CISO UK Summit | October 26, 2017 | The May Fair Hotel - London, UK

↓ Agenda Key

Keynote Presentation

Visionary speaker presents to entire audience on key issues, challenges and business opportunities

Keynote Presentations give attending delegates the opportunity to hear from leading voices in the industry. These presentations feature relevant topics and issues aligned with the speaker's experience and expertise, selected by the speaker in concert with the summit's Content Committee." title="Keynote Presentations give attending delegates the opportunity to hear from leading voices in the industry. These presentations feature relevant topics and issues aligned with the speaker's experience and expertise, selected by the speaker in concert with the summit's Content Committee.

Executive Visions

Panel moderated by Master of Ceremonies and headed by four executives discussing critical business topics

Executive Visions sessions are panel discussions that enable in-depth exchanges on critical business topics. Led by a moderator, these sessions encourage attending executives to address industry challenges and gain insight through interaction with expert panel members." title="Executive Visions sessions are panel discussions that enable in-depth exchanges on critical business topics. Led by a moderator, these sessions encourage attending executives to address industry challenges and gain insight through interaction with expert panel members.

Thought Leadership

Solution provider-led session giving high-level overview of opportunities

Led by an executive from the vendor community, Thought Leadership sessions provide comprehensive overviews of current business concerns, offering strategies and solutions for success. This is a unique opportunity to access the perspective of a leading member of the vendor community." title="Led by an executive from the vendor community, Thought Leadership sessions provide comprehensive overviews of current business concerns, offering strategies and solutions for success. This is a unique opportunity to access the perspective of a leading member of the vendor community.

Think Tank

End user-led session in boardroom style, focusing on best practices

Think Tanks are interactive sessions that place delegates in lively discussion and debate. Sessions admit only 15-20 participants at a time to ensure an intimate environment in which delegates can engage each other and have their voices heard." title="Think Tanks are interactive sessions that place delegates in lively discussion and debate. Sessions admit only 15-20 participants at a time to ensure an intimate environment in which delegates can engage each other and have their voices heard.

Roundtable

Interactive session led by a moderator, focused on industry issue

Led by an industry analyst, expert or a member of the vendor community, Roundtables are open-forum sessions with strategic guidance. Attending delegates gather to collaborate on common issues and challenges within a format that allows them to get things done." title="Led by an industry analyst, expert or a member of the vendor community, Roundtables are open-forum sessions with strategic guidance. Attending delegates gather to collaborate on common issues and challenges within a format that allows them to get things done.

Case Study

Overview of recent project successes and failures

Case Studies allow attending executives to hear compelling stories about implementations and projects, emphasizing best practices and lessons learned. Presentations are immediately followed by Q&A sessions." title="Case Studies allow attending executives to hear compelling stories about implementations and projects, emphasizing best practices and lessons learned. Presentations are immediately followed by Q&A sessions.

Focus Group

Discussion of business drivers within a particular industry area

Focus Groups allow executives to discuss business drivers within particular industry areas. These sessions allow attendees to isolate specific issues and work through them. Presentations last 15-20 minutes and are followed by Q&A sessions." title="Focus Groups allow executives to discuss business drivers within particular industry areas. These sessions allow attendees to isolate specific issues and work through them. Presentations last 15-20 minutes and are followed by Q&A sessions.

Analyst Q&A Session

Moderator-led coverage of the latest industry research

Q&A sessions cover the latest industry research, allowing attendees to gain insight on topics of interest through questions directed to a leading industry analyst." title="Q&A sessions cover the latest industry research, allowing attendees to gain insight on topics of interest through questions directed to a leading industry analyst.

Vendor Showcase

Several brief, pointed overviews of the newest solutions and services

Taking the form of three 10-minute elevator pitches by attending vendors, these sessions provide a concise and pointed overview of the latest solutions and services aligned with attendee needs and preferences." title="Taking the form of three 10-minute elevator pitches by attending vendors, these sessions provide a concise and pointed overview of the latest solutions and services aligned with attendee needs and preferences.

Executive Exchange

Pre-determined, one-on-one interaction revolving around solutions of interest

Executive Exchanges offer one-on-one interaction between executives and vendors. This is an opportunity for both parties to make key business contacts, ask direct questions and get the answers they need. Session content is prearranged and based on mutual interest." title="Executive Exchanges offer one-on-one interaction between executives and vendors. This is an opportunity for both parties to make key business contacts, ask direct questions and get the answers they need. Session content is prearranged and based on mutual interest.

Open Forum Luncheon

Informal discussions on pre-determined topics

Led by a moderator, Open Forum Luncheons offer attendees informal, yet focused discussions on current industry topics and trends over lunch." title="Led by a moderator, Open Forum Luncheons offer attendees informal, yet focused discussions on current industry topics and trends over lunch.

Networking Session

Unique activities at once relaxing, enjoyable and productive

Networking opportunities take various unique forms, merging enjoyable and relaxing activities with an environment conducive to in-depth conversation. These gatherings allow attendees to wind down between sessions and one-on-one meetings, while still furthering discussions and being productive." title="Networking opportunities take various unique forms, merging enjoyable and relaxing activities with an environment conducive to in-depth conversation. These gatherings allow attendees to wind down between sessions and one-on-one meetings, while still furthering discussions and being productive.

 

Thursday, October 26, 2017 - CISO UK Summit

7:00 am - 7:55 am

Registration and Networking Breakfast

 

8:00 am - 8:20 am

Welcome Address and Opening Remarks

Presented by:

Mark Chillingworth, Editor, Icon Business Media

 
 

8:25 am - 8:55 am

Share:

Keynote Presentation

Threats are Evolving. A New Approach to Cyber Security Is Required

According to Gartner Research, by 2020, 60% of enterprise information security budgets will be allocated for rapid detection and response approaches.

It's a simple concept. The earlier you detect and mitigate a threat, the less the ultimate cost to your business. By implementing an effective end-to-end threat management process that focuses on reducing detection and response times, you will have the ability to prevent high-impact security incidents such as major data breaches. This process is known as Threat Lifecycle Management (TLM) and can help you improve the efficiency of your security operations.

TLM is a series of aligned security operations capabilities and processes. It begins with the ability to see broadly and deeply across your IT environment and ends with the ability to quickly mitigate and recover from a security incident. You can enable effective TLM at a scale appropriate to your business through modern technology specifically in the areas of: 

  • Advanced machine analytics which are key to discovering potential threats quickly.  
  • Security automation and orchestration capabilities which increase analyst efficiency to support the entire threat investigation through to full remediation and recovery. 

Key Takeaways: 

  • Determine if your spending is focused on the right areas. 
  • Understand how to prevent high-impact cyber incidents. 
  • Discover how can you lower your TCO and maximise the ROI of your security technology.

Sponsored by:

LogRhythm View details

 
 
 

9:00 am - 9:25 am

Vendor Showcase

 

9:30 am - 9:55 am

Vendor Showcase

 

10:00 am - 10:25 am

Executive Exchange

 

Share:

Executive Boardroom

Your Journey to Success in Today's Technology Revolution

The current pace of the changing business world is unprecedented. Some are calling it the biggest technological revolution ever and it's only just beginning. From cloud computing to smart devices to online support, the retail industry is immersed in digital transformation to leverage new advances and meet customer expectations. 

With the convergence of products and technology, all this technology disruption is speeding the pace of innovation as companies try to stay ahead of the competition. As if this rapid change and increased innovation is not enough, the very nature of the workforce is changing with the advent of blended teams, increased diversity, and post-boomer expectations. This means more work that is often being done by fewer people. 

The need to stay integrated and aligned amid unprecedented technology shifts, full-speed innovation, and changing workforce requirements raises new challenges that require a new management mindset and a broader set of tools.

This is the very problem that work and resource management is meant to address as the next evolution in planning. 

Takeaways: 

  • Understand how work and resource management brings together domains such as Project Portfolio Management, Product Innovation, Strategic Planning, Enterprise Architecture, and Work Collaboration.
  • Learn about how companies such as Waitrose and Marks and Spencer are addressing these challenges.

Sponsored by:

Planview UK Ltd View details

 
 

Share:

Executive Boardroom

Unsupervised Machine Learning: A New Approach to Cyber Defense

From insiders to sophisticated external attackers, the reality of cyber security today is that the threat is already inside. Legacy approaches to cyber security, which rely on knowledge of past attacks, are simply not sufficient to combat new, evolving attacks and no human cyber analyst can watch or react quickly enough. A fundamentally new approach to cyber defense is needed to detect and investigate these threats that are already inside the network - before they turn into a full-blown crisis. 

Self-learning systems represent a fundamental step-change in automated cyber defense and are relied upon by organizations around the world to cover millions of devices. Based on unsupervised machine learning and probabilistic mathematics, these new approaches to security can establish a highly accurate understanding of normal behavior by learning an organization's 'pattern of life'. They can, therefore, spot abnormal activity as it emerges and even take precise, measured actions to automatically curb the threat.

Discover why unsupervised machine learning is the future of defense and how the 'immune system' approach to cyber security provides complete network visibility and the ability to prioritize threats in order to better allocate time and resources. 

In this session, learn: 

  • How new machine learning and mathematics are automating advanced cyber defense.
  • Why full network visibility allows you to detect threats as or before they emerge.
  • How smart prioritization and visualization of threats allows for better resource allocation and lower risk.
  • Real-world examples of unknown threats detected by 'immune system' technology.

Sponsored by:

Darktrace View details

 
 
 

10:30 am - 10:40 am

Morning Networking Coffee Break

 

10:45 am - 11:10 am

Executive Exchange

 

Share:

Thought Leadership

Using Lean Innovation to Catch the Next Wave of IT

Everyone wants to win, but as the pace of change picks up, companies are finding it harder than ever to launch new product lines successfully and keep existing ones running at a profit. Disruption is happening to every industry and every company and you need a strategy. So where do you start? How have successful companies approached the challenge? And do you really understand the fundamental relationship between technology disruption and your business strategy? 

This session will share a useful framework for dealing with disruption and how an enterprise can stay true to its existing businesses whilst looking at ways to innovate and catch the next wave. Whether its addressing new market opportunities to attack or understanding core market positions to defend or new technological frontiers to consider, the end goal is to leave this session with an actionable set of ideas and concepts for dealing with disruption and a useful framework as well.

Sponsored by:

Dell EMC View details

 
 
 

11:15 am - 11:40 am

Executive Exchange

 

Share:

Think Tank

Mobilizing Data From Across the Organization

By enabling business stakeholders to self-serve the relevant information they need, an organization is able to gain resource capacity to focus on R&D, development, and launch of new products. In just 20 months Cox Automotive made significant progress toward becoming a data-driven business while providing actionable insight to our business and our clients' businesses. Allison Nau explores how Cox Automotive is became a data-driven business, demonstrating how mobilizing data from across the organization has helped drive sales, provide better customer service, and improve operational efficiency. 

Takeaway: How a company can develop new products. Allison offers a perspective on Cox's journey, sharing the pitfalls, the challenges, and what has enabled the company to move quickly. Along the way, Allison demonstrates some live examples of how Cox Automotive uses Hadoop to provide actionable insight for its business and power products for its automotive clients.

Presented by:

Allison Nau, Managing Director, Cox Automotive View details

 
 
 

11:45 am - 12:10 pm

Executive Exchange

 

Share:

Thought Leadership

How to Significantly Save on Your Annual SAP/Oracle Maintenance

Today's modern CIO is embarking on a digital transformation journey exploring radical hybrid IT strategies and leveraging new technologies like cloud, social, mobile and big data. However, with 'keeping the lights on' legacy IT components (costing nearly 90% of a typical IT budget), how can IT make powerful advancements and lead business change? 

Join this interactive session to learn how award-winning CIOs are successfully tipping the balance by liberating people, time and money from costly ongoing maintenance of their ERP systems - including SAP and Oracle - to invest in strategic initiatives that create real-world competitive advantage.

Sponsored by:

Rimini Street View details

 
 
 

12:15 pm - 12:45 pm

Networking Luncheon

 

12:50 pm - 1:15 pm

Vendor Showcase

 

1:20 pm - 1:45 pm

Vendor Showcase

 

1:50 pm - 2:15 pm

Executive Exchange

 

Share:

Executive Boardroom

How Analytics Disrupted the NPM Market and What's Next

It is no secret that the IT landscape is evolving rapidly, creating new challenges for IT organisations. Megatrends such as mobility, desktop virtualisation, ransomware, the Internet of Things and the software-defined datacentre all demand that IT organisations operate smarter and are equipped with real-time insights into what is happening in their environments. However, legacy IT monitoring products have not kept pace with these changes, leaving enterprises with a hodgepodge of niche tools designed for the paradigms of decades past. Left without a means to cut through increasing complexity, IT teams struggle to achieve key outcomes. 

This session will discuss:  

  • How the network is the richest source of data.
  • How the network has become the common denominator tying everything together during digital transformation.
  • How organisations are able to mine the communications between devices for real-time insights and data-driven operation.
  • How your wire data can be used strategically within your IT ecosystem.

This session will offer a clear understanding of how your organisation can unlock the hidden value in your networks, discovering, observing, and analysing every digital interaction as it occurs.

Sponsored by:

ExtraHop Networks UK Limited View details

 
 

Share:

Executive Boardroom

Trends in Email Attacks & Identity Fraud

Email is the primary infiltration mechanism for the majority of cyber-attacks. To effectively combat these attacks, organisations need to understand the types of identity deception attackers typically prefer as well as the relative risk and cost of attacks to businesses and the likelihood of their success.  

Takeaways: 

  • Explore the latest threat research into characteristics of known email-based cyber attacks.
  • Examine the prevalence of low-volume, socially engineered email attacks which easily bypass existing security layers.
  • Quantify the relative risk and cost of attacks to your business.
  • Understand how your enterprise can innovate to detect attacks using spear phishing and identity deception.

Sponsored by:

Agari EMEA View details

 
 
 

2:20 pm - 2:45 pm

Executive Exchange

 

Share:

Think Tank

IT is Dead, Long Live IT

Leading CIO Mark Aikman debates the future of IT leadership. Join him in a thought provoking presentation and debate.

Presented by:

Mark Aikman, Group CIO, The North of England P&I Association Limited View details

 
 
 

2:50 pm - 3:15 pm

Executive Exchange

 

Share:

Thought Leadership

Why Cloud ERP decisions should be made by IT

ERP decisions are often made by business leaders while IT is given little more than a veto option. With Cloud ERP becoming popular, it would seem that the technology choices become even less relevant, but IT's guidance for Cloud ERP applications is actually more critical than ever.

Sponsored by:

Workday View details

 
 
 

3:20 pm - 3:30 pm

Afternoon Networking Coffee Break

 

3:35 pm - 4:00 pm

Executive Exchange

 

Share:

Thought Leadership

Accelerating Business Agility with Integration Platforms

There is a growing realisation that the ability for companies to stay competitive and survive today and into the future is directly related to their ability to transform into a more agile digital business. At the heart of the transformation discussion is IT modernization. The modern digital business needs to rethink their technology approach to consider, among other things, moving infrastructure and applications to the cloud. This allows lines of business to take more control over their applications by adopting best of breed applications to meet specific business needs and enabling access from a proliferation of, often, mobile devices. 

However, the move to modernisation has challenges, not least of which is how to easily integrate the growing portfolio of applications, securely moving, managing, governing and orchestrating data across on premises and cloud based applications.

Sponsored by:

Dell Boomi View details

 
 
 

4:05 pm - 4:30 pm

Executive Exchange

 

Share:

Thought Leadership

Artificial Intelligence and Machine Learning - Turning Potential Into Reality

Situation - The potential of AI and ML is being supercharged by the increased availability of two key resources: digitised data and compute power; demanding cost-effective ways to aggregate massive data sets and access high-density compute resources. 

Complication - Successful implementation of AI/ML programmes may require firms to fundamentally reappraise existing operating infrastructure. Resources required to support the application of AI/ML in financial services are complex and require specialist expertise. 

Resolution - An ecosystem of services and providers will enable firms to successfully exploit the potential of AI/ML technologies. A recent report commissioned by Telstra reflected increasingly flexible approaches, with a varied use of cloud-based resources, colocation facilities and hosting services. 

Takeaways: 
  • Exploration of some use cases around AI/ML in financial services 
  • Identification of the key challenges from a data, compute and network perspective 
  • Investigation of technology infrastructure approaches that can best support AI/ML programmes in finance 
  • Assessment of future trends and possibilities arising from AI/ML in finance, and what is needed to turn potential into reality

Sponsored by:

Telstra View details

 
 
 

4:35 pm - 5:00 pm

Executive Exchange

 

Share:

Think Tank

Building Good Architecture Principles in an Organisation Older than California

2+ years ago we embarked on a Digital journey with the appointment of a CDO to our executive, with that came new ways of working we had tried in pockets in the past. This time the agent of change had a seat at the executive table and new ways of working began to emerge at pace.  

Our existing principles had served us well over the years but technology and delivery methods changes quickly. It was important our principles take the pace of that change into account so they can help us all make good technology decisions that reflect our ethical leadership too. 

We build a solid set of 10 principles we now work to and they are published
 https://digitalblog.coop.co.uk/2017/04/06/our-co-op-architecture-principles/ 

Takeaways:

  • Share our key learnings from the development process 
  • The key points of debate and how we resolved them 
  • How it's changed behaviours

Presented by:

Danielle Haugedal-Wilson, Head of Business Architecture & Analysis, The Co-operative Group View details

 
 

Think Tank

Robotics - Making The Most of Your Data In The Digital Transformation Journey

For most IT organizations, the way to get there is through a digital transformation framework, which produces a radically different and modern approach to technology and support that is based on a principle of business agility. It emphasizes moving quickly to adjust to the way the customer in the global techno-society wants to interact. 

Digital transformation requires a new business operating vision and a strategy on how to deliver that vision. includes technology infrastructure, tools, applications, communications, staff capabilities, staff competencies and more. The CIO has to work closely with corporate planning to define the type of support that will be needed and how the technology infrastructure and capability will evolve and to create a flexible investment plan that can be adjusted over time. Key elements must include the redesign of the technology infrastructure to reduce complexity and cost while increasing scalability, a rethinking of how business and IT work together, and an ability to quickly adopt and integrate new advanced technologies. 

Until recently, this goal has been almost impossible to achieve, because few companies have the ability to replace legacy infrastructure and applications. And it has been almost impossible to unlock legacy functionality and data for use with modern technology.


Presented by:

Michael Natusch, Global Head of Artificial Intelligence, Prudential PLC

 
 

5:05 pm - 5:30 pm

Executive Exchange

 

Share:

Think Tank

GDPR - Threat or Opportunity?

The Facts:

  • A recent Veritas survey found that: ?although 31% of those surveyed believe that they are already GDPR compliant, on inspection only 2% of respondents actually appear to be?. 
  • A McAfee survey showed that: ?only 2% of senior decision makers know the full extent of the laws that apply to their organisations?.
  • What does this mean for your organisation? 
  • Who's responsible? 

Discussion topics include: 

  • GDPR v DPA â?" What are the differences? 
  • Personal Data Processing Principles â?" Article 5. 
  • Preparing for the General Data Protection Regulations (GDPR). The Information Commissioner's Office (ICO) â?" 12 Steps 
  • Impacts. 
  • Stakeholders and Engagement. Who's responsible? 
  • Do I need to hire additional resources/dedicated GDPR Data Protection Officer (DPO)? 
  • Do I need to implement new systems? 
  • What will be the implications for non-compliance? 
  • Next steps.

Presented by:

Bill Limond, Former CIO, City of London, Platina Global Solutions View details

 
 
 

5:30 pm - 5:45 pm

Thank You Address and Closing Remarks

Presented by:

Mark Chillingworth, Editor, Icon Business Media

 
 

5:45 pm - 7:00 pm

Cocktail Reception