ExecLN Event (CIO | CMO | CISO) 7th Sep 2016 | Page 6

The Programme 09:00 - 09:05 Welcome to the Executive Leader Network by John Morton (Event Chair) 09:05 - 10:15 | All Events (09:05 - 09:25) - CIO Keynote - Princess Suite Accelerating Corporate Innovation by Embracing the Start Up Culture Entrepreneurs have the vision to change the economic value of new and existing markets. Start ups often shorten their innovation and product development cycles by adopting a combination of business-hypothesis-driven experimentation, iterative product releases, and validated learning. Experience shows that corporations continue to face the innovator’s dilemma: how to generate disruptive innovation and continue to grow and be efficient in their core business. To address this challenge, top companies are experimenting with a set of strategies and mechanisms – e.g. start-up incubators, corporate VCs, internal innovation department… each with its own advantages and disadvantages. Ilona Simpson - CIO in Residence at Ariadne Capital @IlonaSimpson (09:30 - 09:50) - CMO Keynote - Princess Suite How Extraordinary Leaders Drive Customer Loyalty Imagine a culture where people are truly connected to their work, to their colleagues, and to their customers. Imagine transforming your customer experience in a way that uses fresh insights with your existing data and technologies to get even better results. What if you had a clear roadmap that helped you lead the changes that are needed in your organisation in order to deliver your vision. Experience tells us that those leaders who have a clear vision, a logical strategy, who understand what they want to achieve and are disciplined in executing the strategy while holding their teams to account, are far more likely to deliver strong results. In his presentation, Glenn will outline the baseline leadership activities that will help your organisation transform its customer experience both outside-in and inside-out. Glenn Price - Regional Managing Director at TeleTech Consulting Europe @priceglenn @ttechconsult (09:55 - 10:15) - CISO Keynote - Princess Suite Discover Hidden Threats With User Behaviour Analytics (UBA) Cyber criminals seek technology attack surfaces to get behind the firewall, onto the network and into your systems. However, they are equally if not more attuned to seeking vulnerabilities in users. Even if they are not acting maliciously, network users can put your business at risk simply by bypassing policies and procedures while doing their job. Users can do great damage - their abnormal behaviour is notoriously difficult to detect. So how much at risk is your business if you can’t identify user threat activity? It’s vital that an organisation has visibility of when a user behaves in an erratic and unusual manner to ensure any business risk can be mitigated quickly and effectively. Matthew Ellison - Director of Sales Engineering, EMEA at LogRhythm @logrhythm Page 6