PDF Download May 3-4, 2016 Agenda (PDF)

Big Data Summit
May 3-4, 2016

↓ Agenda Key

View detailsKeynote Presentation

Visionary speaker presents to entire audience on key issues, challenges and business opportunities

View detailsExecutive Visions

Panel moderated by Master of Ceremonies and headed by four executives discussing critical business topics

View detailsThought Leadership

Solution provider-led session giving high-level overview of opportunities

View detailsThink Tank

End user-led session in boardroom style, focusing on best practices

View detailsRoundtable

Interactive session led by a moderator, focused on industry issue

View detailsExecutive Exchange

Pre-determined, one-on-one interaction revolving around solutions of interest

View detailsFocus Group

Discussion of business drivers within a particular industry area

View detailsAnalyst Q&A Session

Moderator-led coverage of the latest industry research

View detailsVendor Showcase

Several brief, pointed overviews of the newest solutions and services

View detailsCase Study

Overview of recent project successes and failures

View detailsOpen Forum Luncheon

Informal discussions on pre-determined topics

View detailsNetworking Session

Unique activities at once relaxing, enjoyable and productive

Tuesday, May 3, 2016 - Big Data Summit

12:00 pm
-
1:30 pm

Registration and Greeting

1:30 pm
-
1:40 pm

Welcome Address and Opening Remarks

1:40 pm
-
2:25 pm

Keynote Presentation

Big Data Analytics and the Impact on Fraud

Financial fraud is, unfortunately a huge business, with annual losses so massive that were “Fraud” a country, it would have the fifth highest global GDP. While enterprises in the financial services sector have always used analytical processes to detect and limit those losses, as technology moves forward the analytical capabilities that can be brought to bear increase in exponentially in capability and those on the leading edge are able to see, and stop, more fraud in less time. Just as Big Data capabilities are bringing significant business benefit to other aspects of the business, they can to fraud mitigation but several challenges need to be overcome for maximum efficiency. Only by addressing quality, volume, security, and integration challenges and by further ensuring the right staff with the right skills are in place can benefits actually be realized. 

Takeaways: 

• The increased use of unmanned technology combined with ever quicker financial transaction processing has created a world ripe for the proliferation of fraud 

• In a “fight fire with fire” approach, those same machine learning approaches can be repurposed to analyze transactions looking for the needle in the needlestack that is the illicit one 

• A Big Data approach only works with the right foundation; garbage in garbage out has never been more true and data and process rigor is essential to success

2:35 pm
-
3:05 pm

Executive Exchange

Thought Leadership

Turning Big Data into Big Opportunity

It has been said that leveraging Big Data is like looking for a needle in a haystack; that the challenge is finding the one piece of insight in the sea of irrelevant data. The truth is there is no irrelevant data just data without initial context or meaning, suggesting the problem in actuality is one of looking for a needle in a needle stack. Compounding this problem is that, to offer maximum value, these insights need to found as quickly as possible lest someone else find the relevance first and exploits the opportunity that goes along with it. IT Leaders need to focus not just on building the toolset that allow the business to find insights, but on building an insight pipeline that finds the relevance and feeds it to business peers. 

Takeaways: 

• See that Big Data is an opportunity engine waiting to be exploited 

• Learn to identify the insights the business needs to succeed 

• Understand how to build the capability to find and deliver those insights

3:10 pm
-
3:40 pm

Executive Exchange

Think Tank

Big Data & Healthcare Analytics – Bringing Clinical Data into the Business of Healthcare

Everyone is in the same boat; we’ve collectively spent the last few years implementing and fine tuning various EHR, Hospital Information, and other clinical systems and have amassed a wealth of data that could be used for so much more than it’s current limited application. In a world where healthcare is moving away from a fee for service model, we need to find ways to aggregate this information and use it to build patient care programs that improve care quality and patient outcomes, while lowering costs and performing well in a risk contract. Breaking data silos and building an holistic single pane of glass view into our clinical data, we can begin to identify our risk populations, design programs of efficient care management teams, and make use of long term proactive health planning for better care AND better costs. 

Takeaways: 

• Understand that the key to efficient and effective risk-based payment models is deep data analytics 

• See how the data needed to make such models work exists in our information systems, but is siloed 

• Discuss best practice strategies to break down these silos and drive cost and care improvements

Think Tank

Cloud, Crowd, Content: Changing the Big Data Game

It’s no secret that Big Data is a big deal, but just how big is it? Some estimates show that while we have a massive 2 Zettabytes under collective corporate management, that this represents one ten thousandth of a percent of the data that has been created. Fortunately those other “nexus” technologies are providing the opportunity to make use of these untapped data resources – mobile is providing a ubiquitous input channel, cloud a dynamically scalable processing capability, and social the community involvement to process and find value. Leveraged well Big Data can solve a wealth of corporate challenges, ranging from improving efficiency, through mitigating risk, to actually growing bottom line revenue. 

Takeaways: 

• Understand how big Big Data really is and where the value to your organization lies 

• Learn what problems Big Data solves and how it achieves value 

• Be challenged to think about the future of Big Data in your organization

3:45 pm
-
4:00 pm

Networking Session

4:05 pm
-
4:35 pm

Executive Exchange

Think Tank

Understanding Marketing’s Big Data Role

While “Big Data” has been a buzzword for years, for many organizations it has been a solution looking for a problem. Leading organizations are realizing that problem however is how to perform the micro-segmentation and laser focused personalization programs that make marketing campaigns so efficient and effective. Marketing departments therefore need to be taking a leading role when it comes to prospect and client data analytics programs in order to maximize the vale of these types of programs.

Takeaways:

  • Marketing can benefit from Big Data for more efficient campaigns
  • Marketing needs to ensure the collection of trustworthy client data
  • The issues of data ownership, stewardship, and analytical responsibility must be resolved before success can occur

Think Tank

Big Data Analytics the Key to Smart Grid Value

Smart Grid technology is nothing new but the penetration rates continue to lag in many areas of the country, as overall installation of smart meters themselves is less than 25% nationally in large part due to low cost electricity in many areas. Smart Grid is about far more than cost management however and delivers benefits in four key areas: Increased customer satisfaction, improved overall utility reliability, enhanced operational efficiency, and improved safety and risk mitigation. To be able to properly leverage these benefits however, Utilities must understand what is happening across the smart grid by capturing the wealth of data and properly analyzing it through the use of data analytics. Join our panelists as they discuss the broad benefits of smart grid adoption, the benefit of big data analytics in smart grid deployments, and the pitfalls to be avoided in both deployments.

Takeaways:

  • Smart grid allows a wealth of benefits that can increase revenues, reduce cost, and create value
  • These improvements are realized by exploiting patterns in the data that is captured by smart meters and other smart grid devices
  • The complexity, variability and sheer quantity of the information being gathered means specialized Big Data solutions are needed to realize the value

4:40 pm
-
5:10 pm

Thought Leadership

Big Data, Big Success

As the retail market space becomes increasingly crowded and competitive, retailers need to put themselves in a position to differentiate themselves from their competitors, either by pricing or by offering. In order to be able to do this, retailers need to put themselves in a position where they have a deeper and broader understanding of not just the needs and wants of their customers, but also their motivators and triggers. IT Leaders realize that they need to invest in powerful analytics programs that allow them to leverage the wealth of client data they are capturing, find the relevant patterns and insights, and use those to aggressively attack the market and establish dominance. 

Takeaways: 

• Successful retailers have long used data analytics to ensure a competitive edge relative to their peers 

• Data is becoming more ubiquitous and the sources by which it is derived are growing exponentially 

• Personalization of experience is a strong indicator of relationship success, but can only be achieved by truly understanding the client through data analytics

5:15 pm
-
6:15 pm

CIO Executive Visions Panel

Using Data & Analytics to Drive Business Transformation

Big Data initiatives have become a reality among almost every company today, however, what we have seen is lots of initiatives have become just science projects and did not deliver on early expectations. This situation needs to reversed quickly because those organizations that are being successful with Big Data and analytics programs are rapidly leaving those that are unsuccessful in their wake. Big Data and analytics has the potential to be transformational for the enterprise, but IT leaders need to be making the right investments, in the right areas, to ensure optimal success. This panel discussion will focus on how to use data and analytics to drive true business success and show some real examples of companies and individuals who made a difference.

Takeaways:

  • Analytics is not a new capability and has always been aligned with the most successful companies
  • The roles of IT and the lines of business are changing when it comes to data and analytics programs
  • The business benefits of analytics programs can be huge but efforts need to be constrained so that they don’t turn into flights of fancy, yet set free enough that they find the “unknown unknowns” that truly drive transformation

6:15 pm
-
7:00 pm

Cocktail Reception

7:00 pm
-
8:30 pm

Executive Networking Dinner

8:30 pm
-
10:00 pm

After Dinner Networking

Wednesday, May 4, 2016 - Big Data Summit

7:00 am
-
8:00 am

Networking Breakfast

8:10 am
-
8:55 am

Keynote Presentation

Big Data and Analytics at the Next Level

The explosive growth of data volume and data variety that have characterized this new big data era are set to head in a steeper upward trajectory as IoT moves from being a fringe technology, to a mainstream capability. When a single Boeing 787 is able to capture 70Tb of data per flight from thousands of individual sensors throughout the vehicle, just imagine the data volume that can be captured when not just every plane, or even every vehicle, but every device and every individual is streaming a constant set of “status” information. Data growth by itself however is only a small portion of the story, as to have value this data must be analysed in essentially real-time in order to create actionable outcomes. 

Takeaways: 

• Big data today may be big, but every single one of the “v’s” that compose it (Volume, Variety, Velocity, Veracity and Value) is set to increase exponentially as a result of IoT 

• The ability to analyse, interpret, and find meaning in this vast sea of data will be single biggest differentiator in enterprise success 

• Enterprises will have to walk a fine line when it comes to privacy of the information they collect to ensure the continued ability to do so.

9:05 am
-
9:35 am

Executive Exchange

Think Tank

Think Big! No Action = No Profit

Big Data is possibly one of the most over-used and exhausted buzzwords of the past few years, particularly within the marketing landscape, yet it continues to be one of the biggest game changing opportunities since the Internet went mainstream. But Big Data success is driven less by addressing the Volume and Variety aspects, and far more by its Velocity. Simply put, the most successful companies are not the ones with the most data, or the richest data, but those that use it the quickest and best because, while marketers will agree that tapping into the wealth of available information is valuable, if you don’t take action on the data quickly, it becomes worthless. A winning marketing management strategy gives visibility to the bigger picture: customer engagement, customer retention, customer loyalty, as well as marketing performance. 

Takeaways: 

• Learn how to use big data to gain actionable insights and delve deeper into your customers world 

• Discover how to gain transparency on your data by effectively peeling back the layers 

• Explore real-life data analysis case studies

9:40 am
-
10:10 am

Executive Exchange

Think Tank

Disrupting Markets with Disruptive Technologies

While the combination of Social, Mobile, Analytics, and Cloud have been present and disrupting IT departments and enterprises as a whole for over two years now, in many ways organizations have still not fully embraced them, have still not fully leveraged them. These new platforms allow organizations radically new ways to go to market, allowing for broad scale deployment of “systems of engagement” that create dynamic relationships with clients and prospects. Finding the resources, wherewithal, and ability to fully commit to these technologies and the capabilities they create has proven to be a struggle for many, but a struggle that can be overcome by leveraging the right partners that bring the right skills and experiences to bear. 

Takeaways: 

• Social, Mobile, Analytics, and Cloud are all here to stay; each one adds value to enterprises but collectively that value increases exponentially 

• The manner in which these technologies are implemented, operated, and utilized is different than the foregoing systems of record we are used to 

• Unique skills and capabilities are required to leverage the power and value of these platforms, skills and capabilities that can be in short supply

Think Tank

Securing Divergent Endpoints

Over the last few years, as cloud and mobile technologies have taken hold within the enterprise, the concept of the network perimeter has dissolved, and with it the concepts around traditional network security. The broad scale adoption of IoT technologies however will make this first phase of network disaggregation seem trivial in comparison as enterprises begin to connect to not just thousands but millions of disparate and divergent endpoints. To ensure appropriate security in such a dispersed networking world and entirely new paradigm to security will be required that encompasses not just wildly diverse types of devices in wildly diverse locations, but the threat of low-powered, low complexity endpoints that have no internal capacity for monitored and managed security capabilities. 

Takeaways: 

• The number and type of enterprise endpoints is about to go through explosive growth and each of these endpoints will represent security threat 

• These new endpoints will not have the capacity for internal security and so central security solutions will be required to ensure appropriate protection 

• The volume and variety of new security data feeds and security threat info will overwhelm traditional security platforms and capabilities

10:15 am
-
10:30 am

Networking Break

10:35 am
-
11:05 am

Executive Exchange

Thought Leadership

Big Data and Analytics at the Scale of Mobility

Big Data and Analytics at the Scale of Mobility The explosive growth of data volume and data variety that have characterized this new Big Data era are set to head in a steeper upward trajectory as enterprises collectively begin to exploit the massive data flows that are coming out of mobile devices. As the volume of mobile devices eclipses that of human beings on the planet, just imagine the data volume that can be captured when every device and every individual is streaming a constant set of contextual “status” information. Data growth by itself however is only a small portion of the story, as to have value this data must be analysed in essentially real-time in order to create actionable outcomes. 

Takeaways: 

• Big data today may be big, but every single one of the “v’s” that compose it (Volume, Variety, Velocity, Veracity and Value) is set to increase exponentially as a result of wholesale mobility adoption 

• The ability to analyse, interpret, and find meaning in this vast sea of data will be single biggest differentiator in enterprise success 

• Enterprises will have to walk a fine line when it comes to privacy of the information they collect to ensure the continued ability to do so.

11:10 am
-
11:40 am

Executive Exchange

Roundtable

Proving the ROI of IoT

We all know that ROI calculations, on the surface, are simple mathematical formulas: compare the cost of investment against the value of the return over a given and agreed upon period. But determining exactly what each side of the equation entails and totals is the challenging part, and nowhere moreso than in burgeoning areas such as IoT adoption where use cases are still not clearly understood, and technology costs are highly variable, and all the components related to cost may not yet be quantifiable. The benefits are there, as a number of enterprises are discovering with early pilot programs, but CIOs must enter this area with their eyes wide open to ensure that early IoT implementations have the ROI necessary to keep more complex projects moving forward. 

Takeaways: 

• Costs must be carefully quantified for any IoT project – it’s not just the sensors, but networking, data, security, etc. spend must be taken into account 

• Similarly value must be clearly established both in isolation and in comparison to any more “traditional” methods that could be used 

• Successful IoT projects will be those that can initially leverage existing spend to mitigate costs with successive project piggybacking on earlier investments

Sponsored by:

View detailsClouderaCloudera

Roundtable


Sponsored by:

Looker

11:45 am
-
12:15 pm

Executive Exchange

Think Tank

Implementing Effective Mobile Device Management

Though Mobile Device Management (MDM) has become the de facto mobile computing security platform offering the ability to control devices, and contain critical data, only 50% of organizations have deployed an MDM platform. Not all MDM platforms are equal, nor are the needs of individual adopters. How then should the enterprise make the best of us of the selected tool, ensuring the right level of protection while avoiding the infringement of individual rights? The key to efficient and effective deployment is balancing the protection you need, the capabilities of the tool selected, and the demands to be placed on mobile users. 

Takeaways: 

• Discover the costs and benefits and of MDM deployment 

• Determine the capability differences between common MDM platforms 

• Learn about common deployment patterns; what works and what doesn’t

Think Tank

Building Broadband Availability and Speed

As wireless connectivity becomes increasingly prevalent, investment in wireline infrastructure is dwindling. However, while wireline voice traffic is in steep decline, wireline data traffic is up nearly 40% in the last eight years indicating that broadband data connections are still very much in demand. A recent study however shows that just 62% of US residents have broadband connectivity, that average broadband speed ranks just ninth worldwide (trailing countries such as Latvia, Denmark, and the Czech Republic), yet the US ranks in the bottom half of evaluated countries in terms of broadband cost. Clearly investment is needed in terms of increasing the speed, availability, and affordability of broadband in the US and CIOs must be actively involved in the plans to achieve those goals given the intrinsic reliance on IT to achieve them. 

Takeaways: 

• A recent study shows that subscribers are more than twice as likely to feel that mobile security is a carrier issues than a personal issue 

• As in-circulation handsets are increasingly becoming smart phones instead of feature phones telcos are effectively hosting hundreds of millions of threat vectors to their networks on their networks 

• Astute IT leaders will realize that these dual problems can and must be dealt with by a single security solution

12:20 pm
-
1:20 pm

Networking Luncheon

1:25 pm
-
1:55 pm

Executive Exchange

Thought Leadership

Aggregating Diverse Data Types

Low-power, low-complexity computing devices are set to invade the enterprise and indeed have begun to do so already in a number of cases. As these devices proliferate, so will the data that they generate and, at least initially, so will the proprietary data formats that they use. Until comprehensive standards can be developed, implemented, and enforced, enterprises will be left to deal with hodge-podge data that needs to be cleanly aggregated before it can be analysed and until analysis can occur, that data is just meaningless noise. Enterprising CIOs will recognize this challenge early and works closely with both IoT sensor providers as well as business unit leaders to ensure that appropriate investments are made, and that processes are put in place so that value can be extracted from the data that is being gathered. 

Takeaways 

• New endpoints mean new data feeds in potentially almost endless new structures and new formats 

• The volume of data creating sensors that will invade the enterprise means the volume of data to be aggregated will be beyond anything seen before, as will the variety of types, and the speed with which aggregation is needed 

• A comprehensive data model is essential to success

2:00 pm
-
2:30 pm

Executive Exchange

Think Tank

Security in an Outsourced World

Building security into your enterprise processes, and integrating it with your existing technology investments has never been more critical or complicated than it is in this era of decentralized computing, and ever-tightening compliance requirements. Furthering this complication is the impact that partnering deals can have since infrastructure, applications, and even data may no longer be under your direct control. To be able to ensure efficient and effective security capabilities you need to understand the nature of the threats that exist today, the impact a sourcing relationship can have on these threats, and the mitigation strategies and tools key industry leaders are using to address the challenge. 

Takeaways: 

• Social, Mobile, Cloud, and Analytics is already having a significant impact on enterprise security, sourcing potentially adds another layer of complexity 

• Beyond “simple” security however there are also issues such as privacy and compliance that also need to be considered 

• Investing in the right tools and practices is essential to weather the storm without breaking the bank

Think Tank

IoT and IT/OT

One of the key areas for early IoT projects is in the area of industrial automation, as an extension of existing, older M2M type technologies. In many cases these older industrial automation initiatives used proprietary communications protocols and dedicated sensors that interfaced with controllers that could manage communications between IT and OT platforms. Fast forward to an IoT world however and these sensors and controllers will need to natively speak IP, natively integrate to back-end enterprise systems beyond just simple controllers, systems such as ERP, BI and other core platforms. Navigating the complexity of process, data, security, and functionality implications has the potential to be a minefield for the unwitting IT executive that goes in without eyes wide open. 

Takeaways 

• IT/OT integration is a low-hanging fruit area for IoT adoption 

• Existing investments into older M2M IT/OT integrations however can erode any potential value 

• Before investing in IoT enabled IT/OT integration careful consideration must be made of the implications and whether value can be realized – does the investment justify the returns over what is already in place?

2:35 pm
-
3:05 pm

Executive Exchange

Roundtable

Improving Email Deliverability AND Security

It may seem self-evident, but email is still the predominant form of business communication whether in B2B or B2C channels with business sending over 100 billion emails each and every day. Not all of this traffic is legitimate, desired, or safe however with estimates that as much as 90% of all email traffic can be considered spam or worse. In this environment businesses need to ensure that the email they send is viewed as trustworthy, and that the mail they receive is safe of threats. To do this email authentication is imperative and DMARC, Domain-based Message Authentication, Reporting, and Conformance is the gold standard. While DMARC policies are published to public DNS servers and already protect up to 60% of mailboxes for the most part these are public mailboxes from consumer email providers and many business are still on the outside looking in. Savvy IT Leaders know that they need to leverage commercial solutions that streamline DMARC management for their own email infrastructure to ensure they are protected from threats, and able to communicate with partners, clients, and prospects. 

Takeaways: 

• Email authentication is essential in today’s spam-centric world to ensure deliverability of key business communications 

• Email authentication also ensures businesses are protected from the myriad email based security threats that assail them every day 

• DMARC provides this protection but management can be convoluted and time consuming without focused management solutions

Roundtable

Ensuring Data Quality

Data quality is one of the most critical issues facing every enterprise and whether data be duplicate, stale, incomplete, invalid, conflicting or just plain incorrect the impact of enterprise decision making and ultimately enterprise success and be significant and severe. As the number of data sources grows, as the speed with which data is collected and utilized increases, and as the raw volume expands almost exponentially, the impacts of poor data quality becomes more significant than ever before. IT executives must build strong data governance capabilities to ensure that enterprise data is kept unique, timely, complete, valid, consistent, and accurate. 

Takeaways: 

• Data quality is not a new problem but the advent of the IoT age means that it will be a problem of greater relevance than ever before 

• The process by which data quality can be addressed isn’t fun or “sexy” but where enterprises have often ignored it to date they can no longer do so 

• Enterprises that do not proactively address data quality now may find that IoT is their downfall rather than their savior

3:10 pm
-
3:40 pm

Executive Exchange

Thought Leadership

Defining Data Governance

Data volume, data variety, and data velocity have all grown exponentially over the last few years, the so-called “Big Data” explosion. And while this increased organizational focus on data, the information it contains, and the insights that can be gleaned from it promises tremendous opportunity, that opportunity isn’t achieved without overcoming significant challenges. Whether it be the increased need for better data quality (an issue unresolved from the “small” data days), more efficient and effective data management, answering questions around data ownership vs. stewardship, or even increased regulatory pressure as a result of data security and data privacy, this increased focus on data has created an increased need for Data Governance. Join our panelists as we discuss the thorny issue of Data Governance: what it is, how it works, why you need it, and who should be responsible for it. 

Takeaways: 

• Data management issues have existed as long as data has existed but the Big Data boom has increased these challenges exponentially 

• Resolving data management issues requires a strong data governance program to make rules, resolve issues, and enforce compliance 

• Determining “what” to about data governance is the easy part, determining how and by whom it should be done will be the real challenge facing IT

3:45 pm
-
4:00 pm

Networking Session


4:05 pm
-
4:35 pm

Executive Exchange

Think Tank

Building Dynamic Security Teams

There’s no other way to say it than bluntly; Information Security is a white-hot field within Information Technology as a whole – over the last dozen years it has gone from after-thought, to scapegoat, to critical enterprise success factor. As a result, the need for capable and qualified Information Security specialists, whether front-line Analysts, mid-level Managers, or top level CISOs is at an all time high, but personnel and skills availability is sinking to an all-time (at least in terms of supply and demand ratio) low. There simply isn’t enough expertise in existence to go around, or enough education occurring to create it. In this environment, senior Information Security leaders are having to get creative in their pursuit of the people, performance, and passion necessary to address this capability shortfall. 

Takeaways: 

• Learn how to build grass-roots programs that cultivate a farm full of potential security experts through internal and collaborative programs 

• Find out how to leverage key organizational traits to generate buzz and interest where none existed before 

• Understand the relevance of certs vs. experience and how to evaluate and validate the value of candidates

Think Tank

The Power of Big Data: Energizing the Customer Experience

Customer intimacy is an imperative for companies who are struggling with increasing commoditization of goods and services and an explosive growth in the channels of engagement. Digital organizations have a head start and have disrupted traditional customer interfaces to gain competitive advantage. As a result, organizations across industries are now exploring ways to energize the customer experience and fill the digital gap. This session will present practical ways in which leaders in digital customer experience are leveraging Big Data to harvest customer insights, create new business applications and enable digital transformation within sales and marketing. 

Takeaways: 

• Discover how new data ingestion techniques and Big Data Lake are used to drive customer intimacy 

• Learn how digital customer transactions and social media can successfully integrate with enterprise data such as inventory and order management 

• Discuss how CIOs and CMOs need to interact to enable effective operating models to monetize on Big Data

4:40 pm
-
5:10 pm

Executive Exchange

Thought Leadership

Overcoming the Data/Privacy Divide

To drive greater focus and flexibility in retail capability, retailers are investing heavily in customer data capture and customer data analytics capabilities, whether from traditional loyalty programs, online data capture, or in-store mobile tracking. As more and more personable data is collected or created however, the specter of customer privacy issues begin to loom larger and larger. Enterprises need to take a long hard look at the information they are capturing and the manner in which it is being used to determine whether the potential value outweighs the potential risk, and whether the incentive offer to the customer is sufficient to overcome any reticence on their part. 

Takeaways: 

• Data privacy is not a show-stopper; customers are willing to share personal information if the payoff is sufficiently worthwhile 

• Not all information gathering needs to be personal and in many cases anonymous aggregated data can be just as instructive, certainly about trends 

• Where information gathering does get personal, opt-in with balancing opt-back-out requirements are essential

5:15 pm
-
6:15 pm

CIO Executive Visions Panel

Applying Big Data Principles to Security Paradigms

Volume, variety, velocity, veracity; all four of the hallmarks of Big Data have a clear fit in the world of security as the number of threats grows, their natures diverge, the speed with they are encountered (and subsequently have to be dealt with) accelerates, and the need to be ever more accurate enhances. As enterprises have made significant investments in Big Data programs and analytics platforms, they are beginning to reap real benefits in terms of business efficiency and innovation. The time then has come to begin applying those same principles and platforms to the security challenges facing enterprises to allow for faster, more effective overall security. 

Takeaways: 

• The nature of the enterprise security challenge closely mimics many of the Big Data challenges business are beginning to learn how to solve 

• Just as Big Data challenges required different tools to address for Line of Business and “general” IT issues, so they will for information security challenges 

• Security must become the next focus for analytics capabilities, and analytics the next focus for security professionals.

6:15 pm
-
6:20 pm

Thank You Address and Closing Remarks

6:20 pm
-
7:00 pm

Cocktail Reception

7:00 pm
-
8:30 pm

Networking Dinner

8:30 pm
-
10:00 pm

After Dinner Networking