Beruflich Dokumente
Kultur Dokumente
Keynote Presentation
Executive Visions
Thought Leadership
Think Tank
Roundtable
Executive Exchange
Focus Group
Vendor Showcase
Case Study
Networking Session
12:00 pm
1:30 pm
Networking Breakfast
8:00 am
8:10 am
8:10 am
8:50 am
Keynote Presentation
Bridging Gaps Through Trimodal IT
Todays businesses are challenged to drive fast change through technology with minimal impact, yet the two common models of IT delivery leave little room for the
flexibility and continuous change necessary to achieve success. Hear from Aflac Chief Information Officer Julia Davis how a trimodal approach incorporating legacy
systems alongside modern development practices enabled Aflac to break down walls between business and IT, promote transparency and collaboration and support a
successful migration to agile that fit into the companys culture.
Key Takeaways:
Blend bimodal and trimodal IT to find a model that fits your companys culture and needs.
Tackle projects in segments and demonstrate incremental change and success with each successive step.
Adopt a big picture approach and allocate resources such as funding across a projects entire lifecycle instead of on an annual basis.
Presented by:
Julia Davis, CIO, Aflac
Keynote Presentation
8:55 am
9:35 am
TBD
Sponsored by:
Dell EMC
9:45 am
10:15 am
Executive
Exchange
Think Tank
Think Tank
Executive
Thought Leadership
Exchange
10:55 am
11:25 am
Executive
Thought Leadership
Exchange
11:30 am
12:00 pm
Executive
Exchange
Roundtable
Roundtable
Sponsored by:
Bitglass
Sponsored by:
Darktrace
12:05 pm
12:35 pm
Executive
Exchange
Think Tank
Think Tank
Mobile technologies have swept the world, with the latest news that there
are officially more such devices on the planet than there are people and
across the board these devices have become the go-to way in which
people interact with peers and providers. While banks have begun
adopting mobile channels to engage and interact with their clients, they
clearly need to go much, much further, embracing mobile payments (in
store and for bills), P2P payments, and mobile only enrollments among
other innovations. Wholesale adoption of mobile as the primary (and in
some ways only) engagement and interaction channel means backend
systems will need to be re-architected and CIOs need to begin thinking
about the nature and scope of these changes, as well as initiating the
dialogue about this revolution with their business partners now.
Takeaways:
With 1 million credit card enrollments in its first 72 hours, Apple
Pay shows that the era of mobile payments, at least for
consumers, is already here
Mobile check deposit is just the first wave in mobile banking;
soon customers will expect to do all their banking through their
mobile device
Mobile, and specifically P2P payments through mobile, will push
IT systems to work faster than ever before; the IT department
needs to be ready
Takeaways:
While a secure company is likely a compliant company, the same
cannot be said of the reverse situation
Just because compliance has loosened the purse strings doesnt
mean it takes a pre-eminent position on security investments
Reducing enterprise risk is the goal of both practices but without
appropriate focus on both is a goal that will never be achieved
Presented by:
Andy Villareal, Senior Vice President and Chief Compliance
Officer, MoneyGram International
Presented by:
Steven Daniels, SVP EDM, eCRM, Architecture, Strategy &
Innovation, U.S. Bank
Networking Luncheon
12:40 pm
1:40 pm
1:45 pm
2:15 pm
Executive
Exchange
Think Tank
Think Tank
Takeaways:
Key and certificate management is complex and must be
addressed in achievable phases with maturity milestones
Visibility and understanding of the keys and certificates in your
environment is critical
Cybercriminals are leveraging a poor trust model to circumvent
Presented by:
Brian Lavery, SVP | US Technology Solutions, TD
2:20 pm
2:50 pm
Executive
Exchange
Thought Leadership
Identity and the New Age of Enterprise Security
From a technology standpoint, as a society the world of business has gone through two distinct stages in the evolution of its information security
focus. The first addressed network based protection and preventative controls such as firewalls and anti-malware. The second looked at data-centric
and detective controls such as encryption and intrusion/extrusion monitoring. Since breaches continue to occur at a record pace, what is need new is
clearly a new evolution, one that pushes towards From a technology standpoint, as a society the world of business has gone through two distinct
stages in the evolution of its information security focus. The first addressed network based protection and preventative controls such as firewalls and
anti-malware. The second looked at data-centric and detective controls such as encryption and intrusion/extrusion monitoring. Since breaches
continue to occur at a record pace, what is need new is clearly a new evolution, one that pushes towards individual focused security through granular
user monitoring and management as provided by solutions such as Identity and Access Management. While IAM isnt a new technology field, it is one
whose time has come and CISO need to begin investing in modern-day, light-weight, easy to implement IAM solutions now to stay ahead of the curve,
and reduce enterprise threats.
Takeaways:
The breach onslaught demonstrates that existing security solutions are incapable of defending current threats
Enterprises need to begin looking at security from an activity perspective rather than an artifact perspective
IAM provides activity insight, and therefore threat awareness, no other platform can equal
Sponsored by:
RSA
2:55 pm
3:25 pm
Executive
Exchange
Roundtable
Roundtable
The vast majority of cloud services available on the market today are
best described as horizontal offerings the same feature set and
functionalities offered to each enterprise regardless of the different
market pressures those enterprises face. But one-size-fits-all
horizontal offerings are not the only way in which cloud can be consumed
because businesses arent one-size-fits-all in their individuals needs and
approaches to their market spaces. As a result, vertical cloud offerings
are increasingly coming to market. These solutions differ from private
clouds in that they dont offer that truly individual level of customization,
instead providing a one-size-fits-some approach. The advantages of
such an approach (semi-custom offering without the semi-custom pricing
primarily) can make these solutions seem appealing, but IT leaders must
determine whether the inherent risk of a smaller and more niche focused
solution offsets the benefit of a more tailored and less generic offering.
Privilege access abuse is often a top use case for user and entity
behavior analytics (UEBA) however it begins with first knowing what is
privilege access and what has been granted and what privilege users are
doing with this access in order to monitor abuses. This is also known as
discovery, and both IAM and PAM solutions have been challenged with
closing this gap. Legacy methods of tracking privilege accounts include
prefixes, tags and access management solutions providing reports. The
challenge is these methods likely track less than 50% of privilege access
and may not include entitlements within accounts.
Takeaways:
Vertical cloud offerings have existed since the beginning of the
cloud but simply have not been as popular as the larger
horizontal solutions on the market
Vertical offerings can be tremendously thin (focused) allowing
them to be incredibly deep (tailored) but offerings generally come
from smaller providers
The big boys are starting to take notice of vertical specialization
and push into this market making partner selection confusing
Sponsored by:
Kofax
3:30 pm
4:00 pm
Executive
Exchange
Thought Leadership
Security Analytics and its Role in Business Defense
Cyber enabled threats have evolved over time from relatively simple approaches to highly complex targeted attacks, and companies have to defend
themselves at all levels of this threat pyramid. While many organizations now recognize that Security Analytics plays an important role in detecting
patterns in the data like the footprints attackers leave behind. The challenge for many is that they arent sure exactly what that means or how to get
started. This is in part because analytics is an overused term that is often left undefined. Join us in a conversation about Security Analytics with a
focus on demystifying the term and working out how to get started.
Takeaways:
Executive
Exchange
Think Tank
Think Tank
It's well documented that Millennials are significantly different than any
previous generation. Their purchase behavior, borrowing and savings
behavior, ethnic diversity and use of digital technology are causing banks
to rethink how they deliver services and engage what is now the largest
generational population in the country. Understanding the dynamics of
this generation and its impact on the bank of the future including
marketing, branch strategies, online banking and portfolio management is
essential for long term success.
Key Takeaways:
PRESENT: What I can do today within my organization to
effectively develop and retain top cyber talent
FUTURE: Becoming more aware of security skills sets that will
protect my enterprise
COLLABORATION: How I can partner with academia to
decrease the cyber talent gap
Takeaways:
Dive into the differences between Millennials and other
generations to understand what makes them different and what
makes them tick
Be exposed to the demands of this generation to see how that
will impact future decision making
Learn how to develop the plan to transition from the bank of
today to the bank of tomorrow
Presented by:
Jay VanDerwerken, Senior Managing Director, NYU Tandon
Presented by:
Mircea Mihaescu, Chief Operating Officer, Moven
School of Engineering
Executive Visions
4:40 pm
5:20 pm
5:20 pm
6:30 pm
6:30 pm
8:00 pm
Networking Dinner
8:00 pm
10:00 pm
Networking Breakfast
8:10 am
8:50 am
Keynote Presentation
Securitys Place in Enterprise Risk Management
While Information Security has existed for decades, Enterprise Risk Management (ERM), as a formal and holistic practice, is much newer yet already has taken pre-
While Information Security has existed for decades, Enterprise Risk Management (ERM), as a formal and holistic practice, is much newer yet already has taken preeminence over its forebear. What is the CISO, who in many ways has toiled in invisibility, infamy, or ignominy to do when faced with the issue of being supplanted by
the Chief Risk Officer, just as enterprise demand for and focus on security has reached all-time heights? Savvy CISOs will recognize this new, broader need for
holistic visibility into, and management of, overall enterprise risk and will position themselves for success by looking beyond traditional information security boundaries
and engaging business partners around all enterprise risk.
Takeaways:
Just because information security is an aspect of enterprise risk doesnt mean that the CISO needs to take a back seat position
Enterprise risk is defined by the business but needs to be quantified by an expert; CISOs bring risk quantification expertise to the table
The end goal is not about fiefdoms and ownership, it is about improving enterprise value and success; maintaining focus is essential
Presented by:
Ron Green, EVP, CISO, Mastercard
Keynote Presentation
8:55 am
9:35 am
9:45 am
10:15 am
Executive
Exchange
Think Tank
Think Tank
Takeaways:
Takeaways:
Cloud does not spell the death knell for the IT department and
could well signal an actual growth
The skills required in a cloud world are different than those in an
on-prem world, but in many ways are higher order skill sets
that offer greater business value
As skills demand increases, CIOs will have to figure out whether
to build, buy, or borrow the resources with the right capabilities
Presented by:
Radha Kuchibhotla, VP IT, State Street
10:20 am
10:50 am
Executive
Exchange
Thought Leadership
Build a strategic view of your customer journey
You may not realize that your customers are on a journey, but they know. The customer experience consists of a series of touchpoints, from
marketing to purchase to servicing. In Insurance, each one of these touchpoints is a moment of truth, an opportunity to either improve or reduce
customer satisfaction. In todays competitive, rapidly evolving market, customer satisfaction is one true durable competitive advantage.
Do you have a good understanding of these customer touchpoints, and how effective each one is? Are these customer touchpoints improving the
customer experience, or making it worse? Can you build a strategic view, and keep that view up to date? Many companies take an offline approach to
building customer journey maps. However, with the rapid proliferation of channels, keeping these offline models up to date is a huge challenge, as is
effectively tying in key performance indicators.
With GMC Softwares new Customer Journey Mapping technology you can build a true strategic view of all touchpoints, and show how those
touchpoints link into a journey. With Social Commenting and other collaborative tools, you can involve all departments in maintaining these maps, and
ensuring that each one remains relevant and effective.
Takeaways:
Learn about how customer journey maps can improve your customer experience
Learn how to effectively build a strategic view of customer touchpoints
Learn how to improve organizational collaboration with GMC Customer Journey Mapping
Sponsored by:
GMC Software Technology
10:55 am
11:25 am
Executive
Thought Leadership
Exchange
Executive Visions
11:30 am
12:15 pm
Diversity in IT
The importance technology plays within an enterprise will only continue to gain momentum as more developers, engineers, and programmers enter the workforce. As
these segments continue to grow, so does the diversity of the workforce within the technology field. For a field that is severely constrained by a talent and skills gap,
this influx of bodies can only be a good thing. Beyond the basic ability to deliver of identified capabilities a diverse workforce, whether cultural or gender influenced
offers a whole that is more than the sum of the parts. Finding ways to drive and increase diversity in IT then should be a key focus for every IT executive.
Takeaways:
Identify the importance behind diversity in technology, opportunities, and capabilities
Discuss the importance of cultivating diversity at the grass-roots level and building post-secondary programs that drive awareness of and interest in IT
Understand the hurdles that exist that limit the prevalence of diversity in IT, and what steps must be taken to lower, if not eliminate them
Panelists:
Tara Kissoon, Managing Director, Head of IT Risk Management, Corporate Support Area (CSA) , BMO Financial Group
Julia Davis, CIO, Aflac
Janga Aliminati, Chief Architect - Cloud , Visa
Sreesh Inguva, VP Cloud Architecture, Citi
12:15 pm
12:20 pm
Closing Remarks
12:20 pm
2:00 pm