CDO Summit Canada | Apr 22-24, 2018 | Ottawa, ON, Canada
↓ Agenda Key
Keynote Presentation
Visionary speaker presents to entire audience on key issues, challenges and business opportunities
Keynote Presentations give attending delegates the opportunity to hear from leading voices in the industry. These presentations feature relevant topics and issues aligned with the speaker's experience and expertise, selected by the speaker in concert with the summit's Content Committee." title="Keynote Presentations give attending delegates the opportunity to hear from leading voices in the industry. These presentations feature relevant topics and issues aligned with the speaker's experience and expertise, selected by the speaker in concert with the summit's Content Committee.
Executive Visions
Panel moderated by Master of Ceremonies and headed by four executives discussing critical business topics
Executive Visions sessions are panel discussions that enable in-depth exchanges on critical business topics. Led by a moderator, these sessions encourage attending executives to address industry challenges and gain insight through interaction with expert panel members." title="Executive Visions sessions are panel discussions that enable in-depth exchanges on critical business topics. Led by a moderator, these sessions encourage attending executives to address industry challenges and gain insight through interaction with expert panel members.
Thought Leadership
Solution provider-led session giving high-level overview of opportunities
Led by an executive from the vendor community, Thought Leadership sessions provide comprehensive overviews of current business concerns, offering strategies and solutions for success. This is a unique opportunity to access the perspective of a leading member of the vendor community." title="Led by an executive from the vendor community, Thought Leadership sessions provide comprehensive overviews of current business concerns, offering strategies and solutions for success. This is a unique opportunity to access the perspective of a leading member of the vendor community.
Think Tank
End user-led session in boardroom style, focusing on best practices
Think Tanks are interactive sessions that place delegates in lively discussion and debate. Sessions admit only 15-20 participants at a time to ensure an intimate environment in which delegates can engage each other and have their voices heard." title="Think Tanks are interactive sessions that place delegates in lively discussion and debate. Sessions admit only 15-20 participants at a time to ensure an intimate environment in which delegates can engage each other and have their voices heard.
Roundtable
Interactive session led by a moderator, focused on industry issue
Led by an industry analyst, expert or a member of the vendor community, Roundtables are open-forum sessions with strategic guidance. Attending delegates gather to collaborate on common issues and challenges within a format that allows them to get things done." title="Led by an industry analyst, expert or a member of the vendor community, Roundtables are open-forum sessions with strategic guidance. Attending delegates gather to collaborate on common issues and challenges within a format that allows them to get things done.
Case Study
Overview of recent project successes and failures
Case Studies allow attending executives to hear compelling stories about implementations and projects, emphasizing best practices and lessons learned. Presentations are immediately followed by Q&A sessions." title="Case Studies allow attending executives to hear compelling stories about implementations and projects, emphasizing best practices and lessons learned. Presentations are immediately followed by Q&A sessions.
Focus Group
Discussion of business drivers within a particular industry area
Focus Groups allow executives to discuss business drivers within particular industry areas. These sessions allow attendees to isolate specific issues and work through them. Presentations last 15-20 minutes and are followed by Q&A sessions." title="Focus Groups allow executives to discuss business drivers within particular industry areas. These sessions allow attendees to isolate specific issues and work through them. Presentations last 15-20 minutes and are followed by Q&A sessions.
Analyst Q&A Session
Moderator-led coverage of the latest industry research
Q&A sessions cover the latest industry research, allowing attendees to gain insight on topics of interest through questions directed to a leading industry analyst." title="Q&A sessions cover the latest industry research, allowing attendees to gain insight on topics of interest through questions directed to a leading industry analyst.
Vendor Showcase
Several brief, pointed overviews of the newest solutions and services
Taking the form of three 10-minute elevator pitches by attending vendors, these sessions provide a concise and pointed overview of the latest solutions and services aligned with attendee needs and preferences." title="Taking the form of three 10-minute elevator pitches by attending vendors, these sessions provide a concise and pointed overview of the latest solutions and services aligned with attendee needs and preferences.
Executive Exchange
Pre-determined, one-on-one interaction revolving around solutions of interest
Executive Exchanges offer one-on-one interaction between executives and vendors. This is an opportunity for both parties to make key business contacts, ask direct questions and get the answers they need. Session content is prearranged and based on mutual interest." title="Executive Exchanges offer one-on-one interaction between executives and vendors. This is an opportunity for both parties to make key business contacts, ask direct questions and get the answers they need. Session content is prearranged and based on mutual interest.
Open Forum Luncheon
Informal discussions on pre-determined topics
Led by a moderator, Open Forum Luncheons offer attendees informal, yet focused discussions on current industry topics and trends over lunch." title="Led by a moderator, Open Forum Luncheons offer attendees informal, yet focused discussions on current industry topics and trends over lunch.
Networking Session
Unique activities at once relaxing, enjoyable and productive
Networking opportunities take various unique forms, merging enjoyable and relaxing activities with an environment conducive to in-depth conversation. These gatherings allow attendees to wind down between sessions and one-on-one meetings, while still furthering discussions and being productive." title="Networking opportunities take various unique forms, merging enjoyable and relaxing activities with an environment conducive to in-depth conversation. These gatherings allow attendees to wind down between sessions and one-on-one meetings, while still furthering discussions and being productive.
3:00 pm - 5:00 pm
5:00 pm - 6:00 pm
As more businesses undergo a digital transformation, and as those digital transformations become more ingrained into organizational culture, Digital becomes not something unique and different from the business, but a core component of every aspect of the business. As this shift occurs, IT itself faces the very real possibility of no longer being something unique from the business, but instead a component of every aspect of the business. In this world, what role then exists for IT Leaders? Two clear paths are presenting themselves รข?" one leads to a focus on infrastructure and integration, to keeping the lights on for the digital innovators, while the other leads to information and innovation itself. Knowing what path to choose, how to choose it, and how to see it through will be one of the greatest challenges CxOs of this era will face.
Takeaways:
6:00 pm - 7:00 pm
7:00 pm - 8:30 pm
8:30 pm - 10:00 pm
7:00 am - 7:55 am
8:00 am - 8:10 am
8:10 am - 8:40 am
While much of the early focus on blockchain and distributed ledger adoption had been focused into the financial services sector, the technology that promises ultimate levels of verifiability and auditability of transactions has clear benefits to the retail sector, far beyond simply accepting Bitcoin. Whether it be to streamline entry into new markets by reducing the overhead required, or enhance trust and transparency in traditional markets by providing permanent and unalterable transaction records, the technology has clear applicability. Though distributed ledger systems such as blockchain are still in their early days, CIOs owe it to themselves to begin investigating the technology and understanding both its applicability and it's limitations and challenges to best position themselves for potential adoption.
Takeaways:
8:45 am - 9:15 am
As Sun Tzu famously said, to know your enemy, you must become your enemy. This session is a unique opportunity to do just that. Join Canada's most infamous reformed hacker, Michael MafiaBoy Calce, as he sheds light on the biggest threat to today's CISO. Michael's presentation will provide a unique perspective on hackers' motives and tactics by highlighting the more unique methods and entry points targeted by today's cyber criminals
9:20 am - 9:45 am
Today's modern CIO is embarking on a digital transformation journey exploring radical hybrid IT strategies and leveraging new technologies like Cloud, Social, Mobile and Big Data. However with 'keeping the lights on' legacy IT components costing nearly 90% of a typical IT budget, how can IT make powerful advancements and lead business change?
Join this interactive session to learn how award-winning CIOs are successfully tipping the balance by liberating people, time and money from costly ongoing maintenance of their ERP systems including SAP and Oracle, to invest in strategic initiatives that create real-world competitive advantage.
9:50 am - 10:15 am
Big Data is moving from experimentation to production implementation across all industries. This transition is being driven by the wealth of new business opportunities introduced by the connected devices, data and analytics known as the Internet of Things (IoT). In this session, we will introduce industry research and actual case studies to illustrate the strategies leading organizations are implementing and the dramatic results they are recognizing. These cases highlight how vast data assets are being operationalized for improved decision making and monetized for new revenue generation. The session will be an interactive discussion on the use cases, technologies and strategies implemented or planned within the group.
10:20 am - 10:30 am
10:35 am - 11:00 am
Massive communities in every enterprise are now highly
functional on their mobile platforms and as a result handling confidential and
sensitive information on devices that have varying degrees of security.
As a group let us share some insights on the challenges and the strategies to
protect this growing piece of the enterprise infrastructure.
Recent IOT attacks in the US have crippled major internet points of presence. As a leader in the deployment and us of IOT, as a group we can share some insights on how organizations can work with their infrastructure partners to better protect themselves from IOT related cyber threats.
11:05 am - 11:30 am
How bad is it? When a breach occurs, how confident are you that you can quantify the impact to the organization in language they understand?
This session describes the requirements for closing the gap: Complete visibility, to paint an accurate picture of what's happening across the environment. Faster insight, through better analytics and detection capabilities. Business context around incidents. And finally, more effective response, where security teams are certain they are taking the right actions to reduce risk and are sure they are protecting what matters most.
Attendees will:
11:35 am - 12:00 pm
There is no doubt that Innovation is one of the hottest words used in the corporate world today. What does it mean and why should we adopt the culture? In spite of most understanding the need for constant improvement, evolution and disruption, very few are successful in execution. The conflict between trying something new and not introducing change to risk stability is real dilemma. Remaining the same and doing it the way that it has always been done? is not an option. How do we find the balance between changing for the sake of change vs. changing for capability and survival? Successful CIOs need to establish a culture of innovation, finding a way to make the change to their own organization before a competitor does.
Takeaways:
12:05 pm - 12:45 pm
Join the region's leading cyber security executives as they share current best practices and explore new proactive strategies and policies to combat and withstand threats.
Understanding that breaches will occur, security executives must work with senior leaders and boards of directors to assess value, measure costs, and identify risk to then properly architect and implement a comprehensive security program.
Topics to include:
12:50 pm - 1:35 pm
1:40 pm - 2:05 pm
Data quality is one of the most critical issues facing every enterprise and whether data be duplicate, stale, incomplete, invalid, conflicting or just plain incorrect the impact of enterprise decision making and ultimately enterprise success and be significant and severe. As the number of data sources grows, as the speed with which data is collected and utilized increases, and as the raw volume expands almost exponentially, the impacts of poor data quality becomes more significant than ever before. IT executives must build strong data governance capabilities to ensure that enterprise data is kept unique, timely, complete, valid, consistent, and accurate.
Takeaways:
2:10 pm - 2:35 pm
During this session, Holly Whalen will cover how Artificial Intelligence is able to detect and prevent from sophisticated unknown malware which are undetected using traditional machine learning. 2015 Intel Security report identified the unknown malware challenge correlated to 1 million net new pieces of malware in the wild, every single day, roughly 42 net new pieces of malware in the wild every hour. Early 2016 reports indicate these numbers have doubled. The sophistication of the unknown malware problem now includes malware that is being developed using traditional machine learning. During this session, Holly Whalen will share the advancements in Artificial Intelligence " deep learning, discovered in 2012 via a University Toronto research team, funded by the Canadian Federal government. These advancements to the Artificial Intelligence community have resulted in an artificial brains decision making capability that surpasses the human error rate, regardless of its application: Facial Recognition, Voice Recognition, Content, Cybersecurity.
Takeaways:
2:40 pm - 3:05 pm
2016 is certainly shaping up to be the year of the ransomware attack. As ransomware and phishing attacks continue to grow in number and sophistication, organizations need to reconsider their current security strategy. Companies continue to invest billions of dollars in technology to shore up their defenses against these threats. But is that enough? Is complete reliance on technology the answer? Or should we focus on the human and human behavior?
3:10 pm - 3:35 pm
Executives have challenges in terms of attracting or retaining new talent into long established organizations, and maximizing the potential of a multi-generational team. How to structure an organization in the new world with a blend of full-time, contract, and specialized resources and leveraging communities and crowds, in order to maximize flexibility and agility. Position your organization to more rapidly and easily adopt and implement new technologies by embracing the multi-generational workforce.
Takeaways:
3:40 pm - 3:50 pm
3:55 pm - 4:20 pm
Big Data initiatives have become a reality among almost every company today, however, what we have seen is lots of initiatives have become just science projects and did not deliver on early expectations. This situation needs to reversed quickly because those organizations that are being successful with Big Data and analytics programs are rapidly leaving those that are unsuccessful in their wake. Big Data and analytics has the potential to be transformational for the enterprise, but IT leaders need to be making the right investments, in the right areas, to ensure optimal success. This discussion will focus on how to use data and analytics to drive true business success and show some real examples of companies and individuals who made a difference.
Takeways:
4:25 pm - 4:50 pm
Android represents the most common and most popular mobile device operating system and any businesses developing for an external audience absolutely must ensure that Android is a supported platform in the capabilities it offers. However, Android is also the most unsecure platform with as much as 95% of all mobile malware inexistence targeting that platform and so businesses that allow mobility within their organization must very carefully consider that threat before they allow Android devices to connect. Rationalizing that dichotomy of a device that will be common and popular amongst the workforce yet at the same time represents a dire threat to enterprise security is an issue that every CIO and CISO must address.
Takeaways:
4:55 pm - 5:20 pm
Like death and taxes, IT outages are an inevitability whether as the result of power loss, telecommunications outage, or any one of a myriad other potential technical and non-technical issues. In this environment, the savvy CIO knows that what matters most is preparation " being ready for that next outage with an IT infrastructure that is both resilient and flexible and Disaster Recovery procedures that allow for efficient and effective recovery, balancing Recovery Time and Recovery Point objectives with appropriate cost. Disasters happen but with proper planning they don't have to be disastrous to your business.
Takeaways:
5:25 pm - 5:35 pm
Join us for an introduction to the Canadian Cyber Threat Exchange, and overview of our goals, and an update on our activities to date.
5:40 pm - 5:50 pm
Join us for an introduction to the CIO Association of Canada, an overview of our goals, and an update on our activities to date.
5:50 pm - 6:30 pm
6:30 pm - 8:00 pm
8:00 pm - 10:00 pm
7:00 am - 8:00 am
8:10 am - 8:40 am
Of all the risk management issues that present themselves to the modern-day CISO, perhaps the most difficult to address is that of privacy. In and of itself, privacy is no different a challenge than protecting any other sensitive information, however the multi-jurisdictional impacts of the issue due to wildly differing laws between the US and European countries (as well as Canada, another country with strong privacy laws) make this an issue that is often times overwhelming to address. CISOs must work diligently to ensure that their privacy efforts conform with the standards of any jurisdiction with which they might work, where their data might be held and this is an almost overwhelming task.
Takeaways:
8:45 am - 9:15 am
Speed and agility are two terms spoken together far more often as digital transformation changes how work gets done and how customers engage with an organization. Digital transformation impacts all tasks that customers go through to engage with your organization and that your employees work through on a minute-by-minute basis. IT needs to respond, and quickly. According to "IDC ICT 2017 Predictions", 47% of survey Canadian business executives investing in digital transformation to re-invent workflows and processes to reduce cost and increase agility. By doing so, the replacement of manual tasks with automated business processes allows greater operational visibility and control.
Please join Michael Cardy, Chief Strategist for Red Hat Canada, as he describes how Canadian private and public organizations are modernizing and standardizing technology stacks and processes; automating and integrating their infrastructure, and introducing new approaches to delivering digital applications.
9:20 am - 9:45 am
Organizations are challenged to keep their IT infrastructure under lock and key without comprehensive visibility into the current state of network defenses. Change is constant - especially in the realm of network access and protection, where emerging business requirements demand continual adjustment of defenses. Security policies almost always grow in size and complexity over time, and as change takes its toll on the existing rule base, unseen exposures are sure to emerge. Organizations of every industry face IT security compliance demands. Ensuring that mandated controls are always in place is vital. Join FireMon for an interactive and thought provoking discussion.
Topics to be discussed include:
9:50 am - 10:15 am
One of a CISO's most significant responsibilities and greatest challenges is communicating security risk and security performance in a way that resonates with senior management and the board quickly and concisely. Effectively managing the SMT and board communications arms the executives with the information they need to provide appropriate guidance to the CISO, as well as support. In this session we will discuss effective strategies for communicating risk, security team performance and approaches to benchmark against peers.
10:20 am - 10:30 am
10:35 am - 11:00 am
The promise of the cloud is almost beyond compare; infinite computing resources, unmatched reliability and uptime, instantaneous service availability, simplistic self-service and provisioning, and the low-low prices of a buy by the drink model. These are the reasons behind the rush to the cloud that we are currently experiencing, but the wholesale adoption does bring a downside " as more and more capability is moved to the cloud, more and more cloud providers are utilized since, for the most part, each provider offers only a limited suite of services. The MultiCloud environment that creates a new set of challenges that IT leaders need to overcome, notably resiliency, interoperability/integration, and security and compliance through careful planning and the lessons learned from building complex on premise distributed systems.
Takeaways:
11:05 am - 11:45 am
Since almost the very beginning of the IT department, much of the focus of IT professionals has been on integrating systems, applications, and data sets; on tying together the various components of the enterprise to drive single versions of the truth, and streamlined operational capabilities. As IT becomes more complex however, IT Leaders need to find a way to break this cycle or risk becoming mired in ever increasing integration webs, webs that demand 100% of their time and 100% of their budget. Future-proofed IT Leaders will break this cycle by deploying solutions that are inherently integrated because they are engineered to be integrated from the ground up. With integration a non-issue, these execs will be free to focus time and resources on the real challenges of the enterprise: driving growth.
Takeaways:
11:45 am - 11:55 am
12:00 pm - 1:00 pm