CIO UK Summit | May 22, 2019 | Le Meridien Piccadilly Hotel - London, UK

↓ Agenda Key

Keynote Presentation

Visionary speaker presents to entire audience on key issues, challenges and business opportunities

Keynote Presentations give attending delegates the opportunity to hear from leading voices in the industry. These presentations feature relevant topics and issues aligned with the speaker's experience and expertise, selected by the speaker in concert with the summit's Content Committee." title="Keynote Presentations give attending delegates the opportunity to hear from leading voices in the industry. These presentations feature relevant topics and issues aligned with the speaker's experience and expertise, selected by the speaker in concert with the summit's Content Committee.

Executive Visions

Panel moderated by Master of Ceremonies and headed by four executives discussing critical business topics

Executive Visions sessions are panel discussions that enable in-depth exchanges on critical business topics. Led by a moderator, these sessions encourage attending executives to address industry challenges and gain insight through interaction with expert panel members." title="Executive Visions sessions are panel discussions that enable in-depth exchanges on critical business topics. Led by a moderator, these sessions encourage attending executives to address industry challenges and gain insight through interaction with expert panel members.

Thought Leadership

Solution provider-led session giving high-level overview of opportunities

Led by an executive from the vendor community, Thought Leadership sessions provide comprehensive overviews of current business concerns, offering strategies and solutions for success. This is a unique opportunity to access the perspective of a leading member of the vendor community." title="Led by an executive from the vendor community, Thought Leadership sessions provide comprehensive overviews of current business concerns, offering strategies and solutions for success. This is a unique opportunity to access the perspective of a leading member of the vendor community.

Think Tank

End user-led session in boardroom style, focusing on best practices

Think Tanks are interactive sessions that place delegates in lively discussion and debate. Sessions admit only 15-20 participants at a time to ensure an intimate environment in which delegates can engage each other and have their voices heard." title="Think Tanks are interactive sessions that place delegates in lively discussion and debate. Sessions admit only 15-20 participants at a time to ensure an intimate environment in which delegates can engage each other and have their voices heard.

Roundtable

Interactive session led by a moderator, focused on industry issue

Led by an industry analyst, expert or a member of the vendor community, Roundtables are open-forum sessions with strategic guidance. Attending delegates gather to collaborate on common issues and challenges within a format that allows them to get things done." title="Led by an industry analyst, expert or a member of the vendor community, Roundtables are open-forum sessions with strategic guidance. Attending delegates gather to collaborate on common issues and challenges within a format that allows them to get things done.

Case Study

Overview of recent project successes and failures

Case Studies allow attending executives to hear compelling stories about implementations and projects, emphasizing best practices and lessons learned. Presentations are immediately followed by Q&A sessions." title="Case Studies allow attending executives to hear compelling stories about implementations and projects, emphasizing best practices and lessons learned. Presentations are immediately followed by Q&A sessions.

Focus Group

Discussion of business drivers within a particular industry area

Focus Groups allow executives to discuss business drivers within particular industry areas. These sessions allow attendees to isolate specific issues and work through them. Presentations last 15-20 minutes and are followed by Q&A sessions." title="Focus Groups allow executives to discuss business drivers within particular industry areas. These sessions allow attendees to isolate specific issues and work through them. Presentations last 15-20 minutes and are followed by Q&A sessions.

Analyst Q&A Session

Moderator-led coverage of the latest industry research

Q&A sessions cover the latest industry research, allowing attendees to gain insight on topics of interest through questions directed to a leading industry analyst." title="Q&A sessions cover the latest industry research, allowing attendees to gain insight on topics of interest through questions directed to a leading industry analyst.

Vendor Showcase

Several brief, pointed overviews of the newest solutions and services

Taking the form of three 10-minute elevator pitches by attending vendors, these sessions provide a concise and pointed overview of the latest solutions and services aligned with attendee needs and preferences." title="Taking the form of three 10-minute elevator pitches by attending vendors, these sessions provide a concise and pointed overview of the latest solutions and services aligned with attendee needs and preferences.

Executive Exchange

Pre-determined, one-on-one interaction revolving around solutions of interest

Executive Exchanges offer one-on-one interaction between executives and vendors. This is an opportunity for both parties to make key business contacts, ask direct questions and get the answers they need. Session content is prearranged and based on mutual interest." title="Executive Exchanges offer one-on-one interaction between executives and vendors. This is an opportunity for both parties to make key business contacts, ask direct questions and get the answers they need. Session content is prearranged and based on mutual interest.

Open Forum Luncheon

Informal discussions on pre-determined topics

Led by a moderator, Open Forum Luncheons offer attendees informal, yet focused discussions on current industry topics and trends over lunch." title="Led by a moderator, Open Forum Luncheons offer attendees informal, yet focused discussions on current industry topics and trends over lunch.

Networking Session

Unique activities at once relaxing, enjoyable and productive

Networking opportunities take various unique forms, merging enjoyable and relaxing activities with an environment conducive to in-depth conversation. These gatherings allow attendees to wind down between sessions and one-on-one meetings, while still furthering discussions and being productive." title="Networking opportunities take various unique forms, merging enjoyable and relaxing activities with an environment conducive to in-depth conversation. These gatherings allow attendees to wind down between sessions and one-on-one meetings, while still furthering discussions and being productive.

 

Wednesday, May 22, 2019 - CIO UK Summit

8:00 am - 8:45 am

Registration & Networking Breakfast

 

8:45 am - 8:55 am

Welcome Address & Opening Remarks

Presented by:

Joel Roxburgh, Director of Lean Transformation, Bupa

 
 

8:55 am - 9:25 am

Keynote Presentation

Bringing Down the Barriers

With the role of the CIO expanding, CIOs are being pushed to increase digital business by using IT in ways that deliver cost saving methods and increased levels of productivity, as well as new opportunities. However, many believe that current methods for these opportunities have reached their end. As a result, it is time to reconfigure these methods in new, unique ways.

Takeaways:

  1. Latest strategies or methods to increase digital business
  2. How to confront resiliency or resistance to new digital initiatives
  3. The different types of behavioral patterns or mindsets to confront

Presented by:

Maarten Ectors, Chief Innovation Officer, Legal & General Group View details

 
 
 

9:30 am - 9:55 am

Executive Exchange

 

Think Tank

Avoiding The Pain

As most , if not all, tier 1 banks are heavily under cyber-attack 24 / 7 and need to have a robust defense. Get a frontline perspective of a 4 year project Barclays has undertaken and is now on the last leg. This is a lessons learned session - appropriate across industry. 

Takeaways: 

  1. Looking at resources to up your cybersecurity posture. 
  2. Look out for the bear traps. 
  3. Identifying capabilities and appropriate applications. 
  4. Looking at fundamental steps to grow your Cyber Threat Detection and Strategy.

Presented by:

Paul Gillen, Managing Director Of Cyber Security Operations, Barclays

 
 

10:00 am - 10:25 am

Executive Exchange

 

Share:

Thought Leadership

Mobile-centric Zero Trust Security Framework

Traditional security models designed on the premise of organizations having a well-defined IT perimeter no longer apply in the perimeter-less world. Passwords based security, which assumed that users operated and accessed business information only form within the enterprise IT perimeter were adequate in the past. But in today's IT environment, where users are accessing information from a variety of untrusted devices, apps, networks, locations, and services - passwords alone are no longer sufficient. It should be no surprise that passwords are still the number 1 cause of data breaches. According to the Verizon Data Breaches Investigations report - 81% of breaches involved weak or stolen passwords. This is because passwords are easily compromised.

In the reality of today's security world how does an organization protect itself? With a Zero Trust approach and framework to security. Zero trust assumes that bad actors are already in the network and secure access is determined by an 'always verify, never trust' approach. Zero trust approach requires that you verify the device, user, apps, networks, and presence of threats before granting access. In addition, you should have on-going enforcement. But with many theories about Zero trust how do you ensure you've taken the right approach.

CIOs and CISOs face three big challenges: 

  • Drive business innovation with mobile productivity by giving employees the ability to use mobile, cloud, and endpoints. 
  • Enforce corporate security without impacting the user experience.
  • Redefine enterprise security strategies to address a perimeter-less environment.

Sponsored by:

MobileIron View details

 
 

Alex Mosher, Global VP Solutions, MobileIron View details

 
 
 

10:30 am - 10:40 am

Morning Networking Coffee Break

 

10:45 am - 11:10 am

Executive Exchange

 

Share:

Executive Boardroom

Moving from a Traditional Router-centric WAN to a Business-driven SD-WAN

Go Beyond the 'Software Defined' and move to 'Self Driving Network', tell the network what the business wants, then use automation and machine learning to just make it work. 

What you will take away from this session: 

  • Not all SDN Solutions are created equal 
  • Automation is key to the Self Driving Network 
  • Machine to Machine learning is critical for Cloud based application success 
  • The Network is now a Business Enabler

Sponsored by:

Silver Peak Systems View details

 
 

Simon Pamplin, EMEA Technical Sales Director, Silver Peak Systems View details

 
 
 

11:15 am - 11:40 am

Executive Exchange

 

Share:

Executive Boardroom

Silent Killers - The Cyber-Attacks You Don't See In The News

In order to protect your organization against cyber-attacks in all their forms, it is essential that you go beyond the headlines to know who might target you, and why. However, despite the enormity of the cyber-attacks that make the headlines - Equifax, Maersk, Sony Pictures, for example - the majority of compromised companies rarely become part of the public vernacular, giving the false impression that it is only a small handful of companies with obvious assets of value that are breached. Even the attacks that do make the headlines are rarely attributed to any particular group, making the threat landscape seem intangible and nebulous, when it is anything but. Disclosed even less frequently are the long-term consequences of being breached, such as gradual erosion of the bottom line, or even going out of business altogether. 

Takeaways: 

  • The hidden economic impact of unreported cyber-attacks on countries, enterprises, and people -and in particular, investors. 
  • How and why such attacks are much more prolific and wide reaching than you would expect? 
  • The reasons why this is a growing problem? 
  • Our exclusive whitepaper - Rethinking Response, a copy of which can be found on your chair.

Sponsored by:

Countercept View details

 
 

Peter Cohen, Director, Countercept View details

 
 
 

11:45 am - 12:10 pm

Executive Exchange

 

Share:

Think Tank

Culture Eats Strategy for Breakfast

Embarking upon a Digital Transformation isn't solely about the technology deployed. The impact upon an organisation both in IT and the business is significant, as Peter Drucker famously said "Culture eats strategy for breakfast" and the success of the transformation and ultimately the organisational objectives will live or die on the support of its people. This session will discuss the foundational building blocks that need to be in place and considerations before and during the transformational change.  

Takeaways:  
  1. Leadership and effective change are as important as the technology itself. 
  2. Don't make a change and then just sit back and wait for the next five years of business as usual It's about organizational agility

Presented by:

Victoria Higgin, CIO & VP IT Transformation, National Grid

 
 

12:15 pm - 12:40 pm

Executive Exchange

 

Share:

Thought Leadership

Are We Safer Today Than 2 Years Ago, When NotPetya Caused Mayhem?

Two weeks ago 1E published one of the largest studies on the state of endpoint management and security. The results were surprising, businesses are just as vulnerable as they were when NotPetya hit and are getting breached more often than we care to imagine. There is good news as well รข?" there are simple answers which cost very little. In this presentation 1E's Founder and CEO, Sumir Karayi, presents the study results, guidance by the ex-cyber security advisor to the White House and discusses how 1E's solutions address the concerns of a modern business, from both a security and operational viewpoint. This session is particularly useful for executives responsible for operations and security.

Sponsored by:

1E View details

 
 

Sumir Karayi, CEO, 1E View details

 
 
 

12:40 pm - 1:30 pm

Working Lunch & Panel

Women in IT - Building a High-Performance Team for Digital Transformation

Digital Transformation has quickly become a top item on the agenda for every organization. CIOs and CISOs are being called upon as beacons of clarity to usher organizations through their digital transformations, but doing so requires a talented, high-performance team.  

This veteran panel of your peers will focus on what it takes to attract, hire and retain a talented, high-performance IT organization to lead transformation in the digital age.

Panelists:

Julie Pierce, Director Openness, Data & Digital, Food Standards Agency View details

 
 

Victoria Higgin, CIO & VP IT Transformation, National Grid

 
 

1:35 pm - 2:00 pm

Executive Exchange

 

Share:

Thought Leadership

3 Best Practices for Application Security (and Bonus Tip)

Applications are the lifeblood of the enterprise, but as the threats multiply, as applications move to the cloud, as legacy applications need to be maintained, and as organizations seek competitive advantage with new technologies and faster release cycles, it's easy to see that application security can be a thankless, endless and challenging job. 

Imperva has distilled three best practices (and a bonus tip) that help enterprises of any size vastly improve and simplify application security, accelerate threat detection and operationalize application security in a dynamic world where change is the only constant.

Sponsored by:

Imperva View details

 
 

Peter Lee, Principal Sales Engineer, Imperva View details

 
 
 

2:05 pm - 2:30 pm

Executive Exchange

 

Think Tank

Winning the Budget Battle

All's well with putting into place a Digital Transformation strategy and action plan, but what happens when the CFO asks you to reduce budget? The session will cover not only getting buy in the budget, but fighting the good fight.

Presented by:

Rabinder Bassi, CIO, Omnicom Group

 
 

2:35 pm - 3:00 pm

Executive Exchange

 

Think Tank

AI: a CISO's Best Friend

It does not take an expert to know that information security threats will only continue to increase. That said, AI is proving to be a worthy defense against these threats. Leading enterprise organizations are investing and relying on AI-based security systems and analytics. As this trend continues, AI-defense will only continue to grow and improve. 

Takeaways: 

  1. The future of AI-based security and how it will impact your organization 
  2. The latest threats and how AI-based security can help 
  3. Create awareness for your stakeholders to gain support behind AI-based security systems

Presented by:

David Lochhead, BISO UK, Zurich Insurance Group

 
 

3:00 pm - 3:10 pm

Afternoon Networking Coffee Break

 

3:15 pm - 3:40 pm

Executive Exchange

 

Think Tank

Securing Your Business

With 2018's major hacks and breaches, people are becoming increasingly concerned about how organizations in both the public and private sector are using their information. More importantly, there is serious alarm as these organizations that are not proactively addressing these concerns. 

Takeaways:  

  1. Why Information Security?
  2. Why Quality Assurance?
  3. Why Business Continuity Management?

Presented by:

Ledum Maeba, Head of Information Security, Avanti Communications Group plc View details

 
 
 

3:45 pm - 4:10 pm

Executive Exchange

 

Think Tank

GDPR Causing Confusion with Cloud Technology

Security is and will continue to be an issue within cloud technology especially with recent regulations such as the General Data Protection Regulation (GDPR). Because of the advantages and opportunities of the cloud, organizations will likely rush into cloud technologies without being fully aware of the security risks. After GDPR came into effect, there is now an even greater responsibility on organizations to manage their data compliantly as they continue transformations towards the cloud. 

Takeaways: 

  1. How GDPR affects your organization's security and cloud services 
  2. Discuss the threats that cloud technologies present and how your organization may be more vulnerable 
  3. Regulations' impact on the future of cloud security

Presented by:

Steven Wright, CISO & GDPR Advisor, Bank of England

 
 

4:15 pm - 5:00 pm

9/11 My Survival

9/11 is a day we will never forget. British BAFTA winning documentary film maker Paul Berriff was in the street beneath the twin towers filming with the New York Fire Department's assistant commissioner when the towers collapsed. Paul was knocked unconscious as the South Tower came down on top of him. He was laying in the debris when 30 minutes later the North Tower also collapsed on him. Paul tells the story of what happened to him, his family, his film crew and others leading up to that terrible event on September 11th 2001. It was a day when Paul had planned for his family to be sightseeing on the roof of the tower at the time the planes struck but, through fate, his plans had to be cancelled at the last minute. This is a dramatic and emotional presentation with film and audio from one of the hijacked planes as well as from those trapped in the towers. Paul tells the minute by minute drama of himself as he arrived under the towers that morning, the collapse and how he miraculously survived with his life and film footage which become some of the most iconic imagery filmed that day.

Presented by:

Paul Berriff, international award-winning documentary film maker, Producer, Director, Cinematographer and fine art photographer, PB Cinematography

 
 

5:00 pm - 6:30 pm

Summit Happy Hour