CIO UK Summit | March 18, 2021 | Virtual Summit - Real-time Online Conversations
↓ Agenda Key
Keynote Presentation
Visionary speaker presents to entire audience on key issues, challenges and business opportunities
Keynote Presentations give attending delegates the opportunity to hear from leading voices in the industry. These presentations feature relevant topics and issues aligned with the speaker's experience and expertise, selected by the speaker in concert with the summit's Content Committee." title="Keynote Presentations give attending delegates the opportunity to hear from leading voices in the industry. These presentations feature relevant topics and issues aligned with the speaker's experience and expertise, selected by the speaker in concert with the summit's Content Committee.
Executive Visions
Panel moderated by Master of Ceremonies and headed by four executives discussing critical business topics
Executive Visions sessions are panel discussions that enable in-depth exchanges on critical business topics. Led by a moderator, these sessions encourage attending executives to address industry challenges and gain insight through interaction with expert panel members." title="Executive Visions sessions are panel discussions that enable in-depth exchanges on critical business topics. Led by a moderator, these sessions encourage attending executives to address industry challenges and gain insight through interaction with expert panel members.
Thought Leadership
Solution provider-led session giving high-level overview of opportunities
Led by an executive from the vendor community, Thought Leadership sessions provide comprehensive overviews of current business concerns, offering strategies and solutions for success. This is a unique opportunity to access the perspective of a leading member of the vendor community." title="Led by an executive from the vendor community, Thought Leadership sessions provide comprehensive overviews of current business concerns, offering strategies and solutions for success. This is a unique opportunity to access the perspective of a leading member of the vendor community.
Think Tank
End user-led session in boardroom style, focusing on best practices
Think Tanks are interactive sessions that place delegates in lively discussion and debate. Sessions admit only 15-20 participants at a time to ensure an intimate environment in which delegates can engage each other and have their voices heard." title="Think Tanks are interactive sessions that place delegates in lively discussion and debate. Sessions admit only 15-20 participants at a time to ensure an intimate environment in which delegates can engage each other and have their voices heard.
Roundtable
Interactive session led by a moderator, focused on industry issue
Led by an industry analyst, expert or a member of the vendor community, Roundtables are open-forum sessions with strategic guidance. Attending delegates gather to collaborate on common issues and challenges within a format that allows them to get things done." title="Led by an industry analyst, expert or a member of the vendor community, Roundtables are open-forum sessions with strategic guidance. Attending delegates gather to collaborate on common issues and challenges within a format that allows them to get things done.
Case Study
Overview of recent project successes and failures
Case Studies allow attending executives to hear compelling stories about implementations and projects, emphasizing best practices and lessons learned. Presentations are immediately followed by Q&A sessions." title="Case Studies allow attending executives to hear compelling stories about implementations and projects, emphasizing best practices and lessons learned. Presentations are immediately followed by Q&A sessions.
Focus Group
Discussion of business drivers within a particular industry area
Focus Groups allow executives to discuss business drivers within particular industry areas. These sessions allow attendees to isolate specific issues and work through them. Presentations last 15-20 minutes and are followed by Q&A sessions." title="Focus Groups allow executives to discuss business drivers within particular industry areas. These sessions allow attendees to isolate specific issues and work through them. Presentations last 15-20 minutes and are followed by Q&A sessions.
Analyst Q&A Session
Moderator-led coverage of the latest industry research
Q&A sessions cover the latest industry research, allowing attendees to gain insight on topics of interest through questions directed to a leading industry analyst." title="Q&A sessions cover the latest industry research, allowing attendees to gain insight on topics of interest through questions directed to a leading industry analyst.
Vendor Showcase
Several brief, pointed overviews of the newest solutions and services
Taking the form of three 10-minute elevator pitches by attending vendors, these sessions provide a concise and pointed overview of the latest solutions and services aligned with attendee needs and preferences." title="Taking the form of three 10-minute elevator pitches by attending vendors, these sessions provide a concise and pointed overview of the latest solutions and services aligned with attendee needs and preferences.
Executive Exchange
Pre-determined, one-on-one interaction revolving around solutions of interest
Executive Exchanges offer one-on-one interaction between executives and vendors. This is an opportunity for both parties to make key business contacts, ask direct questions and get the answers they need. Session content is prearranged and based on mutual interest." title="Executive Exchanges offer one-on-one interaction between executives and vendors. This is an opportunity for both parties to make key business contacts, ask direct questions and get the answers they need. Session content is prearranged and based on mutual interest.
Open Forum Luncheon
Informal discussions on pre-determined topics
Led by a moderator, Open Forum Luncheons offer attendees informal, yet focused discussions on current industry topics and trends over lunch." title="Led by a moderator, Open Forum Luncheons offer attendees informal, yet focused discussions on current industry topics and trends over lunch.
Networking Session
Unique activities at once relaxing, enjoyable and productive
Networking opportunities take various unique forms, merging enjoyable and relaxing activities with an environment conducive to in-depth conversation. These gatherings allow attendees to wind down between sessions and one-on-one meetings, while still furthering discussions and being productive." title="Networking opportunities take various unique forms, merging enjoyable and relaxing activities with an environment conducive to in-depth conversation. These gatherings allow attendees to wind down between sessions and one-on-one meetings, while still furthering discussions and being productive.
8:30 am - 8:45 am
8:45 am - 9:15 am
HSBC has taken digital transformation to new heights in banking and wealth management over the past few years. 2020 saw that transformation accelerate as they shifted to newer digital business initiatives and thus, changed their business model around the customer experience. Join Gavin Munroe, Global CIO, Wealth and Personal Banking, HSBC for our Keynote presentation as he examines how an agile approach has positioned HSBC to take traditional banking into newer digital arenas in 2021 with a focus on security and attention to customer engagement.
Presented by:
Gavin Munroe, Global CIO For Wealth And Personal Banking, HSBC
9:15 am - 9:45 am
Many technologists have had their departments shift from being cost centers to revenue generators for their organizations. That isn't the only shift that is coming for tech executives. Margins are reduced and expectations are high. Innovation has to move faster. Leadership has to evolve. Risk has a whole new meaning in 2021. Business continuity is just one of many complex business challenges creating unanticipated market turbulence. Join us to gain insight into how tech leaders are turning complexity and chaos into real strategy execution initiatives.
Sponsored by:
Cisco Systems
9:45 am - 10:05 am
At a time when the threat landscape ever expanding, two out of three organizations worldwide claim to have a lack of the IT security staff needed. The need for cybersecurity professionals is at an all-time high. The deficit of qualified individuals has made the need for automated security tools more of a requirement than a desire in order to maintain a strong security foundation. Today's products and technologies can enable even small teams to appropriately secure multiple websites and applications, offering potential answers to the pressing recruitment issues.
Takeaways;
Presented by:
Giles Ashton-Roberts, Chief Information Security Officer, FirstGroup
10:05 am - 10:25 am
The traditional paradigm of investing in protection of known threats alone has been declining over recent years, as attackers become more adaptable and capable. Combine this with increased threats and attacker ingenuity, it is small wonder that a CISO's role has become more complex. This leads to the inevitability of a security incident where the complex environments and inventive attacks collide.
This presentation looks at three fundamentals:
Sponsored by:
SentinelOne
Presented by:
Thom Langford, Security Advocate, SentinelOne
10:25 am - 10:45 am
Any transformation calls for more than just a focus on technology. The role of culture, leadership, new ways of working, empowerment and developing your teams into innovative leaders everywhere should be high on your agenda:
Presented by:
Paul Jackman, Chief Information Officer, Motor Insurers Bureau
From a buzz to a buy for many organizations, Zero Trust has become the "must have" for tech leaders in 2021. For Zero Trust initiatives to succeed, they must be accompanied by an eyes-wide-open rollout that recognizes the cultural impact on the organization, and ways to lead, educate and nurture the adoption process. This starts with leadership all the way down to the entire staff to understand the "why" and "how" of Zero Trust initiatives. This session will dive into best practices around Zero Trust and how to get buy in across your organization.
Key Takeaways;
Presented by:
Peter Taylor, Security and Data Protection Officer, Group & Operational Risk, UK Asset Resolution
10:45 am - 11:05 am
Cybercrime is on the rise, costing the global economy trillions per year. With cybercrime-as-a-service and hacking tools readily available, critical data assets and company reputations are at risk. As threat campaigns evolve, understanding how your adversaries are working and what they are targeting can help you ensure a better cyber defence. Join Alex Jinivizian as he discusses how cybercrime has become an industry and shares insight into how phishing and ransomware campaigns work.
Key takeaways:
Sponsored by:
eSentire
Presented by:
Alex Jinivizian, Vice President of Strategy and International Marketing, eSentire
11:05 am - 11:25 am
Lee will give us a short introduction into why AI in the
first place, what are the challenges, and why AI in Rolls-Royce?
He will then explore the ethical and trustworthiness challenges, for example bias and AI mutation, associated with implementing AI into business, both critical and non-critical business areas. He will develop this further to describe how Rolls-Royce undertook the development and deployment of implementation frameworks to ensure the ethical and trustworthy deployment of AI (the Aletheia Framework ™), and the embedding of these into 'business as usual' procedures.
Presented by:
Lee Glazier, Head of Service Integrity - Civil Aerospace, Rolls-Royce
During this session, Sanjay will look at the definitions of vulnerability management and discuss what the subject means at a practical level to different stakeholder groups.
He will describe the types tools that can be used to support vulnerability management. He will discuss both the organisational and technical challenges that organisations can face when implementing a vulnerability management programme. He will also share key takeaways from his experience in leading Worldline's global vulnerability management programme.
Presented by:
Sanjay Kapoor, CISO, UK&I, Worldline Global
11:25 am - 11:45 am
Many companies are already undergoing a change from the familiar culture of presence to a hybrid work model. This is an ongoing process that does not happen overnight. It includes formulating precise performance targets for employees, strengthening interaction in the team, also via digital channels, maintaining a regular exchange of information and sensitizing managers to continuously obtain feedback from their teams in order to improve processes.
Join this session as we discuss how to best prepare ourselves and our employees for 'The New Normal'.
Takeaways;
Sponsored by:
Zoom
11:45 am - 12:05 pm
You may not have ever heard of NHS Resolution, but they handle the claims and litigations for the NHS. Not only that, they are driving one of the biggest digital transformations in healthcare. Niamh McKenna, CIO, NHS Resolution joins J.D. Miller, Vice President, CDM Media for a fireside chat as they discuss how to lead a legacy organization into a digital transformation with so much at stake. From modernizing legacy systems, to taking a fresh look at data, to keeping that data safe and secure during a time where ransomware is a top concern รข?" the two will share a roadmap that will help you drive digital transformation within your own organization.
Presented by:
Niamh Mckenna, CIO, NHS RESOLUTION
12:05 pm - 12:25 pm
Today's digital evolution will take major enterprises twice as long and cost twice as much as initially anticipated. They will likely struggle with digital innovation as they realize the associated challenges and costs within modernization. As such, smaller and more agile organizations have a great opportunity to be first to market, while larger organizations suffer through uninspiring immediate benefits.
Takeaways;
Sponsored by:
Zerto
The average employee uses at least 3 different mobile devices to access business data. This number has risen and so has the amount of company data that is being stored on each device. Each device represents another endpoint that needs to be secured. While mobile malware threats are low, it's expected that there will be a rise in data breaches directly related to mobile devices. Providing access to company data via a secure web application infrastructure with real-time vulnerability management is one way of reducing risk with mobile devices.
Takeaways;
Sponsored by:
Snyk
12:25 pm - 12:45 pm
In a world turned upside down by the global pandemic, is there room to embed a sustainable cyber security culture? If your organisation is ready to embrace a culture with security at its heart, what does it really mean and what does it take? As cyber criminals continue to up their game and use sophisticated techniques to hijack company, customer and personal information, how does culture help to protect and sustain your business?
This session covers three fundamentals that next-generation CISOs, CIOs and IT leaders will appreciate as we continue to adapt the way we work to protect against cyber crime:
Presented by:
Anna-Lisa Miller, Group CISO, Spectris
12:45 pm - 1:05 pm
Work used to be a place: the office. But 2020 was anything but a traditional year, and just like Humpty Dumpty's great fall scattered his pieces all around the wall, the office shattered into pieces last year as almost everyone went into lockdown. But, unlike Humpty, the pieces were not broken. They were still functioning, as skilled staff worked from home. In 2021 firms are responding with more flexible work-from-home policies and sometimes setting up smaller branch offices. Now comes the reckoning: how do we go from temporary to permanent arrangements securely? How do we ensure that work-from-anywhere rhymes with secure-from-anywhere? Joe Robertson, CISO for EMEA at Fortinet, will discuss how to extend your cyber-defensive perimeter into homes and to your branch offices. So that your organization's tale can be more in the Disney style than Brothers Grimm.
1:05 pm - 1:25 pm
This year will offer a wake-up call for many, as the overall cost of getting data wrong will be realized. Chief Data and Analytics Officers (CDAOs) and CIOs focusing on AI will rest assured knowing their teams have what they need when it comes to data. One of the major obstacles is sourcing data from a complex portfolio of applications and convincing gatekeepers to say yes. Effectively using intelligent automation will require compelling efforts in data cleansing, integration, and management that IT will need to support. Correcting previous data issues in legacy systems can be a considerable hurdle to leap, especially for larger enterprises. Top organizations will increase, and possibly double, their data strategy budget.
Takeaways
Presented by:
Kathleen Moore, Chief Information Officer, Automation,Utilities & Innovation, HSBC
1:25 pm - 1:45 pm
From a buzz to a buy for many organizations, Zero Trust has become the "must have" for tech leaders in 2021. For Zero Trust initiatives to succeed, they must be accompanied by an eyes-wide-open rollout that recognizes the cultural impact on the organization, and ways to lead, educate and nurture the adoption process. This starts with leadership all the way down to the entire staff to understand the "why" and "how" of Zero Trust initiatives. This session will dive into best practices around Zero Trust and how to get buy in across your organization.
1:45 pm - 2:05 pm
Hyperautomation is a key strategic component of the digitally enabled organizations and the top trend in emerging technologies. Robotic Process Automation (RPA) is the core technology that enables the Hyperautomation. RPA software robots automate manual, repetitive and mundane human tasks and brings processing speed, cost savings andquality. RPA technology can be extended by artificial intelligence and analytics capabilities to offer smarter and more advanced intelligent automation solutions.
Key Takeaways:
2:05 pm - 2:25 pm
2:25 pm - 2:45 pm
Cybersecurity technologies to identify, protect, detect, respond and recover are extremely important, but not sufficient. HumanOS upgrade is required to safely use the Internet and it is not only about training and awareness. It is about the way users must behave online and the IT community must openly acknowledge system vulnerabilities. Humans are the weakest and strongest links in Cybersecurity.
Presented by:
Flavio Aggio, Chief Information Security Officer, World Health Organization
2:45 pm - 2:55 pm