Conference moderated by: Petr Koubský, publicist, analyst of information and communication media
- 08:00 – 09:00Registration of participants
- 09:00 – 10:45A: Why is digitization such a hot topic?
Digital Czech Republic
Vladimír Dzurilla, Government commissioner for digitization
Digitization as a challenge, and how to survive the year 2030
Jiří Švejcar, Partner, Boston Consulting Group
How will digital and agile transformation affect the role of CIOs? What is the future of IT in organizations? And what to do to stay relevant to your organization?
Be DIGITAL or be DEAD!
Jan Hruška, Chief Technology Officer, O2 Czech Republic
Why you have to and why you want to be digital, how your business will change if you can really be "real-time" and "digital" (how we do it at O2 and how we can help you, too).
Business Defined Datacenter!
Pavel Srnka, Consulting Director, Board Member, ANECT
Martin De Martini, Chief Information Officer, Board Member, Y Soft Corporation
Define data center requirements, design and operation through business parameters, not technology. Your services will be more accessible, safer and faster.
- 10:45 – 11:15Exchange of opinions during coffee and refreshments
- 11:15 – 13:15B: How to avoid risks and prepare for a critical situation?
Aruba Introspect - what the firewall will not stop and SIEM will fail to assess
Jakub Tikovský, HPE Aruba Systems Engineer, HPE
Imagine someone with appropriate rights, who, knowingly or not, downloads sensitive data from internal servers and then wants to abuse or upload it somewhere on the Internet. Firewall does not have much chance to detect such behavior, it can only detect fragments. SIEM may be theoretically more successful, but due to a static setup of rules it will be confronted with false alarms, and the attack will be over before the event is analyzed. Artificial Intelligence and Machine Learning inside Aruba IntroSpect takes care of self-learning rules and helps your security personnel analyze the alarms within minutes, which would otherwise take hours. These principles will protect you not only from the loss of sensitive data, but from many other security threats.
Company memory - how not to lose contacts and data when employees leave your company
Tomáš Kutěj, CEO, manica
The greatest informational value we have in companies is stored in the brains of our employees. How to ensure that this value does not go away with this or that person. It is natural that people are joining and leaving companies, and it is good to be prepared for it.
The ultimate IT guide for modern companies: metadata management
Milan Marťák, CEO, CEOS Data
Today's extreme complexity and interconnection of information systems and enterprise data brings a hidden threat in the form of know-how centered around a single person or even a subcontractor. In this presentation we will introduce a modern way of managing information about the IT systems, monitoring their interconnection and processing business data using Data Lineage or Impact Analysis during changes and updates. Eliminate the risk of losing knowledge about your systems and become true masters of IT.
ESET from a different perspective - a new indispensable pillar of your IT
Igor Pištěk, IT Manager, Moravia Cans
Václav Zubr, Pre-Sales Engineer, ESET
ESET Dynamic Threat Defense functionality in the customer's real environment delivers freedom from the daily IT administrator routine in your business.
What is the acceptable risk level?
David Pavlík, CIO, Kiwi
Information security means an acceptable level of risk for many companies. In his speech, David Pavlík, CIO Kiwi.com, will share the experience of different companies approaching this issue. It will develop a discussion of situations where it is wise to rely on security standards, where it is wise to come up with your own risk model and other practical examples.
- 13:15 – 14:15Business lunch and networking
- 14:15 – 16:00C: What next? What is the future role of CIO in businesses?
The role of CIO/CTO in big projects
Lukáš Klášterský, CTO, Erste Group
The role of the CIO / CTO is essential in large projects for the proper interconnection of the intention and the result of the implementation. Large projects tend to be long and complex and very often divided into different phases of the project. Keeping a large project under control in terms of time, goals and resulting quality, means a lot of effort to streamline and facilitate business and IT, individual IT teams, leadership, and executive components.
The end of punk! We are switching to robust IT and the corresponding new role of CIO
Michal Hanáček, CEO, Pilulka.cz
CIO/CTO cooperation with the rest of the management – the transformation of a small dynamic startup into a data and process driven company. How to do projects in a company with hundreds of employees and their roadmap relative to annual goals and KPIs. What lowcost tools to use to communicate, digitize, and implement changes in a company that is entering the "first class".
What I, as CFO, expect from my CIO and vice versa
Jan Bolek, CFO, DEK
Martin Keltner, IT Director, DEK
CIO and his role as an innovator
Sebastian Mánek, Program Manager, Raiffeisenbank