The Programme
09:00 - 09:05
Welcome to the Executive Leader Network by John Morton (Event Chair)
09:05 - 10:15 | All Events
(09:05 - 09:25) - CIO Keynote - Princess Suite
Accelerating Corporate Innovation by Embracing the Start Up Culture
Entrepreneurs have the vision to change the economic value of new and existing markets. Start ups often shorten their
innovation and product development cycles by adopting a combination of business-hypothesis-driven experimentation,
iterative product releases, and validated learning. Experience shows that corporations continue to face the innovator’s
dilemma: how to generate disruptive innovation and continue to grow and be efficient in their core business. To address this
challenge, top companies are experimenting with a set of strategies and mechanisms – e.g. start-up incubators, corporate
VCs, internal innovation department… each with its own advantages and disadvantages.
Ilona Simpson - CIO in Residence at
Ariadne Capital
@IlonaSimpson
(09:30 - 09:50) - CMO Keynote - Princess Suite
How Extraordinary Leaders Drive Customer Loyalty
Imagine a culture where people are truly connected to their work, to their colleagues, and to their customers. Imagine
transforming your customer experience in a way that uses fresh insights with your existing data and technologies to get even
better results. What if you had a clear roadmap that helped you lead the changes that are needed in your organisation in
order to deliver your vision. Experience tells us that those leaders who have a clear vision, a logical strategy, who understand
what they want to achieve and are disciplined in executing the strategy while holding their teams to account, are far more
likely to deliver strong results. In his presentation, Glenn will outline the baseline leadership activities that will help your
organisation transform its customer experience both outside-in and inside-out.
Glenn Price - Regional Managing Director
at TeleTech Consulting Europe
@priceglenn
@ttechconsult
(09:55 - 10:15) - CISO Keynote - Princess Suite
Discover Hidden Threats With User Behaviour Analytics (UBA)
Cyber criminals seek technology attack surfaces to get behind the firewall, onto the network and into your systems. However,
they are equally if not more attuned to seeking vulnerabilities in users. Even if they are not acting maliciously, network users
can put your business at risk simply by bypassing policies and procedures while doing their job. Users can do great damage
- their abnormal behaviour is notoriously difficult to detect. So how much at risk is your business if you can’t identify user
threat activity? It’s vital that an organisation has visibility of when a user behaves in an erratic and unusual manner to ensure
any business risk can be mitigated quickly and effectively.
Matthew Ellison - Director of Sales
Engineering, EMEA at LogRhythm
@logrhythm
Page 6