IT Transformation 2013: Four restructuring lessons

Tim Mann, NFU Mutual

- Timescale and budget
- Application remediation
- An 'army' of experienced specialists
Event Host: Kate Bellingham

IT Transformation 2013: BYOD threats and opportunities

Nathaniel Ward, CEB

- Bring your own applications and data
- Competitive advantages from BYOD
- IT moving from provider to advisor
Event Host: Kate Bellingham

IT Transformation 2013: Employees’ belief in your cause

Christina Scott, Financial Times

- Cross-department communication
- Staff surveys and feedback
- Following up on staff ideas
Event Host: Kate Bellingham

IT Transformation 2013: Building loyalty programmes

Anthony Roberts, Alliance Boots

- The Boots Advantage Card
- Package solutions
- Developing omni-channel experiences
Event Host: Kate Bellingham

IT Transformation 2013: How to conquer Snowden

Yuval Moss, CyberArk Software

- Practical steps to conquer Snowden
- News on how the breach occurred
- Approaches to mitigating these risks

Event Host: Kate Bellingham

IT Transformation 2013: Private or public cloud?

Panel Debate

- Benefits of cloud computing
- Business models
- Best practices

Event Host: Kate Bellingham

IT Transformation 2013: The FT’s IT expert community

Christina Scott, Financial Times

- Training schemes for staff
- Learning to use social media
- Vision for the future
Event Host: Kate Bellingham

IT Transformation 2013: Finding the best technical staff

Christina Scott, Financial Times

- 'Hire the weirdos and misfits'
- Attracting corporate innovation
- Hiring different types of people
Event Host: Kate Bellingham

IT Transformation 2013: Using customer profiles

Christina Scott, Financial Times

- Creating audience personas
- Understanding reading habits
- Predicting product reception
Event Host: Kate Bellingham

IT Transformation 2013: From ideas to successful market entry

Christina Scott, Financial Times

- Ideas at the concept stage
- Choosing ideas to move forward with
- Testing with customers
Event Host: Kate Bellingham

IT Transformation 2013: Tricks for user-friendly digital design

Christina Scott, Financial Times

- User-centric design
- Meeting the customer's needs
- Observing customer behaviour
Event Host: Kate Bellingham

IT Transformation 2013: Threats from shared user accounts

Yuval Moss, CyberArk Software

- Challenges of shared user accounts
- Systems for account management
- Sharing passwords across infrastructure
Event Host: Kate Bellingham

IT Transformation 2013: Protect your company from hackers

Yuval Moss, CyberArk Software

- Mitigating inside risk
- Processes of transformation
- Account types and privileges
Event Host: Kate Bellingham

IT Transformation 2013: Internal IT’s competitive advantage

Anthony Roberts, Alliance Boots

- Business agility
- Control and independence
- Developing common solutions
Event Host: Kate Bellingham

IT Transformation 2013: Building Alliance Boots’ IT

Anthony Roberts, Alliance Boots

- The development story
- Software development centre
- The 'one IT' approach
Event Host: Kate Bellingham

IT Transformation 2013: Developing your IT department

Anthony Roberts, Alliance Boots

- Long-term strategic choices
- Business culture and fit
- Software and IP rights
Event Host: Kate Bellingham

IT Transformation 2013: Retaining talent and efficiency

Nathaniel Ward, CEB

- The talent lifecycle
- Training on the right skills
- Correctly categorising IT pros
Event Host: Kate Bellingham

IT Transformation 2013: Threats from privileged employees

Yuval Moss, CyberArk Software

- Privileged personal access
- Controlling what users can do
- Two-factor authentication
Event Host: Kate Bellingham