Renaissance Schaumburg, Chicago

Invitation-only means an exceptional experience, on us

Coordinated by your personal concierge, a schedule is tailored to your professional goals and company priorities.

assignment_ind

Complimentary Pass

Inventive learning, renowned speakers, executive networking. All free to you.

flight

Travel Reimbursement

$200 of your travel is covered if you’re trekking over 100 miles to attend.

local_hotel

Accommodations

Your first night’s stay is on us and a discounted rate is available thereafter.

restaurant

5 Star Catering

All of your meals and libations are complimentary throughout the event.

Join IT’s Distinguished Upper Tier

A curated audience reserved for the senior level of the Fortune 500 puts you in exceptional company.

150+

Affluent Peers

Meet the people who are just as invested in leveraging technology as you are.

20+

Influential Leaders

Learn valuable strategy components from today’s very best.

40+

Proven Solutions

Meet industry leading solution providers, hand picked for your priorities.

1.5K

Connections

Take this unprecedented opportunity to connect with high profile execs.

Take this unprecedented opportunity to connect with high profile execs.

Based on your specific areas of responsibility, challenges and interests we’ll craft a personal agenda that paves your path to success.

3

Days of Insight

Jump in the discussion through focused educational sessions and networking opportunities.

40

Innovative Sessions

Keynotes, case studies, plenary sessions, industry panel discussions, and more.

6

Networking Opportunities

Tie into contemporaries and mentors interested in the same avenues of opportunity as you.

10

Research Meetings

Meet one-on-one with executives delivering on the solutions that are shaping the industry.

play_circle_outline Watch Video

Peer-Led Education

The CIO Visions Steering Committee consists entirely of your contemporaries, meaning we tackle the themes that have profound significance to your performance and your company.

High Profile Speakers

Hear strategic endeavors and skillful insights from 40+ IT leaders as they make way in today’s changing landscape. Our Fall 2019 speaker line-up includes:

CIO VISIONS Leadership Fall Summit View More

Mike House

CIO

Piedmont Healthcare

CIO VISIONS Leadership Fall Summit View More

Steve Maris

Director IT

Chicago Police Department

CIO VISIONS Leadership Fall Summit View More

Shamla Naidoo

Chief Information Security Officer

IBM

CIO VISIONS Leadership Fall Summit View More

Sulabh Sood

Director - Program Management

GE (General Electric)

CIO VISIONS Leadership Fall Summit View More

Jason James

CIO

Net Health

CIO VISIONS Leadership Fall Summit View More

Travis Cain

Director Business Architecture

Dell Technologies

CIO VISIONS Leadership Fall Summit View More

Colin Marlaire

Chief Technology and Learning Officer

Northcentral University

CIO VISIONS Leadership Fall Summit View More

Jonathan Chow

SVP & CISO

Live Nation Entertainment

CIO VISIONS Leadership Fall Summit View More

Rizwan Patel

Senior Director of IT

Caesars Entertainment

CIO VISIONS Leadership Fall Summit View More

Lee Weisenberger

Managing Director of IT

Universal Logistics

CIO VISIONS Leadership Fall Summit View More

Mike Hendrickson

Vice President, Technology & Developer Products

Skillsoft

CIO VISIONS Leadership Fall Summit View More

Kirk Nugent

Director of Information Technology

Wallace State Community College

CIO VISIONS Leadership Fall Summit View More

Sean Bryson

Vice President of Solutions & Innovation

Hitachi Consulting

CIO VISIONS Leadership Fall Summit View More

Gautam Gulvady

Interim Chief Information officer (CIO)

International Association of Better Business Bureaus

CIO VISIONS Leadership Fall Summit View More

Bill Balint

CIO

Indiana University of Pennsylvania

CIO VISIONS Leadership Fall Summit View More

Scott Mills

Global Chief Information Officer

World Vision International

CIO VISIONS Leadership Fall Summit View More

Patricia Clay

CIO

Hudson County Community College

CIO VISIONS Leadership Fall Summit View More

Vinod Vasudevan

CTO

Paladion Networks Private

CIO VISIONS Leadership Fall Summit View More

Tommy Gardner

Chief Technology Officer

HP Federal

CIO VISIONS Leadership Fall Summit View More

Rahul Vijay

Head of Global Connectivity

Uber

CIO VISIONS Leadership Fall Summit View More

Elliott Franklin

Director of IT Security

Loews Hotels

CIO VISIONS Leadership Fall Summit View More

John Colbert

Program Director, Watson Supply Chain Offering Management

IBM

CIO VISIONS Leadership Fall Summit View More

Ranjan Sinha

Vice President of Data Platform Engineering & DevOps

IBM

2019 Full Agenda

Your personal concierge will craft a custom schedule based on your interests and priorities. View the complete agenda below.

Reset Filter
CIO Leadership and Innovation
Cyber Security
Data Management: Strategy for Storage and Analytics
DevOps Strategy
Cybersecurity
Digital Transformation
Artificial Intelligence
Staff Training and Retention
SundayNetworking

Welcome Cocktail Reception & Registration

MondayNetworking

Breakfast Buffet

MondayKeynote Presentation

close Digital Transformation – Six Steps to Success

IT LeadershipHitachi Consulting - Vice President of Solutions & Innovation

Digital transformation – driving operational improvements in your physical value stream using connected data from your digital value stream – is delivering unprecedented value across industries to those with a clear road map. In fact, a recent Harvard Business School report shows that companies that embrace digital transformation attain significantly better gross margins, earnings and net income than those that don’t. What’s more, those digital leaders are not spending much more on IT than laggards because the big investments have already been made. The challenge is knowing how to connect the data from the digital value stream to drive continuous improvement with real-time metrics and predictive analytics. No matter where you are on the journey of digital transformation – these six steps can help you connect your systems to drive new levels of productivity, profitability and value across your business.

Key Takeaways:

  • Learn how to connect your physical and digital value streams to create near real-time operating systems.
  • Identify areas of variation across the physical value stream that can be supported by better data and real-time analytics.
  • Gain knowledge through strategic partnerships with digital leaders to accelerate your journey to unlocking more organizational value.

Speaker

Sean Bryson
Vice President of Solutions & InnovationHitachi Consulting
Monday

Targeted Research Meetings

Expo Hall
MondayBreakout Presentation

close We are lost in cybersecurity, what we need is a simple map!

Risk & ComplianceLoews Hotels - Director of IT Security

We are all tired of talking about cybersecurity and how we are losing the battle against the attackers. It’s like we are lost without a map. Instead of rushing to adopt the latest shiny security tool, we need to take a step back and adopt a standardized security framework.

 

Key Takeaways:

  • The NIST CSF uses a common business language to address cybersecurity concerns to leadership
  • Using a standard, the industry-recognized framework allows consistent program maturity mappings to budget requests.
  • Following the NIST CSF, you are demonstrating “due care” which may reduce claims of negligence or inattention following a breach
  • Easily maps to compliance and regulatory requirements reducing unnecessary or redundant efforts

Speaker

Elliott Franklin
Director of IT SecurityLoews Hotels
MondayBreakout Presentation

close Autonomous Cyber Defense: AI and the Immune System Approach

Cyber SecurityDarktrace - Director of Sales

From insiders to sophisticated external attackers, the reality of cyber security today is that the threat is already inside. Legacy approaches to cyber security, which rely on knowledge of past attacks, are simply not sufficient to combat new, evolving attacks, and no human cyber analyst can watch so much or react quickly enough. A fundamentally new approach to cyber defense is needed to detect and respond to these threats that are already inside the network – before they turn into a full-blown crisis. Self-learning systems represent a fundamental step-change in automated cyber defense, are relied upon by organizations around the world, and can cover up to millions of devices. Based on machine learning and probabilistic mathematics, these new approaches to security can establish a highly accurate understanding of normal behavior by learning an organization’s ‘pattern of life,’. They can therefore spot abnormal activity as it emerges and even take precise, measured actions to automatically curb the threat. Discover why autonomous response and machine learning is the future of defense and how the ‘immune system’ approach to cyber security provides complete network visibility and the ability to prioritize threats in order to better allocate time and resources.

Key Takeaways:

  • How new machine learning and mathematics are automating advanced cyber defense
  • Why full network visibility allows you to detect and autonomously respond to threats
  • How smart prioritization and visualization of threats allows for better resource allocation and lower risk
  • Real-world examples of unknown threats detected by ‘immune system’ technology

Speaker

Georgiana Wagemann
Director of SalesDarktrace
MondayBreakout Presentation

close How new age companies are using Connectivity and IoT as their competitive advantage

Digital TransformationUber - Head of Global Connectivity

In today’s hyperconnected world, connectivity can be a competitive advantage, driving revenues, enabling business objectives and improve bottom lines. Come and learn how connectivity and IoT are being used as a competitive advantage today!

Key Takeaway:

  • Rethink your company as a connected company
  • How simple concepts can have big revenue impacts
  • Insights into how complex and interesting companies run their connectivity

Speaker

Rahul Vijay
Head of Global Connectivity Uber
MondayBreakout Presentation

close Fourth Industrial Revolution and Digital Transformation: Mutually Inclusive new theory of Survival of the Fittest

Digital TransformationGE (General Electric) - Director - Program Management

The world is on the cusp of the Fourth Industrial Revolution or Industry 4.0. It is quite different than the prior three Industrial Revolutions —steam & water power, assembly lines, and computerization, as it will challenge the enterprises on not only their business operations but also on how efficiently they adapt to the evolving human behaviors. This revolution is expected to impact all industries, disciplines, economies and ultimately societies. In this new era of revolution, only those enterprises or people will survive and thrive who will adapt to Industry 4.0 by correctly adopting the Digital Transformation strategies and the technologies such as Artificial Intelligence, Robotics, IOT, Energy Storage, Quantum Computing, Mixed Reality, etc. And this adaption & adoption should happen at the right time in the right manner and using the right methodology.

In this session, we will understand the nuances of Industry 4.0 and Digital Transformation. We will review, the mistakes that companies make while transforming themselves. We will discuss the People, Culture, Process & Technology challenges for successfully implementing Industrial 4.0 and Digital Transformation strategies. And finally, we will discuss the behavioral and human aspects imperative for the successful journey in this new revolutionary era.

Key Takeaways:

  • Learn about the Fourth Industrial Revolution and how it is related to Digital Transformation Strategies.
  • Review the mistakes that companies make while transforming themselves and avoid falling into the quagmire of technical debt, people issues and ultimately failure.
  • Using concepts and case studies, understand how and what types of People, Culture, Process & Technology solutions should be implemented in the enterprises and conglomerates to successfully survive and thrive in the Fourth Industrial Revolution.
  • Learn at an individual level, how we can make professional & personal life successful and happy at all levels by adapting to this new era of Fourth Industrial Revolution & Digital Transformation.

Speaker

Sulabh Sood
Director - Program ManagementGE (General Electric)
MondayBreakout Presentation

close Connecting the Healthcare “Internet of Things” (IoT) through Information Logistics (The Internet of Data)

Data Management: Strategy for Storage and AnalyticsNorthrop Grumman - CTO

Advances in hybrid computing environments, data management frameworks, mobile capabilities, security protocols, and analytics platforms make information logistics a necessary and important capability for every organization. The promise of IoT analytics offers timely medical delivery capabilities while addressing data management issues, security and privacy concerns, and computing and analytical options.

Key Takeaways:

  • Why IoT analytis is a key capability for large enterprises with remote, mobile staff
  • How the latest technologies in computing – cloud, edge, device, on-premise – are facilitating the IoT
  • Data, identity, network security and data pivacy concerns remain critical
  • Developing a strategy and architecture that fits the operations model is a key step to success

Speaker

Rafael Diaz
CTONorthrop Grumman
MondayBreakout Presentation

close Accelerating Digital Transformation with Collaborative Communications

Cloud StrategyRingCentral - SVP of Cloud Operations

Digital transformation is about meeting the needs of today’s modern business. The new workforce is increasingly mobile, global and distributed and is putting requirements on companies to support their on-the-go lifestyle. Discover how building a cloud ecosystem of integrated applications drives the speed, agility and data insights you need to generate meaningful business outcomes. With the right solutions in place, you can empower employees to work anytime, anywhere and on any device using the modality of their choice – whether online chat, video meetings or voice communications.

Key Takeaways:

  • Find out how you can unify your collaboration tools into one, single cloud-based platform
  • Learn how to empower employees to work anytime, anywhere and on any device
  • Hear how building a cloud ecosystem of integrated applications can cut costs while driving meaningful business outcomes

Speaker

Curtis Peterson
SVP of Cloud OperationsRingCentral
MondayBreakout Presentation

close Digitally Transforming Everywhere... All at Once

Digital TransformationDell Technologies - Director Business Architecture

Digital Transformation is the novel use of digital technology to solve traditional problems. These digital solutions enable inherently new types of innovation and creativity, rather than simply enhance and support traditional methods. With a definition like that how could there be any confusion. Why bother? Why Digitally Transform at all? It’s all my “leadership” reads about and they expect me to deliver it. You or your team wants to use modern technologies. Your current tools and processes are holding back your IT Delivery. Pick one reason and make sure it is durable. Do it for your Customers! They need you to do it, even if they can’t explain it. This is about Culture. Are you ready for change?

Key Takeaways:

  • Digital Transformation is about Customers
  • Embracing a Culture of Change
  • It’s still about People………Process and Tools follow

Speaker

Travis Cain
Director Business ArchitectureDell Technologies
MondayBreakout Presentation

close The Cloud: A Survival Guide

Cloud StrategyAshley Furniture Industries - Director of IT Operations

The word “cloud” was a wise marketing choice – it implies abstraction and simplicity. And your migration to the cloud certainly almost always starts that way. But how do you maintain the same level of success as complexity increases and the cloud providers continue to unleash new features at a frantic pace? I have helped four companies migrate to the cloud, and I will share my experiences in terms of what worked well and what I learned NOT to do.

Key Takeaways:

  • How to Keep Your Head Above Water
  • Security – Not an Afterthought
  • Migration Options
  • Real Life Experiences

Speaker

Jeffrey Fudge
Director of IT OperationsAshley Furniture Industries
MondayBreakout Presentation

close USING TECHNOLOGY TO CREATE IMMERSIVE EXPERIENCES FOR VISITORS AND EMPLOYEES

AI and Data Driven ExperiencesCaesars Entertainment - Senior Director of IT

Leverage Technologies like Blockchain, AR, VR, Robotics, Drone Racing, Wearables, IoT, Esports, Facial/Image/Object Recognition and others to create an Immersive Experience for Guests and Employees elevating Customer Experience, Increasing Revenue and Reducing Cost.

Key Takeaways:

  • Enterprise Blockchain Applicability
  • AI Driven Insights – Facial/Image/Object Recognition
  • IoT Driven Food Safety

Speaker

Rizwan Patel
Senior Director of ITCaesars Entertainment
MondayBreakout Presentation

close Applying Digital and Analytics to create value for companies

Digital TransformationInternational Association of Better Business Bureaus - Interim Chief Information officer (CIO)

The digital revolution is ongoing. Having a digital presence is becoming a must for companies and businesses. Value for businesses in the digital era is constantly changing. Tech-enablers such as data, connectivity, storage and the cloud create value in different elements of the value chain for companies and businesses.

Key Takeaways:

  • To capture value, companies need to transform holistically
  • Companies and businesses should adapt their value propositions to manage transitions in an environment of rapid change.
  • Companies should look at tech-enabled transformations for growth and performance improvements
  • Data is a strategic asset in your business.

Speaker

Gautam Gulvady
Interim Chief Information officer (CIO)International Association of Better Business Bureaus
Monday

close Securing Your Environment.....One Device at a Time

University of Mississippi - CIO

Securing Your Environment…..One Device at a Time

In an institution where academic freedom prevails, implementing security changes that are a necessity these days can prove challenging across numerous fronts as they are seen as limiting the ability of the individual to succeed in their mission. This presentation will share ideas that have proven successful through communication, conversation and significant buy-in which mentally on-boards the constituents after which the virtual/physical changes are experienced.

KEY TAKEAWAYS:

  • Defining the approach to justify the changes
  • Helping the constituents understand the objective
  • Executing the changes toward a successful outcome

Speaker

Nishanth Rodrigues
CIOUniversity of Mississippi
MondayBreakout Presentation

close Human Element of Digital Transformation

Digital TransformationNet Health - CIO

All successful digital transformation begins as a cultural transformation. Jason “JJ” James, CIO of Net Health, will discuss the digital transformation that he is driving at Net Health and the impact on culture that he has seen. Attendees will take away actionable ideas for their own IT organizations.

Key Takeaway

  • The human factors involved in digital transformation
  • Understanding how culture drives and influences digital transformation
  • Empowering IT to deliver on digital transformation
  • The realization that digital transformation is ongoing and ever-changing

Speaker

Jason James
CIONet Health
MondayBreakout Presentation

close Using Deep Learning to Secure Endpoints Against Future Threats

Artificial IntelligenceHP Federal - Chief Technology Officer

This talk will cover how to use deep learning or convolutional neural networks to protect against future malware.

Key Takeaways:

  • Understand difference between machine learning and deep learning.
  • Historical progression of signature based search to machine learning techniques to today’s deep learning.
  • How using agents at the end points efficiently protects against AI generated malware.
  • The need for action now against evolving threats.

Speaker

Tommy Gardner
Chief Technology OfficerHP Federal
MondayNetworking

Lunch

Monday

Targeted Research Meetings

Expo Hall
Monday

close GDPR: What Now?

CIO Leadership and InnovationInfo-Tech Research Group - Senior Consulting Analyst

Having passed the May 25th deadline, your organization-wide panic may have subsided but the compliance requirements remain, what now? Despite a delay in imposed fines, the consequences of non-compliance with the General Data Protection Regulation (GDPR) will continue to be dictated by channel partners, customers, and vendors – across all industries. Understand how your organization can develop a right-sized approach to compliance, that meets all stakeholder (including regulators’) requirements.

Next, look beyond GDPR, and you’ll find a myriad of new privacy regulations (hint: CaCPA) that add additional complexities to your existing privacy program. This presentation will help you understand the evolving privacy landscape and the alignment between new privacy regulations and GDPR.

Speaker

Rita Zurbrigg
Senior Consulting AnalystInfo-Tech Research Group
MondayBreakout Presentation

close Your Data is at Risk and Your Employees Don't Know It

Phishing / RansomwareHudson County Community College - CIO

For those of us in non-profit world, particularly, our data is in high demand. Everywhere, budgets are tight. Is your team aware of the danger lurking to steal the personal information and valuable intellectual property that you possess? Learn about our modern cyber landscape, and some methods for changing the risk levels at your institution.

Key Takeaways:

  • Cyber crime is growing worldwide
  • Cyber criminals are determined to get your data
  • Most data breaches have a human cause
  • All organizations can increase their security, step by step

Speaker

Patricia Clay
CIOHudson County Community College
MondayBreakout Presentation

close It’s Not a Project: The Journey to a Holistic IT Security Program

Staff Training and RetentionIndiana University of Pennsylvania - CIO

This session will review how a data exposure that occurred outside of central IT’s responsibility led to the creation of a comprehensive, sustainable IT security program at a mid-sized, public doctoral university. A specific goal is to review the components of the program in a manner that would allow attendees to leverage, modify and enhance it for their own purposes. All five major objectives of the program will be explained, including how to get started, suggestions for carrying that early momentum suggestions for making the program sustainable.

Key Takeaways:

  • Great IT security awareness requires sustainable programs and not just projects
  • The largest corporations in the world spent many millions on cyber security activities and many still suffered breaches. Money is not the only key to success.
  • Practically every business and institution has good reason to worry about their IT security posture. Therefore, no one should ignore the good, successful steps taken by others.

Speaker

Bill Balint
CIOIndiana University of Pennsylvania
MondayBreakout Presentation

close Automation Mindset, turning IT into a Profit center and driving growth

Digital TransformationUniversal Logistics - Managing Director of IT

Successful IT leaders will be those that can transition from a cost center to delivering real value to an organizations bottom line. From kiosk to self check, robots in supply chain, and self driving vehicles technology is driving fundamental change in many organizations.

Key Takeaways:

  • Automation is delivering REAL value today.
  • We can offset increasing labor costs and labor shortages by automating low value task of unskilled labor.
  • Mitigate risk associated with Automation with Strategic Pilot programs.
  • Your “automation vision” should go beyond ROI and KPI’s, but become a core value of all your technology initiatives.

Speaker

Lee Weisenberger
Managing Director of ITUniversal Logistics
MondayBreakout Presentation

close Enterprise Transformation using the Power of Data and AI

Digital TransformationIBM - Vice President of Data Platform Engineering & DevOps

Organizations are witnessing the dawn of the data-driven, AI, and regulatory era. The data-driven and digital transformation of organizations are occurring at a rapid pace in order to stay relevant and pave the way to a sustainable future. The consolidation of an organization’s data into a governed, trusted, and well-managed environment that supports both analytics development and production workloads is playing a crucial role in this transformation. Organizations want to take advantage of AI, but they need a trusted foundation and access to the data. Our mission is to deliver a trusted, enterprise-wide, data and AI backbone for transforming IBM into an AI Enterprise. This is helping to accelerate the infusion of data and AI in business processes and provide a fertile environment for identifying, building and deploying AI solutions. The resulting benefits to business are reduced time to find and consume data, reduced time to implement initiatives across business units, reduced end-to-end cycle time and delivering insights that were previously impossible.

 

Speaker

Ranjan Sinha
Vice President of Data Platform Engineering & DevOpsIBM
Monday Breakout Presentation

close Stop Breaches in AWS and Azure with Advanced Threat Detection and Response

CybersecurityPaladion Networks Private - CTO

Cloud computing is powering digital transformations for businesses across the globe. This mainstream adoption is making Cloud platforms a promising new vector for cyber criminals. Organisations of every size must prepare to defend against the coming wave of advanced attacks targeting their Cloud and hybrid infrastructures.

In this session, we will discuss how best to monitor AWS and Azure clouds. We will focus on key components and services that should be monitored along with use cases. We will detail the role of AI-driven threat detection and response to combat sophisticated cloud threats.

Speaker

Vinod Vasudevan
CTOPaladion Networks Private
MondayBreakout Presentation

close Speed B2B Collaboration Transformation with Hybrid Cloud, AI and Block-chain

Digital TransformationIBM - Program Director, Watson Supply Chain Offering Management

84% of organizations will modernize their B2B connectivity in the next 24 months. Will you be one of them? Learn how IBM can help you accelerate digital business transformation. Through real-world examples that leverage blockchain, AI and hybrid cloud, we’ll show you how to drive innovation and extend the value of proven B2B collaboration solutions like EDI and B2B networks.

Key Takeaways:

  • Start modernizing your B2B connectivity
  • Leverage Hybrid Cloud, AI, and Blockchain to drive innovation
  • Accelerate your organization’s digital business transformation

Speaker

John Colbert
Program Director, Watson Supply Chain Offering ManagementIBM
MondayBreakout Presentation

close AI for Innovation and how to use it to secure your digital assets

Artificial IntelligenceIBM - Chief Information Security Officer

Artificial intelligence will change the world. Let’s remove the mystery and lean into the opportunities it presents. Specifically explore a real world use of this technology to manage security.

Key Takeaways:

  • What is AI?
  • How to use it generally
  • How to use AI specifically for cyber
  • A real example – from a practitioner

Speaker

Shamla Naidoo
Chief Information Security OfficerIBM
MondayBreakout Presentation

close Applying Technology to create First Responder Action

Customer-centric Design & Customer JourneyChicago Police Department - Director IT

Mastering the user experience to facilitate the use of real-time information to deploy resources effectively to a critical situation.

Key Takeaways:

  • Create a user experience to engage the user in the utilization of systems
  • Funnel multiple siloed systems into one Unified Web Experience
  • Incorporation of IoT into the user interface
  • Collaboration of multiple technologies under one umbrella

Speaker

Steve Maris
Director ITChicago Police Department
MondayBreakout Presentation

close Life After an Anonymous Attack on My City

Cyber SecurityCity of Fort Lauderdale - CTO

The city of Fort Lauderdale, Florida was hit by an Anonymous denial-of-service attack in December 2014 and was forced to immediately upgrade computer systems to thwart any potential future attacks.The city quickly spent $430,000 upgrading computer security systems to mitigate vulnerabilities it had previously identified. While the attack itself did not cost the city this money, it expedited the timeline for these necessary system upgrades. A complete A-Z approach for a new security awareness program was created.

Key Takeaways:

  • Even if sensitive information isn’t compromised, there can be political fallout from such an attack
  • If you’re aware of vulnerabilities that need to be remedied “when the budget allows,” would-be attackers will be too
  • A security strategy for a new division
  • How the city has changed its ways – both technologically, and behaviorally, in the time since

Speaker

Michael Maier
CTOCity of Fort Lauderdale
MondayBreakout Presentation

close Leadership insight through the lens of Technology

Forward-Thinking Financial LeadershipWallace State Community College - Director of Information Technology

To be a primary Technology Leader in 2019 is to speak 2 to 3 languages, wage war internally and externally, and inspire a team to produce beyond what they probably should. How does one navigate this new landscape? What are the current realities we need to be mindful of? How can we best engage fellow administrators? Join us as we explore the way forward.

Key Takeaways:

  • How Technology has affected and continues to change the world of work.
  • Why it’s important to speak the language of industry.
  • Key differences between being part of the team and serving the team.
  • Leadership sometimes means being a Servant.

Speaker

Kirk Nugent
Director of Information TechnologyWallace State Community College
MondayBreakout Presentation

close Delivering Digital Transformation Programs in a Regulated Industries

Digital TransformationSyneos Health - Director of Business Technology

Digital Transformation is no longer a differentiator limited to high tech companies. It has become a key to success and survival in many different industries, including traditional regulated industries such as insurance, government, and healthcare. There are particular challenges that regulated industries need to address in order to embrace digital transformation and drive successful outcomes, while still working within compliance and regulatory frameworks.

Key Takeaways:

  • Basics of Digital Transformation
  • How to apply Digital Transformation concepts in regulated industries
  • Best practices for defining Digital Transformation projects
  • Best practices to achieve successful delivery of Digital Transformation initiatives

Speaker

Michael Cooperman
Director of Business TechnologySyneos Health
MondayNetworking

Industry Dinner

TuesdayNetworking

Breakfast Buffet

TuesdayKeynote Presentation

close Modernization of Your IT Organization: Continual Learning & Career Road-mapping as Accelerants

AI & Future of WorkSkillsoft - Vice President, Technology & Developer Products

To integrate the efforts of upskilling, reskilling and pre-skilling tech talent pool, organizations are instilling continual learning as an accelerant to modernize their technology stack. Learn how organizations are overcoming the challenges of enabling talent around the globe, the proven tips to optimize your learning programs and the defining factors for success.

Key Takeaways:

  • Learn the strategies for optimizing your talent
  • Identify how to successfully measure your learning effectiveness
  • Learn key strategies to upskill, reskill or pre-skill your talent based on needs
  • Learn about key factors in the global job market
  • Obtain strategies for your organization’s future successes

Speaker

Mike Hendrickson
Vice President, Technology & Developer ProductsSkillsoft
Tuesday

Targeted Research Meetings

Expo Hall
TuesdayBreakout Presentation

close Unlocking the mysteries of common sense data security implementation a.k.a. don’t be that annoying guy!

Cyber SecurityRockefeller University - CISO

Data security controls are critical to protect valuable information assets; however, they are only effective if users actually implement them. This presentation will describe techniques to implement security policies while still maintaining positive relationships with your end-users. Choose security controls wisely and make them count!

Key Takeaways:

  • Practice what you preach
  • Don’t be intimidated by information security or ease-of-use
  • Know your organization, its usage patterns and culture in order to determine what they consider acceptable
  • Be able to switch roles from guru technician to non-techie end-user

Speaker

Marty Leidner
CISORockefeller University
TuesdayBreakout Presentation

close The Phish Are Biting...Tales From the Pond

Phishing / RansomwarePiedmont Healthcare - CIO

Phishing is the #1 attack vector in healthcare. The speaker will share real data and experiences from his organization’s 18 month campaign to improve their cybersecurity posture against this threat.

Key Takeaways:

  • Cultural shifts are difficult yet vital for enhance cybersecurity
  • There are multiple [potential] unwanted side effects from trying to do the “right thing” regarding phishing
  • Having the right tool, like for any endeavor, is paramount
  • Measure, adjust, measure some more, adjust some more…you are never “done”

Speaker

Mike House
CIOPiedmont Healthcare
Tuesday

close A New Approach to Email Security for Office 365

Vade Secure - Director of Corporate Markets

For hackers, Office 365 is the new black!

Because a simple set of Office 365 credentials can give you access to sensitive documents, applications and confidential business information, Office 365 is now the go-to place for cybercriminals looking to make a fast and high profit.

Each day these hackers implement new and always more creative phishing and spear-phishing attacks, that easily bypass the traditional email security solutions.

Discover what their techniques are, and learn what you can do to prevent cybercriminals from breaking into your organization with just a single email.

Key Takeaways:

  • Office 365
  • Email Security
  • Phishing
  • Cyber Security

Speaker

James Duff
Director of Corporate MarketsVade Secure
TuesdayBreakout Presentation

close Helping the World through Digital Transformation

Digital TransformationWorld Vision International - Global Chief Information Officer

In this digital transformation session Scott will discuss and explore the digital enabling of an organization from strategy to support, apps to data and methodologies to mindsets.

Key Takeaways:

  • Digital is Pervasive – from Strategy to Culture
  • Digital is Agile – with Alignment with Autonomy
  • Digital is Transformative – Apps to Data and Analytics
  • Digital if Fundamental – from Poverty to Empowerment

 

Speaker

Scott Mills
Global Chief Information OfficerWorld Vision International
Tuesday

close Unified Access Security

Cyber SecurityDuo Security - Solutions Engineer

The perimeter-based security approach of the last century is no longer adequate for securing the modern enterprise. Today, organizations must secure a mobile workforce that uses a mix of corporate-owned and personal devices to access cloud-based applications and services, often from outside corporate networks. The zero trust access model delivers that security without cumbersome and antiquated technologies such as VPN and MDM.

Attend this session to learn how the zero trust access model works, how leading organizations such as Google use this approach to secure access to their critical applications and data, and how you can implement this model in your organization.

Key Takeaways:

  • Why the traditional perimeter-focused security model won’t meet the needs of most modern organizations
  • How a zero-trust security model can overcome these challenges
  • How you can incorporate this approach into your existing architecture without starting from scratch

 

Speaker

Karl Lewis
Solutions EngineerDuo Security
TuesdayBreakout Presentation

close Data Intelligence in a Multi-Stakeholder World - Challenges and Opportunities

Big Data and AnalyticsNorthcentral University - Chief Technology and Learning Officer

One of the most significant challenges when discussing data initiatives across institutions, organizations, corporations is the sheer number of disparate stakeholders, lexicons and perspectives that are involved. Despite the complexity, there are really only three key guiding principles that govern such processes: what are we trying to know, how might we act, and what do we have.

Key Takeaways:

  • Understanding of an organizations’ stakeholders, politics and barriers.
  • Defining goals and intentions: both ideal and tactical.
  • Identifying stakeholders vs. drivers.
  • Role of technology.

Speaker

Colin Marlaire
Chief Technology and Learning OfficerNorthcentral University
TuesdayBreakout Presentation

close Ransomware: A HigherEd Personal Testimony

Cyber SecurityWallace State Community College - Director of Information Technology

Ransomware is now a $2 billion-per-year criminal industry. Prevention has become apart of a CIOs daily activities. What happens when you find yourself a Target? What happens when you fall Victim? Hear a personal testimony of a University that has walked through that experience and lived to tell the story.

Key Takeaways:

  • Why are HigherEd Institutions Targeted?
  • Tips and Tricks in the aftermath.
  • No cost Prevention practices.

Speaker

Kirk Nugent
Director of Information TechnologyWallace State Community College
TuesdayBreakout Presentation

close Digital Transformation and Emerging Technologies - Hype or Reality?

CIO Leadership and InnovationBerkley Risk Administrators Company, LLC - CIO

You’ve heard it – Digital Transformation and Emerging Technologies such as Blockchain, AI, Deep Learning, IoT, RPA, Cloud, etc. You may also heard the phrase “Be the Disruptor not the Disrupted”. What does all this mean? Hype? Of course it’s a hype for consulting companies like Accenture, IBM and hundreds of other companies to thrive, survive, or stay relevant. Reality? Yes, it’s a reality for companies like the Fintechs, Insuretechs, and FAANG since it’s who they are and it’s in their DNA. What about most of us?

Key Takeaways:

  • Understand the hypes
  • Understand the realities
  • Understand the technologies
  • Understand what are the potential next steps

Speaker

William Tran
CIOBerkley Risk Administrators Company, LLC
TuesdayNetworking

Lunch

Executive Steering Committee

Experienced IT leaders work with us to focus our program on trends that will move the needle at your company.

Steering Committee Members

Steven ThompsonVP of IT
US Medical Management
Bill BalintCIO
Indiana University of Pennsylvania
Peter AndersonCIO
GCRTA
Daniel BergerSVP Technology Risk Management
PNC
Michael WoodrowCIO
Avamere Health Services
Jim GilbertCTO
City of Rapid City
Bill YoungVice President of Digital Transformation / CIO
Butler Community College

An Esteemed Audience

Over 80% of the Fortune 100 joins us each year for what has been voted the “most effective trade show” for over a decade. Use our tools to demonstrate ROI to your C-Suite.

Attendee Testimonials

Attendee List

Exhibitors

CIO Visions has quickly become established as the “deal generating show”.

Exhibitor Testimonials

Exhibitor List

About CIO Visions

CIO Visions is an invitation-only trade show for IT executives that bridges you to the most compelling solutions and information for your crowning priorities.

Have Questions?

We’ve answered a few FAQs to get you started. For any other questions, please don’t hesitate to contact us!

Our Team

Matt Velaer

Conference Director
(424) 334-5145
Send Message

Marin Silvers

VP of Operations
(424) 334-5141
Send Message

Hannah Greenlee

Attendee Relations Executive
(424) 334-5159
Send Message

Britt Erler

Content Director
(424) 389-3287
Send Message

Shanna Delfs

Account Executive
(434) 334-5161
Send Message

Marissa Marsh

Account Executive
(424) 313-1172
Send Message

Andrea Gomez

Account Executive
424-334-5149
Send Message

Hotel and Travel

Your conference pass includes overnight accommodations, travel reimbursement, meals and cocktail receptions.

The Hotel

Renaissance Schaumburg

Experience refined style at the Renaissance Hotel in Schaumburg where stunning design blends seamlessly with impeccable service.

Our Schaumburg hotel accommodations boast stylish design and luxurious comfort. Located in an accessible hub with a sophisticated collection of retail and culinary options such as Sam & Harry’s and Woodfield Mall, this Schaumburg, Illinois hotel serves as an indigenous ambassador for entire Chicagoland area…and a gateway for the entire Midwest.
Accommodations must be booked through the conference organizers and not through the venue directly. To book your stay please contact:
The nearest airport is Chicago O'Hare International Airport (ORD), which is less than 15 miles away. Alternatively, you may fly into Chicago Midway International Airport (MDW). This hotel does not provide shuttle service. Taxis are readily available at the airport.
The Renaissance Schaumburg  | 1551 N. Thoreau Drive Schaumburg, IL 60173
×