Agenda - IDC Middle East CIO Summit 2013 | Events | IDC CEMA

08:30 – 09:00

Registration & Networking

08:50 – 09:05

Welcome Address

Paul Black
Program Director, Telecoms, Middle East, Africa and Turkey, IDC Middle East, Africa, & Turkey

09:05 – 09:50

The CIO Agenda: Transform, Innovate, Collaborate

Jyoti Lalchandani
VP & Regional MD, IDC Middle East, Africa and Turkey

Download the Presentation

Paying particular attention to the realities of the Middle East market, this session will examine the four technology game changers of cloud, mobility, social business, and data analytics, and analyze their role in driving the shift to a '3rd Platform'. It will also draw on IDC's extensive CIO research to highlight the key issues topping the CIO agenda for 2013, while simultaneously providing in-depth insights into the critical challenges facing today's Middle East CIO. The session will end by profiling the role of the 'NextGen CIO' and assessing the overall ICT investment outlook for the region.

Session 1: Operation to Innovation: What is the Smart Move

09:50 – 10:00

IDC Overview

Mark Walker
Program Director, Insights & Vertical Industry Practice, IDC Middle East, Africa, & Turkey

Download the Presentation

10:00 – 10:15

Building the Business Case for IT Investment and Technology Refresh - How to Develop a Proactive IT Asset Management Strategy

Jarkko Huhtaniitty
Regional Manager, HP Financial Services Middle East, Mediterranean and Africa (MEMA), HP

Download the Presentation

IT organizations struggle with declining budgets, yet are expected to do more with less. In addition, IT must now justify its business not only at the CIO level, but at the CFO level too. In this session, we will discuss how IT teams can build a business case to secure their IT investments and refresh. The business case takes into account not only the IT imperatives, but also the financial constraints most companies face today. In this session, you will see how successful IT organizations can break this cycle.

10:15 – 10:40

Open Discussion

Session 2: The New Security Paradigm: Proactive, Predictive

10:40 – 10:50

IDC Overview

Ranjit Rajan
Research Director, Software, IDC Middle East, Africa, & Turkey

Download the Presentation

10:50 – 11:15

Intelligence-Driven Security, A New Model

Rashmi Knowles
Chief Security Architect, EMEA, RSA

Download the Presentation

In the past few years, a stunning range of government agencies and prominent corporations have succumbed to stealthy, tailored cyber attacks designed to exploit vulnerabilities, disrupt operations and steal valuable information. Clearly current security systems are not up to the task of thwarting these advanced threats, since many of their victims had what they considered state of the art detection and prevention systems. These systems failed to stop or sense the presence of an attack on victims’ networks until the damage was done.

Given today’s threat environment and the increasing openness and connectivity of digital infrastructures, security teams now realize that they must assume their IT environments are subject to periodic compromise. Gone are the days when preventive measures to secure the perimeter or trying to detect malware problems using signature-match technologies were enough. The new model of Intelligence-Driven Security offers an understanding of the phases of an attack, continuous threat monitoring, and rapid attack detection and remediation.

 

11:15 – 11:30

Open Discussion

11:30 – 12:00

Coffee Break

Session 3: IT Transformation – Understanding Shifts And Innovations That Will Drive Better Business Value

12:00 – 12:10

IDC Overview

Adriana Rangel
Research Director, Systems & Infrastructure Solutions, IDC Middle East, Africa, & Turkey

Download the Presentation

12:10 – 12:25

IT Transformation – Driving Better Business Value

Basil Ayass
Enterprise Product Manager, Dell

Download the Presentation

The advent of consumerization of IT, BYOD, social media, cloud computing, and big data is set to force a significant shift in the way we procure, implement, and use our IT assets. Convergence is a powerful force that is transforming the vendor landscape, the organization of the IT team, and the way datacenter infrastructure is procured. The current practice of relying on a best-of-breed procurement strategy to consolidate and virtualize on self-integrated server, storage, networking, and management technologies is gradually giving way to the adoption of factory-integrated converged infrastructures. This session will show how customers that are adopting convergence are realizing lower operation expenditures, faster time to deployment, and quicker ROI.

12:25 – 12:50

Open Discussion

Adriana Rangel
Research Director, Systems & Infrastructure Solutions, IDC Middle East, Africa, & Turkey

Basil Ayass
Enterprise Product Manager, Dell

Khaldoun Aboul-Saoud
Regional Market Development Manager , Intel Corporation

Session 4: Evolving Sourcing Models and Motivations

12:50 – 13:00

IDC Overview

Matthew Eastwood
Group Vice President, Enterprise Platform Research, IDC

Download the Presentation

13:00 – 13:15

Cloud Security - Who do You Trust?

Nick Coleman
Global Head Cyber Security Intelligence, IBM

Download the Presentation

Cloud computing is changing the way we use computing and has the potential for significant economic and efficiency benefits. But the speed of adoption depends on how quickly trust in new cloud models can be established in an environment where the threats are becoming more advanced and sophisticated. In a cloud environment concerns often raised include: location and privacy of data, audit and inspection of the security, security of highly virtualized environments from targeted threats and attacks. The IBM session will share some insights and how security has been evolving to meet cloud computing needs within IBM SmartCloud environments.
13:15 – 13:40

Open Discussion

13:40 – 14:25

Lunch & Networking

14:25 – 14:30

Attendees to regroup into the Breakout Sessions

Breakout Sessions – Leadership Panels A and B

Panel A - Facing up to Targeted Attacks and Cybercrime – Lessons from Recent Incidents

Panel B - BYOD Initiatives: Driving Policy and Technology Solutions

14:30 – 14:50

New Security Challenges and Measures

Ranjit Rajan
Research Director, Software, IDC Middle East, Africa, & Turkey

Download the Presentation

The enterprise threat landscape - both external and internal - continues to evolve rapidly in the region. In addition to viruses and other malware, data loss - an internal threat - is also becoming a major challenge. More recently external threats in the form of targeted attacks on high value institutions and assets have been in the news. In this presentation, IDC will draw upon recent research to analyse the threat landscape with a focus on cybercrime, and provide guidance on how organizations prepare themselves to respond effectively.
14:30 – 14:50

BYOD Initiatives: Driving Policy and Technology Solutions

Adriana Rangel
Research Director, Systems & Infrastructure Solutions, IDC Middle East, Africa, & Turkey

Download the Presentation

Whether companies have been adopting BYOD practices in order to support the access to new business mobile applications, or just to accommodate the ever growing pressure from their users to being allowed to connect to the corporate network via their mobile devices, the success of such initiatives will depend on a delicate balance between leading-edge mobile services, gains in productivity, increases in cost and improvements in security.

As the number of corporate mobile applications grows, so too will the volume of sensitive information. Hence, it is expected that improved security and application controls should be needed in order to properly adopt BYOD solutions and adapt IT to an expanding mobile access. This session will address the challenges and security implications of implementing BYOD solutions, together with the need to put in place policies that help the company keep up with rapidly changing use and risk profiles.

 

14:50 – 14:58

Responding to Targeted Attacks: What Should Enterprises Do?

Justin Doo
Director of Cloud and Security Practices, Symantec

As recent news reports testify, targeted attacks are on the increase across the region. This creates new levels of complexity as organizations seek to address the constantly evolving threats that they face. With this in mind, this session will present an array of areas and strategies for security teams to focus on in order to strengthen their defences against such attacks.

14:50 – 14:58

Mobile Policies and Controls

Christopher Martin
Consulting Systems Engineer, EMEA Solution Architect – Security, Blue Coat Systems ME

14:58 – 15:06

The Evolving Threat Landscape in the Middle East

Vladimir Zapolyansky
Deputy Director GREAT, Head of Technology Positioning, Kaspersky Lab

14:58 – 15:06

Desktop and Application Virtualization: Enabling BYOD

Noman Qadir
Regional Director - MEA, Citrix Systems

15:06 – 15:14

Governance: Why it Should be at the Center of Security Strategies

Luke Forsyth
Vice President, Security Services, EMEA, CA Technologies

15:06 – 15:14

Open Discussion

15:14 – 15:30

Open Discussion

Breakout Sessions – Leadership Panels C and D

Panel C - Deconstructing IT's "Value to Business": Assessing New IT Models

Panel D - The IT Infrastructure Crystal Ball: Evolving Datacenter Strategies and Delivery Models

15:30 – 15:50

Deconstructing IT's "Value to Business": Assessing New IT Models

Ranjit Rajan
Research Director, Software, IDC Middle East, Africa, & Turkey

Download the Presentation

CIOs are under increasing pressure from top management and lines of business executives to support projects in new, emerging technology areas such as mobile, social, analytics etc. Clearly such projects can provide significant value to business and support business agility. However, a significant portion of IT budgets and resources are still consumed by maintenance and support of traditional/legacy systems, leaving few resources for new initiatives. In this presentation IDC will examine these challenges and explore new IT models that CIOs can consider.

15:30 – 15:50

The Journey to the Cloud: Understanding the Impact to your Datacenter

Matthew Eastwood
Group Vice President, Enterprise Platform Research, IDC

Download the Presentation

Many new technologies and IT deployment models including consolidation, virtualization, automation, and cloud computing continue to have a fundamental impact on datacenters around the world. At the same time, IT infrastructure suppliers are increasingly focused on building highly integrated converged IT infrastructure offerings aimed at meeting the IT needs of businesses in the future. For enterprise and service provider IT organizations, converged IT also represents a new way of purchasing, deploying, and managing basic IT capacity, a new approach to application development and service delivery. In this session, IDC will look at the evolutionary and revolutionary aspects of the journey to private and public cloud and look at the impact consolidation; virtualization, automation and convergence have on cloud readiness. IT leaders who step out of the traditional IT box and actively participate in the creation of next generation IT-enabled services will dramatically expand their addressable market and position for accelerated growth in the coming decade.
15:50 – 15:58

Variabilization of Technology to Enhance Business Agility

Mukund Seetharaman
General Manger & Business Head – Gulf, Wipro Infotech

Organizations are always on the lookout for ways to transform the fixed costs of running the business into predictable variable costs, thus making them more flexible and agile to meet changing business needs. It is now possible to maximize IT’s potential by focusing on new outcome-based models that lend themselves to making IT variable. This session will show how choosing the right model and measuring the results is imperative for securing the desired results.

15:50 – 15:58

The New Normal

Deepak Narain
Regional Presales Manager, VMware Global Inc.

Organizations started out trying to cut costs in order to align to the uncertain economic environment, but the entire game ended up changing – OPEX is the new CAPEX, the consumer makes the rules, and information flows faster than ever before. Once, the technology drove the market, but now the market drives the technology. Against this backdrop, this session will seek to explain how we stay relevant in the new normal.

15:58 – 16:06

Transform while Perform

Stephen Fernandes
AVP and Head of Middle East, Cognizant

Today, many IT organizations feel they are in a bind. On the one hand, they need to cut budgets due to the state of the economy, budgets that already have very little room for additional trimming. On the other hand, businesses and end users are looking for differentiation and productivity gains from investments in, and implementations of, new technology solutions. But how can IT deliver the goods without the budget to do so? This session will show that the answer lies in IT’s ability to create its own discretionary budget through an all-encompassing framework that enables organizations to contain IT costs, modernize underlying IT infrastructures, and drive new business capabilities.

15:58 – 16:14

Data Center Transformation

Nik Rouda
Senior Director of Marketing, Solutions and Verticals, Riverbed

As the pace of change in IT increases, hot trends including cloud, bring your own device (BYOD), unified communications (UC&C), big data, and software-defined networking (SDN) are forcing a new look at the infrastructure required to deliver services to the business. The boundaries of the virtualized data center must expand across the enterprise to offer performance, availability, and security for these new applications, all while controlling costs. At the same time, IT resources are being increasingly centralized from remote locations into the data center, but this movement must not impact the end user experience or productivity will suffer. This session will explore how data center transformation can help achieve these seemingly-conflicting goals.

16:06 – 16:30

Open Discussion

16:14 – 16:30

Open Discussion

16:30 – 16:50

Tea / Coffee Break & Raffle Draw

16:50 – 17:30

CIOs and the Social Enterprise

Mark Walker
Program Director, Insights & Vertical Industry Practice, IDC Middle East, Africa, & Turkey

Sebastien Marotte
VP of EMEA Enterprise, Google

Adriaan Bloem
Senior Manager Online Platforms, MBC Group

Social enterprise create worlds where users interact, set targets, form teams to achieve goals and provide real time feedback to each other. Cutting edge companies are using tools from social enterprise to build more effective teams of employees, customers and suppliers based on these same principles. Will social enterprise methodologies reinvent how we do business or is this simply the latest over-hyped buzzword?

17:30 – 17:35

Wrap up & Close

19:30 – 21:30

Gala Dinner & Live Entertainment

Please note that the topics identified above are representative only. The conference agenda will be kept up to date.