Highlights of the programme

Published on by Paloma SIGGINI - updated on

Ready For IT: a turnkey summary of cyber fundamentals

 Conferences Round tables


 Opening conference

The Funny Side of Digital and Security Transformation

Technology changes exponentially; organizations change logarithmically.

If we want digital and security transformation, we ultimately have to think about organizational transformation. There has never been greater urgency to change, yet, many organizations resist change. There are common misfires with organizational silos not talking to each other. Technology initiatives are often adopted shallowly, missing their full potential. Forrester found that 21% of businesses believe they are “finished” with digital transformation.

With cartoons and case studies, Marketoonist creator Tom Fishburne will help us laugh at ourselves as a way to think about digital and security transformation. Humor is an under-leveraged leadership skill and can help organizations adopt new technology, overcome fear, and drive cultural change.

Speaker : Tom Fishburne, Marketoonist

Closing conference

Sustainable IT For Growth: A Strategic Differentiator

Forrester predicts that sustainability will skyrocket into a strategic imperative.

Over the last 18 months, we have seen hefty fines levied against businesses making misleading claims. As scrutiny from consumers and empowered watchdogs such as UK’s CMA grows expect the crackdown to intensify. In 2023, organisations will need to make environmental sustainability a strategic imperative.

Technology executives need to become specialists in a wide range of technologies, methods, and services if they want to make better technological decisions. They also play a crucial role in leading development, delivery modernisation, and more. We’ll discuss the IT domains (Development, Workplace, and Infrastructure) on which to act for lowering the IT carbon footprint.

Speaker : Stéphane Vanrechem, Analyste Senior, Forrester

Round tables

"Tame the chaos: the CIO facing the challenges of the crisis!"

CIOs face unprecedented challenges due to recurring crises. Learn how to anticipate risk, adapt quickly and track key metrics to maintain business continuity. 45 minutes to understand how to navigate uncertainty in 2023.

"Basic but not static"

Applying the rules of digital hygiene is common sense. They evolve anyway with the needs and uses, and remain an essential basis to support the digital transformation of the company. But how do you go about it? Are these basics sufficient to reduce risks? Are there "new basics"? Is cyber insurance one of them? 

"Digital sovereignty: a challenge for the territorial organization of digital ecosystems"

The issue of digital sovereignty concerns all companies. What is the impact of these choices on the territorial organization of digital ecosystems? Take the example of the Monaco data center, which is back-up in Luxembourg, in an "e-ambassade"? How should IT departments manage these sovereignty issues and what are the consequences for companies?

Round Tables

"We've lost the talent! How do you manage your resources in a tight IT market?"

In a market where skills are scarce, how can we effectively manage human resources? How can we transform jobs to make them more attractive, adapt positions, and limit outsourcing of IT jobs to keep skills in-house? How can we avoid the risks associated with outsourcing critical functions while taking advantage of the benefits it offers?

"Resilience, the best protection of the company's information assets... Protect your queen!"

Backup and protection of company data are increasingly crucial issues. The risks of cyber attacks, accidental losses or data leaks can have dramatic consequences for the company. How to effectively protect the organization's information assets? How to implement advanced backup methods and analysis techniques such as BCP and DRP? And above all, how to have a resilient system?

"Innovation and security, the best enemies? The example of low-code / no-code!"

Low-code & no-code platforms allow applications to be developed quickly and easily, paving the way for innovation and meeting business expectations.  However, this approach raises security concerns. How can we guarantee the security of applications created with these platforms? How do you manage the risks associated with these technologies while still enjoying the benefits they offer?