PDF Download October 25-27, 2015 Agenda (PDF)

CIO Summit Africa
October 25-27, 2015

↓ Agenda Key

View detailsKeynote Presentation

Visionary speaker presents to entire audience on key issues, challenges and business opportunities

View detailsExecutive Visions

Panel moderated by Master of Ceremonies and headed by four executives discussing critical business topics

View detailsThought Leadership

Solution provider-led session giving high-level overview of opportunities

View detailsThink Tank

End user-led session in boardroom style, focusing on best practices

View detailsRoundtable

Interactive session led by a moderator, focused on industry issue

View detailsExecutive Exchange

Pre-determined, one-on-one interaction revolving around solutions of interest

View detailsFocus Group

Discussion of business drivers within a particular industry area

View detailsAnalyst Q&A Session

Moderator-led coverage of the latest industry research

View detailsVendor Showcase

Several brief, pointed overviews of the newest solutions and services

View detailsCase Study

Overview of recent project successes and failures

View detailsOpen Forum Luncheon

Informal discussions on pre-determined topics

View detailsNetworking Session

Unique activities at once relaxing, enjoyable and productive

Sunday, October 25, 2015 - CIO Summit Africa

3:00 pm
-
4:30 pm

Registration & Greeting

4:30 pm
-
6:00 pm

Exclusive CIO Think Tank

6:00 pm
-
7:00 pm

Cocktail Reception

7:00 pm
-
8:30 pm

Networking Dinner

8:30 pm
-
10:00 pm

After Dinner Networking

Monday, October 26, 2015 - CIO Summit Africa

7:00 am
-
8:00 am

Networking Breakfast

8:00 am
-
8:10 am

Welcome Address and Opening Remarks

8:10 am
-
8:55 am

Keynote Presentation

Planning for a MultiCloud Future

The promise of the cloud is almost beyond compare; infinite computing resources, unmatched reliability and uptime, instantaneous service availability, simplistic self-service and provisioning, and the low-low prices of a “buy by the drink” model. These are the reasons behind the rush to the cloud that we are currently experiencing, but the wholesale adoption does bring a downside – as more and more capability is moved to the cloud, more and more cloud providers are utilized since, for the most part, each provider offers only a limited suite of services. The MultiCloud environment that creates a new set of challenges that IT leaders need to overcome, notably resiliency, interoperability/integration, and security and compliance through careful planning and the lessons learned from building complex on premise distributed systems.

Takeaways:

  • As enterprises move to the cloud, MultiCloud environments will increasingly become the norm, not the exception
  • Consistent planning and thoughtful architecture will be essential to efficient and effective cloud deployments
  • IT leaders do not need to be alarmed, they’ve been down the complex environment path before, but they do need to be careful

9:05 am
-
9:35 am

Executive Exchange

Thought Leadership


Sponsored by:

View detailsDimension DataDimension Data

9:40 am
-
10:10 am

Executive Exchange

Think Tank

Keeping an Eye on the Ball - Not becoming an IT shop


Presented by:

View detailsDavid Visser, CIO, Coca-Cola Southern AfricaCoca-Cola Southern Africa

Think Tank

Addressing the Impact of Geopolitical Instability

For significant portions of its history, Africa has faced overwhelming political instability, unsurprising given the ethnic diversity, the waves of colonization, and the distribution of wealth. This instability is bad for not only the people that call Africa home, but also the businesses as it lowers confidence and limits investment in both people and infrastructure. Lowered investment in turn leads to lowered operational capability and lowered returns creating a lose-lose situation where bad goes to worse. Fortunes for businesses however may be turning as new phase disruptive technologies such as cloud (for infrastructure and applications), mobility (for telecommunications and end user interfaces) and social (for ready access to non-local expertise and knowledge) stand ready to bypass the issues tied to political unrest. CIOs must look quickly to these disruptive technologies to facilitate a phase shift in IT approach to allow their businesses to become more capable, more responsive, and more effective.

Takeaways:

  • The political climate in Africa has long repressed the investment necessary to spur the economic growth that could in turn quell some of the instability
  • Disruptive technologies require significantly less investment while radically driving down the potential of infrastructure loses
  • Businesses stand at the brink of ushering in a new era of productivity for Africa, one that will be driven economically rather than politically, and technology will be its basis

10:15 am
-
10:30 am

Networking Break

10:35 am
-
11:05 am

Executive Exchange

Thought Leadership

Best-of-Breed or Consolidated: Principles in Security Architecture Design

When it comes to implementing network security infrastructure there are two schools of thought: use best-of-breed point solutions, or go with all round consolidated platforms. Pros and cons abound for either approach revolving around varying levels of protection, integration, and administrative overhead but the increasing complexity of current security infrastructure is showing a winning approach. Even though consolidated solutions may offer greater benefits in the long run, no one exists in a green-field situation when it comes to network and infrastructure security so careful planning is required to ensure the necessary protection.

Takeaways:

  • The management burden of best-of-breed outweighs performance benefits
  • Consolidated platforms can lead to feature overlap and unnecessary cost
  • Planning is required to maximize coverage but minimize effort and spend

11:10 am
-
11:40 am

Executive Exchange

Think Tank

IT’s Role in Self-Generated Electricity

Power delivery in sub-Saharan Africa is spotty at best and the impact that this can have on IT delivery is significant; if power cannot be relied upon, in many case service can’t be delivered. Technological advances however are making self-generation increasingly feasible, even in far-flung locales. Though self-generation is still in it’s early phases in even technologically advanced locations like the western United States, it’s promise of not just cheap, but reliable power delivery could have the biggest impact in areas like Africa where public utilities don’t have the stability to meet enterprise IT demands. IT leaders need to be working with business partners now to investigate and begin the implementation of self-generation capacity to allow technology adoption to flourish.

Takeaways:

  • Distributed or self-generation is set to become a robust market the world over and while the price stability it offers mature markets is a nice to have the delivery stability it offers to immature markets is a must have
  • Initial investments in self-generation capability do not need to be bank-breaking; costs have come down radically in the last few years
  • IT will be the biggest beneficiary of self-generation and so CIOs need to take the lead in pushing for these projects.

Think Tank

Bridging the Talent Gap: Building the Team of Tomorrow

There is no escaping the fact that the demands on the IT department are changing. Those changes are necessitating changes in the IT department itself and nowhere is this being felt more than in the roles and responsibilities of the IT staff themselves. Complicating this transition is the fact that every IT department is undergoing to change at roughly the same time making the personnel with the requisite skillsets extremely hard to find, and perhaps even harder to retain. Savvy CIOs need to quickly identify which are the hot skills they most urgently require and then build a strategy that allows them to build (train), borrow (outsource), or buy (hire) the right people with the right capability at the right time.

Takeaways:

  • Commit to a talent-first organization which recognizes and rewards the most important asset you have - your people
  • Identify the skills most urgently in need and prioritize their acquisition
  • Determine which acquisition methods needs to be used for which skill to maximize impact and return on investment

11:45 am
-
12:15 pm

Executive Exchange

Roundtable

Trends in Mobile Application Development

When it comes to developing mobile apps there are three clear directions that an enterprise can take – they can develop mobile web apps, they can develop native apps, or they can develop cross-platform apps. All three have pros and cons, strengths and weaknesses such that there is no definitive “right” or “wrong” answers, but there are certainly some developing best practices that need to be taken into account by any organization planning the rollout (or investigating the unsuccessful rollout) of enterprise mobile applications. Knowing the capabilities of the various development techniques, as well as the use case of the app is essential to making the right choice in development methodology.

Takeaways:

  • Mobile web apps are often the easiest to implement, leveraging web developed web dev skills but generally offer the least satisfying end user experience
  • Native apps may feel like the Cadillac solution, offering the richest experience but come with significant cost (money and time) implications
  • Cross-platform apps allow for a dedicated per platform feel without the effort of developing for each device individually but this can lead to lowest common denominator design compromises

Roundtable

“Managing logical access risks to green"

The trouble with sustaining any IT security effort is the volume and the multidisciplinary nature of the remediation task on hand.  Maintaining momentum and focus is challenging at any time, and when IT service delivery issues arise, these quickly overshadow any security improvement efforts.  Once momentum is lost, any improvements made quickly degrade.  The evidence for this is easily found, materialising as repeat findings in audit reports and self assessments - none more frequently raised then issues of access control and account management.  Continuous monitoring is necessary in order to track and sustain improvements and to ensure that any gains are maintained

The risks posed by unmanaged user accounts and their associated access is a very real threat to your organisation. Over the years of implementing identity management and access governance solutions, Ubusha have developed a framework for measuring these risks and providing continuous monitoring of the state of the problem. During this roundtable, Ubusha will present this approach, providing you with the following take-aways:

  • Using the concept of manage to green, how to provide your various stakeholders with a common goal to work towards and an ability for measurable remediation efforts 
  • What the common metrics are that indicate user access risk, including dormant, orphaned, privileged, policy violating and over entitled user accounts and those with risky access profiles 
  • How to regularly and automatically measure these metrics per application
  • How to use a single view of this information to plan and prioritise remediation tasks


Sponsored by:

View detailsUbusha TechnologiesUbusha Technologies

12:20 pm
-
12:50 pm

Executive Exchange

Thought Leadership

Partnering for Success

Enterprise IT is changing; no longer can organizations simply rely on old school systems of record, they are increasingly pressured to implement new school systems of engagement. These two computing paradigms are radically different however and the hybridized computing environment they create looks nothing like what most IT departments are familiar with, and nothing like what they know how to integrate, operate, and manage. To address this shortfall in ability in the face of this monumental and sweeping change, more and more enterprises are realizing they must turn to sourcing partners who can help them not just adopt and integrate these disparate platforms, but use them to revolutionize and transform their businesses.

Takeaways:

  • To be successful in todays dynamic market environment organizations must adopt new engagement-focused technologies
  • These tools are nothing like what has gone before and adopting, integrating, and leveraging them is overwhelming many IT groups
  • Using experienced partners is the key to success in this new world of hybridized computing platforms

12:55 pm
-
1:55 pm

Networking Luncheon

2:00 pm
-
2:30 pm

Executive Exchange

Think Tank

Turning Big Data into Big Opportunity

It has been said that leveraging Big Data is like looking for a needle in a haystack; that the challenge is finding the one piece of insight in the sea of irrelevant data. The truth is there is no irrelevant data just data without initial context or meaning, suggesting the problem in actuality is one of looking for a needle in a needle stack. Compounding this problem is that, to offer maximum value, these insights need to found as quickly as possible lest someone else find the relevance first and exploits the opportunity that goes along with it. IT Leaders need to focus not just on building the toolset that allow the business to find insights, but on building an insight pipeline that finds the relevance and feeds it to business peers.

Takeaways:

  • See that Big Data is an opportunity engine waiting to be exploited
  • Learn to identify the insights the business needs to succeed
  • Understand how to build the capability to find and deliver those insights

Think Tank

Defining Data Governance

Data volume, data variety, and data velocity have all grown exponentially over the last few years, the so-called “Big Data” explosion. And while this increased organizational focus on data, the information it contains, and the insights that can be gleaned from it promises tremendous opportunity, that opportunity isn’t achieved without overcoming significant challenges. Whether it be the increased need for better data quality (an issue unresolved from the “small” data days), more efficient and effective data management, answering questions around data ownership vs. stewardship, or even increased regulatory pressure as a result of data security and data privacy, this increased focus on data has created an increased need for Data Governance. Join our panelists as we discuss the thorny issue of Data Governance: what it is, how it works, why you need it, and who should be responsible for it.

Takeaways:

  • Data management issues have existed as long as data has existed but the Big Data boom has increased these challenges exponentially
  • Resolving data management issues requires a strong data governance program to make rules, resolve issues, and enforce compliance
  • Determining “what” to about data governance is the easy part, determining how and by whom it should be done will be the real challenge facing IT

2:35 pm
-
3:05 pm

Executive Exchange

Roundtable

Securing the Mobile Workforce

As enterprise IT is increasingly being delivered by mobile computing platforms, the nature of security threats, as well as the manner in which security is delivered is changing. Mobility pushes computing well beyond the traditional network perimeter meaning not only are new security paradigms are required to protect devices and data from direct threats, but the network itself from threats leveraged through those devices. While traditional security measures aren’t dead, by themselves they are certainly no longer sufficient, and IT departments must invest in new technologies, new processes, and new approaches to ensure sufficient levels of enterprise protection.

Takeaways:

  • Understand the nature and magnitude of the new threat landscape
  • Discover the tools and techniques best suited to address these new threats
  • Learn how to best protect your business in an ever more connected world

Roundtable

Sponsored by:

View detailsNutanixNutanix

3:10 pm
-
3:40 pm

Executive Exchange

Thought Leadership

Using Cloud Delivered Services to Enable Business Transformation

As IT leaders begin to make the Cloud an inherent component of their long-term plans, they face the risk of falling into old habits and simply approaching the Cloud from a purely tech-centric perspective. While addressing the technology questions presented by increased Cloud adoption is important, more important is understanding the business enablement opportunities offered by broader Cloud adoption strategies. Innovative CIOs will need to see the Cloud for what it is; a way to change the conversation and focus away from the bits and bytes to an evaluation of what capability enables optimized business initiatives.

Takeaways:

  • Learn why viewing the Cloud as an alternate technology delivery channel only is career suicide
  • Understand the real value of the Cloud, and that it goes beyond surface metrics like cost savings
  • Develop, instead of a Cloud adoption strategy, a Cloud/Business enablement strategy

3:45 pm
-
4:00 pm

Networking Break

4:05 pm
-
4:35 pm

Executive Exchange

Think Tank

Data-Centric Security

For year the security focus of the enterprise was to build a hardened perimeter at the edge of the network, an impenetrable shell that kept the good out and the bad in. Over the last few years this model has fallen by the wayside. Technologies such as Cloud and Mobility have pushed the enterprise beyond its traditional perimeter while increased levels of partnership have created inroads through that shell. As a result, infrastructure based security is no longer sufficient or appropriate and enterprises everywhere are having to make the shift to a new security paradigm, one that is centered on the data itself, not on the infrastructure that houses it.

Takeaways:

  • Learn the principles of data centric security
  • Understand the role encryption plays and how it should be integrated
  • Determine when and where data monitoring tools make sense

Think Tank

Disaster Recovery and Preparing for the Inevitable

Like death and taxes, IT outages are an inevitability whether as the result of power loss, telecommunications outage, or any one of a myriad other potential technical and non-technical issues. In this environment, the savvy CIO knows that what matters most is preparation – being ready for that next outage with an IT infrastructure that is both resilient and flexible and Disaster Recovery procedures that allow for efficient and effective recovery, balancing Recovery Time and Recovery Point objectives with appropriate cost. Disasters happen but with proper planning they don’t have to be disastrous to your business.

Takeaways:

  • In the event of a severe outage, businesses without a Disaster Recovery plan are at a significant disadvantage when it comes to recoverability and viability
  • DR planning cannot be an “at all costs” proposition and appropriate planning must take into account reasonable Recovery Time and Recovery Point objectives
  • Catastrophic outages get the press but are the thin end of the wedge – minor service interruptions are far more common and must be planned for as well

4:40 pm
-
5:10 pm

Executive Exchange

Thought Leadership

Implementing WiFi Clouds

For businesses to be able to leverage mobility as a communications and interaction medium with customers and potential customers, it must ensure continuous connectivity for their targets. While cellular connectivity is generally excellent in most parts of the country, relying on it means relying on someone else’s infrastructure to provide the connectivity, and someone else’s willingness to pay for the connectivity. Since neither of these can ever be counted on, enterprises must make the dive into providing that connectivity for themselves and build comprehensive wifi clouds that encompass any facilities where they wish to engage with customers and prospects. Wifi networks of this scale require a level of network engineering not commonly seen, while further introducing bandwidth and scalability issues, not to mention those related to security and privacy.

Takeaways:

  • Mobile devices must be networked to extract maximum value, but given size and distribution, reliance of third party networks is unfeasible and unlikely
  • Broad based and redundant wifi clouds will be needed within traditional facilities, but most especially in non-traditional ones
  • Enterprises will have to rethink how they approach wifi networking given device density, device locality, and device connectivity

5:15 pm
-
6:15 pm

Executive Visions Panel

Moving from Operations to Transformations

The accepted number for the amount of the IT budget that is tied up in operational spend, in paying to maintain technology that has already been purchased, is 80% leaving only 20% for the IT department to use to drive new projects. Because this level of funding is so low, as much as 70% of IT sponsored projects fail. Yet IT departments are being constantly pushed to be innovative, to find a way to embrace new technologies and leverage them to drive business change. How can you do that when your time, money, and effort goes to just keeping the lights on? Join us as we collectively explore this issue and examine some of the successful strategies that are being leveraged by top IT leaders.

Takeaways:

  • The pressure on CIO’s to drive change has never been higher, but fortunately neither has the opportunity to do so
  • Disruptive technologies don’t just have the power to disrupt IT for the worse, they have the power to disrupt the business for the better
  • Fortune favors the bold; now is the time to take a leap into new modes of business to break the operational spend stranglehold

6:15 pm
-
7:00 pm

Cocktail Reception

7:00 pm
-
8:30 pm

Networking Dinner

8:30 pm
-
10:00 pm

After Dinner Networking

Tuesday, October 27, 2015 - CIO Summit Africa

7:00 am
-
8:00 am

Networking Breakfast

8:10 am
-
8:55 am

Keynote Presentation

Using Data & Analytics to Drive Business Transformation

Big Data initiatives have become a reality among almost every company today, however, what we have seen is lots of initiatives have become just science projects and did not deliver on early expectations. This situation needs to reversed quickly because those organizations that are being successful with Big Data and analytics programs are rapidly leaving those that are unsuccessful in their wake. Big Data and analytics has the potential to be transformational for the enterprise, but IT leaders need to be making the right investments, in the right areas, to ensure optimal success. This panel discussion will focus on how to use data and analytics to drive true business success and show some real examples of companies and individuals who made a difference.

Takeaways:

  • Analytics is not a new capability and has always been aligned with the most successful companies
  • The roles of IT and the lines of business are changing when it comes to data and analytics programs
  • The business benefits of analytics programs can be huge but efforts need to be constrained so that they don’t turn into flights of fancy, yet set free enough that they find the “unknown unknowns” that truly drive transformation

9:05 am
-
9:35 am

Executive Exchange

Thought Leadership

Preparing for a Wireless Broadband Future

Perhaps no technology has defined the rapid proliferation and adoption of information technology more than broadband Internet. While IT certainly existed long before broadband Internet came along, this singular technological advancement has allowed for greater information sharing due to greater levels of interconnectedness. It is partially why Western economies have boomed while African economies scuffle. The cost and complexity of wireline infrastructure has long held Africa back but advancements in wireless technologies, specifically 4G and proposed 5G technologies promise to rewrite this bleak history by making reliable and cost-effective broadband a reality. While much work is still to be done, IT executives can expedite efforts by leveraging self-managed 4G infrastructure for communications between sites across distance.

Takeaways:

  • Broadband availability in Africa is limited by distribution, reliability, and cost and relying on wireline infrastructure to address these concerns is a fool’s game
  • Wireless technologies have finally reached the level of sophistication and speed that they can supplant wireline as viable options
  • Though wireless infrastructure is still sparse and costs still high, expect significant investment in the coming years to address both issues

9:40 am
-
10:10 am

Executive Exchange

Think Tank

From the Trenches to the Clouds

The cloud is becoming an increasingly important tool in the toolkit of both IT and the business, whether it be plain-Jane Infrastructure as a Service or highly specialized Software as a Service and as a result is being broadly adopted. However, while provisioning a Cloud service might be a simple as a call and a credit card, successful implementation is a different matter all together and a variety of factors need to be taken into account. To be successful you need to start early, building an adoption plan, selecting the most appropriate solution, managing the implementation with an eye to all the moving parts, and managing the ongoing relationship forcefully but fairly. Place a single step wrong and the benefit and value can be severely compromised.

Takeaways:

  • Without a solid up-front plan, any cloud implementation is going to be, if not doomed to failure, at least doomed to limited success
  • Successful cloud migration means paying attention to technical (how do you integrate apps? Data?) and non-technical (what happens to staff when roles change?) issues alike
  • Hurdles don’t disappear at go-live and ongoing effort is required to ensure early success are sustained throughout the life of the deployment

Think Tank

Mobile Data Quality

Data quality has long been one of the most challenging issues that IT organizations and the enterprises that are home to them have had to deal with. Everyone knows that these data quality issues exist, but the cost and complication of addressing them has pushed them to the back burner. We stand however at a precipice, one that has been brought on us by mobile computing – as more devices enter the hands of more users, more data is being created and consumed, making the data quality issue more pressing, more relevant, and more urgent to solve. IT leaders can no longer ignore data quality issues for the good of their companies and the good of their careers and need to bring this issue to the fore and get it resolved before the avalanche sweeps them under.

Takeaways:

  • Data quality is hard and unappealing and so in many case it is simply not done, or not done effectively
  • Enterprises have been scuffling by with poor data quality capabilities and may be convinced that the situation is manageable
  • Even though data volumes have grown quickly over the last few years, mobility s set to give data volume a near vertical growth curve which will compound and highlight this fundamental issue

10:15 am
-
10:30 am

Networking Break

10:35 am
-
11:05 am

Executive Exchange

Thought Leadership

Cloud, Crowd, Content: Changing the Big Data Game

It’s no secret that Big Data is a big deal, but just how big is it? Some estimates show that while we have a massive 2 Zettabytes under collective corporate management, that this represents one ten thousandth of a percent of the data that has been created. Fortunately those other “nexus” technologies are providing the opportunity to make use of these untapped data resources – mobile is providing a ubiquitous input channel, cloud a dynamically scalable processing capability, and social the community involvement to process and find value. Leveraged well Big Data can solve a wealth of corporate challenges, ranging from improving efficiency, through mitigating risk, to actually growing bottom line revenue.

Takeaways:

  • Understand how big Big Data really is and where the value to your organization lies
  • Learn what problems Big Data solves and how it achieves value
  • Be challenged to think about the future of Big Data in your organization

11:10 am
-
11:40 am

Executive Exchange

Think Tank

Cloud SLAs: Making, Measuring, and Managing

The lifeblood of any cloud relationship is the Service Level Agreement (SLA) upon which it is based – the SLA sets the expectations of both parties and acts as the roadmap for change, whether planned or unplanned. Each SLA has a complex lifecycle that includes three distinct phases – negotiation where the original terms of the agreement are established, measurement where service is actively monitored to ensure agreed upon levels are achieved, and management where deficiencies from and adjustments to initial agreements are acted upon. IT Leaders must take an active role in all phases of the SLA lifecycle to ensure optimal protection for their enterprise.

Takeaways:

  • Without strong SLAs, cloud service level agreements aren’t worth the paper they are written on
  • While many cloud vendors offer only a standard SLA, effort should always be invested in attempting to negotiate an appropriate set of terms
  • SLA work does not end with the negotiation of acceptable terms, in fact that is when the real work begins of ensuring SLA compliance

Think Tank

Shop-Floor Computing and the Impact of Mobility

Shop floor computing is certainly nothing new – ruggedized PCs with specially protected keyboards and touch sensitive screens have been creeping into manufacturing facilities for decades in the name of improving productivity and enhancing efficiency. These ruggedized computers all suffer the same shortcoming however, that being that they are still tied to a single physical location. Thus, while workers may be able to stay on the shop floor to work with these systems rather than retreating to the office, they still aren’t able to be exactly where the work is occurring, or exactly where problems are cropping up. Mobile computing devices on the other hand allow ultimate freedom and flexibility and seek to truly deliver on the promise that shop floor computing has been making for years. IT leaders in manufacturing and other shop floor lead industries need to begin thinking about broad scale mobility adoption and the requisite decisions that accompany that shift.

Takeaways:

  • Shop floor computing has tremendous opportunity to provide efficiency benefits but is hampered by infrastructure limitations
  • Mobile computing overcomes the primary one those limitations but brings a new set of challenges with it
  • IT leaders need a comprehensive effort that encompasses not just devices, but applications and networking infrastructure to truly leverage the value

11:45 am
-
12:45 pm

Executive Visions Panel

The Role of the CIO: Business Challenger, Innovation Driver

Since the inception of the role, the focus of the CIO has primarily been one of Technologist and IT Operations Manager; selecting the tools and services necessary to support the business, and then efficiently and effectively operating them. This is a future of declining organizational value however as technology becomes increasingly democratized and other organizational groups take control over individual systems and data sets. CIOs need to recast themselves instead as Strategists and Business Innovators; leveraging their unique position at the crux of the organization to propose alternatives to the accepted way of doing things, and to drive organizational growth through business alignment and organizational change.

Takeaways:

  • CIOs are at a fork in the road; they can continue to be Operational or evolve and become Transformational
  • Transformation efforts cannot stop at the boundaries of the IT department, they must reach into the business as a whole, addressing process and defining new capability
  • Visionary CIOs will move their departments from cost centers to value creators, and move themselves from executive afterthoughts to true organization leaders

Panelists:

Hugo Timmerman, Head of IT, Southern Africa, British American Tobacco

12:45 pm
-
12:50 pm

Thank You Address and Closing Remarks

12:55 pm
-
1:55 pm

Grab and Go Luncheon