling by with poor data quality capabilities and may be convinced that the situation is manageable
  • Even though data volumes have grown quickly over the last few years, mobility s set to give data volume a near vertical growth curve which will compound and highlight this fundamental issue.

Roundtable

Implementing WiFi Clouds

For businesses to be able to leverage mobility as a communications and interaction medium with customers and potential customers, it must ensure continuous connectivity for their targets. While cellular connectivity is generally excellent in most parts of the country, relying on it means relying on someone else’s infrastructure to provide the connectivity, and someone else’s willingness to pay for the connectivity. Since neither of these can ever be counted on, enterprises must make the dive into providing that connectivity for themselves and build comprehensive wifi clouds that encompass any facilities where they wish to engage with customers and prospects. Wifi networks of this scale require a level of network engineering not commonly seen, while further introducing bandwidth and scalability issues, not to mention those related to security and privacy.

Takeaways:

  • Mobile devices must be networked to extract maximum value, but given size and distribution, reliance of third party networks is unfeasible and unlikely
  • Broad based and redundant wifi clouds will be needed within traditional facilities, but most especially in non-traditional ones
  • Enterprises will have to rethink how they approach wifi networking given device density, device locality, and device connectivity

3:10 pm
-
3:40 pm

Executive Exchange

Thought Leadership

Managing Business Continuity During M&A Activities

Disaster Recovery and Business Continuity Planning can be a taxing exercise at the best of times, particularly when it is the CIO that is expected to assume the mantle of responsibility for ensuring not only the availability of the IT services necessary to support business capabilities, but often those business capabilities themselves. The difficulty increases exponentially during a merger or acquisition because now not only are IT Leaders trying to ensure the availability of the systems they’ve built and the capabilities that rely on them, but those systems and capabilities of the acquired company which they didn’t build, and likely have next to no knowledge of. Also, since frequency of mergers & acquisitions is only increasing, the likelihood that the CIO will have to deal with this issue is increasing in lock-step. To ensure that everyone is protected from day one of the merger or acquisition, it is vitally important that IT has a seat at the M&A table, is party to the discussions and planning, and has the financial flexibility to not just tie the two sets of systems together but to extend an umbrella of protection over both. 

Takeaways:

  • Understand how frequently M&A activities are occurring and therefore how real of an issue this is
  • See how much of a compounding factor M&A is on “regular” DRP and BCP initiatives
  • Learn about industry-standard best practices to extend rock-solid BCP protection over a freshly merged entity

3:45 pm
-
4:00 pm

Networking Break

4:05 pm
-
4:35 pm

Executive Exchange

Think Tank

Facilitating Technology-Enabled Business Transformation

The role of the modern CIO is more complex than it has ever been before, not just because the technology landscape has become more complex, but also because increasingly the CIO has had to become a business-focused executive, not just a technologist. Long have we talked about the CIO “getting a seat at the table” but modern businesses are now demanding that their technology impresario join them and leverage his deep and rich technical acumen to allow the organization as a whole to better position itself for market-place success. To be successful, CIOs need to invest in themselves, in their personnel, and in the right technologies to allow them to position the IT department to proactively address business needs as an innovator and driver, rather than order-taker and enabler. 

Takeaways:

  • IT leadership can no longer be simply technology focused, but must instead take their visibility into business process and become business focused
  • A broader business-focus does not preclude maintaining technology excellence however and indeed may demand more of it than ever before
  • Success for CIOs will be measured not in how they can enable enterprise decisions, but in how they can drive growth

Think Tank

Disrupting Markets with Disruptive Technologies

While the combination of Social, Mobile, Analytics, and Cloud have been present and disrupting IT departments and enterprises as a whole for over two years now, in many ways organizations have still not fully embraced them, have still not fully leveraged them. These new platforms allow organizations radically new ways to go to market, allowing for broad scale deployment of systems of engagement that create dynamic relationships with clients and prospects. Finding the resources, wherewithal, and ability to fully commit to these technologies and the capabilities they create has proven to be a struggle for many, but a struggle that can be overcome by leveraging the right partners that bring the right skills and experiences to bear.

Takeaways:

  • Social, Mobile, Analytics, and Cloud are all here to stay; each one adds value to enterprises but collectively that value increases exponentially
  • The manner in which these technologies are implemented, operated, and utilized is different than the foregoing systems of record we are used to
  • Unique skills and capabilities are required to leverage the power and value of these platforms, skills and capabilities that can be in short supply

4:40 pm
-
5:10 pm

Executive Exchange

Thought Leadership

Turn Big Data into Big Opportunity

It has been said that leveraging Big Data is like looking for a needle in a haystack; that the challenge is finding the one piece of insight in the sea of irrelevant data. The truth is there is no irrelevant data just data without initial context or meaning, suggesting the problem in actuality is one of looking for a needle in a needle stack. Compounding this problem is that, to offer maximum value, these insights need to found as quickly as possible lest someone else find the relevance first and exploits the opportunity that goes along with it. IT Leaders need to focus not just on building the toolset that allow the business to find insights, but on building an insight pipeline that finds the relevance and feeds it to business peers.

Takeaways:

  • See that Big Data is an opportunity engine waiting to be exploited
  • Learn to identify the insights the business needs to succeed
  • Understand how to build the capability to find and deliver those insights

5:15 pm
-
6:15 pm

Executive Visions

Overcoming the Data/Privacy Divide

To drive greater focus and flexibility in customer engagement, businesses of all types are investing heavily in customer data capture and customer data analytics capabilities, with mobility-based solutions playing a significant role. As more and more personal data is collected or created however, the specter of privacy issues begin to loom larger and larger. Enterprises need to take a long hard look at the information they are capturing and the manner in which it is being used to determine whether the potential value outweighs the potential risk, and whether the incentive offer to the customer is sufficient to overcome any reticence on their part.

Takeaways:

  • Data privacy is not a show-stopper; customers are willing to share personal information if the payoff is sufficiently worthwhile
  • Not all information gathering needs to be personal and in many cases anonymous aggregated data can be just as instructive, certainly about trends
  • Where information gathering does get personal, opt-in with balancing opt-back-out requirements are essential

6:15 pm
-
7:00 pm

Cocktail Reception

7:00 pm
-
8:30 pm

Networking Dinner

8:30 pm
-
10:00 pm

After Dinner Networking

Tuesday, October 25, 2016 - CIO Summit Africa

7:00 am
-
8:00 am

Networking Breakfast

8:10 am
-
8:55 am

Keynote Presentation

Cloud Cost Containment

Perhaps the single biggest value purported from the cloud is that of cost reduction, the opportunity to drive down sky-high IT costs to either meet mandated spending reductions or to channel freed up funds into innovation and growth initiatives. With monthly per-user pricing, businesses avoid huge capital outlays, but the pricing models are so divergent from what IT departments are used to that it isn’t always easy to determine whether they advertised savings actually measure up, and in surveys respondents rarely indicate their savings were everything they expected them to be. To be able to determine just how cost effective cloud solutions are, CIOs need first to calculate the true per-user cost of alternate solutions, including those already in place. 

Takeaways:

  • Cloud solutions generally do deliver savings, as up to 80% of survey respondents indicate, but rarely at the levels advertised and promised.
  • For an apples to apples comparison, it is essential to know the cost of service of solutions already in place, as well as cloud alternatives
  • Cost containment also means limiting cloud sprawl as well; over-provisioning through uncontrolled growth can rapidly erode any potential savings

9:05 am
-
9:35 am

Executive Exchange

Thought Leadership

Finding Efficiency with Network Service Orchestration

As organizations strive for increasingly higher levels of efficacy and efficiency, the need to streamline and simplify existing complex processes through automation is key. Fortunately technology has advanced to allow for this level of automation, however this means that these advanced network platforms must be adopted, and just as importantly, that internal workflows must be reimagined to take advantage of these capabilities. CIOs cannot simply invest in new technology and expect the problem to be solved but instead must take a comprehensive and holistic view of service provisioning today to ensure they can implement the orchestrated vision demanded of tomorrow. 

Takeaways:

  • As competitive pressure increase within the telecommunications industry the keys to long term success will be flexibility and the ability to react quickly to variable customer demand.
  • New technologies create the opportunity for telcos to offer streamlined and efficient provisioning capabilities to deliver this flexibility
  • Technology alone cannot be relied upon to facilitate this change and processes must be recast in this more dynamic light

9:40 am
-
10:10 am

Executive Exchange

Think Tank

Embracing the Mobile Wallet

There has been much discussion over the last couple of years about the development and adoption of Mobile or Digital Wallets, yet the pace of development and adoption continues to be slow. As Near Field Communications (NFC) becomes more ubiquitous across mobile devices, the discussion of e-Wallet development and adoption will only increase. Will the future be client-side wallets or provider-side wallets, will it be individual wallets offered by individual retailers, or amalgamated wallets offered by consortia?

Takeaways:

  • Adoption rates are currently low with initial indications they may stay that way, with less than 40% indicating they would use an e-wallet
  • Mobile retailing is expected to eclipse $500M in just a few years however, growth that needs greater mobile wallet adoption
  • Retailers need to take a position on mobile wallets now to put themselves in a position to benefit from the growth potential

Think Tank

From Wearables to Embedables

Perhaps the biggest new development in personal fitness and health over the last couple of years has been the rise of wearable fitness trackers such as Fitbits and Fuelbands. These connected smart devices allow a greater level of insight into personal health information, but are only just the beginning in terms of how personal data devices can begin to take an active role in personal and professional health management. Whether it be for simplistic tasks such as monitoring for slip and fall, and more significant ones such as measuring blood and body chemistry as precursors of serious injury or affliction, wearables are poised to take healthcare to realms never before thought possible and every associated IT department needs to be ready for the data influx.

Takeaways:

  • The wholesale adoption of wearable connected for devices by the population at large bodes well for future investments in healthcare related IoT initiatives
  • As the costs of personal healthcare in the US continues to skyrocket, systems that allow for more timely detection of illness provide strong opportunity to more actively manage not just health, but health cost
  • Wearables align well with government mandates such as Accountable Care, but someone needs to manage the data flow

10:15 am
-
10:30 am

Networking Break

10:35 am
-
11:05 pm

Executive Exchange

Thought Leadership

Multi-Platform Mobile Development

As enterprises take that deep dive into mobile computing, they move from simply allowing mobile devices into their environment towards leveraging those devices to fulfill roles and functions otherwise unaddressable by traditional devices. This means developing and deploying apps, but things aren’t as simple as “write once, publish many”. Leaving the issue of platform variability to the side, one of the biggest issues in app development is form factor differentiation and the clearest expression of that issue is the difference between smartphones and tablets. While Android co-founder Andy Rubin is on record as saying form factor should have no bearing, there is a strong body of evidence that says apps should be developed differently for different devices if the goal is the utmost usability and productivity. As IT leaders invest more heavily in mobile application development, this is an issue that requires significant deliberation to ensure development time and money is not squandered.

Takeaways:

  • Tablets are not simply Smartphones made bigger; they are unique devices with unique properties and unique capabilities
  • Users do not use tablets and smartphones to do the same things because they way they interact with them is different
  • Mobile development needs to determine if distinct tablet and smartphone apps are required by understanding use cases and device capabilities

11:10 am
-
11:40 am

Executive Exchange

Think Tank

Addressing a Future Spectrum Shortfall

While wireless usage rates have increased to the point that they now eclipse wireline usage rates, studies sow that over the last few years voice traffic over wireless has declined by roughly 20% and is predicted to continue to decline into the future. At the same time however, data traffic has exploded with 8 fold growth between 2005 and 2013, and exponential growth projected for the foreseeable future, the net result being that spectrum demand very shortly predicts to outstrip spectrum supply. Waiting on legislators to provide additional spectrum will be market suicide and leading organizations will need to invest in solutions that leverage the real technology available today rather than the theoretical spectrum available tomorrow.

Takeaways:

  • Explosive growth in connected handsets and data volume through those handsets is putting intense pressure on telcos to provide bandwidth
  • Waiting on legislators is a fools game – even if spectrum is made available, consumption growth by threat by that point will overwhelm new space
  • Spectrum splitting, wifi clouds, and demand management are just some existing technologies than can be used now to establish a leadership position

Think Tank

Defending The Dual Threat to Carriers of Mobile Security

As mobile devices continue to proliferate, security becomes a bigger and more serious issue. While initial security threats were contained to data loss through lost and stolen devices, the leveraging of targeted cyber security threats has created a dual problem for carriers. The first is the PR nightmare of increasing public perception that mobile security breaches of all types are a carrier and not end user issue. The second is the threat that hundreds of millions of powerful connected devices represent to backbone carrier networks themselves. In this environment mobile providers must make investments in security technologies that protect the network from directed threats (from both known and unknown connections) and extend that protection bubble out to subscribers.

Takeaways:

  • A recent study shows that subscribers are more than twice as likely to feel that mobile security is a carrier issues than a personal issue
  • As in-circulation handsets are increasingly becoming smart phones instead of feature phones telcos are effectively hosting hundreds of millions of threat vectors to their networks on their networks
  • Astute IT leaders will realize that these dual problems can and must be dealt with by a single security solution

11:45 am
-
12:45 pm

Executive Visions

Mobility and the Internet of Things

In many ways mobile devices are the original IoT device since they offer both the ability to capture sensory information (through accelerometers and GPS trackers) while providing always on, always available connectedness. And while “true” IoT is more focused on low power, low complexity devices feeding information to centralized aggregators, and executing commands based on feedback from those aggregators, existing mobile devices will continue to have a significant role to play by acting as localized personalized aggregators and information conduits keyed to the needs and wants of specific individuals. These devices can become the storing house of information collected from us (such as health information) and about us (such as personnel preferences), and the tool that acts as the conduit of all outbound and inbound communications flows from other smart devices. Indeed, as IoT becomes more pervasive, the role of personal mobile computing devices only becomes more important.

Takeaways:

  • Those looking to invest in public facing IoT deployments should plan now to make use of personal devices as a communications conduit
  • Open programming and communications standards that allow IoT devices to communicate with multi-platform mobile devices will be the key to success
  • As IoT technologies become more pervasive, and interact more consistently with personal mobile devices, privacy issues will come even further to the fore – businesses should prepare for these issues before they even arise

12:45 pm
-
12:50 pm

Thank You Address and Closing Remarks

12:55 pm
-
1:55 pm

Grab and Go Luncheon