Agenda


07:30 - 08:25
Registration & Breakfast


08:25 - 08:30
CAMSS Quebec 2018
Welcome Remarks


08:30 - 09:15
PANEL DISCUSSION
"The Challenges of Aligning IT and the Business"

“IT alignment” has been for some time, and continues to be, a major challenge for IT leaders. This idea of “aligning” the IT group with the rest of the organization is a persistent puzzle that causes many IT leaders to lose sleep. Yet despite the unrelenting attention to this topic, a clear working template or solution doesn’t appear to be any more evident.

How can IT align with the business when the business itself does not have a strategy in place? Should they be separate strategies or can they be created as one? This session aims to identify the key challenges IT and digital leaders face and how this can ultimately be overcome.

PANELISTS:

Simon Chapleau, Vice President & CIO, Laurentide Controls
Diamantino De Sousa,
CIO, Héma-Québec
Johanne Duhaime, CIO, Québec Hydro


Use Cases (agenda).png

09:20 - 10:05
BOARDROOM BRIEFING #1
"Empowering Innovation: Creating a Culture of Adoption"

As over-used as the word “innovation” may be these days, there is no denying that building a culture of innovation is at the top of most corporate agendas. After all, a company’s own employees are uniquely positioned to understand the intersection of business operations, product development pipelines, and customer demand. New growth should be spurred from within. Yet attempts to build a culture of adopting innovation often fall flat.

This session will focus on how to harbor an adoptive culture of innovation within your team and organization.


Use Cases (agenda).png

09:20 - 10:05
BOARDROOM BRIEFING #2
"Harnessing Data For Business Value"

Complex infrastructure, overlapping domains, and rigorous compliance requirements complicate a growing influx of data from multiple internal and external sources. Successful organizations combat this by leveraging a value generation cycle, or determining the value your data can provide and then using the right technology to deliver real results.

In this session, you'll learn how to derive lasting value from your data. Uncover 5 steps to making this happen, plus case studies on how real businesses laid the foundation for measurable business success.


Use Cases (agenda).png

09:20 - 10:05
BOARDROOM BRIEFING #3
"Implementing Security Without Compromising User Experience"

What is more important to your business – security or user experience? For many businesses, this is a common predicament that often instigates a reaction to focus heavily on one, resulting in the other being detrimentally impacted and consequently adding unnecessary risk and complexity. However, security or user experience is not a compromise any business should make.

In a world where attacks are becoming more sophisticated and regulations are ever-changing, how can businesses secure endpoints and maintain compliance without detrimental impact on user experience?


Meetings (agenda).png

10:05 - 10:30
Networking Break


Use Cases (agenda).png

10:35 - 11:20
BOARDROOM BRIEFING #1
"The Path to Becoming a Digitally Enabled Organization"

Organizations are using powerful cloud technologies to transform how they operate and deliver on rising customer expectations.  But many still struggle to realize the benefits of those tools, in great part due to low levels of digital adoption. In this presentation we'll discuss pragmatic and proven adoption techniques that are helping drive digital transformation in large well-established organizations.


Use Cases (agenda).png

10:35 - 11:20
BOARDROOM BRIEFING #2
"Machine Learning & Artificial Intelligence In The Enterprise"

Artificial intelligence is taking off. There is now a lot more data available and affordable, powerful systems to crunch through it all. It's also much easier to get access to powerful algorithm-based software in the form of open-source products or embedded as a service in enterprise platforms. A new generation of business analysts means organizations are also more comfortable with manipulating business data through the use of machine learning.

This sessions aims to take a look at the effect of AI and machine learning on the enterprise and the limitations of these technologies even as they start bringing real-world benefits.


Use Cases (agenda).png

10:35 - 11:20
BOARDROOM BRIEFING #3
"Advanced Cyber Security"

Today’s threats are more targeted and sophisticated than ever.  In order to be successful in dealing effectively with the cyber threat organizations must take a risk-based approach.  In this session we will cover components of a robust security posture including threat intelligence, network visibility, and big data analytics.  Attend this session if you want to take your current security program to the next level.


Use Cases (agenda).png

11:25 - 12:10
BOARDROOM BRIEFING #1
"Building & Maintaining an Analytic & Data Driven Culture"

Analytics can be a powerful contributor to the achievement of departmental and organizational goals. But successfully deploying analytics in any organization can be challenging and a number of common questions generally arise such as: Where do I start? Which projects should be prioritized? How should my organization be structured for success? What about data? And how do you prevent your teams from reverting back into old habits?

This interactive workshop will focus on the following areas:

Orienting organization thinking from a “data first” approach
Learn how to develop an analytic agenda that aligns with corporate strategies
Identify potential areas to apply analytics in your organization beyond BI
Develop strategies to extend/expand your analytics footprint
How to best architect change


Use Cases (agenda).png

11:25 - 12:10
BOARDROOM BRIEFING #2
"
Blockchain: Overhyped Buzzword or Real-Deal Enterprise Solution?”"

While blockchain is among the hottest technologies in the enterprise security, data storage and file-sharing arenas, many experts question its use or even whether it's really as secure as billed.

The technology has grown in popularity but, many experts are still not sure exactly how it works. This session will focus on the real power of blockchain. Is it just a buzzword, or is it the invisible technology that will change the world?


Use Cases (agenda).png

11:25 - 12:10
BOARDROOM BRIEFING #3
"
Leveraging Robots in the Enterprise"

While companies have traditionally operated under the assumption that it makes sense to improve processes before automating them, the advent of robotic process automation (RPA) technology may be turning that conventional wisdom on its head.This session will discuss how businesses can determine an effective process optimization and automation approach for their organizations.


Luch (agenda).png

12:10 - 13:10
Networking Lunch


13:15 - 14:15
ROUNDTABLE DISCUSSION
"Orchestrating True Digital Transformation"

Building a digital business involves creating new operations that support doing business digitally and take advantage of digital systems. New digital business companies that enter the marketplace and existing companies that add digital business arms increase pressure on their competitors to transition quickly to digital.


This interactive roundtable discussion will provide attendees to brain-storm and share ideas with one another on how to effectively orchestrate digital transformation.

SESSION MODERATORS:

Kirk Serjeantson, CIO, Dicom Transportation Group


14:20 - 15:05
BOARDROOM BRIEFING #1
"The Machine Fights Back - Leveraging AI For Self-Learning Cyber Security"

With machines fighting machines and increasingly sophisticated human attackers, we are now entering a new era of cyber-threats. The battle is no longer at the perimeter but inside of our organizations, and no security team can keep up with its speed. Cyber-attackers are quickly becoming silent and stealthy, and cyber defense has turned into an arms race.

This new wave of cyber-threats has seen skilled attackers that may lie low for weeks or months. By the time they take definitive steps, their actions blend in with the everyday hum of network activity. These attacks call for a change in the way we protect our most critical assets.

Self-learning and self-defending systems are now being deployed to continually assess business environments. Known as ‘immune system’ defense, this approach is used to uncover threats that have already penetrated the network border, and then automatically fight back. Unlike legacy approaches, which rely on rules or signatures, these technologies work autonomously, enable the security team to focus on high-value tasks, and can counter even fast-moving, automated attackers.

SESSION LEADER:
David Masson, Country Manager, Canada, Darktrace


14:20 - 15:05
BOARDROOM BRIEFING #2
"Establishing a Multi-Vendor Strategy"

Despite the trend suggesting organizations purchase as much as they can from a single vendor to avoid the headaches of integration, unfortunately, this is not a reality. Technology leaders find the best approach to deliver real value to their organizations is to secure the services of multiple vendors instead of attempting to find one claiming to do it all. However, with a multivendor approach, digital leaders are required to go the extra mile to make disparate products and interfaces from various vendors work harmoniously. But what's the best approach to this strategy?


Use Cases (agenda).png

14:20 - 15:05
BOARDROOM BRIEFING #3
"Data as a Corporate Asset"

Data is a corporate asset. Yes, this is a much-bandied about term in modern management spheres. The fact of the matter is the modern business relies heavily on data. Data provides insight into business performance, operational efficiencies, as well as strategic direction. If utilized properly, it plays a pivotal role in making strategic and operational decisions. While a number of firms have deployed modern data discovery and data visualization tools, most have come to realize this does not quite solve the challenges of data management, data governance, data security and data discovery. So how to does your data become a true corporate asset and how should it be effectively managed?


Meetings (agenda).png

15:10 - 15:35
Networking Break


15:40 - 16:25
BOARDROOM BRIEFING #1
"The Road To Secure, Mobile Enablement"

Mobile, smart device and BYOD strategies are increasing the pressure on today's security officers. BYOD is high risk, as 85% of the device is out of enterprise control. Traditional security fails as vendors push workstation-solutions to mobile, while other 'mobile security' solutions alter the mobile user experience causing other issues, including users finding a workaround.

This session will focus on industry case-studies while providing the chance to discuss and collaborate on tactics and lessons learned in an open discussion.


Use Cases (agenda).png

15:40 - 16:25
BOARDROOM BRIEFING #2
"Budgeting: What Needs To Be Considered?"

Despite the glaringly obvious benefits of implementing an array of advanced technologies in to the company, working with the same, or in some cases even less budget than the previous year, makes this a continuous uphill struggle. With vast amounts of money spent on past projects and as companies begin to focus on the bottom line benefit of technology to the business, demonstrating the value can be hard when the immediate results are not there to be seen.

How should you work with the CEO and CFO on priority investments? How do you present a business case to obtain the increased funding you need? How do you keep the lights on?


15:40 - 16:25
BOARDROOM BRIEFING #3
"Innovating Without Disrupting Existing Legacies"

Innovative business models are across cloud, analytics, mobile security and social are flourishing all around us. The typical "we've always done it this way" approach simply no longer cuts it in the increasingly competitive digital age. The best run companies are aware of this and leverage technology to create innovative products and services, gain competitive advantage and enhance customer interaction, all while ultimately improving the bottom line. However, with a reported 80% of IT budgets being spent to maintain existing legacy systems - leaving little to no money for new technologies - it leaves IT and Line of Business executives with a conundrum of innovating without disrupting existing, trusted legacies.


16:30 - 17:15
KEYNOTE PRESENTATION


17:15 - 19:30
CAMSS Quebec Evening Reception