14:40 - 15:25
CIO Event
(14:40 - 15:25)
Roundtable - Box 5
(14:40 - 15:25)
Roundtable - Box 6
(14:40 - 15:25)
Roundtable - Box 7
Appian - Digital Transformation in
The Enterprise
Backup Technology - Building a
Coherent Backup & DR Strategy
level 3 - The Connected Enterprise
- How Digital Transformation
Influences Your Organisation
Discussion details on Page 12
Discussion details on Page 13
Discussion details on Page 20
14:40 - 15:25
CISO Event
CMO Event
(14:40 - 15:00)
Ted Style Talk - Royal Suite
(14:40 - 15:00)
Ted Style Talk - Princess Suite
Creating a Business Driven Approach to Security
Thriving In Uncertainty
Cyber security risks have notably evolved over recent years
and the challenges facing enterprise organisations both now
and in the future has created a significant level of complexity.
Along with these complex cyber threats, issues such as GDPR
and the major impact this has upon businesses defining their
cyber security posture, means organisations need to define
an end to end strategy to ensure they can not just maximise
their security protection capabilities, but also have the ability
to effectively and efficiently analyse, react and respond to
attacks. In this session Andy will review the key areas of
consideration for todays enterprise and how to create a
business driven approach to cyber security.
These are uncertain times indeed and the comfort blanket of
polls and reserach isn’t so comforting anymore. Big change
happens fast. Digitisation can blitz the dynamics of a market:
just ask anyone from the music industry, journalists, B&B
owners or taxi drivers. Marketing strategists need a new
skillset and mindset to deal with uncertainty because by
the time opportunities or threats become apparent…it’s too
late.
Andy Waterhouse - EMEA
Alastair Barber - CEO at abc ltd | Strategic
@Andy_J_W
@abcltdblog
Presales Director at RSA
Security
@RSASecurity
Marketing Consultant at AXA, Barclays, Network
Rail and Sony
(15:05 - 15:25)
Ted Style Talk - Royal Suite
(15:05 - 15:25)
Ted Style Talk - Princess Suite
People Make the Best Exploits: Roadmapping Your Security
Investment in Line With The Emerging Threat Landscape
‘Persona Marketing’ to fuel revenue growth strategy
The threat landscape has changed fundamentally over the
last couple of years. Social engineering became the No. 1
attack technique. Attackers have shifted away from automated
exploits and instead engaged people to do the dirty work—
infecting systems, stealing credentials, and transferring funds.
Across all vectors and in attacks of all sizes, threat actors used
social engineering to trick people into doing things that once
depended on malicious code. You will get better visibility
into the nature of attacks against your organisation so you
can quickly distinguish between targeted and indiscriminate
campaigns, which will ultimately help you in making the right
decisions for your investment in security solutions.
This presentation will explore a persona led marketing
strategy as a route to market to generate demand across
multiple sectors and rapidly grow the sales pipeline.
Ed Rowley - Sales
Lorna Nightingale - Head
@ed_rowley
@esri
Engineer at Proofpoint
Page 10
With a growing need for the marketing function to
demonstrate contribution to revenue growth and deliver
an ROI on campaign spend its critical to have a robust and
scalable strategy in place.
@proofpoint
of Marketing at Esri UK