CIO Digital Transformation Summit - US East | March 25-28, 2018 | JW Marriott Hotel Miami - Miami, FL, USA

↓ Agenda Key

Keynote Presentation

Visionary speaker presents to entire audience on key issues, challenges and business opportunities

Keynote Presentations give attending delegates the opportunity to hear from leading voices in the industry. These presentations feature relevant topics and issues aligned with the speaker's experience and expertise, selected by the speaker in concert with the summit's Content Committee." title="Keynote Presentations give attending delegates the opportunity to hear from leading voices in the industry. These presentations feature relevant topics and issues aligned with the speaker's experience and expertise, selected by the speaker in concert with the summit's Content Committee.

Executive Visions

Panel moderated by Master of Ceremonies and headed by four executives discussing critical business topics

Executive Visions sessions are panel discussions that enable in-depth exchanges on critical business topics. Led by a moderator, these sessions encourage attending executives to address industry challenges and gain insight through interaction with expert panel members." title="Executive Visions sessions are panel discussions that enable in-depth exchanges on critical business topics. Led by a moderator, these sessions encourage attending executives to address industry challenges and gain insight through interaction with expert panel members.

Thought Leadership

Solution provider-led session giving high-level overview of opportunities

Led by an executive from the vendor community, Thought Leadership sessions provide comprehensive overviews of current business concerns, offering strategies and solutions for success. This is a unique opportunity to access the perspective of a leading member of the vendor community." title="Led by an executive from the vendor community, Thought Leadership sessions provide comprehensive overviews of current business concerns, offering strategies and solutions for success. This is a unique opportunity to access the perspective of a leading member of the vendor community.

Think Tank

End user-led session in boardroom style, focusing on best practices

Think Tanks are interactive sessions that place delegates in lively discussion and debate. Sessions admit only 15-20 participants at a time to ensure an intimate environment in which delegates can engage each other and have their voices heard." title="Think Tanks are interactive sessions that place delegates in lively discussion and debate. Sessions admit only 15-20 participants at a time to ensure an intimate environment in which delegates can engage each other and have their voices heard.

Roundtable

Interactive session led by a moderator, focused on industry issue

Led by an industry analyst, expert or a member of the vendor community, Roundtables are open-forum sessions with strategic guidance. Attending delegates gather to collaborate on common issues and challenges within a format that allows them to get things done." title="Led by an industry analyst, expert or a member of the vendor community, Roundtables are open-forum sessions with strategic guidance. Attending delegates gather to collaborate on common issues and challenges within a format that allows them to get things done.

Case Study

Overview of recent project successes and failures

Case Studies allow attending executives to hear compelling stories about implementations and projects, emphasizing best practices and lessons learned. Presentations are immediately followed by Q&A sessions." title="Case Studies allow attending executives to hear compelling stories about implementations and projects, emphasizing best practices and lessons learned. Presentations are immediately followed by Q&A sessions.

Focus Group

Discussion of business drivers within a particular industry area

Focus Groups allow executives to discuss business drivers within particular industry areas. These sessions allow attendees to isolate specific issues and work through them. Presentations last 15-20 minutes and are followed by Q&A sessions." title="Focus Groups allow executives to discuss business drivers within particular industry areas. These sessions allow attendees to isolate specific issues and work through them. Presentations last 15-20 minutes and are followed by Q&A sessions.

Analyst Q&A Session

Moderator-led coverage of the latest industry research

Q&A sessions cover the latest industry research, allowing attendees to gain insight on topics of interest through questions directed to a leading industry analyst." title="Q&A sessions cover the latest industry research, allowing attendees to gain insight on topics of interest through questions directed to a leading industry analyst.

Vendor Showcase

Several brief, pointed overviews of the newest solutions and services

Taking the form of three 10-minute elevator pitches by attending vendors, these sessions provide a concise and pointed overview of the latest solutions and services aligned with attendee needs and preferences." title="Taking the form of three 10-minute elevator pitches by attending vendors, these sessions provide a concise and pointed overview of the latest solutions and services aligned with attendee needs and preferences.

Executive Exchange

Pre-determined, one-on-one interaction revolving around solutions of interest

Executive Exchanges offer one-on-one interaction between executives and vendors. This is an opportunity for both parties to make key business contacts, ask direct questions and get the answers they need. Session content is prearranged and based on mutual interest." title="Executive Exchanges offer one-on-one interaction between executives and vendors. This is an opportunity for both parties to make key business contacts, ask direct questions and get the answers they need. Session content is prearranged and based on mutual interest.

Open Forum Luncheon

Informal discussions on pre-determined topics

Led by a moderator, Open Forum Luncheons offer attendees informal, yet focused discussions on current industry topics and trends over lunch." title="Led by a moderator, Open Forum Luncheons offer attendees informal, yet focused discussions on current industry topics and trends over lunch.

Networking Session

Unique activities at once relaxing, enjoyable and productive

Networking opportunities take various unique forms, merging enjoyable and relaxing activities with an environment conducive to in-depth conversation. These gatherings allow attendees to wind down between sessions and one-on-one meetings, while still furthering discussions and being productive." title="Networking opportunities take various unique forms, merging enjoyable and relaxing activities with an environment conducive to in-depth conversation. These gatherings allow attendees to wind down between sessions and one-on-one meetings, while still furthering discussions and being productive.

 

Sunday, March 25, 2018 - CIO Digital Transformation Summit - US East

3:00 pm - 7:00 pm

Registration and Greeting

 

6:00 pm - 8:00 pm

Summit Happy Hour

Join the entire audience for networking, food and drink to kick off the summit!
 

6:30 pm - 9:00 pm

Private VIP Dinner

 

Monday, March 26, 2018 - CIO Digital Transformation Summit - US East

7:30 am - 8:30 am

Registration and Networking Breakfast

 

8:35 am - 8:45 am

Welcome Address and Opening Remarks

Presented by:

Vivian Schneck-Last, Former Managing Director, Goldman Sachs View details

 
 

Steve Dimmitt, Vice President, Marketing and Customer Success, CDM Media View details

 
 
 

8:45 am - 9:25 am

Keynote Presentation

The Road to Digital Transformation: Getting There While Avoiding the Potholes

Making the transition from legacy systems to next generation implementations is a major decision point for virtually any organization trying to take advantage of the new era in end user enablement through personal devices, connectivity and apps. Indeed, while Digital Transformation is one of those key buzzwords that many toss around, what does it really mean and how will it affect your business? Further, with so many options on the horizon, what are some of the key components you need to be most aware of and in some cases, concerned by? And how can you avoid many of the failures currently prevalent among companies trying to make Digital Transformation work for their business with limited success? 

This presentation will focus on key strategies and implementation techniques that will ultimately make it far easier to migrate to next generation business solutions. 

Takeaways:  

  1. How does mobile enablement directly affect my business? 
  2. Which workers are most likely to demand and/or require new systems and why? 
  3. With all the talk of relying on the cloud, is it really the panacea that it's cracked up to be? 
  4. Avoiding the pitfalls of inadequate security and the monumental costs associated with a lack thereof. 
  5. How to align a strategy to best leverage partnerships and services when resources are limited and plans aren't complete.

Sponsored by:

Samsung View details

 
 

Keith Fuentes, Vice President, Knox Services, Samsung View details

 
 
 

9:30 am - 10:10 am

Keynote Presentation

Hybrid Data Management: How Unleashing the Power of Your Data Can Help You Transform the Business

Hybrid Data Management is the foundation for data that will be used in analytics and data science to drive insights for businesses of all sizes and across all industries. It incorporates transactional databases, data warehousing and data lakes with options for on-premises, private and public cloud deployments. Data is the life blood of any organization and it can be a critical asset for the organizations that understand the importance of an uninterrupted flow of information throughout the enterprise.  

Thought leaders across the spectrum of enterprise data management want to ensure that critical applications can run anywhere in an enterprise -- no matter where the data resides. In this session, you will learn what Hybrid Data Management is, how it can benefit your organization, what the challenges to deployment are and how some business are already experiencing benefits from the solution with the help of IBM.

Sponsored by:

IBM View details

 
 

Chris Reuter, North America Data Warehouse Sales Leader, IBM View details

 
 
 

10:15 am - 10:40 am

Executive Exchange

 

Share:

Think Tank

Leveraging Data to Drive Student Success - A Digital Transformation Story

Kaplan believes "if it can be tracked it can be measured and thus optimized. Kaplan is finding ways to leverage data to transform the student experience support their drive for success. Avinash will share both the current data strategy as well as a look ahead at how to use data to improve the Return on Education Investment (ROEI).

Presented by:

Avinash Tripathi, Strategic Business Partner, Kaplan Inc.

 

Think Tank

CISO's Got Talent: Finding, Growing & Retaining the Best People

While new technology and solutions can help CISOs make more, faster and better decisions for an organization, nothing will take the place of a highly talented workforce. CISOs need to be great recruiters of talent but even more importantly growing the skills and capabilities of their team providing engaging and challenging opportunities for people. Competitive compensation is important for retaining great talent but so is a work environment where individual growth and development are front of mind and not an after thought. 

Takeaways:  

  1. Highly skilled employees want an environment where they can grow their skills and feel appropriately challenged. 
  2. Finding the best people, inside and outside of your company, and then providing a path to individual excellence is a key responsibility of CISOs.

Presented by:

Devon Bryan, Executive Vice President and CISO, The Federal Reserve System

 

Think Tank

Making Your Way Through the Fog of Cloud Computing in a Secure Path

What have we learned from a decade of cloud computing? What are the best practices that we should be taking into account as we take the next step on the digital transformation journey? We will discuss the full range of data center to cloud to hybrid cloud to fog and everything in between. 

Takeaways: 

  1. Cloud computing has effectively been with us for a decade. There are clear learnings in the last 10 years that we should leverage as we implement new solutions 
  2. One size does not fit all. Effective solutions can range from a state of the art data center to a hybrid cloud to a fully implemented cloud solution.
  3. Security requirements must be considered on the various cloud implementation options

Presented by:

Gram Ludlow, VP Global Information Security, Marriott Vacations Worldwide Corporation View details

 
 
 

10:45 am - 11:10 am

Executive Exchange

 

Share:

Thought Leadership

Say Goodbye to Vulnerability Backlogs: Using RASP to Reclaim Control and Reduce Risk

Knowing is half the battle when it comes to protecting applications and their sensitive data. 

Application security testing tools scan your code to reveal the long lists of known vulnerabilities, but not all are remediated before the next release-even with mature secure software development practices. Enterprises resort to using theoretical levels of criticality â?" not actual risks-to prioritize which accumulated vulnerabilities to fix and in what order. Many vulnerabilities often undergo an exception process and make it into protocol. 

A real-time, embedded solution like Prevoty's runtime application self-protection (RASP0 changes the game completely. Prevoty places an automated security mechanism at the front of the lineâ?"directly in the application's operating environmentâ?"to immediately lower risk and act as a compensating control at runtime. 

As such, Prevoty-enabled enterprises see 98%+ of their known vulnerabilities mitigated instantly, reducing backlogs and expediting an otherwise cumbersome release process. Prevoty RASP detects live production attacks and generates real-time security event longs and reports. Security teams can then correlate pre-production vulnerability scan results with Prevoty's runtime attack logs to go back, remediate based on actual riskâ?"not just hypothetical threats. The result? Improved forensics.

Sponsored by:

Prevoty, Inc. View details

 
 

Kunal Anand, CTO, Prevoty, Inc. View details

 
 
 

11:15 am - 11:40 am

Executive Exchange

 

Share:

Thought Leadership

"How Will We Pay for It?" - Strategies and Tradeoffs to Fund Digital Transformation

Digital transformation delivers a sustainable competitive edge if done right. The multi-million dollar boardroom question that CIOs are often left to address: "how are we going to pay for this?" with ongoing operations consuming 80%-90% of a typical IT budget. 

Join this interactive discussion to hear how technology leaders are adopting three specific strategies to reallocate capital & resources to digital growth. That reality requires significant rethinking of cost components and budget tradeoffs, and exploring radical options across the entire IT landscape.

Sponsored by:

Rimini Street View details

 
 

Hari Candadai, GVP, Global Product Strategy, Rimini Street View details

 
 
 

11:45 am - 12:10 pm

Solutions Spotlight

Deep dives into the latest and greatest technology solutions to today's business problems.

 

12:15 pm - 12:40 pm

Executive Exchange

 

Share:

Thought Leadership

How Mid-Market CIO's are Transforming Businesses in the New World of IT

The role of mid-market CIO's is rapidly changing requiring  the need to not only support the day-to-day technology concerns of a business but also align new technology plans with the organizations top strategic objectives; in addition all of this must be done while continuing to drive down costs due to tighter IT budgets.

 
The core of many mid-market organization objectives is how to stay competitive through a better understanding of what customers want.  Such an understanding is not the responsibility of a single individual or department but a cohesive approach to enabling all employees to access and interpret customer information as it relates to their specific job functions in their respective departments.  


This experience also needs to tie the organization together in a common, flexible and secure platform to not only meet the CIO's needs but also help drive the organization's strategic objectives forward.
Learn how 8x8 can help you create an optimal customer experience by enabling a superior employee experience.

Sponsored by:

8x8 View details

 
 

Reza Kamran, Director of Product Marketing, 8x8 View details

 
 

Share:

Thought Leadership

DevSecOps - One Man Changes the World

Today, Infosec and DevOps operate in silos with different and sometimes competing mandates. DevOps teams focus on velocity with continuous iterations while Infosec teams focus on managing risk and control. With the meteoric rise of microservices architectures enabled by application containers, the disconnect between DevOps and Infosec puts the organization at significant risk. Traditional vulnerability and remediation processes are ineffective in securing containers. Instead, security must be integrated into the CI/CD toolchain as a critical test to discover vulnerabilities and enforce enterprise policies before production. This session will discuss these challenges and suggest techniques, organizational changes and tools that can help DevOps and Infosec adjust to these new realities.

Sponsored by:

Tenable Network Security View details

 
 
 

12:45 pm - 1:35 pm

Networking Luncheon

 

1:40 pm - 2:05 pm

Solutions Spotlight

Deep dives into the latest and greatest technology solutions to today's business problems.

 

2:10 pm - 2:35 pm

Executive Exchange

 

Think Tank

Exploring Business Analytics & Machine Learning

Successful companies are constantly evolving and identifying new and innovative ways to grow their business and drive customer demand. Highly skilled employees are all tools companies have leveraged to stay ahead of the competition. Data is all around us, and whether we are aware of it or not, virtually everything we do now results in the generation of new data. Every electronic message we send and receive, every internet site we visit - all of this contributes to the vast amount of data that corporations currently hold on us. Data is a commodity in today's world and one whose value is endless. So, what do we do with all this data?  The average person remains largely unaware of exactly how much power businesses have through data analytics.

Takeaways

  1. It makes extensive use of statistical analysis, including explanatory and predictive modeling, and fact-based management to drive decision making.
  2. The new benefits that big data analytics brings to the table are speed and efficiency.
  3. Advanced data analytics is being used across industries to predict future events.
  4. Explore key analytic trends, cultural dynamics impacting decision sciences and data analytics, best practices for structuring an analytics organization and barriers of success to using data and analytics to drive decision making.

Presented by: David Solganik, Managing Director- Global Head of Business Intelligence and Metrics, Morgan Stanley


Think Tank

Which "Friends" Do I Trust? Realities of 3rd Party Risk

It is not a matter of if, but a matter of when. Organizations, more and more, and are outsourcing business activities to third parties because of cost-savings, revenue opportunities, expertise, etc. Thus, collaborating with our business partners early to select the right third-party vendor(s) with the appropriate security posture is essential, especially for vendors hosting, processing and/or transmitting sensitive/regulatory information, or having access to our IT assets. 

Takeaways:  

  1. Regardless of the reasons, outsourcing some business functions to a third party seems inevitable in today's world. 
  2. It is critical to have a proper vetting procedure of third parties before engaging them as business partners who have access to company systems and data.

Presented by:

Jonathan Hale, Senior Director & CISO, Veolia North America View details

 
 

Share:

Think Tank

Tackling Digital Transformation at a Systemically Important Financial Market Utility (SIFMU)

David can discuss the unique challenges, risks and opportunities involved with effectively guiding a SIFMU through a digital transformation, including:

  1. What differentiates a digital transformation at a SIFMU/SIFI from other types of financial institutions; 
  2. OCC's own experience with digital transformation, which is currently geared at revamping the organization's 20-year-old Encore clearing platform and replacing it with a more modular, agile system while maintaining the integrity of the U.S. exchange-listed options market; 
  3. The unique challenges involved with applying new technologies such as cloud computing and IoT to systemically important financial organizations; 
  4. The framework SIFMUs/SIFIs can follow to implement new technologies successfully; and 
  5. Considerations for the broader financial market when exploring their own digital transformations, and the technology vendors who support their efforts.

Presented by:

David Hoag, Group CIO, The OCC View details

 
 
 

2:40 pm - 3:05 pm

Executive Exchange

 

Thought Leadership

The New Landscape of AI-Powered Customer Engagement

Adaptation is everything. Today's customer knows more about our brand and out competitors than we do - they constantly research competitors, interact with us on their own terms, flow across channels, and take unpredictable routes to a fluid destination. They give us a narrow window of opportunity to capture their attention - and if we miss it's, it's gone forever. 

Despite that, only 10% of organizations can adapt an individual's experience in real-time, and optimize their path-to-purchase. The other 90% just can't move fast enough to stay relevant. 

In this session, we'll explore how truly disruptive companies are raising the bar for customer experience, right now - leveraging data from across channels to optimize every aspect of the journey - bringing customers closer, and earning the right to expand those relationships. 

Key Takeaways: 

  • Understand how brands with leverage and market-power are disrupting the market.  
  • See how that disruption is changing customer expectations, and raising the bar across every industry and market segment.  
  • Learn how data and artificial intelligence is fueling modern customer interactions - balancing customer and business needs, to adapt experiences in real-time. 
  • Hear case studies from organizations using AI to expand customer acquisition, optimize retention, and convert new sales opportunities - and doing so at scale.

Sponsored by:

Pegasystems View details

 
 

Executive Boardroom

Advanced Analytics to Differentiate and Successfully Enter a New Market Segment

Cardinal Health successfully entered a new market segment and has become one of today's Specialty Drug distribution market share leaders in only three years! Former Executive Director, Dom Garda, will discuss the digital transformation tactics used to differentiate themselves and enable this success. 

Takeaways:  

  1. Built customer loyalty by enabling Medical Clinics and Practices to operate more effectively 
  2. Overview of how they developed complex Inventory Management and Advanced Analytics solutions using large amounts of disparate data 
  3. The importance of selecting the right technology partner 
  4. Approach to meeting challenges and lessons learned 
  5. How this approach may apply to you

Sponsored by:

Infodat View details

 
 

Executive Boardroom

A Strategic Approach to Data Protection - How Implementing Data Classification is Your Route to Reducing Risk

Enterprises around the globe are creating and storing vast amounts of data as part of their daily business. Without classification of that data, enterprises are at risk for internal or external breaches of data and failing to comply with regulations. What's worse, enterprise security and risk managers are working far harder than they need to without even knowing it. In this session we will discuss data protection challenges and how the increasingly complex regulatory compliance landscape is necessitating organizations to leverage data classification across the enterprise for better risk management. If you are a CISO who has been told to do data classification, this session is for you. 

Takeaways: 

  • Why organizations need to focus on data as part of a holistic risk management approach 
  • How organizations can tackle regulatory compliance challenges with data classification 
  • How the value data classification brings can extend beyond security (i.e. softer organization issues such as awareness and culture)

Sponsored by:

Boldon James View details

 
 
 

3:10 pm - 3:20 pm

Afternoon Networking Coffee Break

 

3:25 pm - 3:50 pm

Solutions Spotlight

Deep dives into the latest and greatest technology solutions to today's business problems.

 

3:55 pm - 4:20 pm

Executive Exchange

 

Share:

Thought Leadership

Increase the Speed and Agility of Data Analytics

Hadoop and related technologies for Big Data analytics can deliver tremendous business value, and at a lower cost than traditional data management approaches. But early adopters have encountered challenges and learned lessons over the past few years. In this presentation, we'll discuss:  

  • he five worst practices in early Hadoop deployments and how to avoid them 
  • Best practices for the right architecture to meet the needs of the business 
  • How to ensure highly scalable and elastic Big Data infrastructure

Sponsored by:

Dell EMC View details

 
 

Thought Leadership

Rethink Security with Zero Trust

As today's attacks become more sophisticated, the pressure to protect access to enterprise systems and applications has grown considerably. Unlike the traditional security perimeter model, a Zero Trust approach dispels the notion of traditional models and moves toward a ?Never trust, Always verify? model for protecting access to data. Zero Trust recognizes that any network, device, user, or application could be compromised, and the credentials associated with them. As such, in order to better protect sensitive company resources, IT departments need to adjust their mindset and adopt a new way of thinking: that bad actors are already in their environment. Join us to hear how identity has become the hub of any Zero Trust framework, and discover several guiding principles and paradigms that help define a Zero Trust model.  

We'll examine: The current (broken) state of security and the role identity plays in cyber attacks, the massive rethink underway that redefines security to follow identity, and how Centrify is adopting a Zero Trust model approach with identity at the core, thus uniquely helping reduce risk through the power of identity services.

Sponsored by:

Centrify View details

 
 
 

4:30 pm - 4:55 pm

Solutions Spotlight

Deep dives into the latest and greatest technology solutions to today's business problems.

 

5:00 pm - 5:45 pm

Governing Board Executive Visions

CIOs/CISOs as the Consummate Communicator

Digital transformation is changing how you equip your employees and how your company interacts with customers. It is also changing the role of the CIO and CISO to be a business leader and internal sales leader for transformation. CIOs are now responsible for communicating strategies and recommendations to CxOs, boards and key stakeholders within a company. Join us, during lunch, for a passionate panel discussion with your peers as they share how they are successfully communicating internally to accomplish the company's goals. 

Takeaways:

  1. CIOs must be great communicators, not only with their teams, but the rest of the organization. 
  2. CIOs must learn the best ways to communicate clarity and urgency with boards and CXOs.

Moderated by:

Vivian Schneck-Last, Former Managing Director, Goldman Sachs View details

 
 

Panelists:

Emily Larkin, CISO, Sageworks

 

Shawna Cartwright, Group Director Head of Transformation, Ryder Systems Inc.

 

Donna Kladis, CIO, Techtronics Industries View details

 
 

Myrna Soto, Partner, Trident Capital Cybersecurity

 
 

5:45 pm - 6:45 pm

Summit Happy Hour

 

6:45 pm - 8:00 pm

Networking Dinner

 

6:45 pm - 6:55 pm

Dinner Remarks

Presented by Panaseer
 

7:15 pm - 7:30 pm

Dinner Keynote

Reinventing the American Dream

Presented by:

Jedidiah Yueh, Founder and Executive Chairman, Delphix

 
 

8:00 pm - 10:00 pm

After Dinner Networking

 

Tuesday, March 27, 2018 - CIO Digital Transformation Summit - US East

7:30 am - 8:15 am

Networking Breakfast

 

8:15 am - 8:55 am

Keynote Presentation

What Did Your Data Do Last Night?

It's almost paradoxical that enterprises possessing incredible stores of unique data are often not prepared to take advantage of those valuable assets â?" resulting in negative or reduced ROI from the data, incorrect or biased decision making, risk of potential compliance or security violations, and lost opportunities to gain competitive advantage. Join us to learn the best approach to data that services the needs of the entire enterprise, enabling a truly data-driven culture that will ensure you can know your data, trust your data, and use your data effectively.

Sponsored by:

IBM View details

 
 

Scott Buckles, Business Unit Executive - North America Business Analytics and Unified Governance Solutions Sales, IBM View details

 
 
 

9:00 am - 9:25 am

Executive Exchange

 

Thought Leadership

Security. Compliance. ROI. Why Should You Have to Choose?

With massive volumes of data growing at double-digit rates, regulations getting stricter, escalating security demands and mounting storage costs, many organizations in the digital economy feel caught between a rock and a hard place. Having to choose between security, compliance and storage ROI is no choice at all. This session looks at how to develop a data storage strategy that can address your compliance requirements, provide military-grade security and be cost effective all at the same time. 

Takeaways: 

  • Get a current view of the data storage market and upcoming trends. 
  • Learn how to ensure compliance, security and alignment with your budget when meeting your data storage needs 
  • Find out how to gain the flexibility of any combination of on-prem, hybrid, cloud or multi-cloud storage

Sponsored by:

Leonovus View details

 
 

Executive Boardroom

Customer Journey is a Roundabout, Not a One Way Street

Whether customers buy your products in-store or online, the path to purchase is no longer linear. It's no longer ?news? that the internet and mobile have changed the customer journey and how prospective customers engage and learn with products or services Today's journey is a roundabout, with consumers jumping in and out of platforms, devices, while speaking to friends and family simultaneously. Today's consumers don't make distinctions between being online and shopping offline - they want the experience to be seamless. Successful marketing programs today must be omnipresent and omnichannel. During this session we will discuss best practices and use cases of successful omnichannel marketing efforts that drive not only in-store purchases, but consumer loyalty to keep them coming back. 

Takeaways: 

  • Today's customer journey is not a straight path from interest to purchase, it winds through channels and devices - not always looking to buy but ready to be influenced.
  • Successful companies are implementing effective omnichannel marketing programs that drive more than a strong bottom line, they get customers talking and returning.  
  • Finding a strong partner that understands your business, your customer and how to best reach them throughout the journey is key to marketing success

Sponsored by:

SweetIQ View details

 
 
 

9:30 am - 9:55 am

Executive Exchange

 

Share:

Thought Leadership

Interconnection Oriented Architecture: Methods, Innovations and Opportunities

Next generation digital services such as Internet of Things, Big Data Analytics, Machine Learning, Hybrid Cloud, and Software-Defined Everything are increasingly reliant on proximal, high-speed, low-latency interconnectivity and adjacency to massive compute, storage, and Software as a Service. 

Enterprises, service providers, and governmental communities of interest can reduce costs and time to market by moving to a regionally-distributed Interconnection Oriented Architecture where geo-strategic alignment of applications, data and consumers is achieved at the network edge.

Sponsored by:

Equinix View details

 
 

Thought Leadership

How to Prevent a Costly Attack

Cybercrime has impacted virtually everything and everyone, at some level. Whether it's a big bank or hospital, a hotel chain or transit system, cyber-attacks affect organizations and individuals alike. Industry experts and analysts agree: cybercrime rates will continue to increase in 2018. In this session we'll discuss common attack types and threat vectors, war stories from the SOC at eSentire and how your firm can approach cybersecurity to prepare for inevitable attacks.

Sponsored by:

eSentire View details

 
 
 

10:00 am - 10:25 am

Executive Exchange

 

Executive Boardroom

Interactive Application Development: Leveraging Individuals and Interactions to Produce Real Solutions

Microsoft, Google, Dropbox, and others have proven the value and increased efficiency of collaborative online document development. These tools bring individuals together in a common environment to develop, review, and edit documents together; no matter where they are. What if you could experience the same interaction during all stages of the software development cycle? What if you could test your application, make changes, and continue testing without having to restart your application, or even lose your place in the application workflow? Now you can... 

Takeaways: 

  1.  Discuss true Agile Values and how to realize them in a practical way. 
  2. Discover new technology that fuels human interaction during software development.  
  3. Learn best practices for optimizing the user feedback loop.

Sponsored by:

Coactive View details

 
 

Steve Sherman, Chief Commercial Officer, Coactive View details

 
 

Executive Boardroom

Protecting The Transformation: Leveraging The Network on Both Sides

As the digital transformation takes many forms, the network becomes the common entity and a great place to enforce security if we can get the necessary control. In this session we will discuss the challenges of managing network access in a hybrid environment and how, if done correctly, the network access can enable transformation instead of being a roadblock. 

Takeaways: 

  • How security management can enforce proper access in many different architectures 
  • How intent, context and security controls can combine to reduce the management burden  
  • How to get to microsegmentation or zero trust without killing the team

Sponsored by:

FireMon View details

 
 
 

10:30 am - 10:40 am

Morning Networking Coffee Break

 

10:45 am - 11:10 am

Executive Exchange

 

Thought Leadership

Year of the Defender - Cybersecurity Predictions for 2018

Cybersecurity dominated the news cycle in 2017. There were headlines about viral ransomware, global destructive wipers posing as ransomware, leaks of spy tools from U.S. intelligence agencies, and breaches at major companies. 

What does 2018 hold in store for the defenders? Come discuss the largest security trends Cybereason researchers have identified for 2018.

Sponsored by:

Cybereason View details

 
 
 

11:15 am - 11:40 am

Executive Exchange

 

Share:

Thought Leadership

Leverage AI and Cognitive Capabilities in Your Corporate Video and Deliver Live Streams That Excite Your Workforce

The old world of corporate video is low-quality, hard-to-find and difficult to watch. Learn how leading companies are leveraging AI and cognitive insights as well as IBM Cloud Video's tracking and administration features to deliver effective video that excites and engages teams across offices, continents and time zones. With cognitive enhancements such as automated captions and keywords, the right content is now easier than ever to find. Whether it is a live stream of a c-level address, or team knowledge sharing, video can be created and leveraged across the organization as a learning, communication, and training tool that helps build stronger bonds between team members and communicates powerfully the key messages.

Sponsored by:

IBM View details

 
 

Executive Boardroom

Deception-Based Threat Detection: Myths and Realities

In today's world where advanced threats and insiders demonstrate that they can evade security prevention systems, in-network threat visibility and detection are considered critical security infrastructure. That said, there are myths and realities about the effectiveness of deception for detecting advanced threats - and there are specific strategies for operational management efficiency and key use cases that are driving adoption. Join us for this session where you'll hear about real-world deployment experiences, the value customers are realizing, and what pen test Red Teams are saying about deception-based threat detection.

Sponsored by:

Attivo Networks View details

 
 
 

11:45 am - 12:10 pm

Executive Exchange

 

Thought Leadership

Where Are We on Our Journey? Effective Dashboards for Decision Making

How fast are we going? Are we going in the right direction? How much fuel do we have in the tank? These are common questions for those on the move.  Companies on a digital transformation journey need effective dashboards to help them understand the myriad data sources screaming for attention. We will discuss best practices for the various types of dashboards that can be used to make the most important decisions for your company.

Takeaways:

  1. Digital Transformation is providing an increasing amount of data to be understood and analyzed in order to make the right decisions.
  2. Effective dashboards are a key tenet of consuming this onslaught of data.

Sponsored by:

Celonis View details

 
 
 

12:15 pm - 12:40 pm

Executive Exchange

 

Share:

Think Tank

Aligning the Governance Clutter: A More Holistic View?

Organizations are struggling with firm-wide efforts to maximize value, identify risk themes, and dramatically reduce costs due to the underlying quantity and complexity of their committees, governance bodies, and corresponding programs. Join us to explore how leading practices are being employed to significantly simplify governance, develop more principles-based strategies, accelerate innovation, and embed sound risk management practices.

Presented by:

Richard Kessler, Global Director, Cyber Security Services Strategy and Governance, KPMG View details

 
 

Think Tank

Testing in Cyber: Employees, Infrastructure, and Procedures

Preparing for cyber-attacks: how testing your people, processes and technology improves your operational readiness. Review of the cybersecurity threat landscape, popular attack vectors and what you can do about it. Practice attacks to maximize preparedness

Presented by:

Tom Kartanowicz, Head of Information Security, Natixis View details

 
 

Think Tank

Digital Transformation: Using Technology to Interpret the Data

One of the promised benefits of Digital Transformtion is the ability to capture, process and analyze more data that can then be used to transform a company's operations. More data, however, may mean nothing if it can't be analyzed and interpreted. AI and Machine Learning are promising tools to help CIOs, CDOs , CFOs and CMOs turn data into actionable next steps.

Takeaways:

  1. Digital Transformation is providing a significant increase in data that can be used to transform a business
  2. AI and Machine Learning can help C-Levels and other key leaders more efficiently analyze and turn data into actions.

Presented by:

Maria V. Gonzalez, Director of Web Technologies and Application Embedded Analytics, Ryder Systems Inc.

 
 

12:45 pm - 1:45 pm

Networking Luncheon

 

1:50 pm - 2:15 pm

Solutions Spotlight

Deep dives into the latest and greatest technology solutions to today's business problems.

 

2:20 pm - 2:45 pm

Executive Exchange

 

Executive Boardroom

State of Endpoint Security: 2018 Edition

Ponemon Institute estimates an average breach cost of $3.5 million in 2017, with a 27% probability that a U.S. company will experience a breach in the next 24 months. Just in one recent example, shipping company Maersk lost over $300 million when ransomware infected its systems. Malware is winning with a never ending supply of new attack vectors, previously unseen methods and malware variants. Why, after companies have invested billions of dollars in endpoint security, are they still so vulnerable? 

This interactive presentation will discuss the reasons behind the vulnerable state of endpoint security, along with the evolution of traditional Antivirus (AV), and the rise of Next-Generation Antivirus (NGAV) products powered by Machine Learning and Endpoint Detection and Response (EDR) solutions. It will then look into the latest endpoint security trends that promise to increase efficacy, lower TCO and deliver a more robust feature set without requiring organizations to rip and replace their existing security stack. 

This presentation will include a demo of the infamous Rubber Ducky that remains practically unstoppable by today's endpoint security products.

Sponsored by:

Nyotron View details

 
 
 

2:50 pm - 3:15 pm

Executive Exchange

 

Think Tank

From ITSM to the Digital Divide - Shift to Engage the Consumer


Presented by:

Abraham Naguib, SVP IT Strategy (CTO), Citi View details

 
 

Think Tank

Next Generation (Third Party) Security

Presented by:

Thien La, CISO, Wellmark Blue Cross Blue Shield View details

 
 

Think Tank

Which Third Parties Should We Trust?

It is not a matter of if, but a matter of when. Organizations, more and more, and are outsourcing business activities to 3rd-parties because of cost-savings, revenue opportunities, expertise, etc. Thus, collaborating with our business partners early to select the right third-party vendor(s) with the appropriate security posture is essential, especially for vendors hosting, processing and/or transmitting sensitive/regulatory information, or having access to our IT assets.

Takeaways:

  1. Regardless of the reasons, outsourcing some business functions to a third party seems inevitable in today's world.
  2. It is critical to have a proper vetting procedure of third parties before engaging them as business partners who have access to company systems and data.

Presented by:

Adolph Barclift, Divisional - CISO - Americas, NCR Corporation View details

 
 
 

3:20 pm - 3:55 pm

Governing Board Executive Visions

CIO as Driver of Digital Disruption

Digital transformation is causing Digital Disruption.  Companies are faced with new competitors using new technologies to change how industries work.  The CIO is in the best position to understand the limitations of legacy systems and processes and the opportunities that come with new technologies and capabilities.  We will discuss in this panel the best practices for CIOs to be the drivers of Digital Disruption for their company.

Takeaways:

  1. CIOs are in the best position to know how new technologies and thought processes can help their company be Digital Disruptors
  2. Because of this, CIOs should be one of, if not THE, driver of Digital Disruption for their company

Moderated by:

Steve Dimmitt, Vice President, Marketing and Customer Success, CDM Media View details

 
 

Panelists:

Ralph Groce III, Global CIO, Everest Reinsurance Company View details

 
 

Pradeep Wahi, Chairman, ARA Inc. View details

 
 
 

4:00 pm - 4:10 pm

Governing Board Summary

Next Steps on the Digital Transformation Journey

Our Governing Board will summarize the learnings from the day and discuss the path forward for building an ongoing community of CIOs where common issues can be addressed and success stories can be shared.

Takeaways:

  1. Building an ongoing community with your peers can be an invaluable resource for tackling the Digital Transformation projects ahead of you
  2. Sharing stories of success (and failures) is not reserved to a one day CIO Summit but should be shared on a regular basis with your peers

 

4:10 pm - 4:15 pm

Closing Remarks

 

4:15 pm - 6:00 pm

Summit Happy Hour

Join the entire audience for networking, food and drink to wrap up the summit!

Sponsored by:

Equinix View details