The Red Rock Casino Resort & Spa, Las Vegas

Invitation-only means an exceptional experience, on us

Coordinated by your personal concierge, a schedule is tailored to your professional goals and company priorities.

assignment_ind

Complimentary Pass

Inventive learning, renown speakers, executive networking. All free to you.

flight

Travel Reimbursement

$200 of your travel is covered if you’re trekking over 100 miles to attend.

local_hotel

Accomodations

Your first night’s stay is on us and a discounted rate is available thereafter.

restaurant

5 Star Catering

All of your meals and libations are complimentary throughout the event.

Join IT’s Distinguished Upper Tier

A curated audience reserved for the senior level of the Fortune 500 puts you in exceptional company.

150+

Affluent Peers

Meet the people who are just as invested in leveraging technology as you are.

20+

Influential Leaders

Learn valuable strategy components from today’s very best.

40+

Proven Solutions

Meet industry leading solution providers, hand picked for your priorities.

1.5K

Connections

Take this unprecedented opportunity to connect with high profile execs.

A curated experience to cultivate achievement

Based on your specific areas of responsibility, challenges and interests we’ll craft a personal agenda that paves your path to success.

3

Days of Insight

Jump in the discussion through focused educational sessions and networking opportunities.

40

Innovative Sessions

Keynotes, plenary sessions, industry panel discussions, case studies and more.

6

Networking Opportunities

Tie into contemporaries and mentors interested in the same avenues of opportunity as you.

10

Research Meetings

Meet one-on-one with executives delivering on the solutions that are shaping the industry.

play_circle_outline Watch Video

Peer-Led Education

The CIO Visions Steering Committee consists entirely of your contemporaries, meaning we tackle the themes that have profound significance to you performance and your company.

FEATURED SPEAKERS

Key Themes

Explore strategies for leveraging the cloud to drive down costs and the security implications that come with it. Dive deeper to understand the impact on employees, mobile strategy and more.

High Profile Speakers

Hear strategic endeavors and skillful insights from 20+ IT leaders as they make way in today’s changing landscape.

CIO VISIONS Cybersecurity Spring Summit View More

Ruben Chacon

VP & CISO

Constellation Brands

CIO VISIONS Cybersecurity Spring Summit View More

Nick Curcuru

VP, Big Data Security

Mastercard

CIO VISIONS Cybersecurity Spring Summit View More

Michael Lee Sherwood

Director of Innovation and Technology

City of Las Vegas

CIO VISIONS Cybersecurity Spring Summit View More

Prabodh Telang

Information Security Officer

Credit Union of Colorado

CIO VISIONS Cybersecurity Spring Summit View More

Mark Decker

CIO / Technology Director

Jackson County Oregon

CIO VISIONS Cybersecurity Spring Summit View More

Vijay Anand

Vice President of Product Marketing

MicroStrategy Inc.

CIO VISIONS Cybersecurity Spring Summit View More

Peter Quinn

Chief Information Officer

NYC Department of Education

CIO VISIONS Cybersecurity Spring Summit View More

Karen Davis

Business Group CIO & VP Research Computing

RTI International

CIO VISIONS Cybersecurity Spring Summit View More

Bradley Horst

CIO

EYP Architecture & Engineering

CIO VISIONS Cybersecurity Spring Summit View More

Paul Jones

Clerk and Comptroller

Palm Beach County

CIO VISIONS Cybersecurity Spring Summit View More

Barry Toubin

Chief Marketing Officer

Benjamin Moore & Co

CIO VISIONS Cybersecurity Spring Summit View More

Alisa Sheyn

Director of Business Operations, Product Development and Technology

AVID

CIO VISIONS Cybersecurity Spring Summit View More

Piyush Prakash

Chief Technology Officer

iLink Systems Inc

CIO VISIONS Cybersecurity Spring Summit View More

Mary J Leonardo Patry

Principle, IT Executive Advisor and Coach

ITeffectivity

CIO VISIONS Cybersecurity Spring Summit View More

Michael Maier

CTO

City of Fort Lauderdale

CIO VISIONS Cybersecurity Spring Summit View More

Sai Billanuka

Vice President

Thomson Reuters

CIO VISIONS Cybersecurity Spring Summit View More

Raphael Morozov

Eurofins DMS

CIO VISIONS Cybersecurity Spring Summit View More

John Callon

Senior Director of Product Marketing

Cyren

CIO VISIONS Cybersecurity Spring Summit View More

Mark E. Glenn

CIO, Director

Washington State Military Department

CIO VISIONS Cybersecurity Spring Summit View More

Feng Hou

Chief Information Officer

Central New Mexico Community College

CIO VISIONS Cybersecurity Spring Summit View More

Ryan Loy

Chief Information Officer

EBSCO Industries, Inc.

CIO VISIONS Cybersecurity Spring Summit View More

Mike Hendrickson

Vice President, Technology & Developer Products

Skillsoft

CIO VISIONS Cybersecurity Spring Summit View More

Michael Kearns

VP of Enterprise

Toptal

CIO VISIONS Cybersecurity Spring Summit View More

James Duff

Director of Corporate Markets

Vade Secure

CIO VISIONS Cybersecurity Spring Summit View More

Victor Ramos

Vice President of Enterprise Architecture

City National Bank

CIO VISIONS Cybersecurity Spring Summit View More

Missy Young

Chief Information Officer

Switch

CIO VISIONS Cybersecurity Spring Summit View More

Endre Walls

CISO

Customers Bancorp

CIO VISIONS Cybersecurity Spring Summit View More

Chris Gebhardt

Director, InfoSec

TEEM/WeWork

CIO VISIONS Cybersecurity Spring Summit View More

David Holmes

Principal Security Strategist

Shape Security

CIO VISIONS Cybersecurity Spring Summit View More

W. Curtis Preston

Chief Technologist

Druva

CIO VISIONS Cybersecurity Spring Summit View More

Joseph Wolfgram

Vice President & Chief Technology Officer

Mission Health

CIO VISIONS Cybersecurity Spring Summit View More

John Smiley

VP of Enterprise Solutions

PPT Solutions

CIO VISIONS Cybersecurity Spring Summit View More

Scott Prater

VP of Technology

PPT Solutions

2019 Full Agenda

Hear strategic endeavors and skillful insights from 20+ IT leaders as they make way in today’s changing landscape.

Reset Filter
CIO Leadership and Innovation
Cyber Security
Data Management: Strategy for Storage and Analytics
SundayNetworking

Welcome Cocktail Reception & Registration

MondayNetworking

Breakfast Buffet

MondayKeynote Presentation

close Digital Transformation – Six Steps to Success

IT LeadershipHitachi - SVP, Practice Lead

Digital transformation – driving operational improvements in your physical value stream using connected data from your digital value stream – is delivering unprecedented value across industries to those with a clear road map. In fact, a recent Harvard Business School report shows that companies that embrace digital transformation attain significantly better gross margins, earnings and net income than those that don’t. What’s more, those digital leaders are not spending much more on IT than laggards because the big investments have already been made. The challenge is knowing how to connect the data from the digital value stream to drive continuous improvement with real-time metrics and predictive analytics. No matter where you are on the journey of digital transformation – these six steps can help you connect your systems to drive new levels of productivity, profitability and value across your business.

Key Takeaways:

  • Learn how to connect your physical and digital value streams to create near real-time operating systems.
  • Identify areas of variation across the physical value stream that can be supported by better data and real-time analytics.
  • Gain knowledge through strategic partnerships with digital leaders to accelerate your journey to unlocking more organizational value.

Speaker

Stephen Engel
SVP, Practice LeadHitachi
Monday

Targeted Research Meetings

Expo Hall
MondayBreakout Presentation

close Building a Sustainable Cyber Program

Cyber SecurityMastercard - VP, Big Data Security

Building a Sustainable Cyber Security Program – Cyber Security is at the top of mind of executives, shareholders and government officials. Enterprises can no longer put of creating a cyber program. Programs do not need to be complicated nor cumbersome to manage. Nick will talk about how enterprises need work within a framework an follow 5 key principles to create a sustainable program which will not bury and organization. The session will show how to build trust and confidence with your cyber program.

Key Takeaways:

  • Top 5 things to do to create a sustainable program
  • Key cyber metrics to track
  • Key questions your program must answer for your execs
  • Why a framework is important and how to use it

Speaker

Nick Curcuru
VP, Big Data SecurityMastercard
MondayBreakout Presentation

close AI-Based Autonomous Response: Are Humans Ready?

Network SecurityDarktrace - Director

Cyber security is quickly becoming an arms race, with machines fighting machines on the battleground of corporate networks. AI-based cyber defense can not only detect threats as they emerge, but also autonomously respond to attacks in real time. But are humans ready to accept the actions machines would take to neutralize threats?

Key Takeaways:

  • AI approaches and algorithms for detecting and responding to threats
  • How human teams adopt (or resist) automated defenses
  • The concepts of ‘human confirmation’ mode and ‘active defense’
  • Success stories across Smart Cities, genomics organizations, and industrial control systems

Speaker

Parker Ashley
DirectorDarktrace
MondayBreakout Presentation

close Pathway to the Future How Cities Are Unlocking Data

City of Las Vegas - Director of Innovation and Technology

A review of the city of Las Vegas and its efforts to become the premier smart city of the future.

Key Takeaways:

  • Understand the smart city concept
  • How cities are using data
  • Discuss the infrastructure involved in building a smart city
  • Understand the business use cases

Speaker

Michael Lee Sherwood
Director of Innovation and TechnologyCity of Las Vegas
MondayBreakout Presentation

close Optimizing Delivery - Using Risk and Value KPIs Towards a Rational Portfolio

IT LeadershipCouncil on International Educational Exchange - Chief Information Officer & Chief Information Security Officer

Successful delivery of projects is more than just delivering on time and on budget. Alignment with strategic goals, using Risk and Value KPIs is key to working on projects that make the most impact.

Key Takeaways:

  • Portfolio Optimization
  • Strategy for Architecture Agility
  • Effective resource balancing

Speaker

Irving Bruckstein
Chief Information Officer & Chief Information Security OfficerCouncil on International Educational Exchange
MondayBreakout Presentation

close Life After an Anonymous Attack on My City

Cyber SecurityCity of Fort Lauderdale - CTO

The city of Fort Lauderdale, Florida was hit by an Anonymous denial-of-service attack in December 2014 and was forced to immediately upgrade computer systems to thwart any potential future attacks.The city quickly spent $430,000 upgrading computer security systems to mitigate vulnerabilities it had previously identified. While the attack itself did not cost the city this money, it expedited the timeline for these necessary system upgrades. A complete A-Z approach for a new security awareness program was created.

Key Takeaways:

  • Even if sensitive information isn’t compromised, there can be political fallout from such an attack
  • If you’re aware of vulnerabilities that need to be remedied “when the budget allows,” would-be attackers will be too
  • A security strategy for a new division
  • How the city has changed its ways – both technologically, and behaviorally, in the time since

Speaker

Michael Maier
CTOCity of Fort Lauderdale
MondayBreakout Presentation

close The Journey from CIO to CMO

IT LeadershipBenjamin Moore & Co - Chief Marketing Officer

After leading an IT transformation as a first time CIO, I had the opportunity to become the CMO for a beloved brand. The discussion will explore the challenges in the transition, the similarities and differences in the disciplines, and leadership skills to be successful in both.

Key Takeaways:

  • Good leadership skills apply consistently across disciplines
  • Why tech skills are important in Marketing
  • You can be a better partner if you can see your client’s perspective

Speaker

Barry Toubin
Chief Marketing OfficerBenjamin Moore & Co
MondayBreakout Presentation

close Coming Soon

Toptal - VP of Enterprise

Coming soon

Speaker

Michael Kearns
VP of EnterpriseToptal
MondayBreakout Presentation

close Diversity in Technology Leadership - Yielding Business Outcomes

IT LeadershipAVID - Director of Business Operations, Product Development and Technology

In this session, we will explore the current state of diversity and representation in leadership and technology and address key business benefits to a more balanced workforce, such as revenue, cost savings and customer satisfaction. We’ll conclude with suggestions and steps to reaching a more diverse and engaged workforce.

Key Takeaways:

  • Diversity in workforce and leadership has been linked to tighter customer engagement, wider marketing reach and more efficient branding spend
  • Several studies identify companies with a more balanced representation in workforce and leadership having higher revenue numbers and stronger shareholder value
  • Innovation spikes with engaged and balanced teams and reduces intellectual property risk
  • Moving towards diversity and fair representation is easy and achievable

Speaker

Alisa Sheyn
Director of Business Operations, Product Development and TechnologyAVID
MondayBreakout Presentation

close Beyond Security Awareness - Becoming Foolproof

Ransomware/PhishingJackson County Oregon - CIO / Technology Director

Despite mandatory security training, most users remain highly vulnerable to social engineering. Awareness is not enough. Compliance-focused training can be worse than no training at all. To truly reduce breach risk, we need a more effective approach.

Key Takeaways:

  • A data breach may not be your worst-case scenario
  • Why social engineering is the best exploit ever
  • How mandatory security training can backfire
  • The 3 keys to a truly effective training program

Speaker

Mark Decker
CIO / Technology DirectorJackson County Oregon
MondayBreakout Presentation

close Machine Learning for Dev Teams

DevOps StrategyEurofins DMS - CTO

From predictive analytics to chatbots to security, machine learning is everywhere – except for your company… So how does a mid-market CIO bring machine learning into their enterprise? In this talk, we will explore how one can leverage the latest tools to turn machine learning into just another dev practice.

Key Takeaways:

  • Much like the cloud a decade ago, machine learning can no longer be ignored by forward-thinking CIOs
  • CIOs can help their companies gain a strategic advantage by identifying applications for AI/ML
  • It is no longer necessary to build out a data science team to begin to leverage AI/ML
  • ML can become just another tool in your dev team’s toolbelt

Speaker

Raphael Morozov
CTOEurofins DMS
MondayBreakout Presentation

close The New Era of Evasive Phishing: Why It’s Happening and How to Stop It

Ransomware/PhishingCyren - Senior Director of Product Marketing

Phishing is increasingly getting through to users and is the top source of breaches at companies. The rise of the Phishing-as-a-Service industry is driving phishing volumes while making attacks more targeted and sophisticated. This new era of evasive phishing requires not just new detection countermeasures, but a new security architecture.

Key Takeaways:

  • What is “evasive phishing,” what are examples of techniques being applied, and what has been the impact on IT security?
  • What’s currently on offer from the “Phishing-as-a-Service” industry, and what happens when they start using AI?
  • How effective do IT and security managers rate their phishing security, and what does the growth of Office 365 mean for phishing security?
  • In the cat-and-mouse game with the cyber criminals, what’s the next move in terms of security architecture?

Speaker

John Callon
Senior Director of Product MarketingCyren
MondayBreakout Presentation

close Securing a Hybrid-Cloud Environment

Cloud SecurityCredit Union of Colorado - Information Security Officer

Security controls that scale and extend from on-premise to cloud based workloads.

Key Takeaways:

  • Must have security controls for an hybrid environment
  • Maintain your regulatory and compliance requirements
  • Incident management and response
  • Securely adopt and benefit from cloud based technologies

Speaker

Prabodh Telang
Information Security OfficerCredit Union of Colorado
MondayBreakout Presentation

close Why the Cloud is Perfect for Data Protection

Cloud StrategyDruva - Chief Technologist

While more companies are now leveraging the cloud to increase their level of data protection and management, there are still many wondering “why?”

The answer:  the cloud actually brings substantial advancements to the data protection and management table that simply aren’t possible without it. The easiest advantage to envision? Unlimited scalability. If a data protection tool is properly designed, the capacity should automatically expand to meet any customer’s needs. The second advantage: the cloud is the simplest way to centralize the storage of all secondary data sources while also providing unlimited compute that can be used to gain additional insight and business value from that data. Finally, the ability to do automated Disaster Recovery (DR) without maintaining a DR facility is unquestionably a major value of the cloud, and simply isn’t possible otherwise. Join Curtis Preston, as he explains the benefits of cloud-based data protection and management, how to decide if a cloud-based solution is right for you, and best practices when evaluating data management vendors.

Speaker

W. Curtis Preston
Chief TechnologistDruva
MondayNetworking

Lunch

Monday

Targeted Research Meetings

Expo Hall
MondayBreakout Presentation

close Putting the Human Back Into Network Security

Cyber SecurityForcepoint - Director of Network Security Architects

Network security technology is shifting from just being a way to keep threats out of your network to providing operational insights that can make your people more effective and your organization more efficient. With the growth of unmanaged devices like phones, tables, appliances and Internet of Things (IoT) gadgets, the network often is the only place where sensing and enforcement can be done consistently.

Key Takeaways:

  • Learn about advances in behavioral monitoring, analytics and machine learning enabling security to go beyond a threat-centric approach
  • How to addres the fuzzy “gray” area where today’s greatest productivity and greatest risks are found.
  • How network security products are making it easier to understand people’s intent so that you can take a modern risk-adaptive approach connecting and protecting your people and data

Speaker

Michael Knapp
Director of Network Security ArchitectsForcepoint
MondayBreakout Presentation

close Innovative Strategies for Cultivating Security Talent

Cybersecurity Staff TrainingGrand Canyon Education - Director of Security

A look at how to bridge the massive gap in security talent we all face, as massive workforce shortages abound.

Key Takeaways:

  • There is a massive shortfall in security talent, due to rapid increase in demand for skills that take time to cultivate
  • Alternative methods of cultivating talent must be identified, if we are to be successful
  • If we find people with a strong technical foundation (or interest) and provide them with the required experiences, we can grow the talent we need
  • Mix together a few rock stars and lots of raw uncultivated talent, then simmer in a positive culture, pouring in generous quantities of hands-on experience

Speaker

Mike Manrod
Director of SecurityGrand Canyon Education
MondayBreakout Presentation

close Theory of Leadership

IT LeadershipCity National Bank - Vice President of Enterprise Architecture

What is the “essence” that a leader has that lets him or her lead? How can you get more of this “leadership essence”? What kind of things do you do day to day and over the long run that cause you to gain or lose this “leadership essence”? In this session we will talk about and describe some strategic skills and knowledge that effective leaders must possess.

Key Takeaways:

  • What are essential skills a leader must have?
  • Techniques for growing your leadership skills
  • Other skills and knowledge needed to be an effective leader

Speaker

Victor Ramos
Vice President of Enterprise ArchitectureCity National Bank
MondayBreakout Presentation

close The Secure Cloud 9

Cloud SecurityCustomers Bancorp - CISO

Gain 9 critical insights for securely adopting a cloud strategy to host your products, platforms, or business-critical technologies.

Key Takeaways:

  • Avoid the common pitfalls of cloud deployments.
  • Gain insights into what works and what doesn’t when it comes to cloud.
  • Rationalize your cloud strategy to ensure it’ll meet your business objectives.
  • Decrease risks to your business by deploying a secure cloud.

Speaker

Endre Walls
CISOCustomers Bancorp
Monday

close A New Approach to Email Security for Office 365

Vade Secure - Director of Corporate Markets

For hackers, Office 365 is the new black!

Because a simple set of Office 365 credentials can give you access to sensitive documents, applications and confidential business information, Office 365 is now the go-to place for cybercriminals looking to make a fast and high profit.

Each day these hackers implement new and always more creative phishing and spear-phishing attacks, that easily bypass the traditional email security solutions.

Discover what their techniques are, and learn what you can do to prevent cybercriminals from breaking into your organization with just a single email.

Key Takeaways:

  • Office 365
  • Email Security
  • Phishing
  • Cyber Security

Speaker

James Duff
Director of Corporate MarketsVade Secure
MondayBreakout Presentation

close Preparing Your Talent for Today’s Evolving Roles and Tomorrow's Challenges

Staff Training and RetentionSkillsoft - Vice President, Technology & Developer Products

In this session, Mike Hendrickson will explore the skills needed to properly enable individuals to deliver true business value through new job capabilities and functions. Further, Mike will outline how technology leaders can empower their technology professionals to advance throughout their career, transforming individuals from where they are today, to where they aspire to be in the future as they develop knowledge, experience, skills and best practices.

Key Takeaways:

  • Mike Hendrickson will explore the skills needed to properly enable individuals to deliver true business value through new job capabilities and functions
  • Mike will outline how technology leaders can empower their technology professionals to advance throughout their career, transforming individuals from where they are today, to where they aspire to be in the future as they develop knowledge, experience, skills and best practices.
  • Mike will put a particular emphasis on how organizations can better enable and train their technology professionals and measure how effective their efforts are. And how you can really know if someone has learned what they need for the future.
  • Mike will provide a blueprint for organizations looking to properly skill technology professionals in a way that will allow the organization to utilize any technology stacks in a valuable, meaningful way.

Speaker

Mike Hendrickson
Vice President, Technology & Developer ProductsSkillsoft
MondayBreakout Presentation

close SWAT Team Lessons for Cybersecurity and More

CybersecurityTEEM/WeWork - Director, InfoSec

There are many lessons and skills the Cybersecurity industry can learn from the intense, life and death world of Police SWAT Teams. Chris Gebhardt is a former Police Lieutenant and SWAT Team Leader who also specialized his career in IT and InfoSec. He will share some specialized skills he has applied to Cybersecurity operations to create an always win, open eyes mindset. You’ll hear stories from the field and server room about ‘keeping your head on a swivel’ and ‘two is one, one is none.’ He’ll show you how you can adopt these concepts to augment your cybersecurity thinking for the better.

Key Takeaways:

  • Incident response plans blind you
  • Be open to ideas
  • Your team can be more than it is

 

Speaker

Chris Gebhardt
Director, InfoSecTEEM/WeWork
Monday Breakout Presentation

close Business Group CIO and Alignment with Corporate IT

IT LeadershipRTI International - Business Group CIO & VP Research Computing

Many IT organizations struggle with ensuring their strategy and directions aligns with that the overall business. One way to solve that issue is to have business staff with responsibility and authority that mirrors that of a corporate CIO, but is imbedded in the business. This session will cover a case study of such a design, including pros and cons and ongoing challenges.

Key Takeaways:

  • Understanding of the challenges of aligning corporate IT with a business that also delivers technology solutions to clients
  • Understanding of the solution design
  • Understanding of things that have worked well, and those that are still evolving

Speaker

Karen Davis
Business Group CIO & VP Research ComputingRTI International
MondayBreakout Presentation

close You are the New CIO. You’ve Made it. Now What?

IT LeadershipITeffectivity - Principle, IT Executive Advisor and Coach

You are the new CIO. Expectations of you are running high.  You know you have a limited time to get on board, make a difference and demonstrate your value.  In this participative workshop, Mary Patry will call on members of the audience to demonstrate the power of a coaching relationship to jump start your first 90 days.  Key takeaways include steps to:

Key Takeaways:

  • To get clear about what success means
  • Understand the culture and fit in
  • Create a development plan to grow professionally
  • Get small wins and begin to execute

Speaker

Mary J Leonardo Patry
Principle, IT Executive Advisor and CoachITeffectivity
MondayBreakout Presentation

close Evolving Automation from RPA to API to AI

AutomationThomson Reuters - Vice President

Every organization is going through some sort of digital transformation and automation is key aspect of it. How the automation is evolving and the strategy on starting simple and taking all the way to ML/AI.

Key Takeaways:

  • How to enhance your automation strategy
  • Learn digital transformation in the age AI
  • Embrace automation to bring efficiency

Speaker

Sai Billanuka
Vice PresidentThomson Reuters
MondayBreakout Presentation

close Navigating Today's Top Web Threat: Defending Against Credential Stuffing Without Creating User Friction

CybersecurityShape Security - Principal Security Strategist

Fraudsters and thieves are weaponizing each new data breach with credential stuffing attacks. Their automation is working against the recent reductions in user friction that businesses have worked so hard to achieve. This talk helps you understand how to separate fake users from your real customers without creating friction for your customers’ experience.

Key Takeaways:

  • This unwanted automation problem is more severe than most realize
  • How can you keep out automation without treating your customers like criminals?
  • There are 16 levels of retooling, which steps should you skip?

Speaker

David Holmes
Principal Security StrategistShape Security
MondayBreakout Presentation

close Blockchain - The Next Generation of the Internet, What can it do and why is it important to you?

Digital TransformationCentral New Mexico Community College - Chief Information Officer

If the current Internet is the Internet of data, blockchain is the internet of value. As the distributed ledger technology (DLT), blockchain can significantly increase business value by improving business efficiency via smart contract process automation, cutting costs via disintermediation and therefore transforming customer experience (UX).

Key Takeaways:

  • How can blockchain transform customer experience (UX)?
  • How can blockchain increase business efficiency?
  • How can blockchain cut costs for business?
  • Why every business leader needs to adopt a blockchain strategy as a business priority?

Speaker

Feng Hou
Chief Information OfficerCentral New Mexico Community College
MondayBreakout Presentation

close What to do in an IT Emergency

IT LeadershipWashington State Military Department - CIO, Director

In this educational session Mark will discuss how the community of professionals and experts from the public, private and tribal sectors within emergency communications work together to provide reliable and resilient emergency communications throughout times of crisis and how this impacts business. Crisis management and learning what to do is critical for any business organization, public or private. Mark will review and share a case study, on how the WECCWG has grown substantially and currently holds a tri-annual forum to bring their community together to raise the collective awareness of the unique emergencies and challenges we all must be ready to overcome together in an emergency.

Key Takeaways:

  • In this session we will discuss public & private sectors collaboration
  • How to be prepared in an emergency
  • What to do in an IT emergency
  • Who and how to coordinate with: Case study on WECCWG

Speaker

Mark E. Glenn
CIO, DirectorWashington State Military Department
MondayNetworking

Industry Dinner

TuesdayNetworking

Breakfast Buffet

TuesdayKeynote

close Coming Soon

MicroStrategy -

Coming soon

Speaker

TBD
MicroStrategy
Tuesday

Targeted Research Meetings

Expo Hall
TuesdayBreakout Presentation

close Securing the Organization - It's More than Technology

CybersecurityPalm Beach County - Clerk and Comptroller

Implementing a well-rounded organizational security program based on the following 3 domains:

1. Administrative – includes; policies, processes, training and defining success measures.

2 Technology – includes the technology infrastructure required to protect and defend.

3. Compliance – is all about documentation and is critical to limit liability.

Key Takeaways:

  • A practical guide to reducing liability and demonstrating due diligence and due care at all levels
  • Understanding the importance of compliance and documentation at all levels
  • Leveraging audits and risk assessments to gain and maintain organizational engagement
  • It’s all about reducing risk and organizational engagement

Speaker

Paul Jones
Clerk and ComptrollerPalm Beach County
TuesdayBreakout Presentation

close Thirty Seconds Over Tokyo

IT LeadershipEBSCO Industries, Inc. - Chief Information Officer

Discussion on how EBSCO IT completely transformed itself while leveraging existing talent. The conversation will outline the difficulties and techniques used to preserve the culture of the organization. The Doolittle title reference refers to how, through effective leadership, you can completely retool what you have and be very effective. Often times, leaders feel the need to hire in ideas.

Key Takeaways:

  • Key building blocks needed before transforming
  • How to preserve the culture during transformation
  • How to measure yourself along the way

Speaker

Ryan Loy
Chief Information OfficerEBSCO Industries, Inc.
TuesdayBreakout Presentation

close Coming Soon

Switch - Chief Information Officer

Coming Soon

Speaker

Missy Young
Chief Information OfficerSwitch
TuesdayBreakout Presentation

close Managing a Major Cyber-Crisis

CybersecurityConstellation Brands - VP & CISO

When disaster hits, what are the key priorities for a CISO? Are you able to actually make all of your preparedness a reality? Ruben Chacon outlines his experience as the security lead managing a cybercrisis for a major global organization when it was impacted by Ransomware-like malware in June 2017, and offers tips on how to best manage the aftermath.

Key Takeaways:

  • Tactical priorities during a major cyber-crisis
  • Key practical learnings to prepare and manage a cyber-crisis
  • Where to start to get ready

Speaker

Ruben Chacon
VP & CISOConstellation Brands
TuesdayBreakout Presentation

close On-Premises to Cloud Migrations: Successfully Transitioning General Telephony and Contact Center Services

Digital TransformationPPT Solutions - VP of Technology
PPT Solutions - VP of Enterprise Solutions

Cloud technology provides multi-dimensional solutions that minimize downtime and maximize ROI. Understanding the benefits of a cloud migration and its potential to transform some of the most critical components of an operation can be a major factor in determining if the move is the right one for your organization. The proper due diligence ahead of deployment along with avoiding the most common pitfalls are key in the implementation of successful cloud migrations.

Key Takeaways:

  • A general understanding of the advantages of cloud services for Contact Center as a Service (CCaaS) and Unified Communications as a Service (UCaaS) bring most organizations.
  • Better understanding of how to differentiate the capabilities of CCaaS and UCaaS vendors and how they fit an organization’s needs
  • The necessary steps to take in preparing your organization (technical and business) to move from premises solutions to CCaaS and UCaaS capabilities
  • Common pitfalls to avoid when making the transition

Speaker

Scott Prater
VP of TechnologyPPT Solutions
John Smiley
VP of Enterprise Solutions PPT Solutions
TuesdayBreakout Presentation

close 3 Secrets for CIO Success

IT LeadershipMission Health - Vice President & Chief Technology Officer

The job of CIO is more demanding and more strategic than ever. The job is way beyond running the IT department, and these three secrets you didn’t learn in your MBA program will help ensure you have a long and rewarding career as a CIO.

Key Takeaways:

  • Know What You Control – There are only 3 things
  • Manage Expectations – With every relationship, all the time
  • IT Financial Management – Never speak “geek”. You must converse in the language of business
  • Avoid the “Silly Cycle” of IT Leadership – Keep your job as long as you want it!

Speaker

Joseph Wolfgram
Vice President & Chief Technology OfficerMission Health
TuesdayBreakout Presentation

close Transform Your Business with Data Driven Insights and Actions

Big Data and AnalyticsiLink Systems Inc - Chief Technology Officer

We live in a world of unprecedented change. To be successful in this world of change, you need to develop a data culture, creating an environment where every team and every individual is empowered to do great things because of the data at their fingertips. Recent advances in Artificial Intelligence (AI) have incredible potential. And yet, AI is also probably one of the least understood technological breakthroughs in modern times. Attend this session to learn on how you can transform your business through data driven insights and action powered by Microsoft Data Estate, Business Analytics & AI platform.

  • How to modernize your data estate with on-premises, cloud and hybrid options using flexible and powerful tools, and proven partner expertise
  • How to tap into the power of natural language, self-service business insights and visualization capabilities, and make insights available to anyone, anywhere, at any time
  • How you can transform your business, combining AI innovation with a proven Enterprise Data platform, to derive intelligence from a wide range of data relevant to your business no matter where it lives
  • Why Microsoft Azure provides the most flexible platform for you to infuse intelligence into your own products and services

Speaker

Piyush Prakash
Chief Technology OfficeriLink Systems Inc
TuesdayNetworking

Lunch

Executive Steering Committee

Experienced IT leaders work with us to focus our program on trends that will move the needle at your company.

Steering Committee Members

Mike Maier CISO
City of Fort Lauderdale
Nishanth Rodrigues Chief Information Officer
University of Mississippi
Paul Cottey Chief Information Officer
Water Street Healthcare Partners
Karen Davis Business Group CIO & VP, Research Computing
RTI International
Raphael Morozov CTO
Eurofins DMS
Adam Waldron Chief Information Officer
Idaho Farm Bureau Insurance
Alan Whitehouse Chief Information Officer
WellStar West Georgia Medical Center
Andrea Giantelli VP of Global IT Compliance & Portfolio Management
Platform Specialty Products
August Alfonso CIO & VP for Facilities Operations &
Del Mar College
Carolyn Schmidt Tastefully Simple
Chief Information Officer
Dean Jensen Assistant Professor of Computer Science
Elmhurst College
Donna Harrington Chief Technology Officer
Southwestern College
Dr. Ken Russell CIO & VP, Digital Transformation
Pfeiffer University
Erwin Eimers Chief Information Officer
Valent U.S.A. LLC
Jack King Chief Technology Officer
State of Illinois
Jason James Chief Information Officer
Optima Healthcare Solutions
Jeffrey Potter Chief Technology Officer
Davenport & Company LLC
Jonathan Neumark Assistant VP, Technology Services
Flagship Credit Acceptance
Kumar Periasamy Vice President - Digital Transformation
United Nations FCU
Leah Kraus Chief Information Officer
North Carolina Central University
Mark Simon SVP, CIO and CISO
Benefis Health System
Michael McCartney Chief Marketing and Technology Officer
MoneySolver
Mujeebur Rahmansaher Chief Technology Officer
The Team Companies
Nader Nemati QTC Management Inc
Chief Information Officer
Rezaul Abid Global Head of Information Systems and T Strategy Architecture and Innovation
Bechtel Global Corporation
Meerah Rajavel Chief Information Officer
Forcepoint

An Esteemed Audience

Over 80% of the Fortune 100 joins us each year for what has been voted the “most effective trade show” for over a decade. Use our tools to demonstrate ROI to your C-Suite.

Attendee Testimonials

Attendee List

Exhibitors

CIO Visions has quickly become established as the “deal generating show”.

About CIO Visions

CIO Visions is an invitation-only trade show for IT executives that bridges you to the most compelling solutions and information for your crowning priorities.

Have Questions?

We’ve answered a few FAQs to get you started. For any other questions, please don’t hesitate to contact us!

Our Team

Matt Velaer

Conference Director
(424) 334-5145
Send Message

Marin Silvers

Sponsor Relations
(424) 334-5141
Send Message

Carlos Rodriguez

Conference Producer
(424) 389-3287
Send Message

Laura Dion

Attendee Relations Executive
(424) 363-9967
Send Message

Shanna Delfs

Account Executive
(434) 334-5161
Send Message

Andrea Gomez

Account Executive
424-334-5149
Send Message

Alex Flamer

Account Executive
424-389-2931
Send Message

Hotel and Travel

Your conference pass includes overnight accommodations, travel reimbursement, meals and cocktail receptions.

The Hotel

The Red Rock Casino Resort & Spa, Las Vegas

Luxurious accommodations, an Eden-esque pool nirvana complete with waterfalls, sumptuous spa treatments, award winning restaurants, miles of trail and a top notch casino–all overlooking the stunning Red Rock Canyon National Conservation Area.

Nestled at the entrance of the Red Rock Canyon National Recreation area,  just minutes from the Strip, Red Rock Resort Casino & Spa offers the best of both sides of Vegas. Enjoy the shows, the gambling, and all the pizazz Vegas is famous for, or feed your thirst for adventure with mountain climbing and exploration. Stunning views and an even more stunning atmosphere make Red Rock one of the best that Vegas has to offer.
We’ll book your accommodations, cover your first night’s stay and offer a discounted rate thereafter. To make your reservations please contact:
Red Rock operates a complimentary shuttle to and from McCarran Airport (LAS). The shuttle schedule is located here. Taxis and other ride sharing is also available and cost approximately
Red Rock Resort, Casino & Spa | 11011 W. Charleston Blvd. Las Vegas, NV 89135
×