Renaissance Schaumburg, Chicago

Invitation-only means an exceptional experience, on us

Coordinated by your personal concierge, a schedule is tailored to your professional goals and company priorities.

assignment_ind

Complimentary Pass

Inventive learning, renowned speakers, executive networking. All free to you.

flight

Travel Reimbursement

$200 of your travel is covered if you’re trekking over 100 miles to attend.

local_hotel

Accommodations

Your first night’s stay is on us and a discounted rate is available thereafter.

restaurant

5 Star Catering

All of your meals and libations are complimentary throughout the event.

Join IT’s Distinguished Upper Tier

A curated audience reserved for the senior level of the Fortune 500 puts you in exceptional company.

150+

Affluent Peers

Meet the people who are just as invested in leveraging technology as you are.

20+

Influential Leaders

Learn valuable strategy components from today’s very best.

40+

Proven Solutions

Meet industry leading solution providers, hand picked for your priorities.

1.5K

Connections

Take this unprecedented opportunity to connect with high profile execs.

Take this unprecedented opportunity to connect with high profile execs.

Based on your specific areas of responsibility, challenges and interests we’ll craft a personal agenda that paves your path to success.

3

Days of Insight

Jump in the discussion through focused educational sessions and networking opportunities.

40

Innovative Sessions

Keynotes, case studies, plenary sessions, industry panel discussions, and more.

6

Networking Opportunities

Tie into contemporaries and mentors interested in the same avenues of opportunity as you.

10

Research Meetings

Meet one-on-one with executives delivering on the solutions that are shaping the industry.

play_circle_outline Watch Video

Peer-Led Education

The CIO Visions Steering Committee consists entirely of your contemporaries, meaning we tackle the themes that have profound significance to your performance and your company.

High Profile Speakers

Hear strategic endeavors and skillful insights from 40+ IT leaders as they make way in today’s changing landscape. Our Fall 2020 speaker line-up includes:

CIO VISIONS Leadership Fall Summit View More

Mike House

CIO

Piedmont Healthcare

CIO VISIONS Leadership Fall Summit View More

Steve Maris

Director IT

Chicago Police Department

CIO VISIONS Leadership Fall Summit View More

Shamla Naidoo

Chief Information Security Officer

IBM

CIO VISIONS Leadership Fall Summit View More

Sulabh Sood

Director - Program Management

GE (General Electric)

CIO VISIONS Leadership Fall Summit View More

Jason James

CIO

Net Health

CIO VISIONS Leadership Fall Summit View More

Travis Cain

Director Business Architecture

Dell Technologies

CIO VISIONS Leadership Fall Summit View More

Rizwan Patel

Senior Director of IT

Caesars Entertainment

CIO VISIONS Leadership Fall Summit View More

Lee Weisenberger

Managing Director of IT

Universal Logistics

CIO VISIONS Leadership Fall Summit View More

Mike Hendrickson

Vice President, Technology & Developer Products

Skillsoft

CIO VISIONS Leadership Fall Summit View More

Kirk Nugent

Director of Information Technology

Wallace State Community College

CIO VISIONS Leadership Fall Summit View More

Shashank Volety

Vice President, Digital Solutions

Hitachi Consulting

CIO VISIONS Leadership Fall Summit View More

Mark Albers

Vice President; Digital Solutions Practice

Hitachi Consulting

CIO VISIONS Leadership Fall Summit View More

Bill Balint

CIO

Indiana University of Pennsylvania

CIO VISIONS Leadership Fall Summit View More

Scott Mills

Global Chief Information Officer

World Vision International

CIO VISIONS Leadership Fall Summit View More

Patricia Clay

CIO

Hudson County Community College

CIO VISIONS Leadership Fall Summit View More

Vinod Vasudevan

CTO

Paladion Networks Private

CIO VISIONS Leadership Fall Summit View More

Tommy Gardner

Chief Technology Officer

HP Federal

CIO VISIONS Leadership Fall Summit View More

Rahul Vijay

Head of Global Connectivity

Uber

CIO VISIONS Leadership Fall Summit View More

Elliott Franklin

Director of IT Security

Loews Hotels

CIO VISIONS Leadership Fall Summit View More

John Colbert

Program Director, Watson Supply Chain Offering Management

IBM

CIO VISIONS Leadership Fall Summit View More

Ranjan Sinha

Vice President of Data Platform Engineering & DevOps

IBM

CIO VISIONS Leadership Fall Summit View More

Tod Huber

CTO

Milwaukee County

CIO VISIONS Leadership Fall Summit View More

Don Minnick

Senior Director Business Consulting

Core Compete

CIO VISIONS Leadership Fall Summit View More

Andrew Anderson

Enterprise Client Partner

Toptal

CIO VISIONS Leadership Fall Summit View More

David Martin

Senior Director, Product Management - Threat Response

Open Systems

CIO VISIONS Leadership Fall Summit View More

Eryn Brodsky

Sr. vArchitect, Hyperconverged Platforms

Dell Technologies

CIO VISIONS Leadership Fall Summit View More

Naveed Husain

Vice President Office Public Sector and Education

RingCentral

CIO VISIONS Leadership Fall Summit View More

Pradipa Karbhari

Director, Cloud and AI

Microsoft

CIO VISIONS Leadership Fall Summit View More

Abhijit Dey

Vice President of Engineering

Druva

CIO VISIONS Leadership Fall Summit View More

Kevin McEvilly

SVP - Technology

Canvas Worldwide

CIO VISIONS Leadership Fall Summit View More

Jamie Duff

Director of Sales

Vade Secure

CIO VISIONS Leadership Fall Summit View More

Susan Miller

Chief Revenue Officer

Brightfield

CIO VISIONS Leadership Fall Summit View More

Paul Kim

Software Development Manager

Amazon

CIO VISIONS Leadership Fall Summit View More

Marty Leidner

CISO

Rockefeller University

CIO VISIONS Leadership Fall Summit View More

Maddie Slater

Director

Darktrace

CIO VISIONS Leadership Fall Summit View More

Craig Russell

IT Director

Jay Peak Resort

CIO VISIONS Leadership Fall Summit View More

Mike Manrod

CISO

Grand Canyon Education

CIO VISIONS Leadership Fall Summit View More

Cameron Seader

Technology Strategist

SUSE

CIO VISIONS Leadership Fall Summit View More

Roger Grimes

Data-Driven Defense Evangelist

KnowBe4

CIO VISIONS Leadership Fall Summit View More

Sam Wolfshohl

Senior Security Engineer

Cyren

CIO VISIONS Leadership Fall Summit View More

Chris Hegberg

Regional Security Account Director

Cyren

CIO VISIONS Leadership Fall Summit View More

Missy Young

Chief Information Officer

Switch

2020 Full Agenda

Your personal concierge will craft a custom schedule based on your interests and priorities. View the complete agenda below.

Reset Filter
CIO Leadership and Innovation
Cyber Security
Data Management: Strategy for Storage and Analytics
DevOps Strategy
Cybersecurity
Digital Transformation
Artificial Intelligence
Staff Training and Retention
SundayNetworking

Welcome Cocktail Reception & Registration

MondayNetworking

Breakfast Buffet

MondayKeynote Presentation

close Digital Transformation – Six Steps to Success

IT LeadershipHitachi Consulting - Vice President, Digital Solutions
Hitachi Consulting - Vice President; Digital Solutions Practice

Digital transformation – driving operational improvements in your physical value stream using connected data from your digital value stream – is delivering unprecedented value across industries to those with a clear road map. In fact, a recent Harvard Business School report shows that companies that embrace digital transformation attain significantly better gross margins, earnings and net income than those that don’t. What’s more, those digital leaders are not spending much more on IT than laggards because the big investments have already been made. The challenge is knowing how to connect the data from the digital value stream to drive continuous improvement with real-time metrics and predictive analytics. No matter where you are on the journey of digital transformation – these six steps can help you connect your systems to drive new levels of productivity, profitability and value across your business.

Key Takeaways:

  • Learn how to connect your physical and digital value streams to create near real-time operating systems.
  • Identify areas of variation across the physical value stream that can be supported by better data and real-time analytics.
  • Gain knowledge through strategic partnerships with digital leaders to accelerate your journey to unlocking more organizational value.

Speaker

Shashank Volety
Vice President, Digital SolutionsHitachi Consulting
Mark Albers
Vice President; Digital Solutions PracticeHitachi Consulting
Monday

Targeted Research Meetings

Expo Hall
MondayBreakout Presentation

close Dell Technologies HCI: Modernize Your Infrastructure and Accelerate IT Transformation with VxRail

Data Storage and AnalyticsDell Technologies - Sr. vArchitect, Hyperconverged Platforms

VxRail, the only HCI platform jointly engineered with VMware delivers simplicity, scalability and business agility through automation, orchestration and end to end lifecycle management. Join us as we review the most recent announcements on empowering IT to keep pace with business innovation. We will review how new Intel processors improve VxRail performance by up to 28%, how significant lifecycle management enhancements give the user more control and can shorten upgrade times up to 20%, and how PKS on VMware Cloud Foundation on VxRail automates Kubernetes infrastructure deployment to foster operational freedom and unlock innovation.

Key Takeaways:

  • Virtualization doesn’t have to be difficult to deploy and storage does not have to be expensive and complicated
  • VMware vSAN, the leading HCI software, enables you to evolve your datacenter without risk, reduce TCO, and scale to tomorrow
  • Advances in VMware vSAN and VxRAIL capabilities make deploying virtualization faster and more cost-effective than ever
  • Start small and grow: Single-node, non-disruptive scaling and storage capacity expansion provide a predictable, “pay-as-you-grow” approach for future scale up and out as your business and user requirements evolve without up-front planning

Speaker

Eryn Brodsky
Sr. vArchitect, Hyperconverged PlatformsDell Technologies
MondayBreakout Presentation

close We are lost in cybersecurity, what we need is a simple map!

Risk & ComplianceLoews Hotels - Director of IT Security

We are all tired of talking about cybersecurity and how we are losing the battle against the attackers. It’s like we are lost without a map. Instead of rushing to adopt the latest shiny security tool, we need to take a step back and adopt a standardized security framework.

 

Key Takeaways:

  • The NIST CSF uses a common business language to address cybersecurity concerns to leadership
  • Using a standard, the industry-recognized framework allows consistent program maturity mappings to budget requests.
  • Following the NIST CSF, you are demonstrating “due care” which may reduce claims of negligence or inattention following a breach
  • Easily maps to compliance and regulatory requirements reducing unnecessary or redundant efforts

Speaker

Elliott Franklin
Director of IT SecurityLoews Hotels
MondayBreakout Presentation

close Accelerating Digital Transformation with Collaborative Communications

Cloud StrategyRingCentral - Vice President Office Public Sector and Education

Digital transformation is about meeting the needs of today’s modern business. The new workforce is increasingly mobile, global and distributed and is putting requirements on companies to support their on-the-go lifestyle. Discover how building a cloud ecosystem of integrated applications drives the speed, agility and data insights you need to generate meaningful business outcomes. With the right solutions in place, you can empower employees to work anytime, anywhere and on any device using the modality of their choice – whether online chat, video meetings or voice communications.

Key Takeaways:

  • Find out how you can unify your collaboration tools into one, single cloud-based platform
  • Learn how to empower employees to work anytime, anywhere and on any device
  • Hear how building a cloud ecosystem of integrated applications can cut costs while driving meaningful business outcomes

Speaker

Naveed Husain
Vice President Office Public Sector and EducationRingCentral
MondayBreakout Presentation

close Fourth Industrial Revolution and Digital Transformation: Mutually Inclusive new theory of Survival of the Fittest

Digital TransformationGE (General Electric) - Director - Program Management

The world is on the cusp of the Fourth Industrial Revolution or Industry 4.0. It is quite different than the prior three Industrial Revolutions —steam & water power, assembly lines, and computerization, as it will challenge the enterprises on not only their business operations but also on how efficiently they adapt to the evolving human behaviors. This revolution is expected to impact all industries, disciplines, economies and ultimately societies. In this new era of revolution, only those enterprises or people will survive and thrive who will adapt to Industry 4.0 by correctly adopting the Digital Transformation strategies and technologies such as Artificial Intelligence, Robotics, IoT, Cloud, Digital Twin, Augmented Reality, etc.

Key Takeaways:

  • Understanding of Digital Transformation strategies and Industry 4.0 technologies.
  • Relationship between Industry 4.0 and Digital Transformation.
  • Why Digital Transformation fails?
  • Using statistics, concepts and case studies, understand how People, Culture, Process & Technology solutions should be implemented to successfully survive and thrive.
  • Learn at an individual level, how we can adapt to this new area by doing Personal Transformation.

Speaker

Sulabh Sood
Director - Program ManagementGE (General Electric)
MondayBreakout Presentation

close Creating, Managing and Improving an Enterprise Information Security Program

CybersecurityMilwaukee County - CTO

This session will focus on the Enterprise Information Security Program – the people, process and technology required to initially establish the program, the strategies around managing and growing the program, and the effort to continuously improve the program to keep up with changing business requirements and the changing threat landscape.

 

Key Takeaways:

  • The general steps taken to establish an Information Security Program
  • People, process and technology to maintain an Information Security Program
  • Strategies on growing the Information Security Program/future trends for cybersecurity
  • Obtaining funding to establish, expand and grow an Information Security Program

Speaker

Tod Huber
CTOMilwaukee County
MondayBreakout Presentation

close Change Management at small and midsize companies

Staff Training and RetentionCanvas Worldwide - SVP - Technology

  • Is SMB CM a fallacy?
  • Culture challenges
  • SMB vs. Fortune 500
  • CIO Leadership when people just want new laptops
  • CM drivers

 

Key Takeaways:

  • CEO’s role
  • BCP and other initiatives that can help
  • HR’s assistance with job descriptions and performance management
  • Programs & Platform Management

 

Speaker

Kevin McEvilly
SVP - TechnologyCanvas Worldwide
MondayBreakout Presentation

close Driving the Future of Work with Data

Cybersecurity Staff TrainingToptal - Enterprise Client Partner

Talent strategy is critical to an organization’s ability to innovate and quickly pivot to fuel growth and stay ahead of competition. Andrew Anderson will share his unique insights on the industry-wide shift in talent management and how companies are increasing ROI from the “human cloud” and blended workforce operating model – the future of work.

Speaker

Andrew Anderson
Enterprise Client PartnerToptal
MondayBreakout Presentation

close Speed B2B Collaboration Transformation with Hybrid Cloud, AI and Blockchain

Digital TransformationIBM - Program Director, Watson Supply Chain Offering Management

84% of organizations will modernize their B2B connectivity in the next 24 months. Will you be one of them? Learn how IBM can help you accelerate digital business transformation. Through real-world examples that leverage blockchain, AI and hybrid cloud, we’ll show you how to drive innovation and extend the value of proven B2B collaboration solutions like EDI and B2B networks.

Key Takeaways:

  • Start modernizing your B2B connectivity
  • Leverage Hybrid Cloud, AI, and Blockchain to drive innovation
  • Accelerate your organization’s digital business transformation

Speaker

John Colbert
Program Director, Watson Supply Chain Offering ManagementIBM
MondayBreakout Presentation

close AI-Based Autonomous Response: Are Humans Ready?

CybersecurityDarktrace - Director

Cyber security is quickly becoming an arms race, with machines fighting machines on the battleground of corporate networks. AI-based cyber defense can not only detect threats as they emerge, but also autonomously respond to attacks in real time. But are humans ready to accept the actions machines would take to neutralize threats?

Key Takeaways:

  • AI approaches and algorithms for detecting and responding to threats
  • How human teams adopt (or resist) automated defenses
  • The concepts of ‘human confirmation’ mode and ‘active defense’
  • Success stories across Smart Cities, genomics organizations, and industrial control systems

Speaker

Maddie Slater
DirectorDarktrace
MondayBreakout Presentation

close Using Technology To Create Immersive Experiences for Visitors and Employees

AI and Data Driven ExperiencesCaesars Entertainment - Senior Director of IT

Leverage Technologies like Blockchain, AR, VR, Robotics, Drone Racing, Wearables, IoT, Esports, Facial/Image/Object Recognition and others to create an Immersive Experience for Guests and Employees elevating Customer Experience, Increasing Revenue and Reducing Cost.

Key Takeaways:

  • Enterprise Blockchain Applicability
  • AI Driven Insights – Facial/Image/Object Recognition
  • IoT Driven Food Safety

Speaker

Rizwan Patel
Senior Director of ITCaesars Entertainment
TuesdayBreakout Presentation

close Accelerating Digital Transformation through an AI-Driven Unified Workforce Strategy

Digital TransformationBrightfield - Chief Revenue Officer

New analytic techniques and data sources allow CIOs to optimize their IT workforce across all sources of workers–consultants, temporary staff, BPO providers, and permanent employees. CIOs using these new approaches fill open positions faster, secure hard-to-find IT skills, and reduce overall costs.

Key takeaways:

  • Forecasting IT skill needs
  • Linking IT strategy to optimal worker types, locations, and pricing
  • Analyzing consulting contracts to save costs and reduce project risks

Speaker

Susan Miller
Chief Revenue OfficerBrightfield
MondayBreakout Presentation

close How new age companies are using Connectivity and IoT as their competitive advantage

Digital TransformationUber - Head of Global Connectivity

In today’s hyperconnected world, connectivity can be a competitive advantage, driving revenues, enabling business objectives and improve bottom lines. Come and learn how connectivity and IoT are being used as a competitive advantage today!

Key Takeaway:

  • Rethink your company as a connected company
  • How simple concepts can have big revenue impacts
  • Insights into how complex and interesting companies run their connectivity

Speaker

Rahul Vijay
Head of Global ConnectivityUber
Monday Breakout Presentation

close Stop Breaches in AWS and Azure with Advanced Threat Detection and Response

CybersecurityPaladion Networks Private - CTO

Cloud computing is powering digital transformations for businesses across the globe. This mainstream adoption is making Cloud platforms a promising new vector for cyber criminals. Organisations of every size must prepare to defend against the coming wave of advanced attacks targeting their Cloud and hybrid infrastructures.

In this session, we will discuss how best to monitor AWS and Azure clouds. We will focus on key components and services that should be monitored along with use cases. We will detail the role of AI-driven threat detection and response to combat sophisticated cloud threats.

Speaker

Vinod Vasudevan
CTOPaladion Networks Private
MondayBreakout Presentation

close Human Element of Digital Transformation

Digital TransformationNet Health - CIO

All successful digital transformation begins as a cultural transformation. Jason “JJ” James, CIO of Net Health, will discuss the digital transformation that he is driving at Net Health and the impact on culture that he has seen. Attendees will take away actionable ideas for their own IT organizations.

Key Takeaway

  • The human factors involved in digital transformation
  • Understanding how culture drives and influences digital transformation
  • Empowering IT to deliver on digital transformation
  • The realization that digital transformation is ongoing and ever-changing

Speaker

Jason James
CIONet Health
MondayNetworking

Lunch

Monday

Targeted Research Meetings

Expo Hall
MondayBreakout Presentation

close AI, BlockChains, and Connected Services enabled by IoT: The ABCs of Digital Transformation

Digital TransformationMicrosoft - Director, Cloud and AI

This highly-engaging presentation explores the role played by these leading-edge technologies in enabling the digital transformation of supply chains across industries, including areas of Smart Manufacturing, Smart Contracts, Smart Distribution, and Smart Operations.

 

Key Takeaways:

  • The audience will get to learn the latest technology trends cross-industry
  • The audience will get to see how these technologies can be combined in new, interesting and powerful ways to tackle complex problems
  • The audience will leave with a good understanding of several ways in which to leverage these new technologies in their own scenarios

Speaker

Pradipa Karbhari
Director, Cloud and AIMicrosoft
MondayBreakout Presentation

close A new approach to email security for Office 365

Artificial IntelligenceVade Secure - Director of Sales

For hackers, Microsoft Office 365 is the new black! Because a simple set of Office 365 credentials can unlock a treasure trove of sensitive documents, applications, and confidential business information, Office 365 is now the #1 target for cybercriminals looking to make a fast profit. Each day these hackers implement new and ever-more creative phishing and spear-phishing attacks that easily bypass traditional email security solutions.

Discover the latest threats and techniques, and learn what you can do to prevent cybercriminals from breaking into your organization with just a single email.

 

Key Takeaways:

  • Microsoft Office 365 is the #1 impersonated brand for phishing attacks
  • AI-based email threat detection and remediation blocks all threats
  • Traditional email security inadequate to detect phishing and spear-phishing attacks
  • Insight into how cybercriminals bypass traditional email security tools

Speaker

Jamie Duff
Director of SalesVade Secure
MondayBreakout Presentation

close Hiring the Best: Attracting and Assessing the Best Engineers in the World

Cybersecurity Staff TrainingAmazon - Software Development Manager

How do you attract the best minds this world has to offer? How do you assess these candidates in 1 hour or 1 day of interviews? This talk is focused on hiring software engineers but can be generalized to most tech roles.

 

Key Takeaways:

  • Keep the bar of entry high
  • Give a good candidate experience
  • Assess on multiple functional and leadership competencies

Speaker

Paul Kim
Software Development ManagerAmazon
MondayBreakout Presentation

close Using Deep Learning to Secure Endpoints Against Future Threats

Artificial IntelligenceHP Federal - Chief Technology Officer

This talk will cover how to use deep learning or convolutional neural networks to protect against future malware.

Key Takeaways:

  • Understand difference between machine learning and deep learning.
  • Historical progression of signature based search to machine learning techniques to today’s deep learning.
  • How using agents at the end points efficiently protects against AI generated malware.
  • The need for action now against evolving threats.

Speaker

Tommy Gardner
Chief Technology OfficerHP Federal
MondayBreakout Presentation

close The Importance of Continuous Monitoring to Minimize Cybersecurity Risk

CybersecurityOpen Systems - Senior Director, Product Management - Threat Response

Despite best efforts and substantial financial investment by service providers and enterprise alike, costly breaches continue to happen at an alarming rate. It has become clear that the historical approach to securing assets by purchasing increasingly sophisticated and layered security technologies is not working. These technologies are necessary but not sufficient. An emerging best practices model to minimize risk combines technology with continuous monitoring by security experts in a Security Operations Center (SOC).

This session presents a reference model for effectively monitoring Hybrid/Multi-cloud environments using a SOC. It covers the basic architecture of a modern SOC and proposes a pragmatic approach to providing complete visibility into all of the potential attack surfaces.

 

Key Takeaways:

  • minimize risk
  • continuous monitoring by security experts in a Security Operations Center
  • cybersecurity

Speaker

David Martin
Senior Director, Product Management - Threat ResponseOpen Systems
MondayBreakout Presentation

close Data Protection for the Cloud Era

CybersecurityDruva - Vice President of Engineering

More and more enterprises are now leveraging the cloud to increase their level of data protection and management for their applications. The ability to keep secondary, or backup data in cloud storage a) eliminates traditional data centers b) reduces operational complexity associated with legacy on-premise backup solutions c) Provides Unlimited scalability d) Centralizes storage of all secondary data sources e) Provides unlimited compute f) Gain additional insight and business value from that data. g) Finally, the ability to do automated Disaster Recovery (DR) without maintaining a DR facility.

 

Key Takeaways:

  • An understanding of the diverging cost models of premises and cloud-based infrastructures
  • A view into the impact of global regulation as it relates to premises and cloud-based solutions
  • A perspective on the growth of SaaS as an industry in terms of requirements fulfilled for enterprise and how that is changing the landscape and the evolution of the data center.
  • Predictive data analytics for cloud data management and DevOps in cloud use cases and application of artificial intelligence in dev and production clouds.

Speaker

Abhijit Dey
Vice President of EngineeringDruva
MondayBreakout Presentation

close It’s Not a Project: The Journey to a Holistic IT Security Program

Staff Training and RetentionIndiana University of Pennsylvania - CIO

This session will review how a data exposure that occurred outside of central IT’s responsibility led to the creation of a comprehensive, sustainable IT security program at a mid-sized, public doctoral university. A specific goal is to review the components of the program in a manner that would allow attendees to leverage, modify and enhance it for their own purposes. All five major objectives of the program will be explained, including how to get started, suggestions for carrying that early momentum suggestions for making the program sustainable.

Key Takeaways:

  • Great IT security awareness requires sustainable programs and not just projects
  • The largest corporations in the world spent many millions on cyber security activities and many still suffered breaches. Money is not the only key to success.
  • Practically every business and institution has good reason to worry about their IT security posture. Therefore, no one should ignore the good, successful steps taken by others.

Speaker

Bill Balint
CIOIndiana University of Pennsylvania
MondayBreakout Presentation

close Automation Mindset, turning IT into a Profit center and driving growth

Digital TransformationUniversal Logistics - Managing Director of IT

Successful IT leaders will be those that can transition from a cost center to delivering real value to an organizations bottom line. From kiosk to self check, robots in supply chain, and self driving vehicles technology is driving fundamental change in many organizations.

Key Takeaways:

  • Automation is delivering REAL value today.
  • We can offset increasing labor costs and labor shortages by automating low value task of unskilled labor.
  • Mitigate risk associated with Automation with Strategic Pilot programs.
  • Your “automation vision” should go beyond ROI and KPI’s, but become a core value of all your technology initiatives.

Speaker

Lee Weisenberger
Managing Director of ITUniversal Logistics
MondayBreakout Presentation

close Analytics Innovation Theater: Analytic Technology of Your Choice in a Flexible, Governed Platform

Digital TransformationCore Compete - Senior Director Business Consulting

Winning enterprises are finding practical and cost-effective ways to analyze exponentially growing data, utilize different tools for different tasks and address governance and security.

The Analytics Innovation Theater offers an on-demand, self-service platform that delivers a full array of analytic tools in a flexible, centralized, elastic and managed environment.

 

Key Takeaways:

  • Hear and discuss key challenges facing IT and data science teams as they take on digital transformation
  • Learn how to leverage proven cloud-native capabilities to deploy a modern analytics platform that meets these key challenges
  • Discover a unique approach to offering flexible analytic capabilities, performance, and control in a cost-effective way
  • Gain a competitive advantage by capitalizing on innovative, vendor agnostic, cloud analytics capabilities

Speaker

Don Minnick
Senior Director Business ConsultingCore Compete
MondayBreakout Presentation

close AI for Innovation and how to use it to secure your digital assets

Artificial IntelligenceIBM - Chief Information Security Officer

Artificial intelligence will change the world. Let’s remove the mystery and lean into the opportunities it presents. Specifically explore a real world use of this technology to manage security.

Key Takeaways:

  • What is AI?
  • How to use it generally
  • How to use AI specifically for cyber
  • A real example – from a practitioner

Speaker

Shamla Naidoo
Chief Information Security OfficerIBM
MondayBreakout Presentation

close Applying Technology to create First Responder Action

Customer-centric Design & Customer JourneyChicago Police Department - Director IT

Mastering the user experience to facilitate the use of real-time information to deploy resources effectively to a critical situation.

Key Takeaways:

  • Create a user experience to engage the user in the utilization of systems
  • Funnel multiple siloed systems into one Unified Web Experience
  • Incorporation of IoT into the user interface
  • Collaboration of multiple technologies under one umbrella

Speaker

Steve Maris
Director ITChicago Police Department
MondayBreakout Presentation

close Digitally Transforming Everywhere... All at Once

Digital TransformationDell Technologies - Director Business Architecture

Digital Transformation is the novel use of digital technology to solve traditional problems. These digital solutions enable inherently new types of innovation and creativity, rather than simply enhance and support traditional methods. With a definition like that how could there be any confusion. Why bother? Why Digitally Transform at all? It’s all my “leadership” reads about and they expect me to deliver it. You or your team wants to use modern technologies. Your current tools and processes are holding back your IT Delivery. Pick one reason and make sure it is durable. Do it for your Customers! They need you to do it, even if they can’t explain it. This is about Culture. Are you ready for change?

Key Takeaways:

  • Digital Transformation is about Customers
  • Embracing a Culture of Change
  • It’s still about People………Process and Tools follow

Speaker

Travis Cain
Director Business ArchitectureDell Technologies
MondayBreakout Presentation

close The Quantum Computing Break Is Coming. Will You Be Ready?

CybersecurityKnowBe4 - Data-Driven Defense Evangelist

Quantum computing is a game-changer and will have a huge impact on the way we do business. Yet, some experts say quantum computers will break existing public key cryptography forever. The bad guys will be able to use more secrets against you than ever before. Learn how you can prepare.

Key Takeaways:

  • Why quantum computing is different than traditional binary computing
  • How close quantum computers are to breaking traditional public key cryptography
  • What defenses you can deploy after public key cryptography is broken
  • How to prepare your users – your best, last line of defense

Speaker

Roger Grimes
Data-Driven Defense EvangelistKnowBe4
MondayBreakout Presentation

close Business Continuity, Disaster Recovery, and Backups. How the lines are blurring

Big Data and AnalyticsJay Peak Resort - IT Director

New Technologies and products coupled with the public and private cloud offerings have blurred the lines between traditional backups and disaster recovery allowing even small and midsize companies to get the benefits of disaster recovery that were previously only available to larger companies with 7 figure IT budgets. Leveraging these new offerings allows us to add value to the company in an area that formally was just a cost sync.

Key Takeaways:

  • Traditional backups only offer you the option of “only” losing a day’s worth of work
  • The public/private cloud allows us to develop a comprehensive plan without the added real estate costs
  • Legacy backup hardware can still be utilized in the 3-2-1 scheme so prolonging the usefullness of that hardware reduces capital expenditure

Speaker

Craig Russell
IT DirectorJay Peak Resort
MondayBreakout Presentation

close Leadership Insight Through the Lens of Technology

CIO Leadership and InnovationWallace State Community College - Director of Information Technology

To be a primary Technology Leader in 2019 is to speak 2 to 3 languages, wage war internally and externally, and inspire a team to produce beyond what they probably should. How does one navigate this new landscape? What are the current realities we need to be mindful of? How can we best engage fellow administrators? Join us as we explore the way forward.

Key Takeaways:

  • How Technology has affected and continues to change the world of work.
  • Why it’s important to speak the language of industry.
  • Key differences between being part of the team and serving the team.
  • Leadership sometimes means being a Servant.

Speaker

Kirk Nugent
Director of Information TechnologyWallace State Community College
TuesdayNetworking

Breakfast Buffet

TuesdayKeynote Presentation

close Modernization of Your IT Organization: Continual Learning & Career Road-mapping as Accelerants

AI & Future of WorkSkillsoft - Vice President, Technology & Developer Products

To integrate the efforts of upskilling, reskilling and pre-skilling tech talent pool, organizations are instilling continual learning as an accelerant to modernize their technology stack. Learn how organizations are overcoming the challenges of enabling talent around the globe, the proven tips to optimize your learning programs and the defining factors for success.

Key Takeaways:

  • Learn the strategies for optimizing your talent
  • Identify how to successfully measure your learning effectiveness
  • Learn key strategies to upskill, reskill or pre-skill your talent based on needs
  • Learn about key factors in the global job market
  • Obtain strategies for your organization’s future successes

Speaker

Mike Hendrickson
Vice President, Technology & Developer ProductsSkillsoft
Tuesday

Targeted Research Meetings

Expo Hall
TuesdayBreakout Presentation

close Enterprise Transformation using the Power of Data and AI

Digital TransformationIBM - Vice President of Data Platform Engineering & DevOps

Organizations are witnessing the dawn of the data-driven, AI, and regulatory era. The data-driven and digital transformation of organizations are occurring at a rapid pace in order to stay relevant and pave the way to a sustainable future. The consolidation of an organization’s data into a governed, trusted, and well-managed environment that supports both analytics development and production workloads is playing a crucial role in this transformation. Organizations want to take advantage of AI, but they need a trusted foundation and access to the data. Our mission is to deliver a trusted, enterprise-wide, data and AI backbone for transforming IBM into an AI Enterprise. This is helping to accelerate the infusion of data and AI in business processes and provide a fertile environment for identifying, building and deploying AI solutions. The resulting benefits to business are reduced time to find and consume data, reduced time to implement initiatives across business units, reduced end-to-end cycle time and delivering insights that were previously impossible.

 

Speaker

Ranjan Sinha
Vice President of Data Platform Engineering & DevOpsIBM
TuesdayBreakout Presentation

close Sustaining Our Physical World in a Digital Age

CybersecuritySwitch - Chief Information Officer

Technology advancement is poised to create a new revolution for humanity, and we must think and act in ways that ensure the sustainability of our planet and keep humans happy and thriving. Artificial Intelligence (AI) applications are influencing and improving health, science, communication, transportation and energy on a global scale – and it is our responsibility to design and build the infrastructure for this new digital age while preserving our humanity and the planet earth. We’re all in this together.

Key Takeaways:

  • Imagine an age when Digital + Physical + Biological lines are blurred
  • Complex issues such as sustainability, sourcing and making better choices for the planet and its people
  • How is physical infrastructure advancing to support all of this technology?
  • The critical role of STEAM (Science, Technology, Engineering, Arts, and Math) education initiatives as the path to building the workforce of the future
  • Challenges of keeping the humanity in technology in the age of analytics and technological transformation

Speaker

Missy Young
Chief Information OfficerSwitch
TuesdayBreakout Presentation

close Unlocking the mysteries of common sense data security implementation a.k.a. don’t be that annoying guy!

Cyber SecurityRockefeller University - CISO

Data security controls are critical to protect valuable information assets; however, they are only effective if users actually implement them. This presentation will describe techniques to implement security policies while still maintaining positive relationships with your end-users. Choose security controls wisely and make them count!

Key Takeaways:

  • Practice what you preach
  • Don’t be intimidated by information security or ease-of-use
  • Know your organization, its usage patterns and culture in order to determine what they consider acceptable
  • Be able to switch roles from guru technician to non-techie end-user

Speaker

Marty Leidner
CISORockefeller University
TuesdayBreakout Presentation

close The Phish Are Biting...Tales From the Pond

Phishing / RansomwarePiedmont Healthcare - CIO

Phishing is the #1 attack vector in healthcare. The speaker will share real data and experiences from his organization’s 18 month campaign to improve their cybersecurity posture against this threat.

Key Takeaways:

  • Cultural shifts are difficult yet vital for enhance cybersecurity
  • There are multiple [potential] unwanted side effects from trying to do the “right thing” regarding phishing
  • Having the right tool, like for any endeavor, is paramount
  • Measure, adjust, measure some more, adjust some more…you are never “done”

Speaker

Mike House
CIOPiedmont Healthcare
TuesdayBreakout Presentation

close SUSE: Enabling Transformation from Edge to Core to Cloud

Digital TransformationSUSE - Technology Strategist

We will discuss how SUSE views the Digital Transformation that catches so much attention in the IT & business community today. What it can do to enable your business to achieve, the challenges often encountered on the journey and how SUSE is preparing to enable you to build, deploy, and operate your infrastructure and applications from the edge to the core to the cloud.

Key Takeaways:

  • SUSE Core Values
  • Digital Transformation
  • Consistent Platform from edge to core to cloud
  • Enterprise Resiliency and Scale
  • Deployment and Lifecycle Management
  • Application Delivery
  • Multi-cloud Management

Speaker

Cameron Seader
Technology StrategistSUSE
TuesdayBreakout Presentation

close Helping the World through Digital Transformation

Digital TransformationWorld Vision International - Global Chief Information Officer

In this digital transformation session Scott will discuss and explore the digital enabling of an organization from strategy to support, apps to data and methodologies to mindsets.

Key Takeaways:

  • Digital is Pervasive – from Strategy to Culture
  • Digital is Agile – with Alignment with Autonomy
  • Digital is Transformative – Apps to Data and Analytics
  • Digital if Fundamental – from Poverty to Empowerment

 

Speaker

Scott Mills
Global Chief Information OfficerWorld Vision International
TuesdayBreakout Presentation

close The New Era of Evasive Phishing: Why It’s Happening and How to Stop It

Ransomware/PhishingCyren - Senior Security Engineer
Cyren - Regional Security Account Director

Phishing is increasingly getting through to users and is the top source of breaches at companies. The rise of the Phishing-as-a-Service industry is driving phishing volumes while making attacks more targeted and sophisticated. This new era of evasive phishing requires not just new detection countermeasures, but a new security architecture.

Key Takeaways:

  • What is “evasive phishing,” what are examples of techniques being applied, and what has been the impact on IT security?
  • What’s currently on offer from the “Phishing-as-a-Service” industry, and what happens when they start using AI?
  • What does the growth of Office 365 mean for phishing security?
  • In the cat-and-mouse game with the cyber criminals, what’s the next move in terms of security architecture?

Speaker

Sam Wolfshohl
Senior Security EngineerCyren
Chris Hegberg
Regional Security Account DirectorCyren
TuesdayBreakout Presentation

close A New Paradigm for Attack and Defense

CybersecurityGrand Canyon Education - CISO

The ideal strategy for cybersecurity needs to include a way to adapt modern controls to the actual attack methods that we all see each day.

Key Takeaways:

  • How to establish fundamental controls / the hard outer shell
  • How to implement vulnerability management and penetration testing
  • How to roll-out data protection and DLP
  • Strategies for IAM / Identity and Access Management

Speaker

Mike Manrod
CISOGrand Canyon Education
TuesdayBreakout Presentation

close Your Data is at Risk and Your Employees Don't Know It

Phishing / RansomwareHudson County Community College - CIO

For those of us in non-profit world, particularly, our data is in high demand. Everywhere, budgets are tight. Is your team aware of the danger lurking to steal the personal information and valuable intellectual property that you possess? Learn about our modern cyber landscape, and some methods for changing the risk levels at your institution.

Key Takeaways:

  • Cyber crime is growing worldwide
  • Cyber criminals are determined to get your data
  • Most data breaches have a human cause
  • All organizations can increase their security, step by step

Speaker

Patricia Clay
CIOHudson County Community College
TuesdayNetworking

Lunch

Executive Steering Committee

Experienced IT leaders work with us to focus our program on trends that will move the needle at your company.

Steering Committee Members

Steven ThompsonVP of IT
US Medical Management
Bill BalintCIO
Indiana University of Pennsylvania
Peter AndersonCIO
GCRTA
Daniel BergerSVP Technology Risk Management
PNC
Michael WoodrowCIO
Avamere Health Services
Jim GilbertCTO
City of Rapid City
Bill YoungVice President of Digital Transformation / CIO
Butler Community College

An Esteemed Audience

Over 80% of the Fortune 100 joins us each year for what has been voted the “most effective trade show” for over a decade. Use our tools to demonstrate ROI to your C-Suite.

Attendee Testimonials

Attendee List

Exhibitors

CIO Visions has quickly become established as the “deal generating show”.

Exhibitor Testimonials

Exhibitor List

About CIO Visions

CIO Visions is an invitation-only trade show for IT executives that bridges you to the most compelling solutions and information for your crowning priorities.

Have Questions?

We’ve answered a few FAQs to get you started. For any other questions, please don’t hesitate to contact us!

Our Team

Matt Velaer

Conference Director
(424) 334-5145
Send Message

Marin Silvers

VP of Operations
(424) 334-5141
Send Message

Hannah Greenlee

Attendee Relations Executive
(424) 334-5159
Send Message

Britt Erler

Content Director
(424) 389-3287
Send Message

Shanna Delfs

Account Executive
(434) 334-5161
Send Message

Marissa Marsh

Account Executive
(424) 313-1172
Send Message

Andrea Gomez

Account Executive
424-334-5149
Send Message

Hotel and Travel

Your conference pass includes overnight accommodations, travel reimbursement, meals and cocktail receptions.

The Hotel

Renaissance Schaumburg

Experience refined style at the Renaissance Hotel in Schaumburg where stunning design blends seamlessly with impeccable service.

Our Schaumburg hotel accommodations boast stylish design and luxurious comfort. Located in an accessible hub with a sophisticated collection of retail and culinary options such as Sam & Harry’s and Woodfield Mall, this Schaumburg, Illinois hotel serves as an indigenous ambassador for entire Chicagoland area…and a gateway for the entire Midwest.
Accommodations must be booked through the conference organizers and not through the venue directly. To book your stay please contact:
The nearest airport is Chicago O'Hare International Airport (ORD), which is less than 15 miles away. Alternatively, you may fly into Chicago Midway International Airport (MDW). This hotel does not provide shuttle service. Taxis are readily available at the airport.
The Renaissance Schaumburg  | 1551 N. Thoreau Drive Schaumburg, IL 60173
×