The Red Rock Casino Resort & Spa, Las Vegas

What You Get

Our ‘invitation-only’ approach allows us to provide exceptional service for our audience.


Conference Pass

Full access to the event, from educational sessions to networking events.


Flight Voucher

Traveling more than 100 miles? We'll help with a $200 flight credit.


Overnight Hotel

We cover the first night and offer a discounted rate. Spouses welcomed.


5 Star Catering

Breakfasts, lunches, networking receptions and dinner included.

Who You'll Meet

A unique engagement opportunity with Fortune 100 and 500 enterprises.


Influential Peers

Learn from the best in the field and walk away with actionable insights.


Thought Leaders

Gain valuable and actionable insights from knowledgable IT experts.


Leading Partners

Meet only the solution providers most relevant for your initiatives.



Unparalleled networking opportunities with high profile industry leaders.

What You'll Do

Your registration creates a truly customized agenda based on your specific areas of responsibility, challenges and interests.


Peer-Led Learning

Spend most of your time participating in educational sessions and networking activities.


Educational Sessions

Keynotes, case studies, plenary sessions, industry panel discussions, and more.


Networking Activities

The ideal event to connect with peers who can truly make a difference to your career.


Research Meetings

Discover and validate leading solutions guided by knowledgable executives.

play_circle_outline Watch Video


A 100% peer-driven educational program centered the most pressing and current Cybersecurity topics.



Get insights from 20+ specialized IT executives making way in the ever-changing world of emerging technologies. Presenters from the 2018 series included:

CIO VISIONS Cybersecurity Spring Summit View More

Todd Barnum


GoPro, Inc.

CIO VISIONS Cybersecurity Spring Summit View More

George Khalil


City of Riverside

CIO VISIONS Cybersecurity Spring Summit View More

Nick Curcuru

VP, Big Data Security


CIO VISIONS Cybersecurity Spring Summit View More

George Finney


Southern Methodist University

CIO VISIONS Cybersecurity Spring Summit View More

Corey Thompson

VP of IT

Pacific Drilling

CIO VISIONS Cybersecurity Spring Summit View More

Jeffrey Fudge

Director of IT Operations

Ashley Furniture Industries

CIO VISIONS Cybersecurity Spring Summit View More

Beach Clark

VP of IT

Georgia Aquarium

CIO VISIONS Cybersecurity Spring Summit View More

Michael Smith


American Academy of Family Physicians

CIO VISIONS Cybersecurity Spring Summit View More

Vennard Wright


Washington Suburban Sanitary Commission

CIO VISIONS Cybersecurity Spring Summit View More

Jason Allen



CIO VISIONS Cybersecurity Spring Summit View More

Kirk Nugent

Information Technology Director

Wallace State Community College

CIO VISIONS Cybersecurity Spring Summit View More

Pam Click

CIO (Divisional)


CIO VISIONS Cybersecurity Spring Summit View More

Jason James


Optima Healthcare Solutions

CIO VISIONS Cybersecurity Spring Summit View More

Tom Jackson

CIO, Vice Chancellor of IT

North Carolina A&T State University

CIO VISIONS Cybersecurity Spring Summit View More

Gaurav Bhatia

Chief Digital Officer

NewDay USA , LLC

CIO VISIONS Cybersecurity Spring Summit View More

Zane Burnett

VP Digital Innovation & Technology

Alain Pinel Realtors

CIO VISIONS Cybersecurity Spring Summit View More

William Tran


Berkley Risk Administrators Company, LLC

CIO VISIONS Cybersecurity Spring Summit View More

Chad Mead




Make every session valuable by selecting up to 3 key themes to mix and match the most relevant topics to you. Example sessions from a past conference:

Reset Filter
CIO Leadership & Innovation
Cyber Security
Data Management - Strategy for Storage and Analytics

Welcome Cocktail Reception & Registration


Breakfast Buffet

MondayKeynote Presentation

close Digital Transformation – Six Steps to Success

CIO Leadership & InnovationHitachi - SVP, Practice Lead

Digital transformation – driving operational improvements in your physical value stream using connected data from your digital value stream – is delivering unprecedented value across industries to those with a clear road map. In fact, a recent Harvard Business School report shows that companies that embrace digital transformation attain significantly better gross margins, earnings and net income than those that don’t. What’s more, those digital leaders are not spending much more on IT than laggards because the big investments have already been made. The challenge is knowing how to connect the data from the digital value stream to drive continuous improvement with real-time metrics and predictive analytics. No matter where you are on the journey of digital transformation – these six steps can help you connect your systems to drive new levels of productivity, profitability and value across your business.

Key Takeaways:

  • Learn how to connect your physical and digital value streams to create near real-time operating systems.
  • Identify areas of variation across the physical value stream that can be supported by better data and real-time analytics.
  • Gain knowledge through strategic partnerships with digital leaders to accelerate your journey to unlocking more organizational value.


Stephen Engel
SVP, Practice LeadHitachi

Targeted Research Meetings

Expo Hall
MondayBreakout Presentation

close Connecting the Healthcare “Internet of Things” (IoT) through Information Logistics (The Internet of Data)

Data Management – Strategy for Storage and AnalyticsNorthrop Grumman - CTO

Advances in hybrid computing environments, data management frameworks, mobile capabilities, security protocols, and analytics platforms make information logistics a necessary and important capability for every organization. The promise of IoT analytics offers timely medical delivery capabilities while addressing data management issues, security and privacy concerns, and computing and analytical options.

Key Takeaways:

  • Why IoT analytis is a key capability for large enterprises with remote, mobile staff
  • How the latest technologies in computing – cloud, edge, device, on-premise – are facilitating the IoT
  • Data, identity, network security and data pivacy concerns remain critical
  • Developing a strategy and architecture that fits the operations model is a key step to success


Rafael Diaz
CTONorthrop Grumman
MondayBreakout Presentation

close Hidden Secrets of a Breach That Every Leader MUST Know

Cyber Security[24]7 - Chief Information Security Officer & Vice President Internal Audit

Every leader prepares for the worst and hopes for the best. With a cyber breach, you need more than preparation. You need true experience on your side. A cyber breach is the wrong time to learn. This presentation will highlight what to expect and have to come out on top.

Key Takeaways:

  • Know what questions to ask and when
  • Learn your stakeholders, partners, and distractors
  • Learn why communication is your biggest challenge
  • Learn how to lead alpha co-workers during this challenging time


Edward Contreras
Chief Information Security Officer & Vice President Internal Audit[24]7
MondayBreakout Presentation

close Autonomous Cyber Defense: AI and the Immune System Approach

Cyber SecurityDarktrace - Director of Sales

From insiders to sophisticated external attackers, the reality of cyber security today is that the threat is already inside. Legacy approaches to cyber security, which rely on knowledge of past attacks, are simply not sufficient to combat new, evolving attacks, and no human cyber analyst can watch so much or react quickly enough. A fundamentally new approach to cyber defense is needed to detect and respond to these threats that are already inside the network – before they turn into a full-blown crisis. Self-learning systems represent a fundamental step-change in automated cyber defense, are relied upon by organizations around the world, and can cover up to millions of devices. Based on machine learning and probabilistic mathematics, these new approaches to security can establish a highly accurate understanding of normal behavior by learning an organization’s ‘pattern of life,’. They can therefore spot abnormal activity as it emerges and even take precise, measured actions to automatically curb the threat. Discover why autonomous response and machine learning is the future of defense and how the ‘immune system’ approach to cyber security provides complete network visibility and the ability to prioritize threats in order to better allocate time and resources.

Key Takeaways:

  • How new machine learning and mathematics are automating advanced cyber defense
  • Why full network visibility allows you to detect and autonomously respond to threats
  • How smart prioritization and visualization of threats allows for better resource allocation and lower risk
  • Real-world examples of unknown threats detected by ‘immune system’ technology


Georgiana Wagemann
Director of SalesDarktrace
MondayBreakout Presentation

close Accelerating Digital Transformation with Collaborative Communications

Cloud StrategyRingCentral - SVP of Cloud Operations

Digital transformation is about meeting the needs of today’s modern business. The new workforce is increasingly mobile, global and distributed and is putting requirements on companies to support their on-the-go lifestyle. Discover how building a cloud ecosystem of integrated applications drives the speed, agility and data insights you need to generate meaningful business outcomes. With the right solutions in place, you can empower employees to work anytime, anywhere and on any device using the modality of their choice – whether online chat, video meetings or voice communications.

Key Takeaways:

  • Find out how you can unify your collaboration tools into one, single cloud-based platform
  • Learn how to empower employees to work anytime, anywhere and on any device
  • Hear how building a cloud ecosystem of integrated applications can cut costs while driving meaningful business outcomes


Curtis Peterson
SVP of Cloud OperationsRingCentral
MondayBreakout Presentation

close The Cloud: A Survival Guide

Cloud StrategyAshley Furniture Industries - Director of IT Operations

The word “cloud” was a wise marketing choice – it implies abstraction and simplicity. And your migration to the cloud certainly almost always starts that way. But how do you maintain the same level of success as complexity increases and the cloud providers continue to unleash new features at a frantic pace? I have helped four companies migrate to the cloud, and I will share my experiences in terms of what worked well and what I learned NOT to do.

Key Takeaways:

  • How to Keep Your Head Above Water
  • Security – Not an Afterthought
  • Migration Options
  • Real Life Experiences


Jeffrey Fudge
Director of IT OperationsAshley Furniture Industries
MondayBreakout Presentation

close Life After an Anonymous Attack on My City

Cyber SecurityCity of Fort Lauderdale - CTO

The city of Fort Lauderdale, Florida was hit by an Anonymous denial-of-service attack in December 2014 and was forced to immediately upgrade computer systems to thwart any potential future attacks.The city quickly spent $430,000 upgrading computer security systems to mitigate vulnerabilities it had previously identified. While the attack itself did not cost the city this money, it expedited the timeline for these necessary system upgrades. A complete A-Z approach for a new security awareness program was created.

Key Takeaways:

  • Even if sensitive information isn’t compromised, there can be political fallout from such an attack
  • If you’re aware of vulnerabilities that need to be remedied “when the budget allows,” would-be attackers will be too
  • A security strategy for a new division
  • How the city has changed its ways – both technologically, and behaviorally, in the time since


Michael Maier
CTOCity of Fort Lauderdale

close What’s Next for MFA? Authentication Challenges, Trends, and Tips

Cyber SecurityWatchGuard Technologies, Inc - Director of Authentication

MFA is invaluable in preventing unauthorized access to sensitive data – and the headline-making breaches that often result. However, conventional MFA is difficult to deploy, time consuming to manage, and often frustrating to use. Looking to the future, how do we make MFA adapt, not users?

Join WatchGuard’s Director of Authentication as he dives into key trends impacting authentication now, and what’s next for MFA.

Key Takeaways:

  • Learn about the current challenges and trends impacting multi-factor authentication
  • Hear key tips for deploying effective, easy MFA at your business
  • See a password hack in action – and how to prevent it


Alexandre Cagnoni
Director of AuthenticationWatchGuard Technologies, Inc
MondayBreakout Presentation

close Unlocking the mysteries of common sense data security implementation a.k.a. don’t be that annoying guy!

Cyber SecurityRockefeller University - CISO

Data security controls are critical to protect valuable information assets; however, they are only effective if users actually implement them. This presentation will describe techniques to implement security policies while still maintaining positive relationships with your end-users. Choose security controls wisely and make them count!

Key Takeaways:

  • Practice what you preach
  • Don’t be intimidated by information security or ease-of-use
  • Know your organization, its usage patterns and culture in order to determine what they consider acceptable
  • Be able to switch roles from guru technician to non-techie end-user


Marty Leidner
CISORockefeller University
MondayBreakout Presentation

close Leveraging Analytics for Growth

Data Management – Strategy for Storage and AnalyticsGeorgia Aquarium - VP of IT

Ranked the number one Aquarium in the United States by TripAdvisor, Georgia Aquarium will serve more than 2.4 million guests this year. Since the aquarium’s mission of self-sufficiency generates just 10% of its budget from fund-raising, it manages for growth by leveraging data for crowd management, attendance forecasting and to measure guest sentiment and satisfaction. Join us to learn more about their data journey, and how they are now embarking on revenue management and price optimization using data.

Key Takeaways:

  • Analytics once reserved for Industries like financial services are now being used in many industries
  • Analytics is as much about the journey as the destination
  • Results of projects can be measured by Revenue Growth


Beach Clark
VP of ITGeorgia Aquarium
MondayBreakout Presentation

close Privileged Access on 500,000 endpoints? 5 lessons learned

Cyber SecurityRemediant - CRO

Rolling out Privileged Access Management to more than half a million servers, workstations and VMs has resulted in some lessons well learned. Join us for this interactive session to learn the top 5 best lessons learned through hands-on rollouts at organizations ranging from small non-profits to mega Fortune 100 companies. We guarantee you will walk away with information that can save your next PAM project… or maybe rescue your current PAM implementation!

Key Takeaways:

  • Privilege Access Remains the #1 Concern for Organizations
  • Gain visibility and transparency into where access is
  • Create Zero Trust without agents-on prem and in the cloud
  • Deployment doesn’t have to be hard


JD Sherry
MondayBreakout Presentation

close CIO, CDO, and CMO: Managing Relationships, Maintaining Relevance and Preparing for Change

CIO Leadership & InnovationAlain Pinel Realtors - VP Digital Innovation & Technology

Who owns what within an organization, and what should we be doing to fully realize our leadership responsibilities and potential? Changing organizational landscapes have brought confusion and frustration to all three positions- is there a need for them all? If so, how do we maintain harmony and efficiency.

Key Takeaways:

  • How to own digital decision making
  • How to maintain relevance in a landscape of native digital fluency
  • How to balance security with compatibility and innovation
  • How to foster a collaborative environment with the CMO


Zane Burnett
VP Digital Innovation & TechnologyAlain Pinel Realtors

close Securing Your Environment.....One Device at a Time

University of Mississippi - CIO

Securing Your Environment…..One Device at a Time

In an institution where academic freedom prevails, implementing security changes that are a necessity these days can prove challenging across numerous fronts as they are seen as limiting the ability of the individual to succeed in their mission. This presentation will share ideas that have proven successful through communication, conversation and significant buy-in which mentally on-boards the constituents after which the virtual/physical changes are experienced.


  • Defining the approach to justify the changes
  • Helping the constituents understand the objective
  • Executing the changes toward a successful outcome


Nishanth Rodrigues
CIOUniversity of Mississippi

close The Future of SD-Wan

Cato Networks - Regional Sales Director

SD-WAN is a new and exciting opportunity to transform enterprises costly and rigid MPLS-based wide area networks (WAN). It promises to make the WAN more affordable and agile, boost capacity, and improve resiliency. But, SD-WAN goes far beyond replacing MPLS. It can optimize global connectivity, streamline network security, and seamlessly integrate cloud resources and mobile users into a simple coherent network.

Key Takeaways:

  • The requirements for full WAN transformation when business applications have moved to the cloud and need to be accessed from anywhere
  • The security challenges facing organizations with distributed locations, cloud applications, and mobile users.
  • How the convergence of edge SD-WAN, a global backbone, and firewall as a service enables you to do more with less, and reduce costs, complexity, and risks
  • Real-life examples and case studies of how enterprises of all sizes use Cato Networks to securely connect their global and regional locations, mobile users, and cloud resources.


Jack Dolan
Regional Sales DirectorCato Networks
MondayBreakout Presentation

close Machine Learning for Dev Teams

DevOps StrategyEurofins DMS - CTO

From predictive analytics to chatbots to security, machine learning is everywhere – except for your company… So how does a mid-market CIO bring machine learning into their enterprise? In this talk, we will explore how one can leverage the latest tools to turn machine learning into just another dev practice.

Key Takeaways:

  • Much like the cloud a decade ago, machine learning can no longer be ignored by forward-thinking CIOs
  • CIOs can help their companies gain a strategic advantage by identifying applications for AI/ML
  • It is no longer necessary to build out a data science team to begin to leverage AI/ML
  • ML can become just another tool in your dev team’s toolbelt


Raphael Morozov
CTOEurofins DMS



Targeted Research Meetings

Expo Hall
MondayBreakout Presentation

close Building a DevSecOps Culture

DevOps StrategyYello - CIO

We’ve heard a lot about the benefits of DevSecOps recently, but how do you build a culture that leverages the union of security, operations, and development effectively? My talk will explore Yello’s approach to DevSecOps, and I’ll also talk about how a new breed of technology companies leverage the combined model to build high-quality software quickly and securely.

Key Takeaways:

  • DevSecOps is the new DevOps
  • Security is everyone’s responsibility
  • Building a DevSecOps culture requires both and top down and bottom-up approach


Jason Allen
MondayBreakout Presentation

close SD-WAN Explosion: The Emerging Solution for a Cloud-First Enterprise

Cloud StrategySilverPeak - Lead Global Enterprise Architect for Dover Corporation

As enterprises continue to adopt cloud infrastructure and applications, exploding traffic levels and changing traffic patterns are driving them to re-evaluate their WANs. The WAN is a key enabler in transforming businesses to the new digital economy, but the current WAN infrastructure based on conventional routers was not designed for the cloud. To keep branch offices protected from threats, all web-bound traffic is backhauled to headquarters-based security services, which negatively impacts cloud application performance. As a result, enterprises are faced with architectural complexity, inconsistent application performance, and security challenges for applications and users.

Dover Corporation is a global manufacturing company with 22 Operating companies across five Continents.  Hear from Bill Wolfe, Lead Global Enterprise Architect for Dover Corporation, on how they incorporated SD-WAN to simplify and automate their network, integrate new sites easily, have better visibility and save substantially on connectivity costs as part of their goal to improve business operations and become a cloud-first enterprise.

Bill believes businesses should embrace technology for the purpose of improving business operations, providing a platform for competitive advantage and delivery of new service and product offerings.  Learn how Dover Corporation embraced SD-WAN and the results they are getting from the investment.


William H. Wolfe II
Lead Global Enterprise Architect for Dover CorporationSilverPeak

close GDPR: What Now?

CIO Leadership & InnovationInfo-Tech Research Group - Senior Consulting Analyst

Having passed the May 25th deadline, your organization-wide panic may have subsided but the compliance requirements remain, what now? Despite a delay in imposed fines, the consequences of non-compliance with the General Data Protection Regulation (GDPR) will continue to be dictated by channel partners, customers, and vendors – across all industries. Understand how your organization can develop a right-sized approach to compliance, that meets all stakeholder (including regulators’) requirements.

Next, look beyond GDPR, and you’ll find a myriad of new privacy regulations (hint: CaCPA) that add additional complexities to your existing privacy program. This presentation will help you understand the evolving privacy landscape and the alignment between new privacy regulations and GDPR.


Rita Zurbrigg
Senior Consulting AnalystInfo-Tech Research Group
MondayBreakout Presentation

close Building a Sustainable Cyber Program

Cyber SecurityMastercard - VP, Big Data Security

Building a Sustainable Cyber Security Program – Cyber Security is at the top of mind of executives, shareholders and government officials. Enterprises can no longer put of creating a cyber program. Programs do not need to be complicated nor cumbersome to manage. Nick will talk about how enterprises need work within a framework an follow 5 key principles to create a sustainable program which will not bury and organization. The session will show how to build trust and confidence with your cyber program.

Key Takeaways:

  • Top 5 things to do to create a sustainable program
  • Key cyber metrics to track
  • Key questions your program must answer for your execs
  • Why a framework is important and how to use it


Nick Curcuru
VP, Big Data SecurityMastercard
MondayBreakout Presentation

close Finding, Retaining and Growing IT Talent

CIO Leadership & InnovationOptima Healthcare Solutions - CIO

The technology sector is outperforming the rest of the U.S. economy, with unemployment rates at roughly 2.5%, according new data from the U.S. Bureau of Labor Statistics—compared to 4.1% national average. Today’s technology professionals are benefiting. With greater opportunity, they’re actively seeking out the best jobs to match their skills. As an employer, it’s never been harder to find and retain the best talent. Are your best IT resources on the verge of leaving? If they do leave unexpectedly, how will you deliver on critical IT projects? And once you find quality staff, how do you motivate them to achieve their fullest potential, so you can grow a successful team?

Key Takeaways:

  • Formalize an internal referral program – Employee referrals continue to be employers’ top source of hires, delivering more than 30 percent of all hires overall in 2016 and 45 percent of internal hires – Source: Society for Human Resources Manager (SHRM)
  • Think local, hire global – Does it matter where your IT team is? Not all IT orgs are hiring overseas. Rural sourced options continue to exist with talent in more affordable markets like Alabama, Oklahoma, Tennessee, and Michigan.
  • Growing IT Talent – The reduces overall attrition. This is important when digital transformation projects take 18-36 months. Losing top talent during one of these projects can delay the project and increase costs.
  • Dedicated Mentoring – Set dedicated office hours for your team. Make sure those time slots are dedicated each week.


Jason James
CIOOptima Healthcare Solutions
MondayBreakout Presentation

close How to Maximize your ERP Selection and Negotiation

CIO Leadership & InnovationTechnology Evaluation Centers - VP of Software Selection

Selecting the right ERP solution is key to improve business productivity and make the growth plan viable. As a Global Consulting and Advisory firm with 25 years in the market, TEC prepared a presentation that will help any company in a process of selecting a software solution that will fit better in the company’s needs and support the growing projects.

Key Takeaways:

  • Use an structured easy to follow approach to Software Selection
  • Get hands-on expert advice to lead, coach and support your evaluation
  • Find out how to score the deciding factors in your evaluation
  • Build consensus among the stakeholders and an audit trail, leveraging the information for your selection and negotiation


Michael Thaw
VP of Software SelectionTechnology Evaluation Centers

close A New Approach to Email Security for Office 365

Vade Secure - Director of Corporate Markets

For hackers, Office 365 is the new black!

Because a simple set of Office 365 credentials can give you access to sensitive documents, applications and confidential business information, Office 365 is now the go-to place for cybercriminals looking to make a fast and high profit.

Each day these hackers implement new and always more creative phishing and spear-phishing attacks, that easily bypass the traditional email security solutions.

Discover what their techniques are, and learn what you can do to prevent cybercriminals from breaking into your organization with just a single email.

Key Takeaways:

  • Office 365
  • Email Security
  • Phishing
  • Cyber Security


James Duff
Director of Corporate MarketsVade Secure
MondayBreakout Presentation

close A Shifting Focus to a Data-Centric Security

Cyber SecurityCity of Riverside - ISO

Information is at the heart of everything CIO’s do, yet we often forget what we’re trying to protect and focus on specific tools, losing sight of our crown jewels and leading to major gaps in our defense strategies. And even with programs and protocols in place, if users (employees) do not understand cybersecurity is an integral job responsibility, the enterprise is at risk.

Key Takeaways:

  • Data life cycle management
  • Data Defense in depth
  • Business engagement
  • Risk management


George Khalil
ISOCity of Riverside
MondayBreakout Presentation

close Putting the Human Back Into Network Security

Cyber SecurityForcepoint - Director of Network Security Architects

Network security technology is shifting from just being a way to keep threats out of your network to providing operational insights that can make your people more effective and your organization more efficient. With the growth of unmanaged devices like phones, tables, appliances and Internet of Things (IoT) gadgets, the network often is the only place where sensing and enforcement can be done consistently.

Key Takeaways:

  • Learn about advances in behavioral monitoring, analytics and machine learning enabling security to go beyond a threat-centric approach
  • How to addres the fuzzy “gray” area where today’s greatest productivity and greatest risks are found.
  • How network security products are making it easier to understand people’s intent so that you can take a modern risk-adaptive approach connecting and protecting your people and data


Michael Knapp
Director of Network Security ArchitectsForcepoint
MondayBreakout Presentation

close Strategic & Tactical Alignment with Your Business Partners - A Killer Standard Deck/Process

CIO Leadership & InnovationWestmoreland Coal Company - VP of IT

CIO stands for “career is over” for those IT leaders who do not proactively engage their business partners in a holistic manner aligning strategy, projects, priorities, incidents, customer satisfaction, etc. At this session we will walk through an actual tool and standard deck for you to take back and start using.

Key Takeaways:

  • Standard deck for “account management”
  • Recommended KPIs
  • Recommended project prioritization
  • Recommended resource allocation schema


Adam Bricker
VP of ITWestmoreland Coal Company
MondayBreakout Presentation

close Experiences Building an Information Security Program in 180 Days

Cyber SecurityNorth Carolina A&T State University - CIO, Vice Chancellor of IT

In January 2018, NC A&T launched a major IT Development Initiative that will culminate in a new Information Security Program. The initiative includes new policies and operating standards, organization of a governance structure, over two dozen projects related to cybersecurity, major changes in the management of technology across campus, and realignment of campus IT resources. The new program will implement a continuous improvement cycle to ensure sustained efforts to manage and improve information security, and to comply with accreditation standards and system policies. NC A&T’s CIO will present the initiative from its inception and progress made into the fall.

Key Takeaways:

  • Information Security Program structure and organization
  • Summary of organizational issues affecting information security
  • Information security education for the executive committee


Tom Jackson
CIO, Vice Chancellor of ITNorth Carolina A&T State University

close Innovating at Scale with On-Demand Talent

CIO Leadership & InnovationTopcoder - VP of Security

It’s easy to talk about innovation, and harder to get big ideas off the ground. Without access to the right talent, businesses fail to use the most in-demand technologies to their advantage. Learn how to make the gig economy work for you, innovate effectively, and get to market faster.

Key Takeaways:

  • Make better use of today’s most in-demand technologies
  • Understand how to leverage crowdsourcing for on-demand talent
  • Incorporate innovation into your everyday design and development projects


John Wheeler
VP of SecurityTopcoder

Industry Dinner


Breakfast Buffet


close Don’t Forget the Basics While Chasing the Shiny Objects in Defending Against Today’s Cyber Threats

CIO Leadership & InnovationBlue Cross Blue Shield - Vice President and Chief Information Security Officer (CISO)

Cybersecurity breaches continue to dominate the headlines, in spite of investments made to defend enterprises. Past several years saw a sharp
rise in the number and severity of breaches, and emergence of threat actors and groups who appear to specialize in targeting specific industries.
This presentation explores some high-profile threats while highlighting little known details about methods and tactics used, in an effort to
explain the discrepancy between security mind-share, and the apparent lack of effect.


Petar Naumovski
Vice President and Chief Information Security Officer (CISO)Blue Cross Blue Shield

Targeted Research Meetings

Expo Hall
TuesdayBreakout Presentation

close Practical Methods for IT to Truly Connect With the Business

CIO Leadership & InnovationPacific Drilling - VP of IT

CIO’s very often talk about the real or perceived gap between IT and the business. This discussion talks about the indicators and practical steps CIO’s can take to begin to eliminate that gap.

Key Takeaways:

  • Real business problems cannot be solved sitting in the corporate office
  • Understand the three basic areas of IT and know what areas you should focusing on: 1. Basic IT 2. IT in use 3. Disruptive IT
  • How your IT organization identifies themselves
  • Common obstacles to be aware of and how to address them


Corey Thompson
VP of ITPacific Drilling
TuesdayBreakout Presentation

close The Nine Cybersecurity Habits

CIO Leadership & InnovationSouthern Methodist University - CSO

Cybersecurity is a people problem, not a technology problem. To change behaviors, we need to understand the underlying habits that govern our responses. This presentation will explore nine key cybersecurity habits, and will look at how you can use those habits to focus on changing behaviors in your security training.

Key Takeaways:

  • Security is a behavior, not a skill
  • We need different tools to influence people: Psychology, Neuroscience, Economics
  • Changing habits requires time and consistency


George Finney
CSOSouthern Methodist University
TuesdayBreakout Presentation

close Trends in Data Management

Data Management – Strategy for Storage and AnalyticsDruva - VP Product & Alliances

The data landscape has changed, leaving organizations to build data management strategies that must withstand increasing scrutiny. Critical data must be protected from loss or breach, while data privacy regulations, make it even more critical that organizations understand what data they have and be able to make actionable decisions regarding it. This creates pressure for IT teams, which are already struggling to meet the myriad of needs posed by the different types of data distributed across organizations. Join us for an informative session on the latest trends in Data Management & Protection. Share best practices & learn how organizations addressing the challenges of:

  1. Multiple, disparate data sources
  2. Exponential data growth
  3. Today’s complex data environment

Key Takeaways:

  • How companies are using data management and solve for privacy challenges
  • Strategies for GDPR compliance and other upcoming regulations
  • How to manage data across heterogeneous environments


Dave Packer
VP Product & AlliancesDruva
TuesdayBreakout Presentation

close CIO: Driving Marketing Technology Innovation

CIO Leadership & InnovationNewDay USA , LLC - Chief Digital Officer

The biggest challenges is that the role of technology is evolving and marketers are making decision on technology as well. What should CIO’s consider and how they should partner with their marketing and digital team to help organizations succeed.

Key Takeaways:

  • Partnership of the CIO with the CMO and CDO
  • Technologies and processes that are helping business grow
  • Organization proceses and team that will help CIOs succeed
  • Thinking like a marketer and leading the charge with innovation


Gaurav Bhatia
Chief Digital OfficerNewDay USA , LLC

close Unified Access Security

Cyber SecurityDuo Security - Solutions Engineer

The perimeter-based security approach of the last century is no longer adequate for securing the modern enterprise. Today, organizations must secure a mobile workforce that uses a mix of corporate-owned and personal devices to access cloud-based applications and services, often from outside corporate networks. The zero trust access model delivers that security without cumbersome and antiquated technologies such as VPN and MDM.

Attend this session to learn how the zero trust access model works, how leading organizations such as Google use this approach to secure access to their critical applications and data, and how you can implement this model in your organization.

Key Takeaways:

  • Why the traditional perimeter-focused security model won’t meet the needs of most modern organizations
  • How a zero-trust security model can overcome these challenges
  • How you can incorporate this approach into your existing architecture without starting from scratch



Karl Lewis
Solutions EngineerDuo Security
TuesdayBreakout Presentation

close Ransomware: A HigherEd Personal Testimony

Cyber SecurityWallace State Community College - Information Technology Director

Ransomware is now a $2 billion-per-year criminal industry. Prevention has become apart of a CIOs daily activities. What happens when you find yourself a Target? What happens when you fall Victim? Hear a personal testimony of a University that has walked through that experience and lived to tell the story.

Key Takeaways:

  • Why are HigherEd Institutions Targeted?
  • Tips and Tricks in the aftermath.
  • No cost Prevention practices.


Kirk Nugent
Information Technology DirectorWallace State Community College
TuesdayBreakout Presentation

close Digital Transformation and Emerging Technologies - Hype or Reality?

CIO Leadership & InnovationBerkley Risk Administrators Company, LLC - CIO

You’ve heard it – Digital Transformation and Emerging Technologies such as Blockchain, AI, Deep Learning, IoT, RPA, Cloud, etc. You may also heard the phrase “Be the Disruptor not the Disrupted”. What does all this mean? Hype? Of course it’s a hype for consulting companies like Accenture, IBM and hundreds of other companies to thrive, survive, or stay relevant. Reality? Yes, it’s a reality for companies like the Fintechs, Insuretechs, and FAANG since it’s who they are and it’s in their DNA. What about most of us?

Key Takeaways:

  • Understand the hypes
  • Understand the realities
  • Understand the technologies
  • Understand what are the potential next steps


William Tran
CIOBerkley Risk Administrators Company, LLC



Active IT pros help us design a relevant and 100% peer-led educational program. Members from the 2018 series included:

Steering Committee Members

Mike Maier CISO
City of Fort Lauderdale
Trina Spalding IT Security Officer
Hilliard Lyons
Esteban Velez VP of IT & Cyber Security (CIO)
Classic Hotels & Resorts
Jon Dack CIO
Toast, Inc.
David Esping CTO
Ozarks Technical Community College
Ilan Zachar CTO
Carr Properties
Nishanth Rodrigues CIO
University of Mississippi
Vennard Wright CIO
Washington Suburban Sanitary Commission


Over the year’s we’ve help thousands of senior level IT executives connect with peers in different industries to discuss their top-of-mind directives. Delegates from the 2018 series included:

Attendee Testimonials

"The one-on-one meeting interactions with the vendors and the opportunity to network with my counterparts has helped my professional network and career. The Educational Sessions provided me with insights on how other organizations are using technology and how I can improve my company’s—while helping to enhance our spending. I rate the Quartz Events experience 5-stars."

Attendee List


CIO VISIONS is the IT industry’s fastest growing event, quickly establishing a reputation as the boiling pot of information, ideas and solutions. Sponsors from the 2018 series included:

Exhibitor Testimonials



"CIO VISIONS continues to attract an array of bright-minded and forward thinking IT professionals, and to showcase impressive industry thought-leaders – benefits every conference goer looks to realize. The unique networking opportunities combined with the stimulating atmosphere make this event one in a class of it’s own."

Exhibitor List


North America's leading IT executive-level event plays host to over 500 attendees each year. In the last decade, we’ve produced 15 large scale CIO VISIONS summits across America.


Here is a quick FAQ to help you get started. For more information contacts us, we're happy to talk to you.

Our Team

Matt Velaer

Conference Director
(424) 334-5145
Send Message

Marin Silvers

Sponsor Relations
(424) 334-5141
Send Message

Krizzle Silva

Attendee Relations
(424) 334-5159
Send Message

Carlos Rodriguez

Conference Producer
(424) 389-3287
Send Message

Shanna Delfs

Account Executive
(434) 334-5161
Send Message


Your full access conference pass includes overnight accommodations, meals and cocktail receptions.

The Hotel

The Red Rock Casino Resort & Spa, Las Vegas

Featuring luxurious hotel rooms and suites, three-acre pool backyard, sensuous spa treatments, delectable dining and exciting casino gaming–all overlooking the stunning Red Rock Canyon National Conservation Area.

Inspired by the natural beauty of the neighboring mountains, Red Rock Casino Resort & Spa, Las Vegas & Spa pays homage to the elegant mid-century modern resorts that made Las Vegas famous. Spacious accommodations are designed with modern contemporary décor and a wealth of amenities like no other hotel rooms in Las Vegas, and include a 42-inch HD TV, VOIP internet phones, an automated, fully-stocked private bar and in-room safe.
Accommodations must be booked through the conference organizers and not through the venue directly. To book your stay please contact:
The closest airport to the hotel is McCarran International Airport (LAS). Red Rock does operate a complimentary shuttle between McCarran Airport and the hotel. You can see the shuttle schedule here. Taxis are also available at the airport and cost approximately $50 each way.
Red Rock Resort, Casino & Spa | 11011 W. Charleston Blvd. Las Vegas, NV 89135