Renaissance Schaumburg, Chicago

What You Get

Our ‘invitation-only’ approach allows us to provide exceptional service for our audience.

assignment_ind

Conference Pass

Full access to the event, from educational sessions to networking events.

flight

Flight Voucher

Traveling more than 100 miles? We'll help with a $200 flight credit.

local_hotel

Overnight Hotel

We cover the first night and offer a discounted rate. Spouses welcomed.

restaurant

5 Star Catering

Breakfasts, lunches, networking receptions and dinner included.

Who You'll Meet

A unique engagement opportunity with IT executives from emerging mid-market companies.

150+

Influential Peers

Learn from the best in the field and walk away with actionable insights.

20+

Thought Leaders

Gain valuable and actionable insights from knowledgable IT experts.

40+

Leading Partners

Meet only the solution providers most relevant for your projects and initiatives.

1.5K

Connections

Unparalleled networking opportunities with high profile industry leaders.

What You'll Do

Your registration creates a truly customized agenda based on your specific areas of responsibility, challenges and interests.

0%

Peer-Led Learning

Spend most of your time participating in educational sessions and networking activities.

40

Educational Sessions

Keynotes, case studies, plenary sessions, industry panel discussions, and more.

6

Networking Activities

The ideal event to connect with peers who can truly make a difference to your career.

0%

Research Meetings

Discover and validate leading solutions guided by knowledgable executives.

play_circle_outline Watch Video

KEY THEMES

A 100% peer-driven educational program centered around 5 key themes addressing the mid-market IT challenges.

FEATURED SPEAKERS

Key Themes

2018 SPEAKERS

Get insights from 20+ specialized IT executives making way in the ever-changing world of emerging technologies. Presenters for the Fall 2018 event include:

CIO VISIONS Mid-Market Fall Summit View More

Rafael Diaz

CTO

Northrop Grumman

CIO VISIONS Mid-Market Fall Summit View More

Raphael Morozov

CTO

Eurofins DMS

CIO VISIONS Mid-Market Fall Summit View More

Adam Bricker

VP of IT

Westmoreland Coal Company

CIO VISIONS Mid-Market Fall Summit View More

Nick Curcuru

VP, Big Data

Mastercard

CIO VISIONS Mid-Market Fall Summit View More

Corey Thompson

VP of IT

Pacific Drilling

CIO VISIONS Mid-Market Fall Summit View More

Jeffrey Fudge

Director of IT Operations

Ashley Furniture Industries

CIO VISIONS Mid-Market Fall Summit View More

Edward Contreras

CISO & Vice President Internal Audit

[24]7

CIO VISIONS Mid-Market Fall Summit View More

Beach Clark

VP of IT

Georgia Aquarium

CIO VISIONS Mid-Market Fall Summit View More

Michael Smith

CIO

American Academy of Family Physicians

CIO VISIONS Mid-Market Fall Summit View More

George Khalil

ISO

City of Riverside

CIO VISIONS Mid-Market Fall Summit View More

Vennard Wright

CIO

Washington Suburban Sanitary Commission

CIO VISIONS Mid-Market Fall Summit View More

Jason Allen

CIO

Yello

CIO VISIONS Mid-Market Fall Summit View More

Kirk Nugent

Information Technology Director

Wallace State Community College

CIO VISIONS Mid-Market Fall Summit View More

Pam Click

CIO (Divisional)

TIAA

CIO VISIONS Mid-Market Fall Summit View More

Jason James

CIO

Optima Healthcare Solutions

CIO VISIONS Mid-Market Fall Summit View More

Tom Jackson

CIO, Vice Chancellor of IT

North Carolina A&T State University

CIO VISIONS Mid-Market Fall Summit View More

Gaurav Bhatia

Chief Digital Officer

NewDay USA , LLC

CIO VISIONS Mid-Market Fall Summit View More

Zane Burnett

VP Digital Innovation & Technology

Alain Pinel Realtors

CIO VISIONS Mid-Market Fall Summit View More

William Tran

CIO

Berkley Risk Administrators Company, LLC

CIO VISIONS Mid-Market Fall Summit View More

Chad Mead

CTO

SUPERVALU

CIO VISIONS Mid-Market Fall Summit View More

George Finney

CSO

Southern Methodist University

CIO VISIONS Mid-Market Fall Summit View More

Georgiana Wagemann

Director of Sales

Darktrace

CIO VISIONS Mid-Market Fall Summit View More

JD Sherry

CRO

Remediant

CIO VISIONS Mid-Market Fall Summit View More

Dave Packer

VP Product & Alliances

Druva

CIO VISIONS Mid-Market Fall Summit View More

Curtis Peterson

SVP of Cloud Operations

RingCentral

CIO VISIONS Mid-Market Fall Summit View More

William H. Wolfe II

Lead Global Enterprise Architect for Dover Corporation

SilverPeak

AGENDA

Make every session valuable by selecting up to 3 key themes to mix and match the most relevant topics to you.

Reset Filter
CIO Leadership & Innovation
Cyber Security
Data Management - Strategy for Storage and Analytics
SundayNetworking

Welcome Cocktail Reception & Registration

Monday, October 29Breakout Presentation

close Putting the Human Back Into Network Security

Cyber Security

Network security technology is shifting from just being a way to keep threats out of your network to providing operational insights that can make your people more effective and your organization more efficient. With the growth of unmanaged devices like phones, tables, appliances and Internet of Things (IoT) gadgets, the network often is the only place where sensing and enforcement can be done consistently. Key Takeaways:
  • Learn about advances in behavioral monitoring, analytics and machine learning enabling security to go beyond a threat-centric approach
  • How to addres the fuzzy “gray” area where today’s greatest productivity and greatest risks are found.
  • How network security products are making it easier to understand people’s intent so that you can take a modern risk-adaptive approach connecting and protecting your people and data

Speaker

Michael Knapp
Director of Network Security ArchitectsForcepoint
MondayNetworking

Breakfast Buffet

Monday, October 29Keynote Presentation

close Digital Transformation – Six Steps to Success

CIO Leadership & InnovationHitachi - SVP, Practice Lead

Digital transformation – driving operational improvements in your physical value stream using connected data from your digital value stream – is delivering unprecedented value across industries to those with a clear road map. In fact, a recent Harvard Business School report shows that companies that embrace digital transformation attain significantly better gross margins, earnings and net income than those that don’t. What’s more, those digital leaders are not spending much more on IT than laggards because the big investments have already been made. The challenge is knowing how to connect the data from the digital value stream to drive continuous improvement with real-time metrics and predictive analytics. No matter where you are on the journey of digital transformation – these six steps can help you connect your systems to drive new levels of productivity, profitability and value across your business.

Key Takeaways:

  • Learn how to connect your physical and digital value streams to create near real-time operating systems.
  • Identify areas of variation across the physical value stream that can be supported by better data and real-time analytics.
  • Gain knowledge through strategic partnerships with digital leaders to accelerate your journey to unlocking more organizational value.

Speaker

Stephen Engel
SVP, Practice LeadHitachi
Monday

Targeted Research Meetings

Expo Hall
Monday, October 29Breakout Presentation

close Connecting the Healthcare “Internet of Things” (IoT) through Information Logistics (The Internet of Data)

Data Management – Strategy for Storage and AnalyticsNorthrop Grumman - CTO

Advances in hybrid computing environments, data management frameworks, mobile capabilities, security protocols, and analytics platforms make information logistics a necessary and important capability for every organization. The promise of IoT analytics offers timely medical delivery capabilities while addressing data management issues, security and privacy concerns, and computing and analytical options.

Key Takeaways:

  • Why IoT analytis is a key capability for large enterprises with remote, mobile staff
  • How the latest technologies in computing – cloud, edge, device, on-premise – are facilitating the IoT
  • Data, identity, network security and data pivacy concerns remain critical
  • Developing a strategy and architecture that fits the operations model is a key step to success

Speaker

Rafael Diaz
CTONorthrop Grumman
Monday, October 29Breakout Presentation

close Accelerating Digital Transformation with Collaborative Communications

Cloud StrategyRingCentral - SVP of Cloud Operations

Digital transformation is about meeting the needs of today’s modern business. The new workforce is increasingly mobile, global and distributed and is putting requirements on companies to support their on-the-go lifestyle. Discover how building a cloud ecosystem of integrated applications drives the speed, agility and data insights you need to generate meaningful business outcomes. With the right solutions in place, you can empower employees to work anytime, anywhere and on any device using the modality of their choice – whether online chat, video meetings or voice communications.

Key Takeaways:

  • Find out how you can unify your collaboration tools into one, single cloud-based platform
  • Learn how to empower employees to work anytime, anywhere and on any device
  • Hear how building a cloud ecosystem of integrated applications can cut costs while driving meaningful business outcomes

Speaker

Curtis Peterson
SVP of Cloud OperationsRingCentral
Monday, October 29Breakout Presentation

close Machine Learning for Dev Teams

DevOps StrategyEurofins DMS - CTO

From predictive analytics to chatbots to security, machine learning is everywhere – except for your company… So how does a mid-market CIO bring machine learning into their enterprise? In this talk, we will explore how one can leverage the latest tools to turn machine learning into just another dev practice.

Key Takeaways:

  • Much like the cloud a decade ago, machine learning can no longer be ignored by forward-thinking CIOs
  • CIOs can help their companies gain a strategic advantage by identifying applications for AI/ML
  • It is no longer necessary to build out a data science team to begin to leverage AI/ML
  • ML can become just another tool in your dev team’s toolbelt

Speaker

Raphael Morozov
CTOEurofins DMS
Monday, October 29Breakout Presentation

close Strategic & Tactical Alignment with Your Business Partners - A Killer Standard Deck/Process

CIO Leadership & InnovationWestmoreland Coal Company - VP of IT

CIO stands for “career is over” for those IT leaders who do not proactively engage their business partners in a holistic manner aligning strategy, projects, priorities, incidents, customer satisfaction, etc. At this session we will walk through an actual tool and standard deck for you to take back and start using.

Key Takeaways:

  • Standard deck for “account management”
  • Recommended KPIs
  • Recommended project prioritization
  • Recommended resource allocation schema

Speaker

Adam Bricker
VP of ITWestmoreland Coal Company
Monday, October 29Breakout Presentation

close Building a Sustainable Cyber Program

Cyber SecurityMastercard - VP, Big Data

Building a Sustainable Cyber Security Program – Cyber Security is at the top of mind of executives, shareholders and government officials. Enterprises can no longer put of creating a cyber program. Programs do not need to be complicated nor cumbersome to manage. Nick will talk about how enterprises need work within a framework an follow 5 key principles to create a sustainable program which will not bury and organization. The session will show how to build trust and confidence with your cyber program.

Key Takeaways:

  • Top 5 things to do to create a sustainable program
  • Key cyber metrics to track
  • Key questions your program must answer for your execs
  • Why a framework is important and how to use it

Speaker

Nick Curcuru
VP, Big DataMastercard
Monday, October 29Breakout Presentation

close Privileged Access on 500,000 endpoints? 5 lessons learned

Cyber SecurityRemediant - CRO

Rolling out Privileged Access Management to more than half a million servers, workstations and VMs has resulted in some lessons well learned. Join us for this interactive session to learn the top 5 best lessons learned through hands-on rollouts at organizations ranging from small non-profits to mega Fortune 100 companies. We guarantee you will walk away with information that can save your next PAM project… or maybe rescue your current PAM implementation!

Key Takeaways:

  • Privilege Access Remains the #1 Concern for Organizations
  • Gain visibility and transparency into where access is
  • Create Zero Trust without agents-on prem and in the cloud
  • Deployment doesn’t have to be hard

Speaker

JD Sherry
CRORemediant
Monday, October 29Breakout Presentation

close Practical Methods for IT to Truly Connect With the Business

CIO Leadership & InnovationPacific Drilling - VP of IT

CIO’s very often talk about the real or perceived gap between IT and the business. This discussion talks about the indicators and practical steps CIO’s can take to begin to eliminate that gap.

Key Takeaways:

  • Real business problems cannot be solved sitting in the corporate office
  • Understand the three basic areas of IT and know what areas you should focusing on: 1. Basic IT 2. IT in use 3. Disruptive IT
  • How your IT organization identifies themselves
  • Common obstacles to be aware of and how to address them

Speaker

Corey Thompson
VP of ITPacific Drilling
Monday, October 29Breakout Presentation

close The Cloud: A Survival Guide

Cloud StrategyAshley Furniture Industries - Director of IT Operations

The word “cloud” was a wise marketing choice – it implies abstraction and simplicity. And your migration to the cloud certainly almost always starts that way. But how do you maintain the same level of success as complexity increases and the cloud providers continue to unleash new features at a frantic pace? I have helped four companies migrate to the cloud, and I will share my experiences in terms of what worked well and what I learned NOT to do.

Key Takeaways:

  • How to Keep Your Head Above Water
  • Security – Not an Afterthought
  • Migration Options
  • Real Life Experiences

Speaker

Jeffrey Fudge
Director of IT OperationsAshley Furniture Industries
Monday, October 29Breakout Presentation

close Hidden Secrets of a Breach That Every Leader MUST Know

Cyber Security[24]7 - CISO & Vice President Internal Audit

Every leader prepares for the worst and hopes for the best. With a cyber breach, you need more than preparation. You need true experience on your side. A cyber breach is the wrong time to learn. This presentation will highlight what to expect and have to come out on top.

Key Takeaways:

  • Know what questions to ask and when
  • Learn your stakeholders, partners, and distractors
  • Learn why communication is your biggest challenge
  • Learn how to lead alpha co-workers during this challenging time

Speaker

Edward Contreras
CISO & Vice President Internal Audit[24]7
Monday, October 29Breakout Presentation

close Leveraging Analytics for Growth

Data Management – Strategy for Storage and AnalyticsGeorgia Aquarium - VP of IT

Ranked the number one Aquarium in the United States by TripAdvisor, Georgia Aquarium will serve more than 2.4 million guests this year. Since the aquarium’s mission of self-sufficiency generates just 10% of its budget from fund-raising, it manages for growth by leveraging data for crowd management, attendance forecasting and to measure guest sentiment and satisfaction. Join us to learn more about their data journey, and how they are now embarking on revenue management and price optimization using data.

Key Takeaways:

  • Analytics once reserved for Industries like financial services are now being used in many industries
  • Analytics is as much about the journey as the destination
  • Results of projects can be measured by Revenue Growth

Speaker

Beach Clark
VP of ITGeorgia Aquarium
Monday, October 29Breakout Presentation

close Digital Transformation: The AAFP's Digital Transformation Journey

CIO Leadership & InnovationAmerican Academy of Family Physicians - CIO

Digital Transformation is one of the hot buttons and “sexy” words floating around organizations today. Digital transformation is the differentiating factor most organizations must execute on to remain competitive and thrive in business today. Learn how one organization is looking to utilize the next generation of CIO leaders as strategic influencers. Learn that having a seat at the table with senior executive leadership means turning from traditional technology solutions to more business-focused initiatives that drive value and productivity resulting in stronger financial results. Digital transformation is not just new processes or ways of thinking to utilize technology as a strategic asset and competitive advantage, but is also the exercise in re-evaluating current processes and platforms to drive more automation and efficiencies across an organization.

Key Takeaways:

  • Learn how 85% of an organization is revamping their business practices to enable more value for their members
  • Practical scenarios on how to embark on a digital transformational journey
  • How CIO’s can be strategic influencers within an organization
  • How to act and think strategically

 

Speaker

Michael Smith
CIOAmerican Academy of Family Physicians
Monday, October 29Breakout Presentation

close A Shifting Focus to a Data-Centric Security

Cyber SecurityCity of Riverside - ISO

Information is at the heart of everything CIO’s do, yet we often forget what we’re trying to protect and focus on specific tools, losing sight of our crown jewels and leading to major gaps in our defense strategies. And even with programs and protocols in place, if users (employees) do not understand cybersecurity is an integral job responsibility, the enterprise is at risk.

Key Takeaways:

  • Data life cycle management
  • Data Defense in depth
  • Business engagement
  • Risk management

Speaker

George Khalil
ISOCity of Riverside
MondayNetworking

Lunch

Monday

Targeted Research Meetings

Expo Hall
Monday, October 29Breakout Presentation

close Creative IT Budgeting Tips

CIO Leadership & InnovationWashington Suburban Sanitary Commission - CIO

In times of shrinking IT budgets, technology leaders are forced to develop new strategies for developing and maintaining current spend levels. This session will share best practices for managing those budgets.

Key Takeaways:

  • Developing an IT service catalog
  • Assigning cost to IT services
  • Tracking IT service utilization
  • Chargebacks vs. Showbacks

Speaker

Vennard Wright
CIOWashington Suburban Sanitary Commission
Monday, October 29Breakout Presentation

close Building a DevSecOps Culture

DevOps StrategyYello - CIO

We’ve heard a lot about the benefits of DevSecOps recently, but how do you build a culture that leverages the union of security, operations, and development effectively? My talk will explore Yello’s approach to DevSecOps, and I’ll also talk about how a new breed of technology companies leverage the combined model to build high-quality software quickly and securely.

Key Takeaways:

  • DevSecOps is the new DevOps
  • Security is everyone’s responsibility
  • Building a DevSecOps culture requires both and top down and bottom-up approach

Speaker

Jason Allen
CIOYello
Monday, October 29Breakout Presentation

close Ransomware: A HigherEd Personal Testimony

Cyber SecurityWallace State Community College - Information Technology Director

Ransomware is now a $2 billion-per-year criminal industry. Prevention has become apart of a CIOs daily activities. What happens when you find yourself a Target? What happens when you fall Victim? Hear a personal testimony of a University that has walked through that experience and lived to tell the story.

Key Takeaways:

  • Why are HigherEd Institutions Targeted?
  • Tips and Tricks in the aftermath.
  • No cost Prevention practices.

Speaker

Kirk Nugent
Information Technology DirectorWallace State Community College
Monday, October 29Breakout Presentation

close SD-WAN Explosion: The Emerging Solution for a Cloud-First Enterprise

Cloud StrategySilverPeak - Lead Global Enterprise Architect for Dover Corporation

As enterprises continue to adopt cloud infrastructure and applications, exploding traffic levels and changing traffic patterns are driving them to re-evaluate their WANs. The WAN is a key enabler in transforming businesses to the new digital economy, but the current WAN infrastructure based on conventional routers was not designed for the cloud. To keep branch offices protected from threats, all web-bound traffic is backhauled to headquarters-based security services, which negatively impacts cloud application performance. As a result, enterprises are faced with architectural complexity, inconsistent application performance, and security challenges for applications and users.

Dover Corporation is a global manufacturing company with 22 Operating companies across five Continents.  Hear from Bill Wolfe, Lead Global Enterprise Architect for Dover Corporation, on how they incorporated SD-WAN to simplify and automate their network, integrate new sites easily, have better visibility and save substantially on connectivity costs as part of their goal to improve business operations and become a cloud-first enterprise.

Bill believes businesses should embrace technology for the purpose of improving business operations, providing a platform for competitive advantage and delivery of new service and product offerings.  Learn how Dover Corporation embraced SD-WAN and the results they are getting from the investment.

Speaker

William H. Wolfe II
Lead Global Enterprise Architect for Dover CorporationSilverPeak
Monday, October 29Breakout Presentation

close Challenges & Opportunities When Switching to Cloud IAAS/PAAs or SAAS

Cloud StrategyTIAA - CIO (Divisional)

Switching to the Cloud is a huge initiative for many companies, but how does it really work? what are the challenges with migrating to the Cloud from On-prem? what is the opportunity with IAAS/SAAS? how can we get the cost/benefit to provide an ROI? Lessons from Financial Systems Case Study.

Key Takeaways:

  • Engage Partners Early – CISO, Infrastructure, Risk
  • Push for “abandoned” software to be counted
  • Don’t underestimate the timeline for agreement
  • Clearly put in place an “out” if migration is not successful

Speaker

Pam Click
CIO (Divisional)TIAA
Monday, October 29Breakout Presentation

close Finding, Retaining and Growing IT Talent

CIO Leadership & InnovationOptima Healthcare Solutions - CIO

The technology sector is outperforming the rest of the U.S. economy, with unemployment rates at roughly 2.5%, according new data from the U.S. Bureau of Labor Statistics—compared to 4.1% national average. Today’s technology professionals are benefiting. With greater opportunity, they’re actively seeking out the best jobs to match their skills. As an employer, it’s never been harder to find and retain the best talent. Are your best IT resources on the verge of leaving? If they do leave unexpectedly, how will you deliver on critical IT projects? And once you find quality staff, how do you motivate them to achieve their fullest potential, so you can grow a successful team?

Key Takeaways:

  • Formalize an internal referral program – Employee referrals continue to be employers’ top source of hires, delivering more than 30 percent of all hires overall in 2016 and 45 percent of internal hires – Source: Society for Human Resources Manager (SHRM)
  • Think local, hire global – Does it matter where your IT team is? Not all IT orgs are hiring overseas. Rural sourced options continue to exist with talent in more affordable markets like Alabama, Oklahoma, Tennessee, and Michigan.
  • Growing IT Talent – The reduces overall attrition. This is important when digital transformation projects take 18-36 months. Losing top talent during one of these projects can delay the project and increase costs.
  • Dedicated Mentoring – Set dedicated office hours for your team. Make sure those time slots are dedicated each week.

Speaker

Jason James
CIOOptima Healthcare Solutions
Monday, October 29Breakout Presentation

close Experiences Building an Information Security Program in 180 Days

Cyber SecurityNorth Carolina A&T State University - CIO, Vice Chancellor of IT

In January 2018, NC A&T launched a major IT Development Initiative that will culminate in a new Information Security Program. The initiative includes new policies and operating standards, organization of a governance structure, over two dozen projects related to cybersecurity, major changes in the management of technology across campus, and realignment of campus IT resources. The new program will implement a continuous improvement cycle to ensure sustained efforts to manage and improve information security, and to comply with accreditation standards and system policies. NC A&T’s CIO will present the initiative from its inception and progress made into the fall.

Key Takeaways:

  • Information Security Program structure and organization
  • Summary of organizational issues affecting information security
  • Information security education for the executive committee

Speaker

Tom Jackson
CIO, Vice Chancellor of ITNorth Carolina A&T State University
Monday, October 29Breakout Presentation

close Trends in Data Management

Data Management – Strategy for Storage and AnalyticsDruva - VP Product & Alliances

The data landscape has changed, leaving organizations to build data management strategies that must withstand increasing scrutiny. Critical data must be protected from loss or breach, while data privacy regulations, make it even more critical that organizations understand what data they have and be able to make actionable decisions regarding it. This creates pressure for IT teams, which are already struggling to meet the myriad of needs posed by the different types of data distributed across organizations. Join us for an informative session on the latest trends in Data Management & Protection. Share best practices & learn how organizations addressing the challenges of:

  1. Multiple, disparate data sources
  2. Exponential data growth
  3. Today’s complex data environment

Key Takeaways:

  • How companies are using data management and solve for privacy challenges
  • Strategies for GDPR compliance and other upcoming regulations
  • How to manage data across heterogeneous environments

Speaker

Dave Packer
VP Product & AlliancesDruva
Monday, October 29Breakout Presentation

close CIO: Driving Marketing Technology Innovation

CIO Leadership & InnovationNewDay USA , LLC - Chief Digital Officer

The biggest challenges is that the role of technology is evolving and marketers are making decision on technology as well. What should CIO’s consider and how they should partner with their marketing and digital team to help organizations succeed.

Key Takeaways:

  • Partnership of the CIO with the CMO and CDO
  • Technologies and processes that are helping business grow
  • Organization proceses and team that will help CIOs succeed
  • Thinking like a marketer and leading the charge with innovation

Speaker

Gaurav Bhatia
Chief Digital OfficerNewDay USA , LLC
Monday, October 29Breakout Presentation

close How to Maximize your ERP Selection and Negotiation

CIO Leadership & InnovationTechnology Evaluation Centers - VP of Software Selection

Selecting the right ERP solution is key to improve business productivity and make the growth plan viable. As a Global Consulting and Advisory firm with 25 years in the market, TEC prepared a presentation that will help any company in a process of selecting a software solution that will fit better in the company’s needs and support the growing projects.

Key Takeaways:

  • Use an structured easy to follow approach to Software Selection
  • Get hands-on expert advice to lead, coach and support your evaluation
  • Find out how to score the deciding factors in your evaluation
  • Build consensus among the stakeholders and an audit trail, leveraging the information for your selection and negotiation

Speaker

Michael Thaw
VP of Software SelectionTechnology Evaluation Centers
Monday, October 29

close GDPR: What Now?

CIO Leadership & InnovationInfo-Tech Research Group - Senior Consulting Analyst

Having passed the May 25th deadline, your organization-wide panic may have subsided but the compliance requirements remain, what now? Despite a delay in imposed fines, the consequences of non-compliance with the General Data Protection Regulation (GDPR) will continue to be dictated by channel partners, customers, and vendors – across all industries. Understand how your organization can develop a right-sized approach to compliance, that meets all stakeholder (including regulators’) requirements.

Next, look beyond GDPR, and you’ll find a myriad of new privacy regulations (hint: CaCPA) that add additional complexities to your existing privacy program. This presentation will help you understand the evolving privacy landscape and the alignment between new privacy regulations and GDPR.

Speaker

Rita Zurbrigg
Senior Consulting AnalystInfo-Tech Research Group
Monday, October 29Breakout Presentation

close CIO, CDO, and CMO: Managing Relationships, Maintaining Relevance and Preparing for Change

CIO Leadership & InnovationAlain Pinel Realtors - VP Digital Innovation & Technology

Who owns what within an organization, and what should we be doing to fully realize our leadership responsibilities and potential? Changing organizational landscapes have brought confusion and frustration to all three positions- is there a need for them all? If so, how do we maintain harmony and efficiency.

Key Takeaways:

  • How to own digital decision making
  • How to maintain relevance in a landscape of native digital fluency
  • How to balance security with compatibility and innovation
  • How to foster a collaborative environment with the CMO

Speaker

Zane Burnett
VP Digital Innovation & TechnologyAlain Pinel Realtors
Monday, October 29Breakout Presentation

close Digital Transformation and Emerging Technologies - Hype or Reality?

CIO Leadership & InnovationBerkley Risk Administrators Company, LLC - CIO

You’ve heard it – Digital Transformation and Emerging Technologies such as Blockchain, AI, Deep Learning, IoT, RPA, Cloud, etc. You may also heard the phrase “Be the Disruptor not the Disrupted”. What does all this mean? Hype? Of course it’s a hype for consulting companies like Accenture, IBM and hundreds of other companies to thrive, survive, or stay relevant. Reality? Yes, it’s a reality for companies like the Fintechs, Insuretechs, and FAANG since it’s who they are and it’s in their DNA. What about most of us?

Key Takeaways:

  • Understand the hypes
  • Understand the realities
  • Understand the technologies
  • Understand what are the potential next steps

Speaker

William Tran
CIOBerkley Risk Administrators Company, LLC
Monday, October 29Breakout Presentation

close Unlocking the mysteries of common sense data security implementation a.k.a. don’t be that annoying guy!

Cyber SecurityRockefeller University - CISO

Data security controls are critical to protect valuable information assets; however, they are only effective if users actually implement them. This presentation will describe techniques to implement security policies while still maintaining positive relationships with your end-users. Choose security controls wisely and make them count!

Key Takeaways:

  • Practice what you preach
  • Don’t be intimidated by information security or ease-of-use
  • Know your organization, its usage patterns and culture in order to determine what they consider acceptable
  • Be able to switch roles from guru technician to non-techie end-user

Speaker

Marty Leidner
CISORockefeller University
MondayNetworking

Industry Dinner

TuesdayNetworking

Breakfast Buffet

Tuesday, June 12Keynote Presentation

close Steph Curry Cybersecurity:  Nothing But Net!

Cyber SecurityGoPro, Inc. - CISO

At RSA 2017, over 75% of the CISOs polled said they were looking for new positions.  Are CISOs wearing out their welcome with employers? In their effort to secure the company’s sensitive data, many CISOs end up alienating many of their colleagues or creating “hostile work environments.”  Is it a requirement of the job that CISOs live at odds with their organizations?

This session will present helpful tips on keeping your company secure while maintaining positive relationships and job security; what we in the security community might call a true “nothing but net” play.

Speaker

Todd Barnum
CISOGoPro, Inc.
Tuesday

Targeted Research Meetings

Expo Hall
Tuesday, October 30Breakout Presentation

close Bringing IT Back to the Table

CIO Leadership & InnovationSUPERVALU - CTO

What Happened to IT – or “Why are our chairs so much smaller”? In this humorous yet educational presentation Chad will reflect on his own lessons about how IT can get “back to the table” with the rest of the C suite, presenting historical perspective on why IT became marginalized in today’s business climate, and what we can do to earn our place back in the conversation with business leaders.

Key Takeaways:

  • You’re not alone: Collaborate with other CIOs/CTOs in the industry to share what they are doing and learning from each other.
  • Let it go: Encourage business units to cultivate employees who can own IT within their own department.
  • Embed it in the culture: Work IT into business so that it is seamless, not bolted on as an afterthought.
  • Speak the same language: Discuss IT in terms of business and strategy, not technology.

Speaker

Chad Mead
CTOSUPERVALU
Tuesday, October 30Breakout Presentation

close Autonomous Cyber Defense: AI and the Immune System Approach

Cyber SecurityDarktrace - Director of Sales

From insiders to sophisticated external attackers, the reality of cyber security today is that the threat is already inside. Legacy approaches to cyber security, which rely on knowledge of past attacks, are simply not sufficient to combat new, evolving attacks, and no human cyber analyst can watch so much or react quickly enough. A fundamentally new approach to cyber defense is needed to detect and respond to these threats that are already inside the network – before they turn into a full-blown crisis. Self-learning systems represent a fundamental step-change in automated cyber defense, are relied upon by organizations around the world, and can cover up to millions of devices. Based on machine learning and probabilistic mathematics, these new approaches to security can establish a highly accurate understanding of normal behavior by learning an organization’s ‘pattern of life,’. They can therefore spot abnormal activity as it emerges and even take precise, measured actions to automatically curb the threat. Discover why autonomous response and machine learning is the future of defense and how the ‘immune system’ approach to cyber security provides complete network visibility and the ability to prioritize threats in order to better allocate time and resources.

Key Takeaways:

  • How new machine learning and mathematics are automating advanced cyber defense
  • Why full network visibility allows you to detect and autonomously respond to threats
  • How smart prioritization and visualization of threats allows for better resource allocation and lower risk
  • Real-world examples of unknown threats detected by ‘immune system’ technology

Speaker

Georgiana Wagemann
Director of SalesDarktrace
Tuesday, October 30Breakout Presentation

close The Nine Cybersecurity Habits

CIO Leadership & InnovationSouthern Methodist University - CSO

Cybersecurity is a people problem, not a technology problem. To change behaviors, we need to understand the underlying habits that govern our responses. This presentation will explore nine key cybersecurity habits, and will look at how you can use those habits to focus on changing behaviors in your security training.

Key Takeaways:

  • Security is a behavior, not a skill
  • We need different tools to influence people: Psychology, Neuroscience, Economics
  • Changing habits requires time and consistency

Speaker

George Finney
CSOSouthern Methodist University
Tuesday, October 30Breakout Presentation

close Life After an Anonymous Attack on My City

Cyber SecurityCity of Fort Lauderdale - CTO

The city of Fort Lauderdale, Florida was hit by an Anonymous denial-of-service attack in December 2014 and was forced to immediately upgrade computer systems to thwart any potential future attacks.The city quickly spent $430,000 upgrading computer security systems to mitigate vulnerabilities it had previously identified. While the attack itself did not cost the city this money, it expedited the timeline for these necessary system upgrades. A complete A-Z approach for a new security awareness program was created.

Key Takeaways:

  • Even if sensitive information isn’t compromised, there can be political fallout from such an attack
  • If you’re aware of vulnerabilities that need to be remedied “when the budget allows,” would-be attackers will be too
  • A security strategy for a new division
  • How the city has changed its ways – both technologically, and behaviorally, in the time since

Speaker

Michael Maier
CTOCity of Fort Lauderdale
TuesdayNetworking

Lunch

2018 STEERING COMMITTEE

Active mid-market IT pros help us design a relevant and 100% peer-led educational program.

Steering Committee Members

Jon Dack CIO
Toast, Inc.
Trina Spalding IT Security Officer
Hilliard Lyons
Nishanth Rodrigues CIO
University of Mississippi
Ilan Zachar CTO
Carr Properties
Vennard Wright CIO
Washington Suburban Sanitary Commision
David Esping CTO
Ozarks Technical Community College
Esteban Velez VP of IT & Cyber Security (CIO)
Classic Hotels & Resorts
Val Stoyanov CISO
Emmes Corportation

2018 ATTENDEES

Over the year’s we’ve help thousands of senior level IT executives connect with peers in different industries to discuss their top-of-mind directives.

Attendee Testimonials

"The format of the sessions and one-on-one meeting with vendors was a very effective use of my time. The best part of the event is the experts from various areas of information security and solution providers under one roof. It provided an opportunity to learn in a succinct manner without spending too many days out of the office."

"CIO VISIONS is time well spent. In the office, I often don't have time to answer all the emails I received from vendors and then find out which one is the right fit for what I need. The personalized research meeting format allows me to have conversations with vendors that I currently have initiatives for, so the conversations with them are very productive. The sessions are in line with current industry and the networking experience with industry peers is phenomenal!"

"As CIOs we understand the need to network and learn from our peers and experts in the market place. The good news is that there are a plethora of opportunities for us to attend CIO centric events, but sadly, therein lies the difficulty. We have limited time and need to select the events that help us provide the best technological guidance to the enterprises we serve. Having served on many panels and chaired many sessions across many of these events, I have narrowed down the events I attend to a handful. CIO VISIONS is one of them. "

"CIO VISIONS Mid-Marekt is an excellent event for IT leaders to connect, network and discuss the current state of IT. With practitioners providing the presentations and key talks, this is a very practical and "real" event for the attendees."

Attendee List

EXHIBITORS

CIO VISIONS is the IT industry’s fastest growing event, quickly establishing a reputation as the boiling pot of information, ideas and solutions.

Exhibitor Testimonials
EXHIBITOR TESTIMONIALS

"This was my second year attending the CIO VISIONS Mid-Market Summit and each year was worth every dollar we spent. The quality of the meetings and attendees exceeded our expectations!"

EXHIBITOR TESTIMONIALS

"CIO VISIONS continues to attract an array of bright-minded and forward thinking IT professionals, and to showcase impressive industry thought-leaders – benefits every conference goer looks to realize. The unique networking opportunities combined with the stimulating atmosphere make this event one in a class of it’s own."

Exhibitor List

ABOUT CIO VISIONS

North America's leading IT executive level event plays host to over 500 attendees each year. In the last decade, we’ve produced 15 large scale CIO VISIONS summits across America.

HAVE QUESTIONS?

Here is a quick FAQ to help you get started. For more information contacts us, we're happy to talk to you.

Our Team

Matt Velaer

Conference Director
(424) 334-5145
Send Message

Marin Silvers

Sponsor Relations
(424) 334-5141
Send Message

Krizzle Silva

Attendee Relations
(424) 334-5159
Send Message

Riley McLaughlin

Conference Program Manager
(424) 334-5149
Send Message

Jeff Barnett

Sales Manager
(424) 334-5146
Send Message

Shanna Delfs

Account Executive
(434) 334-5161
Send Message

HOTEL & TRAVEL

Your full access conference pass includes overnight accommodations, meals and cocktail receptions.

The Hotel

Renaissance Schaumburg

Experience refined style at the Renaissance Hotel in Schaumburg where stunning design blends seamlessly with impeccable service.

Our Schaumburg hotel accommodations boast stylish design and luxurious comfort. Located in an accessible hub with a sophisticated collection of retail and culinary options such as Sam & Harry’s and Woodfield Mall, this Schaumburg, Illinois hotel serves as an indigenous ambassador for entire Chicagoland area…and a gateway for the entire Midwest.
Accommodations must be booked through the conference organizers and not through the venue directly. We cover the first night and offer a discounted rate. Spouses welcomed. For reservations please contact:
The nearest airport is Chicago O'Hare International Airport (ORD), which is less than 15 miles away. Alternatively, you may fly into Chicago Midway International Airport (MDW). This hotel does not provide shuttle service. Taxis are readily available at the airport.
The Renaissance Schaumburg  | 1551 N. Thoreau Drive Schaumburg, IL 60173