CIO Calgary Summit | September 27, 2018 | Calgary, AB, Canada

↓ Agenda Key

Keynote Presentation

Visionary speaker presents to entire audience on key issues, challenges and business opportunities

Keynote Presentations give attending delegates the opportunity to hear from leading voices in the industry. These presentations feature relevant topics and issues aligned with the speaker's experience and expertise, selected by the speaker in concert with the summit's Content Committee." title="Keynote Presentations give attending delegates the opportunity to hear from leading voices in the industry. These presentations feature relevant topics and issues aligned with the speaker's experience and expertise, selected by the speaker in concert with the summit's Content Committee.

Executive Visions

Panel moderated by Master of Ceremonies and headed by four executives discussing critical business topics

Executive Visions sessions are panel discussions that enable in-depth exchanges on critical business topics. Led by a moderator, these sessions encourage attending executives to address industry challenges and gain insight through interaction with expert panel members." title="Executive Visions sessions are panel discussions that enable in-depth exchanges on critical business topics. Led by a moderator, these sessions encourage attending executives to address industry challenges and gain insight through interaction with expert panel members.

Thought Leadership

Solution provider-led session giving high-level overview of opportunities

Led by an executive from the vendor community, Thought Leadership sessions provide comprehensive overviews of current business concerns, offering strategies and solutions for success. This is a unique opportunity to access the perspective of a leading member of the vendor community." title="Led by an executive from the vendor community, Thought Leadership sessions provide comprehensive overviews of current business concerns, offering strategies and solutions for success. This is a unique opportunity to access the perspective of a leading member of the vendor community.

Think Tank

End user-led session in boardroom style, focusing on best practices

Think Tanks are interactive sessions that place delegates in lively discussion and debate. Sessions admit only 15-20 participants at a time to ensure an intimate environment in which delegates can engage each other and have their voices heard." title="Think Tanks are interactive sessions that place delegates in lively discussion and debate. Sessions admit only 15-20 participants at a time to ensure an intimate environment in which delegates can engage each other and have their voices heard.

Roundtable

Interactive session led by a moderator, focused on industry issue

Led by an industry analyst, expert or a member of the vendor community, Roundtables are open-forum sessions with strategic guidance. Attending delegates gather to collaborate on common issues and challenges within a format that allows them to get things done." title="Led by an industry analyst, expert or a member of the vendor community, Roundtables are open-forum sessions with strategic guidance. Attending delegates gather to collaborate on common issues and challenges within a format that allows them to get things done.

Case Study

Overview of recent project successes and failures

Case Studies allow attending executives to hear compelling stories about implementations and projects, emphasizing best practices and lessons learned. Presentations are immediately followed by Q&A sessions." title="Case Studies allow attending executives to hear compelling stories about implementations and projects, emphasizing best practices and lessons learned. Presentations are immediately followed by Q&A sessions.

Focus Group

Discussion of business drivers within a particular industry area

Focus Groups allow executives to discuss business drivers within particular industry areas. These sessions allow attendees to isolate specific issues and work through them. Presentations last 15-20 minutes and are followed by Q&A sessions." title="Focus Groups allow executives to discuss business drivers within particular industry areas. These sessions allow attendees to isolate specific issues and work through them. Presentations last 15-20 minutes and are followed by Q&A sessions.

Analyst Q&A Session

Moderator-led coverage of the latest industry research

Q&A sessions cover the latest industry research, allowing attendees to gain insight on topics of interest through questions directed to a leading industry analyst." title="Q&A sessions cover the latest industry research, allowing attendees to gain insight on topics of interest through questions directed to a leading industry analyst.

Vendor Showcase

Several brief, pointed overviews of the newest solutions and services

Taking the form of three 10-minute elevator pitches by attending vendors, these sessions provide a concise and pointed overview of the latest solutions and services aligned with attendee needs and preferences." title="Taking the form of three 10-minute elevator pitches by attending vendors, these sessions provide a concise and pointed overview of the latest solutions and services aligned with attendee needs and preferences.

Executive Exchange

Pre-determined, one-on-one interaction revolving around solutions of interest

Executive Exchanges offer one-on-one interaction between executives and vendors. This is an opportunity for both parties to make key business contacts, ask direct questions and get the answers they need. Session content is prearranged and based on mutual interest." title="Executive Exchanges offer one-on-one interaction between executives and vendors. This is an opportunity for both parties to make key business contacts, ask direct questions and get the answers they need. Session content is prearranged and based on mutual interest.

Open Forum Luncheon

Informal discussions on pre-determined topics

Led by a moderator, Open Forum Luncheons offer attendees informal, yet focused discussions on current industry topics and trends over lunch." title="Led by a moderator, Open Forum Luncheons offer attendees informal, yet focused discussions on current industry topics and trends over lunch.

Networking Session

Unique activities at once relaxing, enjoyable and productive

Networking opportunities take various unique forms, merging enjoyable and relaxing activities with an environment conducive to in-depth conversation. These gatherings allow attendees to wind down between sessions and one-on-one meetings, while still furthering discussions and being productive." title="Networking opportunities take various unique forms, merging enjoyable and relaxing activities with an environment conducive to in-depth conversation. These gatherings allow attendees to wind down between sessions and one-on-one meetings, while still furthering discussions and being productive.

 

Thursday, September 27, 2018 - CIO Calgary Summit

7:00 am - 7:55 am

Registration and Networking Breakfast

 

8:00 am - 8:10 am

Welcome Address and Opening Remarks

 

8:10 am - 8:40 am

Keynote Presentation

HP Presents: The Mindset of Hacker

As Sun Tzu famously said, "to know your enemy, you must become your enemy." This session is a unique opportunity to do just that. Join Canada's most infamous reformed hacker, Michael "MafiaBoy" Calce, as he sheds light on the biggest threat to today's CISO. Michael's presentation will provide a unique perspective on hackers' motives and tactics by highlighting the more unique methods and entry points targeted by today's cyber criminals.

 

8:45 am - 9:15 am

Keynote Presentation

Maximize your Competitive Edge with Cognitive Technologies

Today's sophisticated analytics and ever-evolving cognitive technologies are enabling organizations to respond rapidly to customer demands with a competitive edge.  Progressive IT executives are adopting next generation cloud and services to increase operational efficiency and service quality with speed and security - all while delivering on LOB objectives. 

Join IBM's Mickey Iqbal as he shares:

  • How leading IT executives are applying automation and self-learning technologies to turn unmanageable amounts of services-related data into insights that spur business growth. 
  • Customer case studies that demonstrate the benefits of IBM's emerging, open standards-based integrated delivery platform.
 

9:20 am - 9:45 am

Executive Exchange

 

Thought Leadership

Become a Change Agent for Business Transformation

Today's modern CIO is embarking on a digital transformation journey exploring radical hybrid IT strategies and leveraging new technologies like Cloud, Social, Mobile and Big Data. However, with 'keeping the lights on' legacy IT components costing nearly 90% of a typical IT budget, how can IT make powerful advancements and lead business change? 

Join this interactive session to learn how award-winning CIOs are successfully tipping the balance by liberating people, time and money from costly ongoing maintenance of their ERP systems including SAP and Oracle, to invest in strategic initiatives that create real-world competitive advantage.

 

9:50 am - 10:15 am

Executive Exchange

 

Executive Boardroom

Technology in Transition - Delivering Peace of Mind

With shrinking budgets and resources, CIOs are challenged with deploying technologies that address: a new workplace demographic, a more mobile workforce, cost reductions, and driving efficiencies, while at the same time providing innovation to the business. However, without adoption, even the best solutions fail. 

Ensuring that workplace technologies are easy and intuitive to use is critical to their success. 

We will discuss the evolution of the distributed workforce including: increasing efficiencies and effectiveness, reducing costs, meeting and exceeding customer expectations, and innovative technologies รข?" all with a proven path to adoption through familiar interfaces. We will also discuss options for you to consider to deliver these strategic enablers into your business.

Executive Boardroom

Improving Email Deliverability AND Security

It may seem self-evident, but email is still the predominant form of business communication whether in B2B or B2C channels with business sending over 100 billion emails each and every day. Not all of this traffic is legitimate, desired, or safe however with estimates that as much as 90% of all email traffic can be considered spam or worse. In this environment businesses need to ensure that the email they send is viewed as trustworthy, and that the mail they receive is safe of threats. To do this email authentication is imperative and DMARC, Domain-based Message Authentication, Reporting, and Conformance is the gold standard. While DMARC policies are published to public DNS servers and already protect up to 60% of mailboxes for the most part these are public mailboxes from consumer email providers and many businesses are still on the outside looking in. Savvy IT Leaders know that they need to leverage commercial solutions that streamline DMARC management for their own email infrastructure to ensure they are protected from threats, and able to communicate with partners, clients, and prospects.  

Takeaways:  

  • Email authentication is essential in today's spam-centric world to ensure deliverability of key business communications 
  • Email authentication also ensures businesses are protected from the myriad email based security threats that assail them every day 
  • DMARC provides this protection but management can be convoluted and time consuming without focused management solutions
 

10:20 am - 10:30 am

Morning Networking Coffee Break

 

10:35 am - 11:00 am

Executive Exchange

 

Think Tank

Evolving From Legacy To Achieve Digital Transformation

For most IT organizations, the way to get there is through a digital transformation framework, which produces a radically different and modern approach to technology and support that is based on a principle of business agility. It emphasizes moving quickly to adjust to the way the customer in the global techno-society wants to interact. 

Digital transformation requires a new business operating vision and a strategy on how to deliver that vision. includes technology infrastructure, tools, applications, communications, staff capabilities, staff competencies and more. The CIO has to work closely with corporate planning to define the type of support that will be needed and how the technology infrastructure and capability will evolve and to create a flexible investment plan that can be adjusted over time. Key elements must include the redesign of the technology infrastructure to reduce complexity and cost while increasing scalability, a rethinking of how business and IT work together, and an ability to quickly adopt and integrate new advanced technologies. 

Until recently, this goal has been almost impossible to achieve, because few companies have the ability to replace legacy infrastructure and applications. And it has been almost impossible to unlock legacy functionality and data for use with modern technology.

Think Tank

IoT and IT/OT

M2M type technologies. In many cases these older industrial automation initiatives used proprietary communications protocols and dedicated sensors that interfaced with controllers that could manage communications between IT and OT platforms. Fast forward to an IoT world however and these sensors and controllers will need to natively speak IP, natively integrate to back-end enterprise systems beyond just simple controllers, systems such as ERP, BI and other core platforms. Navigating the complexity of process, data, security, and functionality implications has the potential to be a minefield for the unwitting IT executive that goes in without eyes wide open. 

Takeaways:  

  • IT/OT integration is a low-hanging fruit area for IoT adoption 
  • Existing investments into older M2M IT/OT integrations however can erode any potential value 
  • Before investing in IoT enabled IT/OT integration careful consideration must be made of the implications and whether value can be realized - does the investment justify the returns over what is already in place?
 

11:05 am - 11:30 am

Executive Exchange

 

Thought Leadership

Realizing the Enterprise of Things - Securing Corporate IP, Data and Communications Across Multiple Endpoints

Organizations today need to securely enable their mobile workers, while allowing for a rich user experience - but how do you effectively balance the two as new device types proliferate and the lines between desktops, laptops, tablets, smartphones, wearables and even IoT blur? How does the enterprise stay in control? 

This session will examine best practices in approaching data security, endpoint management and communication & collaboration with wide support for different operating systems, form factors, and ownership models in your organization's Enterprise of Things journey.

 

11:35 am - 12:00 pm

Executive Exchange

 

Executive Boardroom

Disaster Recovery and Preparing for the Inevitable

Like death and taxes, IT outages are an inevitability whether as the result of power loss, telecommunications outage, or any one of a myriad other potential technical and non-technical issues. In this environment, the savvy CIO knows that what matters most is preparation " being ready for that next outage with an IT infrastructure that is both resilient and flexible and Disaster Recovery procedures that allow for efficient and effective recovery, balancing Recovery Time and Recovery Point objectives with appropriate cost. Disasters happen but with proper planning they don't have to be disastrous to your business.

Takeaways:

  • In the event of a severe outage, businesses without a Disaster Recovery plan are at a significant disadvantage when it comes to recoverability and viability
  • DR planning cannot be an at all costs proposition and appropriate planning must take into account reasonable Recovery Time and Recovery Point objectives
  • Catastrophic outages get the press but are the thin end of the wedge " minor service interruptions are far more common and must be planned for as well

Executive Boardroom

The Enterprise Immune System: Using Machine Learning for Next-Generation Cyber Defense

From insiders to sophisticated external attackers, the reality of cyber security today is that the threat is already inside. A fundamentally new approach to cyber defense is needed to detect and investigate these threats that are already inside the network - before they turn into a full-blown crisis. 

Based on unsupervised machine learning and probabilistic mathematics developed by specialists from the University of Cambridge, new ?immune system' technologies are capable of learning the ?self' of an organization. By analyzing every network, device, and user, and modeling them as they go about their day-to-day activity, the Enterprise Immune System can establish a highly accurate understanding of normal behavior. It can therefore spot abnormal activity as it emerges, and even take precise, measured actions to automatically curb the threat. 

Rules and signatures are not keeping pace with today's rapidly evolving cyber attacks. The Enterprise Immune System represents a fundamental step-change in automated cyber defense, is relied upon by organizations around the world, and can cover up to millions of devices. 

In this session, learn:

  • How new machine learning and mathematics are automating advanced cyber defense
  • Why 100% network visibility allows you to detect threats as they happen, or before they happen
  • How smart prioritization and visualization of threats allows for better resource allocation and lower risk
  • Real-world examples of unknown threats detected by ?immune system' technology
 

12:05 pm - 12:30 pm

Executive Exchange

 

Fireside Chat

IT Security Awareness

Be Secure - Take a measured, risk-based approach to what is secured and how to secure it. Be Vigilant - Monitor systems, applications, people, and the outside environment to detect incidents more effectively. Be Resilient - Be prepared for incidents and decrease their business impact by improving organizational preparedness to address cyber incidents before they escalate. 

Takeaways: 

  • Managing cyber risks as a team and strategies for deployment of enterprise and emerging technologies 
  • Actively monitor the dynamic threat landscape 
  • Retain and use lessons learned

 

12:35 pm - 1:20 pm

Networking Luncheon

 

1:25 pm - 1:50 pm

Executive Exchange

 

Think Tank

Shadow IT - To Embrace or Eliminate?

Best practice in most enterprises, at least as far as the CIO and CISO goes, is to squash Shadow IT wherever it is encountered. Shadow IT, the argument goes, leads to a world of data and integration problems for the IT department, and significant amounts of unknown and unquantifiable risk for the information security group. A small but vocal minority however is beginning to advocate for Shadow IT as a catalyst of innovation, citing the increases in productivity and creativity by allowing enterprise staff to find their own out of the box solutions to organizational problems. CISOs can allow their organizations to have their cake (Shadow IT) and eat it too (still be secure) by following a few simple steps that allow them to build in security regardless of user activity. 

Takeaways: 
  • Shadow IT is not malicious activity; it is simply the Line of Business user community looking to be efficient and effective 
  • A well-developed security program can take Shadow IT into account and incorporate protection mechanisms that allow end user flexibility 
  • Embracing Shadow IT does not mean no holds barred and end users need to understand the limit of the boundaries and the reason for their existence

Think Tank

Planning for a MultiCloud Future

The promise of the cloud is almost beyond compare; infinite computing resources, unmatched reliability and uptime, instantaneous service availability, simplistic self-service and provisioning, and the low-low prices of a buy by the drink model. These are the reasons behind the rush to the cloud that we are currently experiencing, but the wholesale adoption does bring a downside " as more and more capability is moved to the cloud, more and more cloud providers are utilized since, for the most part, each provider offers only a limited suite of services. The MultiCloud environment that creates a new set of challenges that IT leaders need to overcome, notably resiliency, interoperability/integration, and security and compliance through careful planning and the lessons learned from building complex on premise distributed systems. 

Takeaways: 

  • As enterprises move to the cloud, MultiCloud environments will increasingly become the norm, not the exception 
  • Consistent planning and thoughtful architecture will be essential to efficient and effective cloud deployments 
  • IT leaders do not need to be alarmed, they've been down the complex environment path before, but they do need to be careful
 

1:55 pm - 2:20 pm

Executive Exchange

 

Executive Boardroom

Big Data Analytics and the Impact on Fraud

Financial fraud is, unfortunately a huge business, with annual losses so massive that were Fraud a country, it would have the fifth highest global GDP. While enterprises in the financial services sector have always used analytical processes to detect and limit those losses, as technology moves forward the analytical capabilities that can be brought to bear increase in exponentially in capability and those on the leading edge are able to see, and stop, more fraud in less time. Just as Big Data capabilities are bringing significant business benefit to other aspects of the business, they can to fraud mitigation but several challenges need to be overcome for maximum efficiency. Only by addressing quality, volume, security, and integration challenges and by further ensuring the right staff with the right skills are in place can benefits actually be realized.

Takeaways:  

  • The increased use of unmanned technology combined with ever quicker financial transaction processing has created a world ripe for the proliferation of fraud  
  • In a fight fire with fire approach, those same machine learning approaches can be repurposed to analyze transactions looking for the needle in the needlestack that is the illicit one  
  • A Big Data approach only works with the right foundation; garbage in garbage out has never been more true and data and process rigor is essential to success


Executive Boardroom

The Year of Ransomware: Can Technology Alone Prevent Phishing Attacks and Breaches?

As ransomware and phishing attacks continue to grow in number and sophistication, organizations need to reconsider their current security strategy. Companies continue to invest billions of dollars in technology to shore up their defenses against these threats. But is that enough? Is complete reliance on technology the answer? Or should we focus on the human and human behavior?

 

2:25 pm - 2:50 pm

Executive Exchange

 

Executive Boardroom

How to Reinvent your Company's Future by Investing in Disruptive IT

Business strategy and technology have become inseparable - and it's changing how the game is played. This session will help you define the disruptive architecture needed to build the technology innovations that will deliver the most value to your organization - and demonstrate this value to your company's stakeholders. 

Join IBM's distinguished engineer, Doug Kinnaird, to discover:

  • How to ensure that your IT strategy and capabilities are aligned to realize business transformation.
  • Best practices and examples that will guide your cognitive journey including where to best apply infrastructure as a service (IaaS) cognitive technologies.

Executive Boardroom

Cyber-Espionage and the Advanced Persistent Threat

More and more C-level executives are realizing that cyber security is not just an IT function given the far-reaching and direct impact that cyber security threats can have on current and future business operations. As is evidenced in recent reports from security providers such as Mendicant, McAfee, SentinelOne and others, cyber espionage attacks by APT actors are breaching organizations both large and small, public and private. Whether the objective is Intellectual Property (IP), M&A information, financial records, or other business-sensitive protected data losses can result in significant brand, reputation, and financial impacts. To counter these risks, CISOs need to realize that traditional security techniques are insufficient, and that a new tier of security solutions are required to defend against the APT attack. 

Takeaways:  

  • The era of cheap, powerful, and unique security threats is upon us and in this era traditional tools are insufficient 
  • These Advanced Persistent Threats can be targeted at any organization, not just the biggest and the richest 
  • Tools that allow for quick detection AND dynamic response are key; it's not just finding the door is open, but closing it quickly that is key
 

2:55 pm - 3:20 pm

Executive Exchange

 

Think Tank

The Unbearable Lightness of Digital Transformation

Building a Disruptive Technology Digital team. To become fully digital enterprises, you need to shift the focus inward and innovate the employee experience. Is this defined as how employees feel about their organizations with regard to both opportunities for growth/skills development, and employees' willingness to continue to work for their current firms? Use digital DNA behaviors. 

Takeaways: 

  • Look after -Capability Planning, Innovation, Strategic Intelligence, Predictive Analytics, Disruptive Technology, Enterprise Architecture, Strategic Roadmap, M&A, Patents and Communication.
 

3:25 pm - 3:35 pm

Afternoon Networking Coffee Break

 

3:40 pm - 4:05 pm

Executive Exchange

 

Innovation Showcase

An exclusive opportunity to be exposed to the hottest new solutions providers in a quick-hit format designed to whet the appetite and spark immediate interest.
 

4:10 pm - 4:35 pm

Executive Exchange

 

Think Tank

Disrupting Markets with Disruptive Technologies

While the combination of Social, Mobile, Analytics, and Cloud have been present and disrupting IT departments and enterprises as a whole for over two years now, in many ways organizations have still not fully embraced them, have still not fully leveraged them. These new platforms allow organizations radically new ways to go to market, allowing for broad scale deployment of systems of engagement that create dynamic relationships with clients and prospects. Finding the resources, wherewithal, and ability to fully commit to these technologies and the capabilities they create has proven to be a struggle for many, but a struggle that can be overcome by leveraging the right partners that bring the right skills and experiences to bear.

Takeaways:

  • Social, Mobile, Analytics, and Cloud are all here to stay; each one adds value to enterprises but collectively that value increases exponentially
  • The manner in which these technologies are implemented, operated, and utilized is different than the foregoing systems of record we are used to
  • Unique skills and capabilities are required to leverage the power and value of these platforms, skills and capabilities that can be in short supply
 

4:40 pm - 5:20 pm

Executive Visions

Facilitating Technology-Enabled Business Transformation

The role of the modern IT Executive is more complex than it has ever been before, not just because the technology landscape has become more complex, but also because increasingly IT execs have had to become a business-focused executive, not just a technologist. Long have we talked about the CIO and CISO getting a seat at the table but modern businesses are now demanding that their technology impresario join them and leverage his deep and rich technical acumen to allow the organization as a whole to better position itself for market-place success. To be successful, CxOs need to invest in themselves, in their personnel, and in the right technologies to allow them to position the IT department to proactively address business needs as an innovator and driver, rather than order-taker and enabler.

Takeaways:

  • IT leadership can no longer be simply technology focused, but must instead take their visibility into business process and become business focused
  • A broader business-focus does not preclude maintaining technology excellence however and indeed may demand more of it than ever before
  • Success for CxOs will be measured not in how they can enable enterprise decisions, but in how they can drive growth
 

5:20 pm - 5:30 pm

Thank You Address and Closing Remarks

 

5:30 pm - 7:00 pm

Cocktail Reception