CIO Energy Summit | September 6, 2018 | Houston, TX, USA

↓ Agenda Key

Keynote Presentation

Visionary speaker presents to entire audience on key issues, challenges and business opportunities

Keynote Presentations give attending delegates the opportunity to hear from leading voices in the industry. These presentations feature relevant topics and issues aligned with the speaker's experience and expertise, selected by the speaker in concert with the summit's Content Committee." title="Keynote Presentations give attending delegates the opportunity to hear from leading voices in the industry. These presentations feature relevant topics and issues aligned with the speaker's experience and expertise, selected by the speaker in concert with the summit's Content Committee.

Executive Visions

Panel moderated by Master of Ceremonies and headed by four executives discussing critical business topics

Executive Visions sessions are panel discussions that enable in-depth exchanges on critical business topics. Led by a moderator, these sessions encourage attending executives to address industry challenges and gain insight through interaction with expert panel members." title="Executive Visions sessions are panel discussions that enable in-depth exchanges on critical business topics. Led by a moderator, these sessions encourage attending executives to address industry challenges and gain insight through interaction with expert panel members.

Thought Leadership

Solution provider-led session giving high-level overview of opportunities

Led by an executive from the vendor community, Thought Leadership sessions provide comprehensive overviews of current business concerns, offering strategies and solutions for success. This is a unique opportunity to access the perspective of a leading member of the vendor community." title="Led by an executive from the vendor community, Thought Leadership sessions provide comprehensive overviews of current business concerns, offering strategies and solutions for success. This is a unique opportunity to access the perspective of a leading member of the vendor community.

Think Tank

End user-led session in boardroom style, focusing on best practices

Think Tanks are interactive sessions that place delegates in lively discussion and debate. Sessions admit only 15-20 participants at a time to ensure an intimate environment in which delegates can engage each other and have their voices heard." title="Think Tanks are interactive sessions that place delegates in lively discussion and debate. Sessions admit only 15-20 participants at a time to ensure an intimate environment in which delegates can engage each other and have their voices heard.

Roundtable

Interactive session led by a moderator, focused on industry issue

Led by an industry analyst, expert or a member of the vendor community, Roundtables are open-forum sessions with strategic guidance. Attending delegates gather to collaborate on common issues and challenges within a format that allows them to get things done." title="Led by an industry analyst, expert or a member of the vendor community, Roundtables are open-forum sessions with strategic guidance. Attending delegates gather to collaborate on common issues and challenges within a format that allows them to get things done.

Case Study

Overview of recent project successes and failures

Case Studies allow attending executives to hear compelling stories about implementations and projects, emphasizing best practices and lessons learned. Presentations are immediately followed by Q&A sessions." title="Case Studies allow attending executives to hear compelling stories about implementations and projects, emphasizing best practices and lessons learned. Presentations are immediately followed by Q&A sessions.

Focus Group

Discussion of business drivers within a particular industry area

Focus Groups allow executives to discuss business drivers within particular industry areas. These sessions allow attendees to isolate specific issues and work through them. Presentations last 15-20 minutes and are followed by Q&A sessions." title="Focus Groups allow executives to discuss business drivers within particular industry areas. These sessions allow attendees to isolate specific issues and work through them. Presentations last 15-20 minutes and are followed by Q&A sessions.

Analyst Q&A Session

Moderator-led coverage of the latest industry research

Q&A sessions cover the latest industry research, allowing attendees to gain insight on topics of interest through questions directed to a leading industry analyst." title="Q&A sessions cover the latest industry research, allowing attendees to gain insight on topics of interest through questions directed to a leading industry analyst.

Vendor Showcase

Several brief, pointed overviews of the newest solutions and services

Taking the form of three 10-minute elevator pitches by attending vendors, these sessions provide a concise and pointed overview of the latest solutions and services aligned with attendee needs and preferences." title="Taking the form of three 10-minute elevator pitches by attending vendors, these sessions provide a concise and pointed overview of the latest solutions and services aligned with attendee needs and preferences.

Executive Exchange

Pre-determined, one-on-one interaction revolving around solutions of interest

Executive Exchanges offer one-on-one interaction between executives and vendors. This is an opportunity for both parties to make key business contacts, ask direct questions and get the answers they need. Session content is prearranged and based on mutual interest." title="Executive Exchanges offer one-on-one interaction between executives and vendors. This is an opportunity for both parties to make key business contacts, ask direct questions and get the answers they need. Session content is prearranged and based on mutual interest.

Open Forum Luncheon

Informal discussions on pre-determined topics

Led by a moderator, Open Forum Luncheons offer attendees informal, yet focused discussions on current industry topics and trends over lunch." title="Led by a moderator, Open Forum Luncheons offer attendees informal, yet focused discussions on current industry topics and trends over lunch.

Networking Session

Unique activities at once relaxing, enjoyable and productive

Networking opportunities take various unique forms, merging enjoyable and relaxing activities with an environment conducive to in-depth conversation. These gatherings allow attendees to wind down between sessions and one-on-one meetings, while still furthering discussions and being productive." title="Networking opportunities take various unique forms, merging enjoyable and relaxing activities with an environment conducive to in-depth conversation. These gatherings allow attendees to wind down between sessions and one-on-one meetings, while still furthering discussions and being productive.

 

Thursday, September 6, 2018 - CIO Energy Summit

7:00 am - 7:55 am

Registration and Networking Breakfast

 

8:00 am - 8:10 am

Welcome Address and Opening Remarks

 

8:10 am - 8:40 am

Keynote Presentation

The Future of the CIO in the Coming Digital Economy

As more businesses undergo a digital transformation, and as those digital transformations become more ingrained into organizational culture, "Digital" becomes not something unique and different from the business, but a core component of every aspect of the business. As this shift occurs, IT itself faces the very real possibility of no longer being something unique from the business, but instead a component of every aspect of the business. In this world, what role then exists for the CIO? Two clear paths are presenting themselves - one leads to a focus on infrastructure and integration, to keeping the lights on for the digital innovators, while the other leads to information and innovation itself. Knowing which path to choose, how to choose it, and how to see it through will be one of the greatest challenges CIOs of this era will face.

Takeaways:

  • Change is, if not already here, certainly coming and CIOs who don't prepare for the change may not like the results when it arrives
  • Digital transformation is all about connecting enterprise systems to information technology to drive productivity and performance improvements
  • Be prepared to tackle the tasks that no-one wants to do, but everyone needs done; establish relevance to cultivate importance
 

8:45 am - 9:15 am

Keynote Presentation

Cybersecurity and Critical Infrastructure

The risk of a cyber-attack against Critical Infrastructure has never been greater. We will dive into the current state of cybersecurity; as it relates specifically to critical infrastructure. 

Takeaways: 

  • What are the major concerns?  
  • What is happening on the legislative and regulatory perspective? 
  • What new tools and technologies should organizations be implementing?
 

9:20 am - 9:45 am

Executive Exchange

 

Thought Leadership

How Cognitive Computing Will Impact Cybersecurity for Critical Infrastructure

The evolving landscape of cybersecurity threats is outpacing humans' ability to properly harness and process data, especially in critical infrastructure environments. This session will discuss how cognitive computing and machine learning can be applied to impact the discovery, understanding and mitigation of these threats, including across IT/OT environments.

Takeaways:

  • How does cognitive computing relate to cybersecurity?
  • What are the impacts of applying cognitive cybersecurity?
  • What are the issues related to cognitive computing in IT and OT environments?
 

9:50 am - 10:15 am

Executive Exchange

 

Thought Leadership

Become a Change Agent for Business Transformation

Today's modern CIO is embarking on a digital transformation journey exploring radical hybrid IT strategies and leveraging new technologies like Cloud, Social, Mobile and Big Data. However with 'keeping the lights on' legacy IT components costing nearly 90% of a typical IT budget, how can IT make powerful advancements and lead business change?  

Join this interactive session to learn how award-winning CIOs are successfully tipping the balance by liberating people, time and money from costly ongoing maintenance of their ERP systems including SAP and Oracle, to invest in strategic initiatives that create real-world competitive advantage.

 

10:20 am - 10:30 am

Morning Networking Coffee Break

 

10:35 am - 11:00 am

Executive Exchange

 

Think Tank

Next generation Ope-RA-tions - What IT should gear-up to?

Year 2016, was called the year of the Robots. More than 60% of the organizations are still in the planning stage of Robotic Process Automation (RPA) adoption. 2017 will see a significant proliferation and more formal adoption of RPA in the main stream. In January 2017 this year, McKinsey Global Institute's report stated that ?almost half the activities people are paid almost $16 trillion in wages to do in the global economy have the potential to be automated by adapting currently demonstrated technology, according to an analysis of more than 2,000 work activities across 800 occupations. While less than 5 percent of all occupations can be automated entirely using demonstrated technologies, about 60 percent of all occupations have at least 30 percent of constituent activities that could be automated. More occupations will change than will be automated away?. The companies are increasingly gravitating towards ?digital labor arbitrage? from ?outsourcing labor arbitrage? much of which is being driven by advances in robotics, artificial intelligence, and machine learning are ushering in a new age of automation, as machines match or outperform human performance in a range of work activities, including ones requiring cognitive capabilities. Energy service companies are no exceptions to these advancements. With ever increasing pressure to cut costs, increase productivity and customer centricity, Robotic Process Automation provide some of the answers. 

Key takeaways form this think tank: 

  • Get an overview of what RPA is and how it is evolving.  
  • Understand the technology landscape and its impact on the tradition IT. 
  • Explore typical use cases for retail energy service providers. 
  • Best practices in RPA adoption. 
  • Role of IT in RPA adoption. 
  • IT security implications
 

11:05 am - 11:30 am

Executive Exchange

 

Thought Leadership

Strategic and Secure Mobility

Is mobility a cost? Or is it a key part of your strategy for business success? Many businesses are leveraging mobility to generate real and measurable returns and to increase their competitiveness. How? Join CDM Media and BlackBerry as we explore ways in which companies can strategically manage their mobility investments. 

In our session we'll look at security - again from a strategic viewpoint. Security covers a wide range of issues in the modern enterprise. While protection of data is at the forefront, security involves many other aspects and issues from secure collaboration to the security and protection of employees in an increasingly tumultuous world. We'll deal not only with securing mobility, but how the strategic use of mobility can make you more secure.

 

11:35 am - 12:00 pm

Executive Exchange

 

Think Tank

Quantifying IT Risk

Most IT risk assessment frameworks are subjective, imprecise, and don't relate well to the business. We examine issues that can make the process more useful. 

Takeaways: 

  • High/medium/low risk rating is not useful enough in making resource allocation decisions. 
  • Assessment for compliance or vuknerability? or history? 
  • Factors to add in for your framework. 
  • Decent tools to start with and modify.
 

12:05 pm - 12:30 pm

Executive Exchange

 

Thought Leadership

Security's Place in Enterprise: A Brave New World

Attackers are rapidly refining their ability to evade detection methods against modern cyber security solutions. While Information Security has existed for decades, organizations are starting to realize information security has be fully incarnated in an organization's ecosystem as a formal and holistic behavior, using Threat Intelligence and Enterprise Risk Management (ERM) bestpractices. 

Organizations are more at risk than ever when it comes to advanced attacks, insider threats, compliance issues, change management, ransomware, and many other issues. Savvy CISOs will recognize this new, broader need for threat visibility and management of the overall enterprise risk, and will position themselves for success by looking beyond traditional information security boundaries and engaging business solutions around all cyber enterprise risk. 

Takeaways: 

  • Understand the real risks that enterprises face from cyber attackers. 
  • Learn how organizations manage multiple vendors, products, and solutions when defending against a wide variety of complex attacks. 
  • Just because information security is an aspect of enterprise risk doesn't mean that the CISO needs to take a back seat position. 
  • The end goal is not about fiefdoms and ownership, it is about improving enterprise value and success; maintaining focus is essential.
 

12:35 pm - 1:20 pm

Networking Luncheon

 

1:25 pm - 1:50 pm

Executive Exchange

 

Think Tank

How I Learned to Stop Worrying and Love Cyber Risk

Despite all of the doomsday news articles and hype about APTs, cyber terrorism, and cyber warfare, all is not hopeless and breaches are not inevitable. We can all survive and even stress a little less by stepping back and viewing the problem a little differently. A lot of what is thrown out as security wisdom should be re-examined. - whether it is incident response, forensics, vulnerability management, or something as simple as a password policy. 

Takeaways: 

  • Focus on managing risk. 
  • Need to apply realistic, not theoretical risk management. 
  • Be open to new ideas and new concepts for addressing risk. 
  • Be willing to challenge the status quo.
 

1:55 pm - 2:20 pm

Executive Exchange

 

Thought Leadership

The Existential Moment: From Big Data Noise to the Signal

The energy industry is feeling pressure with the increase in renewables, tightening regulations, declining revenue, and increasing cost pressure. Traditional generation is facing an existential moment. Big Data is promising to be the shining star that will solve these problems. The challenge now is cutting through the Big Data noise to find the signal that pinpoints your specific needs and enables faster decision making. The path to real value is made up of smaller opportunities and not about finding the white elephant.

 

2:25 pm - 2:50 pm

Executive Exchange

 

Executive Boardroom

Compliance Time & Cost Down. Security Posture Up!

We often think of security compliance as a really annoying imposition - one that is onerous, too expensive, and doesn't even really address key security issues. That will change in 2017 and beyond. With the advent of new capabilities and lifecycle solutions, compliance will take a leap forward and dovetail nicely into the overall IT security agenda in an agile IT environment.

 

2:55 pm - 3:20 pm

Executive Exchange

 

Think Tank

Performing Predictive Analytics with Imperfect Data

Getting into predictive analytics starts with building models that learn from historical data. Determining what you focus your resources on and how machine learning can help improve your organizational insights. 

Takeaways:

  • Value can be gained from your organizational data, without the data needing to be perfect 
  • Focus on gaining value with the data you already have 
  • Focus on cleaning up critical but poor quality data over time
 

3:25 pm - 3:35 pm

Afternoon Networking Coffee Break

 

3:40 pm - 4:05 pm

Executive Exchange

 

Executive Boardroom

Safeguarding the Industrial Control-Plane

Securing industrial networks poses unique challenges resulting from the dichotomy between control-plane and data-plane communications. While many are familiar with the data-plane (a.k.a. user-plane) communications, less are familiar with the industrial control-plane. A critical part of the industrial network activity, the control-plane is invariably overlooked. In ICS/SCADA environments, the most critical assets are the industrial controllers (e.g. PLCs, RTUs and DCS controllers). Controllers are the ?brains? responsible for continuous execution of the entire industrial process lifecycle. Since most devices were designed decades ago, they typically don't include any security controls, like authentication or encryption mechanisms. As a result, there is no way to restrict those operating in ICS networks: anyone with network access, whether a trusted employee or malicious attacker, has unfettered access to these devices. Since most threats to ICS systems materialize in the industrial control-plane, it is essential to monitor it. However, monitoring the industrial control-plane is not a trivial task. 

In this session we will review:

  • What is the industrial control-plane?
  • Why is it important to secure it?
  • What challenges do we face when we look to monitor control-plane activities?
  • What steps and measures should you take to safeguard the control-plane?
 

4:10 pm - 4:35 pm

Executive Exchange

 

Think Tank

Managing Business Continuity During M&A Activities

Disaster Recovery and Business Continuity Planning can be a taxing exercise at the best of times, particularly when it is the CIO that is expected to assume the mantle of responsibility for ensuring not only the availability of the IT services necessary to support business capabilities, but often those business capabilities themselves. The difficulty increases exponentially during a merger or acquisition because now not only are IT Leaders trying to ensure the availability of the systems theyve built and the capabilities that rely on them, but those systems and capabilities of the acquired company which they didnt build, and likely have next to no knowledge of. And since frequency of mergers & acquisitions is only increasing, the likelihood that the CIO will have to deal with this issue is increasing in lock-step. To ensure that everyone is protected from day one of the merger or acquisition, it is vitally important that IT has a seat at the M&A table, is party to the discussions and planning, and has the financial flexibility to not just tie the two sets of systems together but to extend an umbrella of protection over both. 

Takeaways: 

  • Understand how frequently M&A activities are occurring and therefore how real of an issue this is 
  • See how much of a compounding factor M&A is on regular DRP and BCP initiatives 
  • Learn about industry-standard best practices to extend rocksolid BCP protection over a freshly merged entity
 

4:40 pm - 5:20 pm

Executive Visions

Using Artificial Intelligence to improve efficiencies and integrations

The market for cybersecurity continues to get bigger, but the problem is not getting better. Traditional tools are not capable of defending against sophisticated and targeted attacks, adversaries outnumber cybersecurity professionals, and they have bigger budgets. Protecting our critical infrastructure is more important than ever, but we can't out-hire or out-spend them, and current tools are ineffective. To successfully protect their organizations and our critical infrastructure, CISOs should be looking to embrace artificial intelligence to help scale their teams and even the playing fields with the adversary. 

Takeaways:

  • Where is AI most valuable in your security operations? 
  • How can AI make your existing resources better and how can it scale your operations? 
  • How can we use AI for cyber and performance in IT and SCADA systems?
 

5:20 pm - 5:30 pm

Thank You Address and Closing Remarks

 

5:30 pm - 7:00 pm

Cocktail Reception