The Red Rock Casino Resort & Spa, Las Vegas

What You Get

Our ‘invitation-only’ approach allows us to provide exceptional service for our audience.


Conference Pass

Full access to the event, from educational sessions to networking events.


Flight Voucher

Traveling more than 100 miles? We'll help with a $200 flight reimbursement.


Overnight Hotel

We cover the first night and offer a discounted rate. Spouses welcomed.


5 Star Catering

Let us treat you to breakfast, lunch, networking receptions and dinner.

Who You'll Meet

A unique engagement opportunity with IT executives from emerging mid-market companies.


Influential Peers

Learn from the best in the field and walk away with actionable insights.



Gain valuable and actionable insights from knowledgable IT experts.


Leading Partners

Meet only the solution providers most relevant for your projects and initiatives.



Unparalleled networking opportunities with high profile industry leaders.

What You'll Do

Your registration creates a truly customized agenda based on your specific areas of responsibility, challenges and interests.


Peer-Led Learning

Spend most of your time participating in educational sessions and networking activities.


Educational Sessions

Keynotes, case studies, plenary sessions, industry panel discussions, and more.


Networking Activities

The ideal event to connect with peers who can truly make a difference to your career.


Research Meetings

Discover and validate leading solutions guided by knowledgable executives.

play_circle_outline Watch Video


A 100% peer-driven educational program centered around 5 key themes addressing the mid-market IT challenges.


Key Themes

close Cloud Strategy
  • Advantages & Disadvantages of Public vs Private Cloud
  • Staffing Changes in a Cloud Environment
  • Controlling Cloud Costs: Leveraging Cloud to Drive Your IT Cost Down
  • Challenges & Opportunities When Switching to the Cloud
  • Developing a Mobile Cloud Strategy for Business
  • Cloud Based Initiatives How to Support Cloud vs. Security
  • Network Integration Between Public and Private Cloud
  • The Future of VoIP & It’s Reliability
  • Security Protocols: Network Security/Cyber Security/Data Security
  • The Use of AI in Data Security: Today’s Opportunities and Challenges
  • Successful Data Governance Approaches
  • Lowering the Risk of a Data Breach When Using the Cloud
  • Protecting Unstructured Data: How Secure Do I Need to Be?
  • Network Visibility and Integration with Security Needs
  • BYOD-Wireless Protection: Implementing Company-Wide Phone Wipes
  • How Do We Make It Easier to Keep Ourselves and Our User Communities Safe?
  • Integration of Security into Strategic Planning Processes and Operations
  • Security vs. Ease of Access
  • Disaster Plans & Business Continuity
  • How to Personalize A.I. and Customer Engagement
  • Leadership Challenges and the Resistance in Changing Processes
  • Strategies on IT Governance - Budgeting and Prioritization
  • Vendor Relations & Contract Negotiations
  • How to Strive in an Environment Where Stated Goals Do Not Match Observed Behavior
  • Understanding the Mechanics of Teaching & Delivering
  • Managing IOT Infrastructure Growth Without the Infrastructure Staff
  • Data Loss Prevention and Backups
  • Enterprise Data Management and Data Classification
  • Utilizing Big Data Analytics: New Tools, New Insights
  • Machine learning and Big Data, What Can Our Data Teach the Machine?
  • How to Monetize Data: Finding the Right Data Analytics Software for Your Needs
  • Dark Data: How to Look at Previously Collected Data, and Use it for Multiple Purposes
  • DevOps approach into IT infrastructure
  • Top Practices for SaaS Application Development
  • Keeping Up with Emerging Software Technologies
  • Using Technology to Support Anticipated Changes
  • Does Agile Work in All Software Development Projects? When Does it Work? When Does it Hurt?


Get insights from 20+ specialized mid-market IT executives making way in the ever-changing world of emerging technologies. Presenters from the 2017 series included:

CIO VISIONS Mid-Market Spring Summit View More

Todd Barnum


GoPro, Inc.

CIO VISIONS Mid-Market Spring Summit View More

Moy Chambers


Canary Speech

CIO VISIONS Mid-Market Spring Summit View More

Bill Packer


American Financial Resources

CIO VISIONS Mid-Market Spring Summit View More

Tom Jurlina


National Able Network Inc

CIO VISIONS Mid-Market Spring Summit View More

Jacob Margolis


County of Orange, CA

CIO VISIONS Mid-Market Spring Summit View More

Jim Gilbert


Rapid City South Dakota

CIO VISIONS Mid-Market Spring Summit View More

Eric Kierstead


BeavEx Incorporated

CIO VISIONS Mid-Market Spring Summit View More

Paul Cottey


Water Street Healthcare Partners

CIO VISIONS Mid-Market Spring Summit View More

Tom Andriola


University of California System

CIO VISIONS Mid-Market Spring Summit View More

Pierre Merlin



CIO VISIONS Mid-Market Spring Summit View More

Douglas Duncan


Columbia Insurance Group

CIO VISIONS Mid-Market Spring Summit View More

Karthik Devarajan

Director of IT

Legal Aid Bureau

CIO VISIONS Mid-Market Spring Summit View More

Roy French


Saint Elizabeth Health Care

CIO VISIONS Mid-Market Spring Summit View More

Eddie Ho


Los Alamos National Bank

CIO VISIONS Mid-Market Spring Summit View More

Ryan Loy



CIO VISIONS Mid-Market Spring Summit View More

Carolyn Bogan

VP, IT Shared Services

KAR Auction Services

CIO VISIONS Mid-Market Spring Summit View More

Adip Dsouza

Director of IT

Professional Finance Company, Inc

CIO VISIONS Mid-Market Spring Summit View More

Christopher Harrison


Nova Southeastern University

CIO VISIONS Mid-Market Spring Summit View More

Jim Garrett


American Healthcare LLC

CIO VISIONS Mid-Market Spring Summit View More

Tris Lingen


TCF Bank

CIO VISIONS Mid-Market Spring Summit View More

Stephen Engel

SVP, Practice Lead


CIO VISIONS Mid-Market Spring Summit View More

Michael Thaw

VP of Software Selection

Technology Evaluation Centers

CIO VISIONS Mid-Market Spring Summit View More

Zoe Lindsey

Security Advocate

Duo Security

CIO VISIONS Mid-Market Spring Summit View More

Chris Johnson

Busniess Solutions Director


CIO VISIONS Mid-Market Spring Summit View More

Adrien Gendre

Chief Solution Architect


CIO VISIONS Mid-Market Spring Summit View More

Nicole Eagan



CIO VISIONS Mid-Market Spring Summit View More

Prashant Kumar



CIO VISIONS Mid-Market Spring Summit View More

Timothy Renollet

Sr. Director of Solutions Engineering


CIO VISIONS Mid-Market Spring Summit View More

Marc Laliberte

Sr. Security Analyst

WatchGuard Technologies


Make every session valuable by selecting up to 3 key themes to mix and match the most relevant topics to you. Sessions from our 2017 series included:

Reset Filter
CIO Leadership & Innovation
Cyber Security

Welcome Cocktail Reception & Registration


Breakfast Buffet

Monday, June 11Keynote Presentation

close Digital Transformation – Six Steps to Success

CIO Leadership & InnovationHitachi - SVP, Practice Lead

Digital transformation – driving operational improvements in your physical value stream using connected data from your digital value stream – is delivering unprecedented value across industries to those with a clear road map. In fact, a recent Harvard Business School report shows that companies that embrace digital transformation attain significantly better gross margins, earnings and net income than those that don’t. What’s more, those digital leaders are not spending much more on IT than laggards because the big investments have already been made. The challenge is knowing how to connect the data from the digital value stream to drive continuous improvement with real-time metrics and predictive analytics. No matter where you are on the journey of digital transformation – these six steps can help you connect your systems to drive new levels of productivity, profitability and value across your business.

Key Takeaways:

  • Learn how to connect your physical and digital value streams to create near real-time operating systems.
  • Identify areas of variation across the physical value stream that can be supported by better data and real-time analytics.
  • Gain knowledge through strategic partnerships with digital leaders to accelerate your journey to unlocking more organizational value.


Stephen Engel
SVP, Practice LeadHitachi

Targeted Research Meetings

Expo Hall
Monday, June 11Breakout Presentation

close Debunking Cybersecurity Myths Around Public Cloud

Cyber SecurityNational Able Network Inc - CIO

Most organizations claim to have a cloud first mentality. Everyone knows that cloud computing is here to stay and is a necessary business driver. Unfortunately, cloud security myths keep circulating causing many IT executives to delay, fear and drag their feet with public cloud adoption. Presentation will delve into some of these myths.

Key Takeaways:

  • Cloud typically provides better protections than on premise
  • Easier management and reporting with cloud solutions
  • More cloud security resources and stopping shadow IT
  • Easier BYOD and less hardware/user management


Tom Jurlina
CIONational Able Network Inc
Monday, June 11Breakout Presentation

close Intelligent by Design: AI and the Future of Cyber Security

Cyber SecurityDarktrace - CEO

Cyber security has turned into an arms race—machines fighting machines on the battleground of corporate networks. Catching today’s most sophisticated cyber-attacks requires finding the slightest and subtlest anomalies inside networks containing millions of constantly changing data points, where billions of events take place every day. Artificial intelligence-based systems are now being deployed to continually assess complex business environments. Known as ‘immune system’ cyber defense, this approach is used to uncover threats that have already penetrated the network border and then autonomously respond, fighting back with precise, targeted actions. Learn how to distinguish the hyperbole surrounding machine learning from proven AI technology that delivers real results for organization of all sizes – and stops attackers in their tracks.

Key Takeaways:

  • New machine learning and AI algorithms that are automating advanced cyber defense
  • The many ways AI can augment human security teams
  • How to navigate the challenges of implementing AI in a business environment
  • Real-world examples of unknown threats detected and contained by ‘immune system’ technology


Nicole Eagan
Monday, June 11Breakout Presentation

close Connecting Today’s Enterprise Workforce with Collaborative Communications

CIO Leadership & InnovationRingCentral - Sr. Director of Solutions Engineering

Successful organizations are finding competitive advantage by transforming their workplaces with increased employee connectivity. Join us in this session to learn more about how these forward-thinking enterprises transform the way they communicate, collaborate, and connect through the cloud; which services they’ll consume; and how this new environment will change the way IT supports end users’ evolving needs for a more connected digital workplace.

Key Takeaways:

  • Increased employee productivity
  • Creating a better, more streamlined customer service experience
  • Enabling a geographically dispersed workforce to connect via voice, video, and messaging


Timothy Renollet
Sr. Director of Solutions EngineeringRingCentral
Monday, June 11Breakout Presentation

close Rise of the Human Cloud - How Agile Talent Pools Will Transform Talent Management

CIO Leadership & InnovationToptal - Co-Founder & CEO

Organizations are under more pressure than ever to innovate, deliver quickly, and respond instantly to changes in the competitive landscape. At the core of this shift is the talent strategy within an organization. Traditional hiring cycles, which are rigid, slow, and cumbersome, will not be sufficient to meet this demand, nor will traditional modes of engaging outside talent and expertise. The Human Cloud is driving organizations towards a new paradigm in talent management – building teams of highly capable individuals, on demand, that are designed to drive specific outcomes. For organizations to thrive in this new future, they will need to develop the ability to rapidly assemble, lead, and manage teams blended from a wide range of sources as a core competency.

Key Takeaways:

  • Understand the different types of talent in the human cloud, and why there is no “one size fits all” answer.
  • Develop ideas to enhance the talent management strategy of their organization.
  • Understand and implement the core competencies required to maximize the value delivered by the Human Cloud and a blended workforce.
  • Build a workplace that is attractive to a wide range of talent, including freelance and globally distributed talent.


Taso Du Val
Co-Founder & CEOToptal
Monday, June 11Breakout Presentation

close How Do We Make it Easier to Keep Ourselves and Our IT Communities Safe?

Cyber SecurityAmerican Healthcare LLC - CISO & VP of IT

Understand and spread the importance of online safety. Ensure protection of information from email to a friend to financial and medical records. As with most environments, the use of wireless networks sometimes provides more vulnerabilities than usefulness. With all the malware (especially ransom-ware) exploding, training and awareness is key to protecting personal and business information.

Key Takeaways:

  • Online? How to relax
  • Ransom-ware is on the rise and everyone has to be aware
  • The internet is useful but dangerous so understand how to use technology to protect yourself
  • Best practices to enforce procedures to ensure safe computing in your place of business


Jim Garrett
CISO & VP of ITAmerican Healthcare LLC
Monday, June 11Breakout Presentation

close Combating Broken Culture With DevOps

DevOps StrategyPSC Group LLC - Busniess Solutions Director

The time for IT leaders to play a pivotal role in business strategy is now. So how do you disrupt the sometimes-contentious relationship between IT and the business to affect real organizational change? This session provides a blueprint for transforming IT’s relationship with the business by delivering measurable value with open and honest communication in both directions, drawing from consulting experience introducing Agile and DevOps to clients large and small. We’ll cover landmines to watch out for, common paths to quick wins, useful tools and lessons learned from successful and not-so-successful Agile projects. When we’re done, you’ll understand the impact that Agile and DevOps can have not only on IT culture, but on the culture surrounding the critical partnership between IT and the rest of the business.

Key Takeaways:

  • Transforming IT’s relationship with the business by delivering measurable value with open and honest communication in both directions.
  • Landmines, common paths to quick wins, useful tools and lessons learned from successful and not-so-successful Agile projects.
  • Understand the impact that DevOps can have not only on IT culture, but on the culture surrounding the critical partnership between IT and the rest of the business.


Chris Johnson
Busniess Solutions DirectorPSC Group LLC
Monday, June 11Breakout Presentation

close A New Approach to Email Security

Cyber SecurityVadeSecure - Chief Solution Architect

Through real-life examples, learn how malwares can easily circumvent classical detection methods such as fingerprint, reputation and sandboxing, and discover how Vade Secure unique predictive email defense can stop ransomwares and phishing attempts before they reach your employees.

Key Takeaways:

  • Email Security
  • Ransomware
  • Phishing


Adrien Gendre
Chief Solution ArchitectVadeSecure
Monday, June 11Breakout Presentation

close Does Agile Work in All Software Development Projects? When Does it Work? When Does it Hurt?

DevOps StrategyInformation Clearinghouse Inc - CIO

In one camp, you have the traditional project approach to Software Development, where development is handled as a linear series of events from conception to production. In the other camp, you have Agile, a flexible, team-centric, iterative approach to lean development. Both strive to streamline the way we get software development projects done, just in different ways. So what makes these two workflow management approaches different? When does Agile work? When does it hurt?

Key Takeaways:

  • Understanding the differences between Agile and Traditional project Methodologies
  • What are the pros and cons of each?
  • When does the Agile approach work?
  • When does the Agile approach hurt?


Joseph Costello
CIOInformation Clearinghouse Inc
Monday, June 11Breakout Presentation

close Digital Innovation @Enterprises

CIO Leadership & InnovationTechBlocks - CEO

Although this sounds like an oxymoron – this can be done and has been done. Lets break down some simple yet successful ways at innovating and making simple digital solutions a reality while transforming businesses.

Key Takeaways:

  • See how digital innovation and transformation can happen at the Enterprise level.
  • Learn the ethos, process and environment needed for digital transformation
  • Re-imagine and revitalize your business through an innovation lens


Prashant Kumar
Monday, June 11Breakout Presentation

close Security Fabric: Bridging Security Gaps to Solve Business Needs

Cyber SecurityFortinet - Office of the CTO

Current technology trends are creating a cybersecurity skills gap that many enterprises experience today, the ability to quickly and effectively audit, recommend and automatically fix the entire network security architecture is critical. A new security architecture is needed, 3rd generation cybersecurity technology automates and orchestrates the response across 3rd party vendors.

Key Takeaways:

  • Technology evolution and innovation are exponentially expanding the attack surface.
  • To keep up, enterprises must take an architectural approach to network security that includes visibility and automation.
  • With limited resources, the ability to quickly and effectively audit, recommend and repair network security is crucial.
  • Threat intelligence, shared in real-time, between 3rd party products are required to meet the continuously changing landscape.


Jason Graun
Office of the CTOFortinet
Monday, June 11Breakout Presentation

close Giving Up Privacy for Convenience

Cyber SecurityEbsco - CIO

As employees and customers demand improved connectivity, mobile solutions and instant access to information, IT leaders face the issue of privacy in an increasingly connected world. How should CIOs think differently to better protect valuable corporate assets while providing access and service? In this session, Ryan Loy surveys the current digital landscape, offering an overview of behavioral risks to security, mitigation strategies and key questions to benchmark yourself and your organization. Learn how to break away from traditional methods and embrace the societal shift toward a digital generation.

Key Takeaways:

  • Discussion on current digital landscape
  • Overview of behavioral risks to security
  • Mitigation strategies
  • Key Questions to grade yourself/organization


Ryan Loy
Monday, June 11Breakout Presentation

close How to Leverage Cloud Technologies and When

Cloud StrategyCanary Speech - SVP of IT

Today’s technology platforms enable companies to approach team building, training and selling opportunities in ways that were previously unimaginable. This quantum leap forward has introduced new challenges: as we scramble to implement the latest and greatest, we may not allow our previous technology investments to reach their full promise.

Key Takeaways:

  • How to leverage Cloud technologies and when
  • How will AI affect your Cloud Strategy
  • Understand that change has changed
  • When to cut and run away from an investment


Moy Chambers
SVP of ITCanary Speech
Tuesday, June 12Breakout Presentation

close Getting Better Every Year

CIO Leadership & InnovationWater Street Healthcare Partners - CIO

CIO’s complain about a lack of budget, but by delivering on the same work as last year with 10% more efficiency, there is “free money” to be found and spent on cool, new things. If the business were to be exactly the same as last year, IT should be able to deliver the same for less money. This is your source of innovation, staff development, and “slush” funds.

Key Takeaways:

  • You must get better every year
  • The money you save is the same as additional budget
  • Your ability to articulate this separates you from others
  • You should be able to spend this money to do cool things!


Paul Cottey
CIOWater Street Healthcare Partners
Monday, June 11Breakout Presentation

close A.I. - The Future Technology Disruptor of all Industries and Sectors

CIO Leadership & InnovationNova Southeastern University - CTO

Over the last few years, Artificial Intelligence (A.I.) has been gaining momentum across all industries and all spectrums of the world from consumer solutions such as Siri and Alexa leveraging Machine Learning to disruptive technologies such as Uber and Lyft as well as Social Media channels such as Facebook, Instagram, Snapchat and Twitter to the extreme side of Quantum computing attempting to solve the world’s biggest and most complex challenges. Some of the key advantages of A.I., are the ability to gain deeper knowledge from data, and to leverage that intelligence into providing significantly better services, support, marketing and sales efforts so as help accelerate, grow and scale companies and organizations across the globe and industries.

Key Takeaways:

  • Understand what is AI
  • How to apply AI
  • Key disruptors of AI in Higher Ed
  • Additional opportunities of AI


Christopher Harrison
CTONova Southeastern University
MondayBreakout Presentation

close Technology Infrastructure Program: A Process to Grid Modernization

Otter Tail Corporation - VP of Information Technology

Long-term vision and framework for proactive investments in technology and infrastructure, which enable a mobile, automated, analytics-based future to optimally and efficiently operate utility.

Key Takeaways:

  • GIS will be the primary source for most company data unless disproven and GIS will be integrated with nearly all major company systems to improve decision making
  • AMI will be strategically deployed to minimize employee change and maximize benefits
  • Greater interconnected systems that minimize redundancy of feature sets
  • Communications and other operational systems will enable switches to operate remotely to isolate system issues. This will enable demand savings and energy efficiency possibilities through automated regulator and capacitor control (i.e. Conservation Voltage Reduction, Volt/Var Optimization) Customer loads will be synched to the markets to react in real time to pricing signals to improve load factors and system efficiency. (DERMS) This communication system will be used to support all utility applications from SCADA, to AMI, to load management.


Don Reed
VP of Information TechnologyOtter Tail Corporation
Monday, June 11Breakout Presentation

close Leadership Framework for Building Elite Teams

CIO Leadership & InnovationColumbia Insurance Group - CIO

Building an elite team is hard, and having a good plan may not be enough without a framework customized for your specific organizational environment. We will examine six key relationships, such as the intersection of management approach versus organizational design. The insights provided will improve your team building success.

Key Takeaways:

  • Building elite teams requires understanding the organizational environment
  • Evaluating the relationship between key environmental factors within the company provides insights into optimal approach
  • Organizational conditions need not be ideal for building an elite team


Douglas Duncan
CIOColumbia Insurance Group
Monday, June 11Breakout Presentation

close A Strong Relationship is need in these Trying CyberSecurity times

Cyber SecurityTCF Bank - EVP, CISO

Opening discussion of today’s environment around CyberSecurity threats.  Presentation moves into what a CIO should expect from a CISO in these times along with what should a CISO expect from a CIO to ensure a successful and effective working relationship.

Key Takeaways:

  • Understanding of the cybersecurity world from a CISO perspective
  • Expectations of a CISO
  • Expectations of a CIO from a CISO perspective
  • Tips for an effective CIO/CISO relationship


Tris Lingen



Targeted Research Meetings

Expo Hall
MondayBreakout Presentation

close How To Recover From an IT Crisis?

Classic Hotels & Resorts - VP of IT & Cyber Security

Steps on what to do during a technology crisis. Wrong and right ways and how others handle similar situations. Necessary to have audience involvement as there is no right way.

Key Takeaways:

  • Its going to happen?
  • What to do when it happens?
  • Multiple levels to what a crisis is, virus, system failure, power outage, INTERNET outage, data breach.
  • How to utilize your resources and recover?
  • How to translate IT speak to the masses in your business? This is key as communication and recovery steps are most likely overlapping as you and your teams try to recover from the IT Crisis.


Esteban Velez
VP of IT & Cyber SecurityClassic Hotels & Resorts
Monday, June 11Breakout Presentation

close Innovate Your Way to Top Performance

CIO Leadership & InnovationAmerican Financial Resources - CIO

In the competition for talent and revenue being innovative is an important component of a holistic positioning strategy. In this presentation we will examine how the technology leader can use innovation concepts to (1) hire and retain great talent; and (2) bring to market key product discoveries that will help propel your company forward.

Key Takeaways:

  • Innovation reduces key employee turnover
  • Innovation allows you to attract the “best” talent
  • Innovation can propel the technology team to be a thought leader within the company
  • Innovation can be accretive to your financial performance


Bill Packer
CIOAmerican Financial Resources
Monday, June 11Breakout Presentation

close Moving from Data Assets to Data Currencies

Data Management – Strategy for Storage and AnalyticsUniversity of California System - VP & CIO

Most organization understand and have built their strategies for “Data as an Asset.” Far fewer have fully leverage the full potential of data in a way a venture or private-equity firm would think about it. For those that do, they evolve their strategies to be “Data as a Currency” and think broadly about not only its uses but the ecosystems it may stimulate, evolve or create.

Key Takeaways:

  • Understand “Data as a Currency” thinking
  • Exposure to a methodology for DaaC thinking
  • Specific examples from companies & the extreme value they create


Tom Andriola
VP & CIOUniversity of California System
Monday, June 11Breakout Presentation

close How to maximize your Software Selection and Negotiation

CIO Leadership & InnovationTechnology Evaluation Centers - VP of Software Selection

Selecting the right Software (ERP, HCM, BI…) solution is key to improving your business productivity and achieving your growth plans. As a Global Consulting and Advisory firm with 25 years in the market, TEC prepared a presentation that will help you select software solutions that best fit your company’s needs, support growth and manage risk.

Key Takeaways:

  • Use an structured easy to follow approach to Software Selection
  • Get hands-on expert advice to lead, coach and support your evaluation
  • Find out how to score the solutions overall including all the deciding factors in your evaluation
  • Build consensus among the stakeholders and an audit trail, leveraging the information for your selection and negotiation


Michael Thaw
VP of Software SelectionTechnology Evaluation Centers
Monday, June 11Breakout Presentation

close Think a Cybersecurity Incident is an Emergency, Then Run it like a Fire Chief!

Cyber SecurityDavenport & Company - CTO

Cybersecurity incidents can happen at any time. Learn to use an expandable incident command framework that has been used to manage emergency incidents from large wildfires to small automobile collisions in fire, law enforcement and emergency medical services and see how this translates to cybersecurity and other incidents.


Jeffrey Potter
CTODavenport & Company
Monday, June 11Breakout Presentation

close Next Gen IT Demands Next Gen IT Service

CIO Leadership & InnovationMSPWorx - Marketing Director

Finding the balance between technology efficiency and the end user experience – living in the era of instant gratification As a user in a consumer driven world, instant access and immediate problem resolution has become our expectation. With online shopping and an array of Apps for any need, we are skipping the lines and expecting some level of automation to prepare and complete our requests as we type. In many ways, a smart phone is our portal to product and services and is safe to say, most people cannot function without it. If our personal lives have been so greatly enhanced by this use technology, why are so many businesses continuing to deliver internal IT service as they did years ago, by forcing users to; • Waiting in lengthy ticket queues • Physically call into a support desk • Manually troubleshooting each ticket Technology has evolved at a staggering pace and it is time to challenge the user experience and adopt a user centric thinking and technology consumption model. We live in a world of offices without walls and can work whenever and wherever we want, although this has given users flexibility and increased productivity it has drastically changed the landscape for IT support. The role of an IT administrator has been stretched to every corner of the globe, raised into the clouds and actively being target by cyber-criminals and advanced persistent threats (APTs). Join Ryan Vallee for a frank discussion on key considerations on providing our end-users with the technology they need to be effective while ensuring your business is running securely and efficiently.

Key Takeaways:

  • Finding the balance between technology efficiency and the end user experience – living in the era of instant gratification
  • Key considerations on providing our end-users with the technology they need to be effective while ensuring your business is running securely and efficiently.
  • We live in a world of offices without walls and can work whenever and wherever we want, although this has given users flexibility and increased productivity it has drastically changed the landscape for IT support.
  • As a user in a consumer driven world, instant access and immediate problem resolution has become our expectation even when it comes to IT.


Ryan Vallee
Marketing DirectorMSPWorx
MondayBreakout Presentation

close Analytics, Machine Learning & Artificial Intelligence: The What and How?


This presentation will explain big data analytics, internet of things (IoT), machine learning, neural networks, deep learning artificial intelligence (AI) and data science. It will also cover how these technologies are being leveraged to increase efficiencies in enterprise’s daily operations, to identify new business opportunities and to enhance customer service.

Key Takeaways:

  • Distinction between and understanding of: Analytics, Machine Learning, Artificial Intelligence (AI), Neural Nets, etc.
  • Examples of how these technologies are being used to create new business models and enhance customer service
  • How to integrate data from various sensors (IoT) – Challenges and opportunities
  • How sensors are being used in Precision Agriculture to increase profit
  • How to initiate digital transformation in a legacy organization


Dr. Michael Valivullah
Monday, June 11Breakout Presentation

close Moving Operational Computing Resources to Microsoft Cloud

Cloud StrategyLegal Aid Bureau - Director of IT

The focus will be specifically on how Maryland Legal Aid extended its on-premises infrastructure and operational computing resources to the cloud and provide some real world scenarios on what workloads you could move to Azure for minimal cost. There will be a live demonstration of Azure portal.

Key Takeaways:

  • Better insights on Microsoft Azure Platform
  • Simple services that could be moved to the cloud
  • Identify if cloud is a better fit


Karthik Devarajan
Director of ITLegal Aid Bureau
Monday, June 11Breakout Presentation

close Zero Trust Access: Five Steps to Securing the Distributed Enterprise

Cyber SecurityDuo Security - Security Advocate

The perimeter-based security approach of the last century is no longer adequate for securing the modern enterprise. Today, organizations must secure a mobile workforce that uses a mix of corporate-owned and personal devices to access cloud-based applications and services, often from outside corporate networks. The zero trust access model delivers that security without cumbersome and antiquated technologies such as VPN and MDM.

Key Takeaways:

  • Learn how the zero trust access model works
  • Learn how leading organizations such as Google use this approach to secure access to their critical applications and data
  • Learn how you can implement this model in your organization in five logical steps


Zoe Lindsey
Security AdvocateDuo Security
Monday, June 11Breakout Presentation

close Knocking Down Security Silos - How Signal Correlation is the Path Forward

Cyber SecurityCatapult Systems - Director of Security & Compliance Solutions

The signals are already there to give you a better understanding of the threats your organization faces but are you listening? Joe Kuster, Director of Security & Compliance Solutions at Catapult Systems, will be covering how Security Silos prevent your IT tools and services from succeeding and the benefits of having an enterprise view of your security state.

Key Takeaways:

  • Signals Intelligence
  • Compromised Account Detection
  • Threat Analytics & Cloud Security
  • User & Device Behavior & Risk Analysis


Joe Kuster
Director of Security & Compliance SolutionsCatapult Systems
Monday, June 11Breakout Presentation

close Remove Business Friction with Risk-Adaptive Security

Data Management – Strategy for Storage and AnalyticsForcepoint - VP, Product Marketing

Macro IT trends around cloud adoption and BYOD are greatly expanding the threat landscape faced by security organizations who can’t keep hiring to cope with the increasing levels of exposure. Security organizations must evolve from a threat-centric reactive environment in order to offer more effective cyber-security. What if there was a solution which could adapt protection dynamically and apply monitoring and enforcement controls, offering protection based on the risk level of users and the value of data accessed? This could enable security organizations to better understand risky behavior and automate the enforcement of policies, dramatically reducing the quantity of alerts requiring investigation and providing more efficient cyber-security.  Join in the discussion around the next generation of data protection.


Ben Tao
VP, Product MarketingForcepoint
MondayBreakout Presentation

close Building a Transformational IT Team: Create the Future and Make it Sustainable

Ash Brokerage - EVP & CIO

Talent acquisition, development and retention are critical to all IT projects, and especially to digital transformation. Building transformational and high performance teams requires a general framework, a vision towards the future and a means to sustain progress in the event of team, talent and market disruptions. In this session we’ll discuss how you can acquire, create and retain highly performing IT teams despite adversity and change.

Key Takeaways:

  • Surround yourself with exceptional senior leadership, 3 to 5 key members
  • Tie into the local universities in a big way – advisory committees, adjuncts, etc.
  • Build your intern bench as large as your organization will allow
  • Create a social contract – everyone must develop their replacement
  • Develop future technical, managerial and executive leaders
  • For complete employee buy-in, make your framework organizationally agnostic
  • Pay employees at or slightly above area market


David Threm
EVP & CIOAsh Brokerage
Monday, June 11Breakout Presentation

close IT Turnaround: Strategic Rebuilding

CIO Leadership & InnovationLos Alamos National Bank - CIO

Information technology is the center-point of all business operations. Degeneration of I/T is common in a wide variety of businesses due to neglect. As a turnaround CIO, I have experienced this in many industries, and have been brought in to perform quick turnarounds to mitigate serious risks to the company. The risks include critical applications failure with serious customer impacts, daily front-page negative reporting, poor employee morale with high turnover, and regulators on-site conducting probes and discovery.

Key Takeaways:

  • Design the turnaround road map and flipping strategy
  • Drive the cultural program, talent refresh, and team building
  • Build standard-based internal control program: COBIT and COSO
  • Learn from real-world case studies


Eddie Ho
CIOLos Alamos National Bank
Monday, June 11Breakout Presentation

close Implementing a Cybersecurity Program and Initiatives

Cyber SecurityCounty of Orange, CA - CISO

Implementing a Cybersecurity program that is sustainable and meets the needs of an organization is challenging and requires CISOs/CIOs to use a risk management approach to this endeavor. This is, of course, while balancing security with innovation.

Key Takeaways:

  • Using Risk Management to Drive Cybersecurity Decisions
  • Components of a Cybersecurity Program
  • Key Steps to Implementing a Cybersecurity Program\Initiative
  • Blending Cybersecurity with Innovation


Jacob Margolis
CISOCounty of Orange, CA
Monday, June 11Breakout Presentation

close SD-WAN for Global Application Deployments: Key Metrics

Data Management – Strategy for Storage and AnalyticsAryaka Networks - Sr. Director, Product Management

The software-defined era is reshaping how global enterprises conduct business at a significant rate. The remote and mobile workforce is increasing rapidly. Mission-critical applications, such as Office 365, voice and video, and ERP systems are moving to the cloud. Businesses also continue to expand globally. This PoC will dive into a how a global SD-WAN can deliver any application to end users around the world with faster performance through a first-hand look at Aryaka’s web-based MyAryaka portal. The MyAryaka customer portal offers deep, end-to-end network and application visibility for Aryaka’s 800+ global enterprise customers. MyAryaka is an application-aware network performance tool that provides a real time view of network configuration, performance, and health. Applications, locations, links, protocol, or port level statistics provide a clear picture of both network utilization and overall application performance for all applications. Additional features include advanced traffic analysis and the ability to zoom into a granular view of what is happening over the enterprise network.

Key Takeaways:

  • Live demonstration of MyAryaka dashboard.
  • Customer use case focusing on metrics
  • Real time view of network configuration, performance, and health


Mouli Radhakrishnan
Sr. Director, Product ManagementAryaka Networks
MondayBreakout Presentation

close Technology Development at Scale: a LeSS Overview

Goldline LLC - Chief Information Officer

Traditional sequential-lifecycle application development doesn’t work well.  Since 2001, Agile development and Scrum in particular have revolutionized software development.  LeSS is a scaling framework that finds the sweet spot between defined concrete elements and empirical process control.  LeSS as a framework is more than a set of principles and experiments. It also provides a framework with rules. The LeSS Rules define what is LeSS (and what isn’t) and they provide a concrete framework for applying LeSS.

Key Takeaways:

  • LeSS Principles
  • A Framework that Focuses on Customer Value and Rapid Innovation
  • Organizational Impact of Agile at Scale


Doug Spencer
Chief Information OfficerGoldline LLC
Monday, June 11Breakout Presentation

close Question Everything: Guiding Data Science Projects Through Questions

Data Management – Strategy for Storage and AnalyticsRapid City South Dakota - CTO

Asking the right questions during all phases of the project can be the difference between success and failure. Knowing the right questions to ask is difficult, especially if you don’t have a Data Science background. This presentation will help you guide your projects by asking these questions.

Key Takeaways:

  • The importance of scoping a data science project correctly
  • Understanding Mode and Method
  • Building a successful project team
  • Ways to recognize and eliminate bias


Jim Gilbert
CTORapid City South Dakota
Monday, June 11Breakout Presentation

close Adopting Android for a Mobile Workforce

CIO Leadership & InnovationSaint Elizabeth Health Care - CIO

This presentation will outline the 7 year mobility journey of one of Canada’s leading homecare agencies, and will present the challenges faced during the four iterations of the mobile platform, what prompted the change, and how this has challenged the IS team in terms of providing support and leadership to the organization.

Key Takeaways:

  • Why Android and not IOS
  • Implications of changing devices (Smartphone vs Tablet)
  • Resources needed for support
  • Unexpected consequences


Roy French
CIOSaint Elizabeth Health Care

Industry Dinner


Breakfast Buffet

Tuesday, June 12Keynote Presentation

close Steph Curry Cybersecurity:  Nothing But Net!

Cyber SecurityGoPro, Inc. - CISO

At RSA 2017, over 75% of the CISOs polled said they were looking for new positions.  Are CISOs wearing out their welcome with employers? In their effort to secure the company’s sensitive data, many CISOs end up alienating many of their colleagues or creating “hostile work environments.”  Is it a requirement of the job that CISOs live at odds with their organizations?

This session will present helpful tips on keeping your company secure while maintaining positive relationships and job security; what we in the security community might call a true “nothing but net” play.


Todd Barnum
CISOGoPro, Inc.

Targeted Research Meetings

Expo Hall
Tuesday, June 12Breakout Presentation

close Cybersecurity Vs. Compliance

Cyber SecurityRBCU - CIO & CISO

Compliance based approaches to cybersecurity have helped implement a minimum level of security but have failed to protect organizations. In a dynamic threat environment, organizations have come to the conclusion that a risk-based approach to management of cyber-security is necessary.

Key Takeaways:

  • Compliance
  • Data Breach Exercise
  • Data Classification
  • Risk-based Cybersecurity


Pierre Merlin
Tuesday, June 12Breakout Presentation

close Deliver a Better User Experience by Experimenting with Design

CIO Leadership & InnovationTopcoder - VP of Platform Services

There’s no shortage of ideas for new apps or websites that can help your business. But it can be difficult to develop — let alone come up with — the best idea. It’s time to think differently about ideation, and experiment with multiple design ideas to transform the user experience.

Key Takeaways:

  • Explore the art of the possible and pursue multiple ideas through design
  • Leverage design to refine web and app development requirements
  • Understand when to use exploratory design vs. executional design
  • Incorporate open innovation into your projects


Joey Poarch
VP of Platform ServicesTopcoder
Tuesday, June 12Breakout Presentation

close It's All About Them...Your Employees!

CIO Leadership & InnovationKAR Auction Services - VP, IT Shared Services

Your employees will determine the success of your business. Focusing on your employees’ well-being and happiest does matter in today’s work environment. The company first mentality is a thing of the past. Taking the time to “get to know” your workforce, not just their skillset, will increase employee’s engagement. It’s all about them, our employees!

Key Takeaways:

  • The benefits of a strong employee-centric work environment
  • Tools to help you understand your employee’s engagement
  • How to create structure to sustain employee engagement


Carolyn Bogan
VP, IT Shared ServicesKAR Auction Services
Tuesday, June 12Breakout Presentation

close Business Intelligence - Everything You Need to Know to Get Started

Data Management – Strategy for Storage and AnalyticsProfessional Finance Company, Inc - Director of IT

Business Intelligence is extremely important in today’s world. It is absolutely imperative every organization uses BI to gain insights into consumer behavior, improve visibility in their organization, and turn data into actionable information. In turn, this will significantly improve efficiency. BI systems must be made available to the entire organization to fully reap all the benefits.

Key Takeaways:

  • Understand the importance of BI
  • How to plan for a successful BI system
  • How to obtain organization wide buy-in


Adip Dsouza
Director of ITProfessional Finance Company, Inc
Tuesday, June 12Breakout Presentation

close Leveraging Big Data and Business Intelligence to Create Market Differentiation Through Technology

CIO Leadership & InnovationBeavEx Incorporated - CIO

Beavex Logistics is a challenger in the Courier industry. We are a nationwide provider of Final Mile Delivery services, but don’t have the brand recognition of companies such as Fedex and UPS. Since we are lesser known, we need to be faster and more progressive than our competitors. This talk will cover how we leveraged Big Data and Business Intelligence to create an innovative, customer facing Analytics Dashboard that was added to our customer portal. The Dashboard created market differentiation for Beavex, and has led to reduced churn as well as increased wins of new customers.

Key Takeaways:

  • Innovation through Technology is a powerful weapon for creating market differentiation
  • A positive online customer experience is priceless for retaining customers and winning new business
  • Innovative technology doesn’t have to be expensive and/or complex to be incredibly useful
  • Making your customer’s life easier through technology is a great way to retain them


Eric Kierstead
CIOBeavEx Incorporated
Tuesday, June 12Breakout Presentation

close Defending Against the 2018 Threat Landscape

Cyber SecurityWatchGuard Technologies - Sr. Security Analyst

This year is shaping up to be a busy year for cyber security. Before we can defend our networks against these modern attacks, we need to know what to expect. In this talk we’ll discuss the state of security in 2018, including the attacks targeting our data, our users and our devices. We’ll then dive in to the tools and training available to protect our networks against these threats.

Key Takeaways:

  • The top threat trends of 2018 including predictions of what to expect in the second half of the year
  • The top 5 attack methods attackers are using in 2018
  • The technical and procedural controls you can implement to defend against the threat landscape


Marc Laliberte
Sr. Security AnalystWatchGuard Technologies
Tuesday, June 12Breakout Presentation

close Locking Down Access to Ephemeral Cloud Workloads

Cloud StrategyRemediant - CEO

Organizations should look at how to automate and lock-down administrative privileges as workloads are spun up in the cloud. Using stolen administrator credentials is the #1 method attackers use to breach your organization. CEO and co-founder Tim Keeler will walk us through the process of the Do’s and Don’ts for administrative access in the cloud.

Key Takeaways:

  • Accelerate your security posture as you move to the cloud.
  • Build in secure configurations for admin access inside your CI/CD ecosystem.
  • Deploy security in a fashion that doesn’t impede operations.
  • Achieve regulatory and compliance standards, such as GDPR, PCI, SOX in the cloud.


Tim Keeler
Tuesday, June 12Breakout Presentation

close The Future of SD-WAN: WAN Transformation in the Cloud and Mobile Era

Cloud StrategyCato Networks - Regional Sales Director

SD-WAN is a new and exciting opportunity to transform enterprises costly and rigid MPLS-based wide area networks (WAN). It promises to make the WAN more affordable and agile, boost capacity, and improve resiliency. But, SD-WAN goes far beyond replacing MPLS. It can optimize global connectivity, streamline network security, and seamlessly integrate cloud resources and mobile users into a simple coherent network. Join this session to learn: The requirements for full WAN transformation when business applications have moved to the cloud and need to be accessed from anywhere. The security challenges facing organizations with distributed locations, cloud applications, and mobile users. How the convergence of edge SD-WAN, a global backbone, and firewall as a service enables you to do more with less, and reduce costs, complexity, and risks. Real-life examples and case studies of how enterprises of all sizes use Cato Networks to securely connect their global and regional locations, mobile users, and cloud resources.

Key Takeaways:

  • The requirements for full WAN transformation when business applications have moved to the cloud and need to be accessed from anywhere.
  • The security challenges facing organizations with distributed locations, cloud applications, and mobile users.
  • How the convergence of edge SD-WAN, a global backbone, and firewall as a service enables you to do more with less, and reduce costs, complexity, and risks.
  • Real-life examples and case studies of how enterprises of all sizes use Cato Networks to securely connect their global and regional locations, mobile users, and cloud resources.


Josh Garland
Regional Sales DirectorCato Networks



Active mid-market IT pros help us design a relevant and 100% peer-led educational program. Members from the 2017 series included:

Steering Committee Members

Jeffrey Potter SVP, CTO
Davenport & Company LLC
Nick Roethel CIO - Director of Technology Services
Metropolitan Transportation Comm
Borys Harmaty CIO
FolioFN Inc
Armin Roeseler CIO
Swanson Health Products
John Martin CIO
Georgia Department of Natural Resources
Larry Schachter CIO
Benderson Development Co. LLC
Grady Ligon CIO
Berkshire Hathaway HomeServices
Robert Bierwagen CIO & VP
MPI Corp
Mitchell Morris CIO
The Huntington
Douglas Duncan CIO
Columbia Insurance Group
David Finkelstein CIO
RiverSpring Health
Bert Sams VP, IT
Haggai Institute
Adip Dsouza Director - IT
Professional Finance Company, Inc.
Karl Schubert CIO/CTO
TechNova Consulting LLC
Nathan Mumm CTO
Copiers Northwest
Karthik Devarajan Director of IT
Legal Aid Bureau
Keith Scott Director of IT
Ron Dinwiddie CIO
Texas Trust Credit Union
Scott Walker VP of IT
Top Rx
Stephanie Sylvestre CIO & Chief Programs Officer
The Children's Trust
Tony Rehmer SVP of IT
Children's Miracle Network Hospitals
Trent Baker CISO/CTO
InSync Healthcare Solutions
Tyrone Grandison CIO
Institute for Health Metrics and Evaluation
Val King CIO
Val Verde Regional Medical Center
William Mahoney VP of IT & Compliance
Centric Technology Solutions, LLC
Ben Cranmore CIO
Furniture Outlets USA Inc.
Brian Mehle CIO
Atlantic Specialty Lines
Ed Jarecki Assistant VP Enterprise IT and PMO
Bellevue University
Frank Zalich VP of IT
Neighborhood House Association
George Prior CIO
Burgess Group
Hugh Miller CIO, CTA
San Antonio
James Peterson CIO
Joseph Meadors SVP, IT and Facilities, CISO
Harrison College
Joseph Moreau Vice Chancellor of Technology & CTO
Foothill-De Anza Community College District
Michael Ouren CIO
Mugunth Vaithylingam CIO
College of Southern Nevada
Sean Hagarty CIO - VP of IT
Steve Gebhart CTO
Willis Marti CISO
Texas A&M University
Saravanan Gurumurthy CTO
ForwardLine LLC


Over the year’s we’ve help thousands of senior-level IT executives connect with peers in different industries to discuss their top-of-mind directives. Delegates from the 2017 series included:

Attendee Testimonials

"The format of the sessions and one-on-one meeting with vendors was a very effective use of my time. The best part of the event is the experts from various areas of information security and solution providers under one roof. It provided an opportunity to learn in a succinct manner without spending too many days out of the office."

"CIO VISIONS is time well spent. In the office, I often don't have time to answer all the emails I received from vendors and then find out which one is the right fit for what I need. The personalized research meeting format allows me to have conversations with vendors that I currently have initiatives for, so the conversations with them are very productive. The sessions are in line with current industry and the networking experience with industry peers is phenomenal!"

"As CIOs we understand the need to network and learn from our peers and experts in the market place. The good news is that there are a plethora of opportunities for us to attend CIO centric events, but sadly, therein lies the difficulty. We have limited time and need to select the events that help us provide the best technological guidance to the enterprises we serve. Having served on many panels and chaired many sessions across many of these events, I have narrowed down the events I attend to a handful. CIO VISIONS is one of them. "

"CIO VISIONS Mid-Marekt is an excellent event for IT leaders to connect, network and discuss the current state of IT. With practitioners providing the presentations and key talks, this is a very practical and "real" event for the attendees."

Attendee List


CIO VISIONS is the IT industry’s fastest growing event, quickly establishing a reputation as the boiling pot of information, ideas and solutions. Sponsors from the 2017 series included:


North America's leading IT executive-level event plays host to over 500 attendees each year. In the last decade, we’ve produced 15 large scale CIO VISIONS summits across America.


Here is a quick FAQ to help you get started. For more information contacts us, we're happy to talk to you.

Our Team

Matt Velaer

Conference Director
(424) 334-5145
Send Message

Marin Silvers

Sponsor Relations
(424) 334-5141
Send Message

Krizzle Silva

Attendee Relations
(424) 334-5159
Send Message

Riley McLaughlin

Conference Program Manager
(424) 334-5149
Send Message

Jeff Barnett

Sales Manager
(424) 334-5146
Send Message

Shanna Delfs

Account Executive
(434) 334-5161
Send Message


Your full access conference pass includes overnight accommodations, meals and cocktail receptions.

The Hotel

Red Rock Casino Resort & Spa

Featuring luxurious hotel rooms and suites, three-acre pool backyard, sensuous spa treatments, delectable dining and exciting casino gaming–all overlooking the stunning Red Rock Canyon National Conservation Area.

Inspired by the natural beauty of the neighboring mountains, Red Rock Casino Resort & Spa, Las Vegas; Spa pays homage to the elegant mid-century modern resorts that made Las Vegas famous. Spacious accommodations are designed with modern contemporary décor and a wealth of amenities like no other hotel rooms in Las Vegas, and include a 42-inch HD TV, VOIP internet phones, an automated, fully-stocked private bar and in-room safe.
Accommodations must be booked through the conference organizers and not through the venue directly. We cover the first night and offer a discounted rate. Spouses welcomed. For reservations please contact:
The closest airport to the hotel is McCarran International Airport (LAS). Red Rock does operate a complimentary shuttle between McCarran Airport and the hotel. You can see the shuttle schedule here. Taxis are also available at the airport and cost approximately $50 each way.
Red Rock Resort, Casino & Spa | 11011 W. Charleston Blvd. Las Vegas, NV 89135