Sie sind auf Seite 1von 7

Agenda Key

Keynote Presentation

Executive Visions

Visionary speaker presents to entire audience on key


issues, challenges and business opportunities

Panel moderated by Master of Ceremonies and headed by


four executives discussing critical business topics

Thought Leadership

Think Tank

Solution provider-led session giving high-level overview


of opportunities

End user-led session in boardroom style, focusing on best


practices

Roundtable

Executive Exchange

Interactive session led by a moderator, focused on


industry issue

Pre-determined, one-on-one interaction revolving around


solutions of interest

Focus Group

Analyst Q&A Session

Discussion of business drivers within a particular


industry area

Moderator-led coverage of the latest industry research

Vendor Showcase

Case Study

Several brief, pointed overviews of the newest solutions


and services

Overview of recent project successes and failures

Open Forum Luncheon

Networking Session

Informal discussions on pre-determined topics

Unique activities at once relaxing, enjoyable and productive

Tuesday, November 8, 2016 - CISO BFSI Summit US


Registration & Greeting

12:00 pm
1:30 pm

Wednesday, November 9, 2016 - CISO BFSI Summit US


7:00 am
7:55 am

Networking Breakfast

8:00 am
8:10 am

Welcome Address and Opening Remarks

8:10 am
8:50 am

Keynote Presentation
Bridging Gaps Through Trimodal IT
Todays businesses are challenged to drive fast change through technology with minimal impact, yet the two common models of IT delivery leave little room for the
flexibility and continuous change necessary to achieve success. Hear from Aflac Chief Information Officer Julia Davis how a trimodal approach incorporating legacy
systems alongside modern development practices enabled Aflac to break down walls between business and IT, promote transparency and collaboration and support a
successful migration to agile that fit into the companys culture.
Key Takeaways:
Blend bimodal and trimodal IT to find a model that fits your companys culture and needs.
Tackle projects in segments and demonstrate incremental change and success with each successive step.
Adopt a big picture approach and allocate resources such as funding across a projects entire lifecycle instead of on an annual basis.
Presented by:
Julia Davis, CIO, Aflac

Keynote Presentation

8:55 am
9:35 am

TBD
Sponsored by:
Dell EMC

9:45 am
10:15 am

Executive
Exchange

Think Tank

Think Tank

Creating New Revenue Streams

Fraud and Anti-Money Laundering: A House Divided?

Page: 1 of 7 - 25 Oct 2016 08:56:14

The economic downturn has had significant and long-lasting effects on


the banking industry, not the least of which is the reduction in interest
based revenue as a result of tightened lending regulations and increased
lending reticence. As these revenues stagnate, financial services
organizations are having to find new sources of revenue to not just try
and drive growth, but to halt shrinkage, and fees alone arent going to
bridge that gap. What are needed are new and appealing products and
services that will draw clients back into a relationship and drive increased
non-interest based revenue. This will be a tumultuous time for the IT
department as the lines of business experiment to find the sweet spot
and will need dynamic and flexible support from their technology arm.
Takeaways:
The saying the only thing constant is change hasnt always
applied to financial services but will increasingly do so in coming
years
New products and services along with new flexibility will be
required to recapture losses still being felt from the economic
downtown of 2008
Now more than ever, the IT department will have to be prepared
to be dynamic and innovative to deliver on revenue-generating
business needs
Presented by:

While the link between anti-fraud and anti-money laundering capabilities


may be easy to draw on the surface, far too often these capabilities are
siloed within the typical financial services organization. Under the covers
areas that seem to have commonality are often separated by radically
different cultural approaches, with fraud staff coming from an operational
or IT background and AML staff drawing from experience in compliance,
legal, and GRC. The key to overcoming the challenges of team
integration first and foremost comes down to system and data integration
and those financial services institutions that are able to operate both
groups from common platforms and intermingled data will find that silos
naturally erode, that barriers do break down, and that the two groups
begin to work efficiently and effectively together such that the whole really
is greater than the sum of the parts.
Takeaways:
Dont let the way things are be the way things will be; making a
move forward is key to improving the performance of both the
fraud and AML groups
Dont let cultural differences be an impediment to integration;
embrace the perspectives that each group brings to the situation
to gain better visibility
Dont expect change without investment; integrating systems and
data will be the grease the facilitates working together but
bringing things to a common platform will require time and, likely,
money to make it work
Presented by:

Matthew Burris, Global Vice President- Data Science, Citi

Omar Khawaja, CISO, Highmark


10:20 am
10:50 am

Executive

Thought Leadership

Exchange

Strategic and Secure Mobility


Is mobility a cost? Or is it a key part of your strategy for business success? Many businesses are leveraging mobility to generate real and measurable
returns and to increase their competitiveness. How? Join CDM Media and BlackBerry as we explore ways in which companies can strategically
manage their mobility investments.
In our session we'll look at security - again from a strategic viewpoint. Security covers a wide range of issues in the modern enterprise. While
protection of data is at the forefront, security involves many other aspects and issues from secure collaboration to the security and protection of
employees in an increasingly tumultuous world. We'll deal not only with securing mobility, but how the strategic use of mobility can make you more
secure.
Sponsored by:
BlackBerry

10:55 am
11:25 am

Executive

Thought Leadership

Exchange

Cloud Adoption Challenges on a Macro Level


The hype around the cloud is pervasive and can be potentially overwhelming but numerous studies have shown that tangible benefits can be had,
whether in cost savings, efficiency improvements, or flexibility enhancements. That said numerous impediments exist to not just realizing that value, but
even considering adoption; regulatory issues, integration challenges, business process revamp, and a dozen other challenges can halt cloud projects
in their tracks before they get off the ground. In this group discussion well explore those inhibitors, understanding which challenges prevent adoption
and what can be done to overcome them.
Takeaways:
The cloud presents a significant opportunity to organizations and while most have adopted in some form or other, wholesale adoption still lags
To realize benefits enterprises must deal with a variety of challenges each one requiring different solutions
Industry by industry adoption is constrained for different reasons but do common solutions exist that can resolve issues across the board?
Sponsored by:
Forcepoint LLC

11:30 am
12:00 pm

Executive
Exchange

Roundtable

Roundtable

Physical and Digital Security Convergence

The Enterprise Immune System: Using Machine Learning for


Next-Generation Cyber Defense

The discussion around the convergence of physical security and


information security dates back over a decade, but though much was
made of the concept in the early 2000s little was actually done and the
buzz faded. Flash-forward to today however and the buzz is back
because of the increased focus on holistic risk management, the
increased pressure of greater compliance requirements, and the
increased demand for every aspect of the business to be a value
generator. CISOs and CIROs need to evaluate the opportunities for both
technology convergence (streamlining platforms) and organizational
convergence (streamlining roles) to meet new threat protections
mandates.
Takeaways:

From insiders to sophisticated external attackers, the reality of cyber


security today is that the threat is already inside. A fundamentally new
approach to cyber defense is needed to detect and investigate these
threats that are already inside the network - before they turn into a fullblown crisis.
Based on unsupervised machine learning and probabilistic mathematics
developed by specialists from the University of Cambridge, new immune
system technologies are capable of learning the self of an organization.
By analyzing every network, device, and user, and modeling them as
they go about their day-to-day activity, the Enterprise Immune System
can establish a highly accurate understanding of normal behavior. It can

Page: 2 of 7 - 25 Oct 2016 08:56:14

As enterprise security matures and morphs or integrates into


enterprise risk management, converged security becomes a
must have
Convergence allows for far greater levels of visibility and control
of threats and threat actors
Convergence enhances not just base security but also toplevel risk management, enterprise compliance, and even
operational value

can establish a highly accurate understanding of normal behavior. It can


therefore spot abnormal activity as it emerges, and even take precise,
measured actions to automatically curb the threat.
Rules and signatures are not keeping pace with todays rapidly evolving
cyber attacks. The Enterprise Immune System represents a fundamental
step-change in automated cyber defense, is relied upon by organizations
around the world, and can cover up to millions of devices.
In this session, learn:

Sponsored by:

How new machine learning and mathematics are automating


advanced cyber defense
Why 100% network visibility allows you to detect threats as they
happen, or before they happen
How smart prioritization and visualization of threats allows for
better resource allocation and lower risk
Real-world examples of unknown threats detected by immune
system technology

Bitglass

Sponsored by:
Darktrace
12:05 pm
12:35 pm

Executive
Exchange

Think Tank

Think Tank

Whats Next with Mobile Banking

Security and Compliance; Chicken and Egg or Chalk and


Cheese?

Mobile technologies have swept the world, with the latest news that there
are officially more such devices on the planet than there are people and
across the board these devices have become the go-to way in which
people interact with peers and providers. While banks have begun
adopting mobile channels to engage and interact with their clients, they
clearly need to go much, much further, embracing mobile payments (in
store and for bills), P2P payments, and mobile only enrollments among
other innovations. Wholesale adoption of mobile as the primary (and in
some ways only) engagement and interaction channel means backend
systems will need to be re-architected and CIOs need to begin thinking
about the nature and scope of these changes, as well as initiating the
dialogue about this revolution with their business partners now.

Takeaways:
With 1 million credit card enrollments in its first 72 hours, Apple
Pay shows that the era of mobile payments, at least for
consumers, is already here
Mobile check deposit is just the first wave in mobile banking;
soon customers will expect to do all their banking through their
mobile device
Mobile, and specifically P2P payments through mobile, will push
IT systems to work faster than ever before; the IT department
needs to be ready

Since regulatory (and industry) compliance became a notable thing in


the early-mid 2000s it has been intimately linked with information security
and often times has been the lever (or hammer) by which enterprises
made necessary investments in security. But being compliant and being
secure arent the same thing, and in too many cases enterprises that
were perfectly compliant have been perfectly breached. A new focus is
needed; one that respects that while security and compliance are not the
same thing, they are working towards the same goal (a reduction in
overall enterprise risk exposure) and sees that compliance flows from
security.

Takeaways:
While a secure company is likely a compliant company, the same
cannot be said of the reverse situation
Just because compliance has loosened the purse strings doesnt
mean it takes a pre-eminent position on security investments
Reducing enterprise risk is the goal of both practices but without
appropriate focus on both is a goal that will never be achieved
Presented by:
Andy Villareal, Senior Vice President and Chief Compliance
Officer, MoneyGram International

Presented by:
Steven Daniels, SVP EDM, eCRM, Architecture, Strategy &
Innovation, U.S. Bank

Networking Luncheon

12:40 pm
1:40 pm
1:45 pm
2:15 pm

Executive
Exchange

Think Tank

Think Tank

Evolving the Data Conversation in your Company

Key Management for Effective Enterprise Security

The constant stream of raw data produced by an enterprise has grown


more valuable, but the ability to harness this value effectively has proven
difficult. Home grown warehouses, multiple copies of the same data being
siphoned under cover of darkness, lack of consensus on who's data is
correct, poor data quality at point of capture - all contribute to an
inefficient ecosystem that can smother value and create frustration all
around. Adding data generated about your customers from systems
external to your enterprise and the problem becomes even further
compounded.

Keys and certificates are vital to the digital authentication and


authorization used with SSL/TLS, SSH, Mobile devices, and VPN access.
The use of keys and certificates will continue to grow as businesses
need to ensure appropriate access across servers, applications, mobile
devices, cloud computing and the Internet of Things. Key and certificate
management is complex, especially with the use of multiple key and
certificate vendors, hardware security modules, and other technologies.
There is an increase in the use of keys and certificates by cybercriminals
in their attacks which is jeopardizing the digital trust which underpins
most of the global economy.

By understanding the breadth of the situation and driving a deeper


appreciation of how we got here, it is possible to evolve the conversation
beyond ineffective quick fixes to create a more sustainable and
comprehensive approach.
Takeaways:
Neither the business or IT can solve this problem alone. It

Takeaways:
Key and certificate management is complex and must be
addressed in achievable phases with maturity milestones
Visibility and understanding of the keys and certificates in your
environment is critical
Cybercriminals are leveraging a poor trust model to circumvent

Page: 3 of 7 - 25 Oct 2016 08:56:14

Neither the business or IT can solve this problem alone. It


requires an effective partnership to assess current state, identify
priorities and to create a shared governance model and roadmap
to unlock value
Beware the buzzwords. Big Data, Hadoop, HTAP, IoT. All are
powerful, but significant groundwork may be required before
these technologies can contribute meaningfully to your
ecosystem
Anticipate change. The roles of many stakeholders in the current
ecosystem will evolve as you make progress

Cybercriminals are leveraging a poor trust model to circumvent


security controls
Presented by:
Stephen Jordan, SVP Cryptographic Services Enterprise
Information Security Engineering & Services, Wells Fargo

Presented by:
Brian Lavery, SVP | US Technology Solutions, TD
2:20 pm
2:50 pm

Executive
Exchange

Thought Leadership
Identity and the New Age of Enterprise Security
From a technology standpoint, as a society the world of business has gone through two distinct stages in the evolution of its information security
focus. The first addressed network based protection and preventative controls such as firewalls and anti-malware. The second looked at data-centric
and detective controls such as encryption and intrusion/extrusion monitoring. Since breaches continue to occur at a record pace, what is need new is
clearly a new evolution, one that pushes towards From a technology standpoint, as a society the world of business has gone through two distinct
stages in the evolution of its information security focus. The first addressed network based protection and preventative controls such as firewalls and
anti-malware. The second looked at data-centric and detective controls such as encryption and intrusion/extrusion monitoring. Since breaches
continue to occur at a record pace, what is need new is clearly a new evolution, one that pushes towards individual focused security through granular
user monitoring and management as provided by solutions such as Identity and Access Management. While IAM isnt a new technology field, it is one
whose time has come and CISO need to begin investing in modern-day, light-weight, easy to implement IAM solutions now to stay ahead of the curve,
and reduce enterprise threats.
Takeaways:
The breach onslaught demonstrates that existing security solutions are incapable of defending current threats
Enterprises need to begin looking at security from an activity perspective rather than an artifact perspective
IAM provides activity insight, and therefore threat awareness, no other platform can equal
Sponsored by:
RSA

2:55 pm
3:25 pm

Executive
Exchange

Roundtable

Roundtable

Horizontal or Vertical? Finding the Right Cloud Fit

Privilege Access Abuse & Analytics

The vast majority of cloud services available on the market today are
best described as horizontal offerings the same feature set and
functionalities offered to each enterprise regardless of the different
market pressures those enterprises face. But one-size-fits-all
horizontal offerings are not the only way in which cloud can be consumed
because businesses arent one-size-fits-all in their individuals needs and
approaches to their market spaces. As a result, vertical cloud offerings
are increasingly coming to market. These solutions differ from private
clouds in that they dont offer that truly individual level of customization,
instead providing a one-size-fits-some approach. The advantages of
such an approach (semi-custom offering without the semi-custom pricing
primarily) can make these solutions seem appealing, but IT leaders must
determine whether the inherent risk of a smaller and more niche focused
solution offsets the benefit of a more tailored and less generic offering.

Privilege access abuse is often a top use case for user and entity
behavior analytics (UEBA) however it begins with first knowing what is
privilege access and what has been granted and what privilege users are
doing with this access in order to monitor abuses. This is also known as
discovery, and both IAM and PAM solutions have been challenged with
closing this gap. Legacy methods of tracking privilege accounts include
prefixes, tags and access management solutions providing reports. The
challenge is these methods likely track less than 50% of privilege access
and may not include entitlements within accounts.

Takeaways:
Vertical cloud offerings have existed since the beginning of the
cloud but simply have not been as popular as the larger
horizontal solutions on the market
Vertical offerings can be tremendously thin (focused) allowing
them to be incredibly deep (tailored) but offerings generally come
from smaller providers
The big boys are starting to take notice of vertical specialization
and push into this market making partner selection confusing

Identity Analytics (IdA) is machine learning from big data to provide a


dynamic, context aware risk-based approach to complement access
management. To detect privilege access abuses with UEBA, one must
learn all privilege access down to the entitlement level with IdA. This
provides a risk-based approach to remove excess access, provide riskbased certifications in order to gain a full understanding of privilege
access and activity to close the gap. This roundtable will discuss the
implications of UEBA and IdA in respect to machine learning providing
privilege access intelligence.
Sponsored by:
Gurucul

Sponsored by:
Kofax
3:30 pm
4:00 pm

Executive
Exchange

Thought Leadership
Security Analytics and its Role in Business Defense
Cyber enabled threats have evolved over time from relatively simple approaches to highly complex targeted attacks, and companies have to defend
themselves at all levels of this threat pyramid. While many organizations now recognize that Security Analytics plays an important role in detecting
patterns in the data like the footprints attackers leave behind. The challenge for many is that they arent sure exactly what that means or how to get
started. This is in part because analytics is an overused term that is often left undefined. Join us in a conversation about Security Analytics with a
focus on demystifying the term and working out how to get started.
Takeaways:

Page: 4 of 7 - 25 Oct 2016 08:56:14

Learn where Security Analytics fits in your defense strategy


Understand what analytics actually means the different mathematical approaches and what they are good at detecting
Discover different approaches to getting the advantage of a Security Analytics program without necessarily building it.
Sponsored by:
BAE Systems Applied Intelligence
4:05 pm
4:35 pm

Executive
Exchange

Think Tank

Think Tank

Reducing the Cyber Talent Dearth

Creating the Bank of the Future

Acquiring and retaining cyber talent to protect organizations from harm is


on the minds of many senior executives, however, good talent is a
scarce resource. This discussion will address ways in which you can
stay in the drivers seat when it comes to hiring, promoting and keeping
good cyber talent. Several options will be discussed including both
internal and external solutions.

It's well documented that Millennials are significantly different than any
previous generation. Their purchase behavior, borrowing and savings
behavior, ethnic diversity and use of digital technology are causing banks
to rethink how they deliver services and engage what is now the largest
generational population in the country. Understanding the dynamics of
this generation and its impact on the bank of the future including
marketing, branch strategies, online banking and portfolio management is
essential for long term success.

Key Takeaways:
PRESENT: What I can do today within my organization to
effectively develop and retain top cyber talent
FUTURE: Becoming more aware of security skills sets that will
protect my enterprise
COLLABORATION: How I can partner with academia to
decrease the cyber talent gap

Takeaways:
Dive into the differences between Millennials and other
generations to understand what makes them different and what
makes them tick
Be exposed to the demands of this generation to see how that
will impact future decision making
Learn how to develop the plan to transition from the bank of
today to the bank of tomorrow

Presented by:
Jay VanDerwerken, Senior Managing Director, NYU Tandon

Presented by:
Mircea Mihaescu, Chief Operating Officer, Moven

School of Engineering

Executive Visions

4:40 pm
5:20 pm

Facilitating Technology-Enabled Business Transformation


The role of the modern CIO is more complex than it has ever been before, not just because the technology landscape has become more complex, but also because
increasingly the CIO has had to become a business-focused executive, not just a technologist. Long have we talked about the CIO getting a seat at the table but
modern businesses are now demanding that their technology impresario join them and leverage his deep and rich technical acumen to allow the organization as a
whole to better position itself for market-place success. To be successful, CIOs need to invest in themselves, in their personnel, and in the right technologies to allow
them to position the IT department to proactively address business needs as an innovator and driver, rather than order-taker and enabler.
Takeaways:
IT leadership can no longer be simply technology focused, but must instead take their visibility into business process and become business focused
A broader business-focus does not preclude maintaining technology excellence however and indeed may demand more of it than ever before
Success for CIOs will be measured not in how they can enable enterprise decisions, but in how they can drive growth
Panelists:
Rajiv Sondhi, Sr Director - Software Engineering & Technology, Capital One
Sponsored by:
SAP

5:20 pm
6:30 pm

Networking Cocktail Reception

6:30 pm
8:00 pm

Networking Dinner

8:00 pm
10:00 pm

After Dinner Networking

Thursday, November 10, 2016 - CISO BFSI Summit US


7:00 am
8:05 am

Networking Breakfast

8:10 am
8:50 am

Keynote Presentation
Securitys Place in Enterprise Risk Management
While Information Security has existed for decades, Enterprise Risk Management (ERM), as a formal and holistic practice, is much newer yet already has taken pre-

Page: 5 of 7 - 25 Oct 2016 08:56:14

While Information Security has existed for decades, Enterprise Risk Management (ERM), as a formal and holistic practice, is much newer yet already has taken preeminence over its forebear. What is the CISO, who in many ways has toiled in invisibility, infamy, or ignominy to do when faced with the issue of being supplanted by
the Chief Risk Officer, just as enterprise demand for and focus on security has reached all-time heights? Savvy CISOs will recognize this new, broader need for
holistic visibility into, and management of, overall enterprise risk and will position themselves for success by looking beyond traditional information security boundaries
and engaging business partners around all enterprise risk.
Takeaways:
Just because information security is an aspect of enterprise risk doesnt mean that the CISO needs to take a back seat position
Enterprise risk is defined by the business but needs to be quantified by an expert; CISOs bring risk quantification expertise to the table
The end goal is not about fiefdoms and ownership, it is about improving enterprise value and success; maintaining focus is essential
Presented by:
Ron Green, EVP, CISO, Mastercard

Keynote Presentation

8:55 am
9:35 am

Identity as a Threat Plane Leveraging UEBA and IdA


The shift from declarative rules and roles to machine learning models
Understanding excess access risks, outliers and intelligent roles
How machine learning models predict and detect unknown threats
The importance of dynamic peer groups in clustering and outlier machine learning
Migrating to adaptive access and risk-based access reviews
Driving deterrence and detection with self-audits for employees and partners
User and Entity behavior analytics (UEBA) and identity analytics (IdA) created from behavior-based machine learning models are changing security methodologies
and architecture in many domains. UEBA and IdA are converging with SIEM, IAM, DLP, CASB and EDR solution areas to impact security solution design and
functionality. The shift includes moving from a declarative rules and roles-based environment into behavior-based risk scoring to determine intelligent roles, adaptive
access, plus predicting and detecting insiders, account hijacking, data exfiltration and cloud access and abuse. We are surrounded by many uses of machine learning
in our daily lives and until only recently are security solutions catching up to this force multiplier.
Sponsored by:
Gurucul

9:45 am
10:15 am

Executive
Exchange

Think Tank

Think Tank

Cloud and the IT Department of the future

Is Security Obscuring the Benefit of the Cloud?

On the surface, wholesale adoption of cloud delivered services seems to


signal the end of the IT department as we know it as the vast majority of
the extant roles and responsibilities become outsourced. While that may
be true, it doesnt necessarily mean the end of the IT department in its
entirety. A variety of studies have shown that expansion of the IT
department is just as likely as contraction as a result of broader cloud
adoption. While the sysadmins and other server-huggers may well go
away cloud adoption signals growth in at least four keys areas: Business
Management, Vendor Management, Information Security, and Systems
Integration. IT Leaders must begin the work now of recasting their IT
department to position is for success if the brave new cloud world.

Cloud delivered computing services, whether Software, Platform, or


Infrastructure as a Service offer the potential of significant business
advantages such as reduced cost and increased flexibility. These
advantages however come with very real risks, chief among them
security concerns and the risk of data and compliance breaches how
do you secure what you cant see, touch, and control? Join the
discussion as we explore both the security and compliance issues
inherent in Cloud deployments, look at the hidden issues that first time
Cloud adopters may simply not be aware of, and discuss through
solutions that can be used to address these challenges and allow
enterprises to fully and firmly embrace the Cloud.

Takeaways:

Takeaways:

Cloud does not spell the death knell for the IT department and
could well signal an actual growth
The skills required in a cloud world are different than those in an
on-prem world, but in many ways are higher order skill sets
that offer greater business value
As skills demand increases, CIOs will have to figure out whether
to build, buy, or borrow the resources with the right capabilities

Be exposed to the true security and compliance cloud threat


landscape
Learn how successful cloud adopters have mitigated these risks
Discover how to build cloud protection capabilities keyed to your
needs

Presented by:
Radha Kuchibhotla, VP IT, State Street
10:20 am
10:50 am

Executive
Exchange

Thought Leadership
Build a strategic view of your customer journey
You may not realize that your customers are on a journey, but they know. The customer experience consists of a series of touchpoints, from
marketing to purchase to servicing. In Insurance, each one of these touchpoints is a moment of truth, an opportunity to either improve or reduce
customer satisfaction. In todays competitive, rapidly evolving market, customer satisfaction is one true durable competitive advantage.
Do you have a good understanding of these customer touchpoints, and how effective each one is? Are these customer touchpoints improving the
customer experience, or making it worse? Can you build a strategic view, and keep that view up to date? Many companies take an offline approach to
building customer journey maps. However, with the rapid proliferation of channels, keeping these offline models up to date is a huge challenge, as is
effectively tying in key performance indicators.
With GMC Softwares new Customer Journey Mapping technology you can build a true strategic view of all touchpoints, and show how those
touchpoints link into a journey. With Social Commenting and other collaborative tools, you can involve all departments in maintaining these maps, and
ensuring that each one remains relevant and effective.

Page: 6 of 7 - 25 Oct 2016 08:56:14

Takeaways:
Learn about how customer journey maps can improve your customer experience
Learn how to effectively build a strategic view of customer touchpoints
Learn how to improve organizational collaboration with GMC Customer Journey Mapping
Sponsored by:
GMC Software Technology
10:55 am
11:25 am

Executive

Thought Leadership

Exchange

Finding the balance between wireless connectivity and security


Wireless connectivity has become like oxygen. Your users, whether they are employees, customers, or partners, rely on it to conduct business with
your enterprise. The challenge is that with the ubiquity of wireless connectivity, the enterprise has lost control over to which networks users connect,
both in and out of the office, and with that, the knowledge on how risky those networks might be. Taking away wireless connectivity is not an option, so
what is a CISO to do? In this talk, we will explore the issues that face the enterprise which is empowering users to conduct business (at any location,
on any device), while at the same time maintaining security and control.
Takeaways:
How wireless connectivity impacts security and control
Why are wireless threats a quickly growing attack vector?
How does shadow IT (in the form of cloud services) exacerbate the challenge?
What is the role of existing security platforms in securing wireless connectivity?
What are the regulatory and compliance issues related to wireless connectivity?
What are the best practices that would minimize the risks?
Sponsored by:
CoroNet

Executive Visions

11:30 am
12:15 pm

Diversity in IT
The importance technology plays within an enterprise will only continue to gain momentum as more developers, engineers, and programmers enter the workforce. As
these segments continue to grow, so does the diversity of the workforce within the technology field. For a field that is severely constrained by a talent and skills gap,
this influx of bodies can only be a good thing. Beyond the basic ability to deliver of identified capabilities a diverse workforce, whether cultural or gender influenced
offers a whole that is more than the sum of the parts. Finding ways to drive and increase diversity in IT then should be a key focus for every IT executive.
Takeaways:
Identify the importance behind diversity in technology, opportunities, and capabilities
Discuss the importance of cultivating diversity at the grass-roots level and building post-secondary programs that drive awareness of and interest in IT
Understand the hurdles that exist that limit the prevalence of diversity in IT, and what steps must be taken to lower, if not eliminate them
Panelists:
Tara Kissoon, Managing Director, Head of IT Risk Management, Corporate Support Area (CSA) , BMO Financial Group
Julia Davis, CIO, Aflac
Janga Aliminati, Chief Architect - Cloud , Visa
Sreesh Inguva, VP Cloud Architecture, Citi

12:15 pm
12:20 pm

Closing Remarks

12:20 pm
2:00 pm

Grab and Go Luncheon

Page: 7 of 7 - 25 Oct 2016 08:56:14

Das könnte Ihnen auch gefallen