↓ Agenda Key
Visionary speaker presents to entire audience on key issues, challenges and business opportunities
Keynote Presentations give attending delegates the opportunity to hear from leading voices in the industry. These presentations feature relevant topics and issues aligned with the speaker's experience and expertise, selected by the speaker in concert with the summit's Content Committee." title="Keynote Presentations give attending delegates the opportunity to hear from leading voices in the industry. These presentations feature relevant topics and issues aligned with the speaker's experience and expertise, selected by the speaker in concert with the summit's Content Committee.
Panel moderated by Master of Ceremonies and headed by four executives discussing critical business topics
Executive Visions sessions are panel discussions that enable in-depth exchanges on critical business topics. Led by a moderator, these sessions encourage attending executives to address industry challenges and gain insight through interaction with expert panel members." title="Executive Visions sessions are panel discussions that enable in-depth exchanges on critical business topics. Led by a moderator, these sessions encourage attending executives to address industry challenges and gain insight through interaction with expert panel members.
Solution provider-led session giving high-level overview of opportunities
Led by an executive from the vendor community, Thought Leadership sessions provide comprehensive overviews of current business concerns, offering strategies and solutions for success. This is a unique opportunity to access the perspective of a leading member of the vendor community." title="Led by an executive from the vendor community, Thought Leadership sessions provide comprehensive overviews of current business concerns, offering strategies and solutions for success. This is a unique opportunity to access the perspective of a leading member of the vendor community.
End user-led session in boardroom style, focusing on best practices
Think Tanks are interactive sessions that place delegates in lively discussion and debate. Sessions admit only 15-20 participants at a time to ensure an intimate environment in which delegates can engage each other and have their voices heard." title="Think Tanks are interactive sessions that place delegates in lively discussion and debate. Sessions admit only 15-20 participants at a time to ensure an intimate environment in which delegates can engage each other and have their voices heard.
Interactive session led by a moderator, focused on industry issue
Led by an industry analyst, expert or a member of the vendor community, Roundtables are open-forum sessions with strategic guidance. Attending delegates gather to collaborate on common issues and challenges within a format that allows them to get things done." title="Led by an industry analyst, expert or a member of the vendor community, Roundtables are open-forum sessions with strategic guidance. Attending delegates gather to collaborate on common issues and challenges within a format that allows them to get things done.
Overview of recent project successes and failures
Case Studies allow attending executives to hear compelling stories about implementations and projects, emphasizing best practices and lessons learned. Presentations are immediately followed by Q&A sessions." title="Case Studies allow attending executives to hear compelling stories about implementations and projects, emphasizing best practices and lessons learned. Presentations are immediately followed by Q&A sessions.
Discussion of business drivers within a particular industry area
Focus Groups allow executives to discuss business drivers within particular industry areas. These sessions allow attendees to isolate specific issues and work through them. Presentations last 15-20 minutes and are followed by Q&A sessions." title="Focus Groups allow executives to discuss business drivers within particular industry areas. These sessions allow attendees to isolate specific issues and work through them. Presentations last 15-20 minutes and are followed by Q&A sessions.
Analyst Q&A Session
Moderator-led coverage of the latest industry research
Q&A sessions cover the latest industry research, allowing attendees to gain insight on topics of interest through questions directed to a leading industry analyst." title="Q&A sessions cover the latest industry research, allowing attendees to gain insight on topics of interest through questions directed to a leading industry analyst.
Several brief, pointed overviews of the newest solutions and services
Taking the form of three 10-minute elevator pitches by attending vendors, these sessions provide a concise and pointed overview of the latest solutions and services aligned with attendee needs and preferences." title="Taking the form of three 10-minute elevator pitches by attending vendors, these sessions provide a concise and pointed overview of the latest solutions and services aligned with attendee needs and preferences.
Pre-determined, one-on-one interaction revolving around solutions of interest
Executive Exchanges offer one-on-one interaction between executives and vendors. This is an opportunity for both parties to make key business contacts, ask direct questions and get the answers they need. Session content is prearranged and based on mutual interest." title="Executive Exchanges offer one-on-one interaction between executives and vendors. This is an opportunity for both parties to make key business contacts, ask direct questions and get the answers they need. Session content is prearranged and based on mutual interest.
Open Forum Luncheon
Informal discussions on pre-determined topics
Led by a moderator, Open Forum Luncheons offer attendees informal, yet focused discussions on current industry topics and trends over lunch." title="Led by a moderator, Open Forum Luncheons offer attendees informal, yet focused discussions on current industry topics and trends over lunch.
Unique activities at once relaxing, enjoyable and productive
Networking opportunities take various unique forms, merging enjoyable and relaxing activities with an environment conducive to in-depth conversation. These gatherings allow attendees to wind down between sessions and one-on-one meetings, while still furthering discussions and being productive." title="Networking opportunities take various unique forms, merging enjoyable and relaxing activities with an environment conducive to in-depth conversation. These gatherings allow attendees to wind down between sessions and one-on-one meetings, while still furthering discussions and being productive.
12:00 pm - 1:00 pm
1:05 pm - 1:15 pm
1:15 pm - 1:45 pm
Over half a decade has passed since peak of the financial crisis and over four years since the passage of Dodd-Frank, the first piece of regulation that was part in place as a response. In the intervening time the only constant has been ongoing waves of regulation that show no signs of stopping any time soon. FSI institutions need to take care that they are not adopting a short-term, piecemeal, decentralized approach to these demands to ensure that they are best able to leverage economies of scale and the insights that come from an integrated approach. Consistent and mature regulatory response programs will allow FSI enterprises to take a more structured, cohesive, and ultimately more effective approach to each individual regulatory requirement and the CIO will be instrumental in ensuring that those programs operate as effectively as possible.
1:50 pm - 2:20 pm
Of all the risk management issues that present themselves to the modern-day CISO, perhaps the most difficult to address is that of privacy. In and of itself, privacy is no different a challenge than protecting any other sensitive information, however the multi-jurisdictional impacts of the issue due to wildly differing laws between the US and European countries (as well as Canada, another country with strong privacy laws) make this an issue that is often times overwhelming to address. CISOs must work diligently to ensure that their privacy efforts conform with the standards of any jurisdiction with which they might work, where their data might be held and this is an almost overwhelming task.
2:25 pm - 2:50 pm
The increase in interest in insurers offering insurance direct may be seen as an inflection point not just in terms of insurance sold direct, but in terms of a shift in momentum from the agent to technology, across lines of business. It's not surprising that both insurers and consumers are interested in a shift in channels. It promises to be less expensive for an insurer to go direct, and consumers are clearly showing a shift in preferences for accessing coverage. However, replacing an agent isn't as simple as simply automating access to markets. And many carriers don't want to replace the agent, yet still want to participate in the online marketplace. This discussion will focus on the nuts and bolts of reinventing distribution.
2:55 pm - 3:20 pm
The hype around the cloud is pervasive and can be potentially overwhelming but numerous studies have shown that tangible benefits can be had, whether in cost savings, efficiency improvements, or flexibility enhancements. That said numerous impediments exist to not just realizing that value, but even considering adoption; regulatory issues, integration challenges, business process revamp, and a dozen other challenges can halt cloud projects in their tracks before they get off the ground. In this group discussion we'll explore those inhibitors, understanding which challenges prevent adoption and what can be done to overcome them.
Building security into your enterprise processes, and integrating it with your existing technology investments has never been more critical or complicated than it is in this era of decentralized computing, and ever-tightening compliance requirements. Furthering this complication is the impact that partnering deals can have since infrastructure, applications, and even data may now longer be under your direct control. To be able to ensure efficient and effective security capabilities you need to understand the nature of the threats that exist today, the impact a sourcing relationship can have on these threats, and the mitigation strategies and tools key industry leaders are using to address the challenge.
3:25 pm - 3:35 pm
3:40 pm - 4:05 pm
Mobile technologies have swept the world, with the latest news that there are officially more such devices on the planet than there are people and across the board these devices have become the go-to way in which people interact with peers and providers. While banks have begun adopting mobile channels to engage and interact with their clients, they clearly need to go much, much further, embracing mobile payments (in store and for bills), P2P payments, and mobile only enrollments among other innovations. Wholesale adoption of mobile as the primary (and in some ways only) engagement and interaction channel means backend systems will need to be re-architected and CIOs need to begin thinking about the nature and scope of these changes, as well as initiating the dialogue about this revolution with their business partners now.
As with all things in life, the focus on how to conduct enterprise security ebbs and flows between varying degrees of reactivity and proactivity. In the old school Security 1.0 world, where the focus was almost completely on network security, efforts were in general proactive in nature with firewalls and anti-malware seeking to prevent threats before they even occurred. This didn't work so well and so Security 2.0 focused on reactivity, wrapping things like encryption around the data so that even if a breach occurred, the loss would be mitigated. Yet breaches, and losses, continue to occur. So if primarily proactive security doesn't work, and if primarily reactive security also doesn't work, how then do we find the right balance between the two to find a security posture that does work?
4:10 pm - 4:35 pm
The accepted number for the amount of the IT budget that is tied up in operational spend, in paying to maintain technology that has already been purchased, is 80% leaving only 20% for the IT department to use to drive new projects. Because this level of funding is so low, as much as 70% of IT sponsored projects fail. Yet IT departments are being constantly pushed to be innovative, to find a way to embrace new technologies and leverage them to drive business change. How can you do that when your time, money, and effort goes to just keeping the lights on? Join us as we collectively explore this issue and examine some of the successful strategies that are being leveraged by top IT leaders.
Ursuline Foley, CIO, Corporate Platform Officer & Interim Chief Data Officer at XL Group Ltd, XL Group
Since regulatory (and industry) compliance became a notable thing in the early-mid 2000's it has been intimately linked with information security and often times has been the lever (or hammer) by which enterprises made necessary investments in security. But being compliant and being secure aren't the same thing, and in too many cases enterprises that were perfectly compliant have been perfectly breached. A new focus is needed; one that respects that while security and compliance are not the same thing, they are working towards the same goal (a reduction in overall enterprise risk exposure) and sees that compliance flows from security.
Luk Boral, Director, Technology Risk Centre of Excellence, BMO Financial Group
4:40 pm - 5:20 pm
Poor talent acquisition outcomes are an acute issue for many organizations and hiring the wrong candidates is an expensive mistake, costing an organization up to 2 times an employee's annual salary, in addition to indirect costs such as lowered employee morale and customer satisfaction. Further, as the business environment becomes increasingly complex and competitive, retaining attracted talent becomes critically important, especially for organizations already facing skills shortages or those such as FSI which may be perceived as "stodgy" or in other negative ways. To improve talent acquisition and retention we need to gain perspective and insights by gathering feedback from the key stakeholder groups allowing for comparison of performance across multiple touch points, identification of breaking points, determination of where time and money are being wasted, and a gathering of recommendations for improvement.
Mary Kotch, EVP Global CIO, Validus
5:20 pm - 6:30 pm
6:30 pm - 8:00 pm
8:00 pm - 10:00 pm
7:00 am - 7:55 am
8:10 am - 8:40 am
As Social Media becomes an increasingly important tool in the toolbox of the FSI enterprise those on the leading edge of adoption and deployment are beginning to use it for more than simple outreach and interaction. The great benefit of social interaction is scope, with the enterprise participating able to have thousands of interactions per hour, and therefore gather thousands of data points per hour. Whereas more simple Social Media programs allow insurers to be responsive to customer demand, social analytics instead allow them to be proactive, by understanding trends and predicting appropriate behavior before the need to react presents itself.
8:45 am - 9:15 am
While Information Security has existed for decades, Enterprise Risk Management (ERM), as a formal and holistic practice, is much newer yet already has taken pre-eminence over its forebear. What is the CISO, who in many ways has toiled in invisibility, infamy, or ignominy to do when faced with the issue of being supplanted by the Chief Risk Officer, just as enterprise demand for and focus on security has reached all-time heights? Savvy CISOs will recognize this new, broader need for holistic visibility into, and management of, overall enterprise risk and will position themselves for success by looking beyond traditional information security boundaries and engaging business partners around all enterprise risk.
9:20 am - 9:45 am
Increasingly, insurers are making concerted efforts to align strategy and innovation. But not every carrier has the resources or available talent to have a full time team with a dedicated budget. One option is to engage with the new innovation ecosystem of startup technology companies. What should carriers consider when leveraging this external innovation ecosystem? This discussion will focus on How to best engage with the innovation ecosystem .
9:50 am - 10:15 am
Predictive analytics have long been a hallmark of the insurance industry " by its very nature, using occurrences from the past to estimate the rate of occurrence in the future is predictive. Technological advances, particularly in the realm of analytics and specifically machine learning are however transforming the way in which predictive analytics are used, and the predictions themselves that are made. No longer do we rely simply on human observation and the correlation of a handful of easily quantifiable relationships. Instead, machine learning is literally allowing insurers to correlate all potential relationships and use those to drive such things as rate calculations. The benefits are twofold in that insurers are able to offer better rates to better customers while assessing risks more accurately and cost-protecting themselves accordingly.
When it comes to implementing network security infrastructure there are two schools of thought: use best-of-breed point solutions, or go with all round consolidated platforms. Pros and cons abound for either approach revolving around varying levels of protection, integration, and administrative overhead but the increasing complexity of current security infrastructure is showing a winning approach. Even though consolidated solutions may offer greater benefits in the long run, no one exists in a green-field situation when it comes to network and infrastructure security so careful planning is required to ensure the necessary protection.
10:20 am - 10:30 am
10:35 am - 11:00 am
As insurers of all shapes and sizes stare down the time-consuming and inherently risky proposition of a core systems replacement, increasingly they are beginning to consider the adoption of public cloud to facilitate this. As SaaS solutions become available they offer the possibility of a plug-and-play end-to-end solution while IaaS allows insurers to maintain a greater measure of control while deploying a new system in parallel minimizing risk and simultaneously controlling cost. Cloud migrations are never completely straightforward however, and many of the tools targeted at insurers are still in their early days. Insurance, by definition, is an industry focused on the mitigation of risk and insurance IT leaders need to be vigilant as they consider their cloud options for core systems replacement.
Feroz Merchhiya, CTO, California Insurance Guarantee Association
There's no other way to say it than bluntly; Information Security is a white-hot field within Information Technology as a whole " over the last dozen years it has gone from after-thought, to scapegoat, to critical enterprise success factor. As a result, the need for capable and qualified Information Security specialists, whether front-line Analysts, mid-level Managers, or top level CISOs is at an all time high, but personnel and skills availability is sinking to an all-time (at least in terms of supply and demand ratio) low. There simply isn't enough expertise in existence to go around, or enough education occurring to create it. In this environment, senior Information Security leaders have to get creative in their pursuit of the people, performance, and passion necessary to address this capability shortfall.
11:05 am - 11:30 am
Today's modern CIO is embarking on a digital transformation journey exploring radical hybrid IT strategies and leveraging new technologies like Cloud, Social, Mobile and Big Data. However with 'keeping the lights on' legacy IT components costing nearly 90% of a typical IT budget, how can IT make powerful advancements and lead business change?
Join this interactive session to learn how award-winning CIOs are successfully tipping the balance by liberating people, time and money from costly ongoing maintenance of their ERP systems including SAP and Oracle, to invest in strategic initiatives that create real-world competitive advantage.
11:35 am - 12:00 pm
It is estimated that the conversion to digital banking has the potential for a significant impact, that the migration of front-end activity combined with the automation of servicing and fulfillment processes could result in as much as a 90% cost reduction. Banks however have been painfully slow to respond and no-one has yet to establish a strong digital capability that will lead to runaway market success for a variety of reasons, perhaps the biggest of which is simply lack of understanding of the potential, and the demand. The conversion to digital banking is inevitable however, and so those IT leaders that prepare their organization's for a future shift now will be setting not only their company, but themselves up for success.
From a technology standpoint, as a society the world of business has gone through two distinct stages in the evolution of its information security focus. The first addressed network based protection and preventative controls such as firewalls and anti-malware. The second looked at data-centric and detective controls such as encryption and intrusion/extrusion monitoring. Since breaches continue to occur at a record pace, what is need new is clearly a new evolution, one that pushes towards individual focused security through granular user monitoring and management as provided by solutions such as Identity and Access Management. While IAM isn't a new technology field, it is one whose time has come and CISO need to begin investing in modern-day, light-weight, easy to implement IAM solutions now to stay ahead of the curve, and reduce enterprise threats.
The breach onslaught demonstrates that existing security solutions are incapable of defending current threats
Enterprises need to begin looking at security from an activity perspective rather than an artifact perspective
IAM provides activity insight, and therefore threat awareness, no other platform can equal
12:05 pm - 12:30 pm
Digital transformation is a trend that is sweeping every industry, not just insurance, but in many ways the insurance industry is one that is seen as lagging behind. Early digitalization efforts that focused on the reduction in cost to serve have resulted in modest savings, but the next wave, the wave that focuses on truly customized client interaction, is the one that stands to offer the greatest benefit. Life is transient in nature and by engaging in a series of ongoing, personalized customer interactions, insurers allow themselves to be positioned at the hub of each individual client's changing circumstances, becoming facilitators of that change, and agents of mitigation of the risk associated with it. To do so however requires a focused digital strategy that can only be fueled by focused investments in information technology.
Rebecca Wanta, CEO & President, RSW1C Consulting
Like death and taxes, IT outages are an inevitability whether as the result of power loss, telecommunications outage, or any one of a myriad other potential technical and non-technical issues. In this environment, the savvy CIO knows that what matters most is preparation " being ready for that next outage with an IT infrastructure that is both resilient and flexible and Disaster Recovery procedures that allow for efficient and effective recovery, balancing Recovery Time and Recovery Point objectives with appropriate cost. Disasters happen but with proper planning they don't have to be disastrous to your business.
12:35 pm - 1:20 pm
1:25 pm - 1:50 pm
The world of technology changes at a blinding pace. Some of these new technologies have provided great benefits, enabling IT to provide expanded functionality, greater efficiencies, and improved performance. Technology has changed the way insurers interact with customers, agents, and regulators. But there is also a set of technologies waiting to be proved within the industry which despite showing some promise, come with some technology risks and the potential for vendor hype. This session will highlight emerging business and technology trends in the insurance industry.
Karlyn Carnahan, Research Director, Celent
1:55 pm - 2:20 pm
Despite rapidly shifting distribution strategies the reality is that the independent agent still accounts for the bulk of business written by most carriers today. Agents (and customers) expect a unified experience across their preferred channels " Web, call center, mobile, email and their agency systems. As competitive pressures continue to increase, many carriers are investing in agent portal projects as one of their top priorities. How important is connectivity and mobile apps and how can a carrier balance enabling the agent with servicing the customer? This session will explore the digital journey to transform the agent/customer experience.
2:25 pm - 2:50 pm
Mobile, as in almost all walks of life, is fast becoming the channel through which clients and potential clients interact with insurers first. Mobile devices are readily at hand and easily worked with, but preparing for a mobile-first distribution strategy isn't just as simple as throwing an app together and then sitting back to let the orders and premiums roll in. While dedicated apps are shown to be the most effective mechanism to interacting with someone via a smart device, the likelihood that a non-customer will download and install such an app, especially if they are still in the investigative phase are very low. The form factor of these devices can create challenges in terms of data entry so usability is something than can also be low. Finally, while people are likely to investigate options via a mobile device, they still overwhelmingly prefer to buy from a person, yet will be balk at providing information already entered into an app a second time. As a result, there are significant front and back end technology hurdles that must be overcome before mobile distribution is more fact than fiction.
The breadth and depth of security threats that are targeting the modern enterprise are bordering on overwhelming, but they're not alone as the breadth and depth of security solutions are also bordering on overwhelming. When security managers have to respond to alerts and warnings from dozens of security systems, and CISOs have to make strategic decisions based on fragmented data, it's hard to argue that security is improving. Security Information and Event Management (SIEM) platforms that aggregate the vast quantities of data, correlate diverse events, and filter the signal from the noise are allowing enterprises to get back ahead of the curve and make appropriate tactical and strategic decisions.
2:55 pm - 3:20 pm
The banking industry is one that rarely would be described as innovative, with all players seemingly taking a what's good for one is good for all approach where no-one particularly upsets the status quo in anything but small and incremental ways. If the latest evidence from the European market is anything to go by, however, the potential exists that a major shakeup could be in the offing as a host of so-called Challenger banks are bursting onto the scene. Whether from upstart financial services organizations, of companies entrenched in non-related fields such as retail, new entrants are coming to market that having nothing invested in old school processes, not in the semi-competitive landscape that currently exists. Change is coming and Financial Services CIOs need to look to their own house to ensure the people, processes, and technologies are in place to respond to this new threat.
Mary Kotch, EVP Global CIO, Validus
For many years the CIO, has struggled with the concept of IT-Business alignment and finding ways to ensure that the IT department and the Lines of Business with which it integrates have a common understanding and ability to communicate. Now, as the CISO and the information security department grow out of the IT shadow, they increasingly find themselves in the same position. Their challenge however is greater in that the concepts of IT security are in many ways more abstract than those of generalist IT, and their activities often run counter to the goals of the rest of the organization. CISOs must learn for the trials and tribulations of the CIO and the IT department, and find common ground with the business, to ensure they can hear what their partners are saying, while communicating their own points in understandable terms.
3:25 pm - 3:35 pm
3:40 pm - 4:05 pm
4:10 pm - 4:35 pm
It's well documented that Millennials are significantly different than any previous generation. Their purchase behavior, borrowing and savings behavior, ethnic diversity and use of digital technology are causing banks to rethink how they deliver services and engage what is now the largest generational population in the country. Understanding the dynamics of this generation and its impact on the bank of the future including marketing, branch strategies, online banking and portfolio management is essential for long term success.
Ahu Chhapgar, SVP and Group Head Digital Payments, Mastercard
The discussion around the convergence of physical security and information security dates back over a decade, but though much was made of the concept in the early 2000's little was actually done and the buzz faded. Flash-forward to today however and the buzz is back because of the increased focus on holistic risk management, the increased pressure of greater compliance requirements, and the increased demand for every aspect of the business to be a value generator. CISOs and CIROs need to evaluate the opportunities for both technology convergence (streamlining platforms) and organizational convergence (streamlining roles) to meet new threat protections mandates.
4:40 pm - 5:20 pm
Maintaining a consistent client experience is key to ensuring a consistent client relationship, which in turn leads to greater client retention and spend. Maintaining that consistent experience is complicated by the fact that clients now interact with all providers, not just FSI ones, through a variety of channels that can number into the dozens. It is essential to not have just consistency of look and feel across all channels, but consistency of experience, and indeed to allow individual experiences to occur sequentially across all channels.
Ralph Groce III, Global CIO, Everest Reinsurance Company
5:20 pm - 5:30 pm
5:30 pm - 7:00 pm