Conference moderated by: Petr Koubský, publicist, analyst of information and communication media

  • 08:00 – 09:00
    Registration of participants

  • 09:00 – 10:45
    A: Why is digitization such a hot topic?

    Digital Czech Republic

    Vladimír Dzurilla, Government commissioner for digitization

    Digitization as a challenge, and how to survive the year 2030

    Jiří Švejcar, Partner, Boston Consulting Group

    How will digital and agile transformation affect the role of CIOs? What is the future of IT in organizations? And what to do to stay relevant to your organization?

    Be DIGITAL or be DEAD!

    Jan Hruška, Chief Technology Officer, O2 Czech Republic

    Why you have to and why you want to be digital, how your business will change if you can really be "real-time" and "digital" (how we do it at O2 and how we can help you, too).

    Business Defined Datacenter!

    Pavel Srnka, Consulting Director, Board Member, ANECT

    Martin De Martini, Chief Information Officer, Board Member, Y Soft Corporation

    Define data center requirements, design and operation through business parameters, not technology. Your services will be more accessible, safer and faster.

  • 10:45 – 11:15
    Exchange of opinions during coffee and refreshments

  • 11:15 – 13:15
    B: How to avoid risks and prepare for a critical situation?

    Aruba Introspect - what the firewall will not stop and SIEM will fail to assess

    Daniel Fertšák, Systems Engineer, HPE

    Imagine someone with appropriate rights, who, knowingly or not, downloads sensitive data from internal servers and then wants to abuse or upload it somewhere on the Internet. Firewall does not have much chance to detect such behavior, it can only detect fragments. SIEM may be theoretically more successful, but due to a static setup of rules it will be confronted with false alarms, and the attack will be over before the event is analyzed. Artificial Intelligence and Machine Learning inside Aruba IntroSpect takes care of self-learning rules and helps your security personnel analyze the alarms within minutes, which would otherwise take hours. These principles will protect you not only from the loss of sensitive data, but from many other security threats.

    Company memory - how not to lose contacts and data when employees leave your company

    Tomáš Kutěj, CEO, manica

    The greatest informational value we have in companies is stored in the brains of our employees. How to ensure that this value does not go away with this or that person. It is natural that people are joining and leaving companies, and it is good to be prepared for it.

    The ultimate IT guide for modern companies: metadata management

    Milan Marťák, CEO, CEOS Data

    Today's extreme complexity and interconnection of information systems and enterprise data brings a hidden threat in the form of know-how centered around a single person or even a subcontractor. In this presentation we will introduce a modern way of managing information about the IT systems, monitoring their interconnection and processing business data using Data Lineage or Impact Analysis during changes and updates. Eliminate the risk of losing knowledge about your systems and become true masters of IT.

    ESET from a different perspective - a new indispensable pillar of your IT

    Jan Dobrý, IT Department Manager, Nemocnice Hořovice

    Václav Zubr, Pre-Sales Engineer, ESET

    ESET Dynamic Threat Defense functionality in the customer's real environment delivers freedom from the daily IT administrator routine in your business.

    What is the acceptable risk level?

    David Pavlík, CIO, Kiwi

    Information security means an acceptable level of risk for many companies. In his speech, David Pavlík, CIO, will share the experience of different companies approaching this issue. It will develop a discussion of situations where it is wise to rely on security standards, where it is wise to come up with your own risk model and other practical examples.

  • 13:15 – 14:15
    Business lunch and networking

  • 14:15 – 16:00
    C: What next? What is the future role of CIO in businesses?

    The role of CIO/CTO in big projects

    Lukáš Klášterský, CTO, Erste Group

    The role of the CIO / CTO is essential in large projects for the proper interconnection of the intention and the result of the implementation. Large projects tend to be long and complex and very often divided into different phases of the project. Keeping a large project under control in terms of time, goals and resulting quality, means a lot of effort to streamline and facilitate business and IT, individual IT teams, leadership, and executive components.

    The end of punk! We are switching to robust IT and the corresponding new role of CIO

    Michal Hanáček, CEO,

    CIO/CTO cooperation with the rest of the management – the transformation of a small dynamic startup into a data and process driven company. How to do projects in a company with hundreds of employees and their roadmap relative to annual goals and KPIs. What lowcost tools to use to communicate, digitize, and implement changes in a company that is entering the "first class".

    What I, as CFO, expect from my CIO and vice versa

    Jan Bolek, CFO, DEK

    Martin Keltner, IT Director, DEK

    CIO and his role as an innovator

    Sebastian Mánek, Program Manager, Raiffeisenbank

  • 16:00
    The end of the conference and afterparty

    Do not be in a hurry! We will be glad if you stay a little longer to exchange opinions with others over a glass of wine.