↓ Agenda Key
Visionary speaker presents to entire audience on key issues, challenges and business opportunities
Keynote Presentations give attending delegates the opportunity to hear from leading voices in the industry. These presentations feature relevant topics and issues aligned with the speaker's experience and expertise, selected by the speaker in concert with the summit's Content Committee." title="Keynote Presentations give attending delegates the opportunity to hear from leading voices in the industry. These presentations feature relevant topics and issues aligned with the speaker's experience and expertise, selected by the speaker in concert with the summit's Content Committee.
Panel moderated by Master of Ceremonies and headed by four executives discussing critical business topics
Executive Visions sessions are panel discussions that enable in-depth exchanges on critical business topics. Led by a moderator, these sessions encourage attending executives to address industry challenges and gain insight through interaction with expert panel members." title="Executive Visions sessions are panel discussions that enable in-depth exchanges on critical business topics. Led by a moderator, these sessions encourage attending executives to address industry challenges and gain insight through interaction with expert panel members.
Solution provider-led session giving high-level overview of opportunities
Led by an executive from the vendor community, Thought Leadership sessions provide comprehensive overviews of current business concerns, offering strategies and solutions for success. This is a unique opportunity to access the perspective of a leading member of the vendor community." title="Led by an executive from the vendor community, Thought Leadership sessions provide comprehensive overviews of current business concerns, offering strategies and solutions for success. This is a unique opportunity to access the perspective of a leading member of the vendor community.
End user-led session in boardroom style, focusing on best practices
Think Tanks are interactive sessions that place delegates in lively discussion and debate. Sessions admit only 15-20 participants at a time to ensure an intimate environment in which delegates can engage each other and have their voices heard." title="Think Tanks are interactive sessions that place delegates in lively discussion and debate. Sessions admit only 15-20 participants at a time to ensure an intimate environment in which delegates can engage each other and have their voices heard.
Interactive session led by a moderator, focused on industry issue
Led by an industry analyst, expert or a member of the vendor community, Roundtables are open-forum sessions with strategic guidance. Attending delegates gather to collaborate on common issues and challenges within a format that allows them to get things done." title="Led by an industry analyst, expert or a member of the vendor community, Roundtables are open-forum sessions with strategic guidance. Attending delegates gather to collaborate on common issues and challenges within a format that allows them to get things done.
Overview of recent project successes and failures
Case Studies allow attending executives to hear compelling stories about implementations and projects, emphasizing best practices and lessons learned. Presentations are immediately followed by Q&A sessions." title="Case Studies allow attending executives to hear compelling stories about implementations and projects, emphasizing best practices and lessons learned. Presentations are immediately followed by Q&A sessions.
Discussion of business drivers within a particular industry area
Focus Groups allow executives to discuss business drivers within particular industry areas. These sessions allow attendees to isolate specific issues and work through them. Presentations last 15-20 minutes and are followed by Q&A sessions." title="Focus Groups allow executives to discuss business drivers within particular industry areas. These sessions allow attendees to isolate specific issues and work through them. Presentations last 15-20 minutes and are followed by Q&A sessions.
Analyst Q&A Session
Moderator-led coverage of the latest industry research
Q&A sessions cover the latest industry research, allowing attendees to gain insight on topics of interest through questions directed to a leading industry analyst." title="Q&A sessions cover the latest industry research, allowing attendees to gain insight on topics of interest through questions directed to a leading industry analyst.
Several brief, pointed overviews of the newest solutions and services
Taking the form of three 10-minute elevator pitches by attending vendors, these sessions provide a concise and pointed overview of the latest solutions and services aligned with attendee needs and preferences." title="Taking the form of three 10-minute elevator pitches by attending vendors, these sessions provide a concise and pointed overview of the latest solutions and services aligned with attendee needs and preferences.
Pre-determined, one-on-one interaction revolving around solutions of interest
Executive Exchanges offer one-on-one interaction between executives and vendors. This is an opportunity for both parties to make key business contacts, ask direct questions and get the answers they need. Session content is prearranged and based on mutual interest." title="Executive Exchanges offer one-on-one interaction between executives and vendors. This is an opportunity for both parties to make key business contacts, ask direct questions and get the answers they need. Session content is prearranged and based on mutual interest.
Open Forum Luncheon
Informal discussions on pre-determined topics
Led by a moderator, Open Forum Luncheons offer attendees informal, yet focused discussions on current industry topics and trends over lunch." title="Led by a moderator, Open Forum Luncheons offer attendees informal, yet focused discussions on current industry topics and trends over lunch.
Unique activities at once relaxing, enjoyable and productive
Networking opportunities take various unique forms, merging enjoyable and relaxing activities with an environment conducive to in-depth conversation. These gatherings allow attendees to wind down between sessions and one-on-one meetings, while still furthering discussions and being productive." title="Networking opportunities take various unique forms, merging enjoyable and relaxing activities with an environment conducive to in-depth conversation. These gatherings allow attendees to wind down between sessions and one-on-one meetings, while still furthering discussions and being productive.
3:00 pm - 4:30 pm
4:30 pm - 6:00 pm
With the continued economic pressures, new regulations, low interest rates, increased customer demands, and new digital technologies - never was it more important in business to challenge the status quo, to encourage change and innovation so as to help companies achieve efficiencies in costs, scale and to enable growth. However, with approximately 80% of the I.T. budget dedicated to operations, leaving only 20% available for discretionary initiatives, how are CIOs making the case for transformations that will drive dramatic effective change in the business processes, technology, operation models and data quality.
Join us as we explore this issue and examine some of the successful strategies that are being leveraged by top I.T. leaders.
Ursuline Foley, CIO, Corporate Platform Officer & Interim Chief Data Officer at XL Group Ltd, XL Group
6:00 pm - 7:30 pm
7:00 am - 7:55 am
8:00 am - 8:10 am
8:10 am - 8:40 am
Fruitful vendor partnerships are increasingly critical to the ever-changing enterprise, and in this session, Omar Khawaja shares essential tactics for ensuring your third-party partners are up to the challenge of true, trusted security.
Omar Khawaja, CISO, Highmark
8:45 am - 9:15 am
While Information Security has existed for decades, Enterprise Risk Management (ERM), as a formal and holistic practice, is much newer yet already has taken pre-eminence over its forebear. What is the CISO, who in many ways has toiled in invisibility, infamy, or ignominy to do when faced with the issue of being supplanted by the Chief Risk Officer, just as enterprise demand for and focus on security has reached all-time heights? Savvy CISOs will recognize this new, broader need for holistic visibility into, and management of, overall enterprise risk and will position themselves for success by looking beyond traditional information security boundaries and engaging business partners around all enterprise risk.
9:20 am - 9:45 am
The Financial Services industry, fueled by a "perfect storm" of interrelated and synergistic trends, is facing fundamental disruption. The confluence of maturing technologies, evolving demographics, the rise of non-traditional competitors, and increased customer expectations is placing increased pressure on traditional institutions to evaluate where and how they will play in this disrupted and re-architected ecosystem. At the same time, leading organizations are taking productive steps toward enabling themselves to reposition. This session will speak to best practices, based on Dell EMC experience, to help companies be successful in the new world.
9:50 am - 10:15 am
10:20 am - 10:30 am
10:35 am - 11:00 am
As insurers of all shapes and sizes stare down the time-consuming and inherently risky proposition of a core systems replacement, increasingly they are beginning to consider the adoption of public cloud to facilitate this. As SaaS solutions become available they offer the possibility of a plug-and-play end-to-end solution while IaaS allows insurers to maintain a greater measure of control while deploying a new system in parallel minimizing risk and simultaneously controlling cost. Cloud migrations are never completely straightforward however, and many of the tools targeted at insurers are still in their early days. Insurance, by definition, is an industry focused on the mitigation of risk and insurance IT leaders need to be vigilant as they consider their cloud options for core systems replacement.
Feroz Merchhiya, CTO, California Insurance Guarantee Association
The benefits of rationalizing the IT portfolio are clear, including: Simplification, cost reduction, and driving innovation. However, initiating enterprise rationalization projects can be a daunting task. In this discussion, we will review a practical ?bootstrap? approach to help organizations identify opportunities for rationalization of their IT products, systems, and applications. This forum is also an opportunity to share experiences with industry veterans and colleagues; leaving you armed with ideas to start the IT transformation process.
Byron Gregg`, VP Enterprise Technology, Fidelity Investments
11:05 am - 11:30 am
Today's modern CIO is embarking on a digital transformation journey exploring radical hybrid IT strategies and leveraging new technologies like Cloud, Social, Mobile and Big Data. However with 'keeping the lights on' legacy IT components costing nearly 90% of a typical IT budget, how can IT make powerful advancements and lead business change?
Join this interactive session to learn how award-winning CIOs are successfully tipping the balance by liberating people, time and money from costly ongoing maintenance of their ERP systems including SAP and Oracle, to invest in strategic initiatives that create real-world competitive advantage.
11:35 am - 12:00 pm
From a technology standpoint, as a society the world of business has gone through two distinct stages in the evolution of its information security focus. The first addressed network based protection and preventative controls such as firewalls and anti-malware. The second looked at data-centric and detective controls such as encryption and intrusion/extrusion monitoring. Since breaches continue to occur at a record pace, what is need new is clearly a new evolution, one that pushes towards individual focused security through granular user monitoring and management as provided by solutions such as Identity and Access Management. While IAM isn't a new technology field, it is one whose time has come and CISO need to begin investing in modern-day, light-weight, easy to implement IAM solutions now to stay ahead of the curve, and reduce enterprise threats.
The breach onslaught demonstrates that existing security solutions are incapable of defending current threats
Enterprises need to begin looking at security from an activity perspective rather than an artifact perspective
IAM provides activity insight, and therefore threat awareness, no other platform can equal
12:05 pm - 12:30 pm
Digital transformation is a trend that is sweeping every industry, not just insurance, but in many ways the insurance industry is one that is seen as lagging behind. Early digitalization efforts that focused on the reduction in cost to serve have resulted in modest savings, but the next wave, the wave that focuses on truly customized client interaction, is the one that stands to offer the greatest benefit. Life is transient in nature and by engaging in a series of ongoing, personalized customer interactions, insurers allow themselves to be positioned at the hub of each individual client's changing circumstances, becoming facilitators of that change, and agents of mitigation of the risk associated with it. To do so however requires a focused digital strategy that can only be fueled by focused investments in information technology.
Rebecca Wanta, CEO & President, RSW1C Consulting
If you are in IT, you ignore your analytics community at your peril - - their data appetite is insatiable, no amount too much, no frequency too often, no speed fast enough. You want to enable them, but also must put appropriate governance around data usage and data management, assuring the right data is used, the right way, and that costs are managed and standards maintained. But how?
H.P. Bunaes, Senior Vice President and Business Information Officer, Sun Trust Bank
12:35 pm - 1:20 pm
1:25 pm - 1:50 pm
The world of technology changes at a blinding pace. Some of these new technologies have provided great benefits, enabling IT to provide expanded functionality, greater efficiencies, and improved performance. Technology has changed the way insurers interact with customers, agents, and regulators. But there is also a set of technologies waiting to be proved within the industry which despite showing some promise, come with some technology risks and the potential for vendor hype. This session will highlight emerging business and technology trends in the insurance industry.
Karlyn Carnahan, Research Director, Celent
1:55 pm - 2:20 pm
Historically, established insurance companies have had an advantage over new market entrants since they have to overcome huge barriers to entry (compute power, access to data and regulatory/compliance constraints). For decades, large companies like Allstate hired IT people to take orders - and outsourced much of the software engineering and operations.
In this new digital world, compute power is cheap, data is widely available, and clever developers can create incredibly close proxies for the historical treasure trove of insurance data we've collected. The startup barbarians, funded by venture capitalists are storming the gates. Technology change is becoming a constant. Our business is in constant flux. It's about continuous incremental improvement. Decisions can't wait for orders anymore.
Allstate's eventual goal is to shift Allstate software development to 70 percent Agile Extreme Programming and 30 percent traditional Agile Scrum and traditional Waterfall. Where developers used to spend only 20 percent of their time coding software, today up to 90 percent of their days are spent programming. Each of Allstate's ?CompoZed? development labs around the world has the same startup look and feel, including scooters parked in the hallways. This is not your grandfather's insurance company anymore.
Roman Dumiak, Chief Architect - Architecture Services, Allstate Insurance
While being compliant and being secure are not the same, we would like to explore ways to optimize organizational resources to successfully achieve both. Recent maturation of regulatory guidance as well as the corporate information security programs allows us to contemplate selective convergence of the two disciplines in the pursuit of the same objective - reduction of risk in individual organizations and the overall economy. Regulatory requirements don't have to be a burden and a proactive approach to managing regulatory compliance can strengthen security objectives. We will also discuss where security and compliance still remain different, and why this is a good thing.
Chad Marson, Senior Risk Manager, Global Information & Technology Risk Management, BMO Financial Group
Luk Boral, Director, Technology Risk Centre of Excellence, BMO Financial Group
2:25 pm - 2:50 pm
Mobile, as in almost all walks of life, is fast becoming the channel through which clients and potential clients interact with insurers first. Mobile devices are readily at hand and easily worked with, but preparing for a mobile-first distribution strategy isn't just as simple as throwing an app together and then sitting back to let the orders and premiums roll in. While dedicated apps are shown to be the most effective mechanism to interacting with someone via a smart device, the likelihood that a non-customer will download and install such an app, especially if they are still in the investigative phase are very low. The form factor of these devices can create challenges in terms of data entry so usability is something than can also be low. Finally, while people are likely to investigate options via a mobile device, they still overwhelmingly prefer to buy from a person, yet will be balk at providing information already entered into an app a second time. As a result, there are significant front and back end technology hurdles that must be overcome before mobile distribution is more fact than fiction.
The breadth and depth of security threats that are targeting the modern enterprise are bordering on overwhelming, but they're not alone as the breadth and depth of security solutions are also bordering on overwhelming. When security managers have to respond to alerts and warnings from dozens of security systems, and CISOs have to make strategic decisions based on fragmented data, it's hard to argue that security is improving. Security Information and Event Management (SIEM) platforms that aggregate the vast quantities of data, correlate diverse events, and filter the signal from the noise are allowing enterprises to get back ahead of the curve and make appropriate tactical and strategic decisions.
2:55 pm - 3:20 pm
The banking industry is one that rarely would be described as innovative, with all players seemingly taking a what's good for one is good for all approach where no-one particularly upsets the status quo in anything but small and incremental ways. If the latest evidence from the European market is anything to go by, however, the potential exists that a major shakeup could be in the offing as a host of so-called Challenger banks are bursting onto the scene. Whether from upstart financial services organizations, of companies entrenched in non-related fields such as retail, new entrants are coming to market that having nothing invested in old school processes, not in the semi-competitive landscape that currently exists. Change is coming and Financial Services CIOs need to look to their own house to ensure the people, processes, and technologies are in place to respond to this new threat.
Mary Kotch, EVP Global CIO, Validus
Today's information networks and data ecosystems are a patchwork of vendors, partners and acquired companies. As regulators have become aware, the security posture of your company is not just a product of your security program; rather it's the sum of the programs in the ecosystem of which it is a part. At the same time, vendor security management processes are all but broken with due diligence efforts completing at the speed of long questionnaires burdening vendors and clients alike, but resulting in critical risk decisions made on only incomplete and sometimes inaccurate or irrelevant information. All the while, regulators are requiring more frequent monitoring and deeper review of not only service providers, but their service providers. As attackers become more sophisticated and breaches become more common, and while business need to accelerate to remain competitive, a new approach to vendor security is needed. It's time for a rationalized approach leveraging core expertise, automation and machine learning to yield both rapid and accurate results to report on and enable efficient and effective management of vendor security risk.
Paul Valente, Director Information Security/ Head IS, Lending Club
3:25 pm - 3:35 pm
3:40 pm - 4:05 pm
4:10 pm - 4:35 pm
It's well documented that Millennials are significantly different than any previous generation. Their purchase behavior, borrowing and savings behavior, ethnic diversity and use of digital technology are causing banks to rethink how they deliver services and engage what is now the largest generational population in the country. Understanding the dynamics of this generation and its impact on the bank of the future including marketing, branch strategies, online banking and portfolio management is essential for long term success.
Ahu Chhapgar, SVP and Group Head Digital Payments, Mastercard
Discuss simply solutions to ensure that your security controls are not only functioning but that they are working correctly on all of your equipment. Often security is put in without the necessary controls to ensure that is fully functioning in your environment. Will also look at the process improvements that are driven by balancing.
Paige Easley, CISO, Palmetto GBA
4:40 pm - 5:20 pm
Poor talent acquisition outcomes are an acute issue for many organizations and hiring the wrong candidates is an expensive mistake, costing an organization up to 2 times an employee's annual salary, in addition to indirect costs such as lowered employee morale and customer satisfaction. Further, as the business environment becomes increasingly complex and competitive, retaining attracted talent becomes critically important, especially for organizations already facing skills shortages or those such as FSI which may be perceived as "stodgy" or in other negative ways. To improve talent acquisition and retention we need to gain perspective and insights by gathering feedback from the key stakeholder groups allowing for comparison of performance across multiple touch points, identification of breaking points, determination of where time and money are being wasted, and a gathering of recommendations for improvement.
Luke Chilone, Managing Director, TD Ameritrade
Kiran Vangaveti, CISO, Tudor Investment Corporation
Ralph Groce III, Global CIO, Everest Reinsurance Company
Mary Kotch, EVP Global CIO, Validus
Eric Yaptangco, CIO - (North America Claims), Chubb Group of Insurance Companies
5:20 pm - 5:30 pm
5:30 pm - 7:00 pm