Renaissance Schaumburg

What You Get

Our ‘invitation-only’ approach allows us to provide exceptional service for our audience.


Conference Pass

Full access to the event, from educational sessions to networking events.


Flight Voucher

Traveling more than 100 miles? We'll help with a $200 flight reimbursement.


Overnight Hotel

We cover the first night and offer a discounted rate. Spouses welcomed.


5 Star Catering

Let us treat you to breakfast, lunch, networking receptions and dinner.

Who You'll Meet

A unique engagement opportunity with Fortune 100 and 500 enterprises.


Influential Peers

Learn from the best in the field and walk away with actionable insights.



Gain valuable and actionable insights from knowledgable IT experts.


Leading Partners

Meet only the solution providers most relevant for your projects and initiatives.



Unparalleled networking opportunities with high profile industry leaders.

What You'll Do

Your registration creates a truly customized agenda based on your specific areas of responsibility, challenges and interests.


Peer-Led Learning

Spend most of your time participating in educational sessions and networking activities.


Educational Sessions

Keynotes, case studies, plenary sessions, industry panel discussions, and more.


Networking Activities

The ideal event to connect with peers who can truly make a difference to your career.


Research Meetings

Discover and validate leading solutions guided by knowledgable executives.

play_circle_outline Watch Video


A 100% peer-driven educational program centered around 6 key themes addressing the entire IT spectrum.


Key Themes

close CIO Leadership & Innovation
  • How to Personalize A.I. and Customer Engagement
  • Leadership Challenges and the Resistance in Changing Processes
  • Strategies on IT Governance – Budgeting and Prioritization
  • Vendor Relations & Contract Negotiations
  • How to Strive in an Environment Where Stated Goals Do Not Match Observed Behavior
  • Understanding the Mechanics of Teaching & Delivering
  • Managing IOT Infrastructure Growth Without the Infrastructure Staff
  • Advantages & Disadvantages of Public vs Private Cloud
  • Staffing Changes in a Cloud Environment
  • Controlling Cloud Costs: Leveraging Cloud to Drive Your IT Cost Down
  • Challenges & Opportunities When Switching to the Cloud
  • Developing a Mobile Cloud Strategy for Business
  • Cloud Based Initiatives How to Support Cloud vs. Security
  • Network Integration Between Public and Private Cloud
  • The Future of VoIP & It’s Reliability
  • Security Protocols: Network Security/Cyber Security/Data Security
  • The Use of AI in Data Security: Today’s Opportunities and Challenges
  • Successful Data Governance Approaches
  • Lowering the Risk of a Data Breach When Using the Cloud
  • Protecting Unstructured Data: How Secure Do I Need to Be?
  • Network Visibility and Integration with Security Needs
  • BYOD-Wireless Protection: Implementing Company-Wide Phone Wipes
  • How Do We Make It Easier to Keep Ourselves and Our User Communities Safe?
  • Integration of Security into Strategic Planning Processes and Operations
  • Security vs. Ease of Access
  • Disaster Plans & Business Continuity


Get insights from 20+ specialized IT executives making way in the ever-changing world of emerging technologies. Presenters for the Fall 2018 event include:

CIO VISIONS Leadership Fall Summit View More

Bill Packer


American Financial Resources

CIO VISIONS Leadership Fall Summit View More

Jim Gilbert


Rapid City South Dakota

CIO VISIONS Leadership Fall Summit View More

Eddie Ho


Los Alamos National Bank

CIO VISIONS Leadership Fall Summit View More

Matthew Mandich

Director, Commercial Strategy

Info-Tech Research Group Inc.

CIO VISIONS Leadership Fall Summit View More

Adip Dsouza

Director of IT

Professional Finance Company, Inc

CIO VISIONS Leadership Fall Summit View More

Tom Jurlina


National Able Network Inc

CIO VISIONS Leadership Fall Summit View More

Karthik Devarajan

Director of IT

Legal Aid Bureau

CIO VISIONS Leadership Fall Summit View More

Douglas Duncan


Columbia Insurance Group

CIO VISIONS Leadership Fall Summit View More

Carolyn Bogan

VP, IT Shared Services

KAR Auction Services


Make every session valuable by selecting up to 3 key themes to mix and match the most relevant topics to you.

Reset Filter
CIO Leadership & Innovation
Cyber Security
Data Management - Strategy for Storage and Analytics

Welcome Cocktail Reception & Registration


Breakfast Buffet

Monday, June 11Keynote Presentation

close Digital Transformation – Six Steps to Success

CIO Leadership & InnovationHitachi - SVP, Practice Lead

Digital transformation – driving operational improvements in your physical value stream using connected data from your digital value stream – is delivering unprecedented value across industries to those with a clear road map. In fact, a recent Harvard Business School report shows that companies that embrace digital transformation attain significantly better gross margins, earnings and net income than those that don’t. What’s more, those digital leaders are not spending much more on IT than laggards because the big investments have already been made. The challenge is knowing how to connect the data from the digital value stream to drive continuous improvement with real-time metrics and predictive analytics. No matter where you are on the journey of digital transformation – these six steps can help you connect your systems to drive new levels of productivity, profitability and value across your business.

Key Takeaways:

  • Learn how to connect your physical and digital value streams to create near real-time operating systems.
  • Identify areas of variation across the physical value stream that can be supported by better data and real-time analytics.
  • Gain knowledge through strategic partnerships with digital leaders to accelerate your journey to unlocking more organizational value.


Stephen Engel
SVP, Practice LeadHitachi

Targeted Research Meetings

Expo Hall
Monday, June 11Breakout Presentation

close A Strong Relationship is Needed in These Trying CyberSecurity Times

Cyber SecurityTCF Bank - EVP, CISO

Opening discussion of today’s environment around CyberSecurity threats.  Presentation moves into what a CIO should expect from a CISO in these times along with what should a CISO expect from a CIO to ensure a successful and effective working relationship.

Key Takeaways:

  • Understanding of the cybersecurity world from a CISO perspective
  • Expectations of a CISO
  • Expectations of a CIO from a CISO perspective
  • Tips for an effective CIO/CISO relationship


Tris Lingen
Monday, June 11Breakout Presentation

close Adopting Android for a Mobile Workforce

CIO Leadership & InnovationSaint Elizabeth Health Care - CIO

This presentation will outline the 7 year mobility journey of one of Canada’s leading homecare agencies, and will present the challenges faced during the four iterations of the mobile platform, what prompted the change, and how this has challenged the IS team in terms of providing support and leadership to the organization.

Key Takeaways:

  • Why Android and not IOS
  • Implications of changing devices (Smartphone vs Tablet)
  • Resources needed for support
  • Unexpected consequences


Roy French
CIOSaint Elizabeth Health Care
Monday, June 11Breakout Presentation

close A.I. - The Future Technology Disruptor of all Industries and Sectors

CIO Leadership & InnovationNova Southeastern University - CTO

Over the last few years, Artificial Intelligence (A.I.) has been gaining momentum across all industries and all spectrums of the world from consumer solutions such as Siri and Alexa leveraging Machine Learning to disruptive technologies such as Uber and Lyft as well as Social Media channels such as Facebook, Instagram, Snapchat and Twitter to the extreme side of Quantum computing attempting to solve the world’s biggest and most complex challenges. Some of the key advantages of A.I., are the ability to gain deeper knowledge from data, and to leverage that intelligence into providing significantly better services, support, marketing and sales efforts so as help accelerate, grow and scale companies and organizations across the globe and industries.

Key Takeaways:

  • Understand what is AI
  • How to apply AI
  • Key disruptors of AI in Higher Ed
  • Additional opportunities of AI


Christopher Harrison
CTONova Southeastern University
Monday, June 11Breakout Presentation

close Connecting Today’s Enterprise Workforce with Collaborative Communications

CIO Leadership & InnovationRingCentral - Sr. Director of Solutions Engineering

Successful organizations are finding competitive advantage by transforming their workplaces with increased employee connectivity. Join us in this session to learn more about how these forward-thinking enterprises transform the way they communicate, collaborate, and connect through the cloud; which services they’ll consume; and how this new environment will change the way IT supports end users’ evolving needs for a more connected digital workplace.

Key Takeaways:

  • Increased employee productivity
  • Creating a better, more streamlined customer service experience
  • Enabling a geographically dispersed workforce to connect via voice, video, and messaging


Timothy Renollet
Sr. Director of Solutions EngineeringRingCentral
Monday, June 11Breakout Presentation

close Debunking Cybersecurity Myths Around Public Cloud

Cyber SecurityNational Able Network Inc - CIO

Most organizations claim to have a cloud first mentality. Everyone knows that cloud computing is here to stay and is a necessary business driver. Unfortunately, cloud security myths keep circulating causing many IT executives to delay, fear and drag their feet with public cloud adoption. Presentation will delve into some of these myths.

Key Takeaways:

  • Cloud typically provides better protections than on premise
  • Easier management and reporting with cloud solutions
  • More cloud security resources and stopping shadow IT
  • Easier BYOD and less hardware/user management


Tom Jurlina
CIONational Able Network Inc
Tuesday, June 12Breakout Presentation

close Getting Better Every Year

CIO Leadership & InnovationWater Street Healthcare Partners - CIO

CIO’s complain about a lack of budget, but by delivering on the same work as last year with 10% more efficiency, there is “free money” to be found and spent on cool, new things. If the business were to be exactly the same as last year, IT should be able to deliver the same for less money. This is your source of innovation, staff development, and “slush” funds.

Key Takeaways:

  • You must get better every year
  • The money you save is the same as additional budget
  • Your ability to articulate this separates you from others
  • You should be able to spend this money to do cool things!


Paul Cottey
CIOWater Street Healthcare Partners
Monday, June 11Breakout Presentation

close Combating Broken Culture With DevOps

DevOps StrategyPSC Group LLC - Business Solutions Director

The time for IT leaders to play a pivotal role in business strategy is now. So how do you disrupt the sometimes-contentious relationship between IT and the business to affect real organizational change? This session provides a blueprint for transforming IT’s relationship with the business by delivering measurable value with open and honest communication in both directions, drawing from consulting experience introducing Agile and DevOps to clients large and small. We’ll cover landmines to watch out for, common paths to quick wins, useful tools and lessons learned from successful and not-so-successful Agile projects. When we’re done, you’ll understand the impact that Agile and DevOps can have not only on IT culture, but on the culture surrounding the critical partnership between IT and the rest of the business.

Key Takeaways:

  • Transforming IT’s relationship with the business by delivering measurable value with open and honest communication in both directions.
  • Landmines, common paths to quick wins, useful tools and lessons learned from successful and not-so-successful Agile projects.
  • Understand the impact that DevOps can have not only on IT culture, but on the culture surrounding the critical partnership between IT and the rest of the business.


Chris Johnson
Business Solutions DirectorPSC Group LLC
Monday, June 11Breakout Presentation

close Digital Innovation @Enterprises

CIO Leadership & InnovationTechBlocks - CEO

Although this sounds like an oxymoron – this can be done and has been done. Let’s break down some simple yet successful steps and frameworks that IT executives can mobilize to innovate and make simple digital solutions a reality while transforming businesses.

Key Takeaways:

  • Modernization is not transformation. How can we use modernization as an opportunity to innovate and transform within an enterprise?
  • Learn the ethos, process and environment needed for digital transformation
  • Re-imagine and revitalize your business through an innovation lens
  • Building an agile digital product engineering mindset and culture. How to quickly build and mobilize it with an enterprise
  • Simple case studies of traditional enterprise IT teams building digital eco-systems and products for their clients and stakeholders and creating new lines of revenue and expanding new digital business horizons


Prashant Kumar
Monday, June 11Breakout Presentation

close Giving Up Privacy for Convenience

Cyber SecurityEbsco - CIO

As employees and customers demand improved connectivity, mobile solutions and instant access to information, IT leaders face the issue of privacy in an increasingly connected world. How should CIOs think differently to better protect valuable corporate assets while providing access and service? In this session, Ryan Loy surveys the current digital landscape, offering an overview of behavioral risks to security, mitigation strategies and key questions to benchmark yourself and your organization. Learn how to break away from traditional methods and embrace the societal shift toward a digital generation.

Key Takeaways:

  • Discussion on current digital landscape
  • Overview of behavioral risks to security
  • Mitigation strategies
  • Key Questions to grade yourself/organization


Ryan Loy
Monday, June 11Breakout Presentation

close A New Approach to Email Security

Cyber SecurityVadeSecure - Pre-sales Engineer

Through real-life examples, learn how malwares can easily circumvent classical detection methods such as fingerprint, reputation and sandboxing, and discover how Vade Secure unique predictive email defense can stop ransomwares and phishing attempts before they reach your employees.

Key Takeaways:

  • Email Security
  • Ransomware
  • Phishing


Romain Basset
Pre-sales EngineerVadeSecure
Monday, June 11Breakout Presentation

close Does Agile Work in All Software Development Projects? When Does it Work? When Does it Hurt?

DevOps StrategyInformation Clearinghouse Inc - CIO

In one camp, you have the traditional project approach to Software Development, where development is handled as a linear series of events from conception to production. In the other camp, you have Agile, a flexible, team-centric, iterative approach to lean development. Both strive to streamline the way we get software development projects done, just in different ways. So what makes these two workflow management approaches different? When does Agile work? When does it hurt?

Key Takeaways:

  • Understanding the differences between Agile and Traditional project Methodologies
  • What are the pros and cons of each?
  • When does the Agile approach work?
  • When does the Agile approach hurt?


Joseph Costello
CIOInformation Clearinghouse Inc
Monday, June 11Breakout Presentation

close Security Fabric: Bridging Security Gaps to Solve Business Needs

Cyber SecurityFortinet - Office of the CTO

Current technology trends are creating a cybersecurity skills gap that many enterprises experience today, the ability to quickly and effectively audit, recommend and automatically fix the entire network security architecture is critical. A new security architecture is needed, 3rd generation cybersecurity technology automates and orchestrates the response across 3rd party vendors.

Key Takeaways:

  • Technology evolution and innovation are exponentially expanding the attack surface.
  • To keep up, enterprises must take an architectural approach to network security that includes visibility and automation.
  • With limited resources, the ability to quickly and effectively audit, recommend and repair network security is crucial.
  • Threat intelligence, shared in real-time, between 3rd party products are required to meet the continuously changing landscape.


Jason Graun
Office of the CTOFortinet
Monday, June 11Breakout Presentation

close Future Workforce: How Globally-Distributed Teams Are Transforming Talent Acquisition, Management and Retention

CIO Leadership & InnovationToptal - Co-Founder & CEO

Businesses are increasingly pressured to innovate, deliver quickly, and respond instantly to changes in the competitive landscape. In order to thrive, businesses will need to evolve the talent strategy within their organization — developing the ability to rapidly assemble, lead, and manage blended teams as a core competency.

Key Takeaways:

  • Understand the different types of talent in the human cloud, and why there is no “one size fits all” answer.
  • Develop ideas to enhance the talent management strategy of their organization.
  • Understand and implement the core competencies required to maximize the value delivered by the Human Cloud and a blended workforce.
  • Build a workplace that is attractive to a wide range of talent, including freelance and globally distributed talent.


Taso Du Val
Co-Founder & CEOToptal
Monday, June 11Breakout Presentation


CIO Leadership & InnovationCity of Las Vegas - Deputy Director of Information Technology/Deputy CIO

From waste management and lighting to public safety and parking, when cities undergo a digital transformation it literally changes the way we live, work and play.  Creating a connected city requires planning, great relationships, partnerships and a keen insight into understanding the amenities and benefits society demands.  Las Vegas is creating a city for the future, partnering with regional and national agencies and companies, Las Vegas looks to provide services and opportunities that empower individuals while creating a culture that is always working towards building community to make life better.


Lester Lewis
Deputy Director of Information Technology/Deputy CIOCity of Las Vegas



Targeted Research Meetings

Expo Hall
Monday, June 11Breakout Presentation

close Leadership Framework for Building Elite Teams

CIO Leadership & InnovationColumbia Insurance Group - CIO

Building an elite team is hard, and having a good plan may not be enough without a framework customized for your specific organizational environment. We will examine six key relationships, such as the intersection of management approach versus organizational design. The insights provided will improve your team building success.

Key Takeaways:

  • Building elite teams requires understanding the organizational environment
  • Evaluating the relationship between key environmental factors within the company provides insights into optimal approach
  • Organizational conditions need not be ideal for building an elite team


Douglas Duncan
CIOColumbia Insurance Group
Monday, June 11Breakout Presentation

close Think a Cybersecurity Incident is an Emergency, Then Run it like a Fire Chief!

Cyber SecurityDavenport & Company - CTO

Cybersecurity incidents can happen at any time. Learn to use an expandable incident command framework that has been used to manage emergency incidents from large wildfires to small automobile collisions in fire, law enforcement and emergency medical services and see how this translates to cybersecurity and other incidents.


Jeffrey Potter
CTODavenport & Company
Monday, June 11Breakout Presentation

close SD-WAN for Global Application Deployments: Key Metrics

Data Management – Strategy for Storage and AnalyticsAryaka Networks - Sr. Director, Product Management

The software-defined era is reshaping how global enterprises conduct business at a significant rate. The remote and mobile workforce is increasing rapidly. Mission-critical applications, such as Office 365, voice and video, and ERP systems are moving to the cloud. Businesses also continue to expand globally. This PoC will dive into a how a global SD-WAN can deliver any application to end users around the world with faster performance through a first-hand look at Aryaka’s web-based MyAryaka portal. The MyAryaka customer portal offers deep, end-to-end network and application visibility for Aryaka’s 800+ global enterprise customers. MyAryaka is an application-aware network performance tool that provides a real time view of network configuration, performance, and health. Applications, locations, links, protocol, or port level statistics provide a clear picture of both network utilization and overall application performance for all applications. Additional features include advanced traffic analysis and the ability to zoom into a granular view of what is happening over the enterprise network.

Key Takeaways:

  • Live demonstration of MyAryaka dashboard.
  • Customer use case focusing on metrics
  • Real time view of network configuration, performance, and health


Mouli Radhakrishnan
Sr. Director, Product ManagementAryaka Networks
Monday, June 11Breakout Presentation

close Next Gen IT Demands Next Gen IT Service

CIO Leadership & InnovationMSPWorx - CEO & Founder

As a user in a consumer driven world, instant access and immediate problem resolution has become our expectation.  With online shopping and an array of Apps for any need, we are skipping the lines and expecting some level of automation to prepare and complete our requests as we type.

In many ways, a smart phone is our portal to product and services and is safe to say, most people cannot function without it. If our personal lives have been so greatly enhanced by this use technology, why are so many businesses continuing to deliver internal IT service as they did years ago, by forcing users to;

  • Waiting in lengthy ticket queues
  • Physically call into a support desk
  • Manually troubleshooting each ticket

Technology has evolved at a staggering pace and it is time to challenge the user experience and adopt a user centric thinking and technology consumption model. We live in a world of offices without walls and can work whenever and wherever we want, although this has given users flexibility and increased productivity it has drastically changed the landscape for IT support.  The role of an IT administrator has been stretched to every corner of the globe, raised into the clouds and actively being target by cyber-criminals and advanced persistent threats (APTs).

Join MSPWorx CEO Mark Scott for a frank discussion on key considerations on providing our end-users with the technology they need to be affective while ensuring your business is running securely and efficiently.  He will discuss leveraging next gen IT Service Management tools like ServiceNow, IBM Watson and unified endpoint management through remote monitoring and management that are helping organizations Live the Managed ITSM Dream.


Mark Scott
CEO & FounderMSPWorx
Monday, June 11Breakout Presentation

close How to Leverage Cloud Technologies and When

Cloud StrategyCanary Speech - SVP of IT

Today’s technology platforms enable companies to approach team building, training and selling opportunities in ways that were previously unimaginable. This quantum leap forward has introduced new challenges: as we scramble to implement the latest and greatest, we may not allow our previous technology investments to reach their full promise.

Key Takeaways:

  • How to leverage Cloud technologies and when
  • How will AI affect your Cloud Strategy
  • Understand that change has changed
  • When to cut and run away from an investment


Moy Chambers
SVP of ITCanary Speech
Monday, June 11Breakout Presentation

close Knocking Down Security Silos - How Signal Correlation is the Path Forward

Cyber SecurityCatapult Systems - Director of Security & Compliance Solutions

The signals are already there to give you a better understanding of the threats your organization faces but are you listening? Joe Kuster, Director of Security & Compliance Solutions at Catapult Systems, will be covering how Security Silos prevent your IT tools and services from succeeding and the benefits of having an enterprise view of your security state.

Key Takeaways:

  • Signals Intelligence
  • Compromised Account Detection
  • Threat Analytics & Cloud Security
  • User & Device Behavior & Risk Analysis


Joe Kuster
Director of Security & Compliance SolutionsCatapult Systems
Monday, June 11Breakout Presentation

close Remove Business Friction with Risk-Adaptive Security

Data Management – Strategy for Storage and AnalyticsForcepoint - VP, Product Marketing

Macro IT trends around cloud adoption and BYOD are greatly expanding the threat landscape faced by security organizations who can’t keep hiring to cope with the increasing levels of exposure. Security organizations must evolve from a threat-centric reactive environment in order to offer more effective cyber-security. What if there was a solution which could adapt protection dynamically and apply monitoring and enforcement controls, offering protection based on the risk level of users and the value of data accessed? This could enable security organizations to better understand risky behavior and automate the enforcement of policies, dramatically reducing the quantity of alerts requiring investigation and providing more efficient cyber-security.  Join in the discussion around the next generation of data protection.


Ben Tao
VP, Product MarketingForcepoint
Monday, June 11Breakout Presentation

close It's All About Them...Your Employees!

CIO Leadership & InnovationKAR Auction Services - VP, IT Shared Services

Your employees will determine the success of your business. Focusing on your employees’ well-being and happiest does matter in today’s work environment. The company first mentality is a thing of the past. Taking the time to “get to know” your workforce, not just their skillset, will increase employee’s engagement. It’s all about them, our employees!

Key Takeaways:

  • The benefits of a strong employee-centric work environment
  • Tools to help you understand your employee’s engagement
  • How to create structure to sustain employee engagement


Carolyn Bogan
VP, IT Shared ServicesKAR Auction Services
Monday, June 11Breakout Presentation

close Artificial Intelligence and the Future of Cyber Defense

Cyber SecurityDarktrace - Director

Cyber security has turned into an arms race—machines fighting machines on the battleground of corporate networks. Catching today’s most sophisticated cyber-attacks requires finding the slightest and subtlest anomalies inside networks containing millions of constantly changing data points, where billions of events take place every day. Artificial intelligence-based systems are now being deployed to continually assess complex business environments. Known as ‘immune system’ cyber defense, this approach is used to uncover threats that have already penetrated the network border and then autonomously respond, fighting back with precise, targeted actions. Learn how to distinguish the hyperbole surrounding machine learning from proven AI technology that delivers real results for organization of all sizes – and stops attackers in their tracks.

Key Takeaways:

  • New machine learning and AI algorithms that are automating advanced cyber defense
  • The many ways AI can augment human security teams
  • How to navigate the challenges of implementing AI in a business environment
  • Real-world examples of unknown threats detected and contained by ‘immune system’ technology


Parker Ashley
Monday, June 11Breakout Presentation

close Moving from Data Assets to Data Currencies

Data Management – Strategy for Storage and AnalyticsUniversity of California System - VP & CIO

Most organization understand and have built their strategies for “Data as an Asset.” Far fewer have fully leverage the full potential of data in a way a venture or private-equity firm would think about it. For those that do, they evolve their strategies to be “Data as a Currency” and think broadly about not only its uses but the ecosystems it may stimulate, evolve or create.

Key Takeaways:

  • Understand “Data as a Currency” thinking
  • Exposure to a methodology for DaaC thinking
  • Specific examples from companies & the extreme value they create


Tom Andriola
VP & CIOUniversity of California System
Monday, June 11Breakout Presentation

close How to Maximize Your Software Selection and Negotiation

CIO Leadership & InnovationTechnology Evaluation Centers - VP of Software Selection

Selecting the right Software (ERP, HCM, BI…) solution is key to improving your business productivity and achieving your growth plans. As a Global Consulting and Advisory firm with 25 years in the market, TEC prepared a presentation that will help you select software solutions that best fit your company’s needs, support growth and manage risk. We’ll Show you how to negotiate the best deal.

Key Takeaways:

  • Use a structured easy to follow approach to Software Selection and Negotiation
  • Get expert advice to Save Time, Money and mitigate Risk in your evaluation
  • Why scoring the solutions overall including all the deciding factors in your evaluation is critical
  • Build an audit trail and consensus among the stakeholders, leveraging the information for your selection and negotiation


Michael Thaw
VP of Software SelectionTechnology Evaluation Centers
Monday, June 11Breakout Presentation

close Question Everything: Guiding Data Science Projects Through Questions

Data Management – Strategy for Storage and AnalyticsRapid City South Dakota - CTO

Asking the right questions during all phases of the project can be the difference between success and failure. Knowing the right questions to ask is difficult, especially if you don’t have a Data Science background. This presentation will help you guide your projects by asking these questions.

Key Takeaways:

  • The importance of scoping a data science project correctly
  • Understanding Mode and Method
  • Building a successful project team
  • Ways to recognize and eliminate bias


Jim Gilbert
CTORapid City South Dakota
Monday, June 11Breakout Presentation

close Zero Trust Access: Five Steps to Securing the Distributed Enterprise

Cyber SecurityDuo Security - Security Advocate

The perimeter-based security approach of the last century is no longer adequate for securing the modern enterprise. Today, organizations must secure a mobile workforce that uses a mix of corporate-owned and personal devices to access cloud-based applications and services, often from outside corporate networks. The zero trust access model delivers that security without cumbersome and antiquated technologies such as VPN and MDM.

Key Takeaways:

  • Learn how the zero trust access model works
  • Learn how leading organizations such as Google use this approach to secure access to their critical applications and data
  • Learn how you can implement this model in your organization in five logical steps


Zoe Lindsey
Security AdvocateDuo Security

Industry Dinner


Breakfast Buffet

Tuesday, June 12Keynote Presentation

close Steph Curry Cybersecurity:  Nothing But Net!

Cyber SecurityGoPro, Inc. - CISO

At RSA 2017, over 75% of the CISOs polled said they were looking for new positions.  Are CISOs wearing out their welcome with employers? In their effort to secure the company’s sensitive data, many CISOs end up alienating many of their colleagues or creating “hostile work environments.”  Is it a requirement of the job that CISOs live at odds with their organizations?

This session will present helpful tips on keeping your company secure while maintaining positive relationships and job security; what we in the security community might call a true “nothing but net” play.


Todd Barnum
CISOGoPro, Inc.

Targeted Research Meetings

Expo Hall
Tuesday, June 12Breakout Presentation

close Moving Operational Computing Resources to Microsoft Cloud

Cloud StrategyLegal Aid Bureau - Director of IT

The focus will be specifically on how Maryland Legal Aid extended its on-premises infrastructure and operational computing resources to the cloud and provide some real world scenarios on what workloads you could move to Azure for minimal cost. There will be a live demonstration of Azure portal.

Key Takeaways:

  • Better insights on Microsoft Azure Platform
  • Simple services that could be moved to the cloud
  • Identify if cloud is a better fit


Karthik Devarajan
Director of ITLegal Aid Bureau
Tuesday, June 12Breakout Presentation

close Defending Against the 2018 Threat Landscape

Cyber SecurityWatchGuard Technologies - Sr. Security Analyst

This year is shaping up to be a busy year for cyber security. Before we can defend our networks against these modern attacks, we need to know what to expect. In this talk we’ll discuss the state of security in 2018, including the attacks targeting our data, our users and our devices. We’ll then dive in to the tools and training available to protect our networks against these threats.

Key Takeaways:

  • The top threat trends of 2018 including predictions of what to expect in the second half of the year
  • The top 5 attack methods attackers are using in 2018
  • The technical and procedural controls you can implement to defend against the threat landscape


Marc Laliberte
Sr. Security AnalystWatchGuard Technologies
Tuesday, June 12Breakout Presentation

close Deliver a Better User Experience by Experimenting with Design

CIO Leadership & InnovationTopcoder - VP of Platform Services

There’s no shortage of ideas for new apps or websites that can help your business. But it can be difficult to develop — let alone come up with — the best idea. It’s time to think differently about ideation, and experiment with multiple design ideas to transform the user experience.

Key Takeaways:

  • Explore the art of the possible and pursue multiple ideas through design
  • Leverage design to refine web and app development requirements
  • Understand when to use exploratory design vs. executional design
  • Incorporate open innovation into your projects


Joey Poarch
VP of Platform ServicesTopcoder
Tuesday, June 12Breakout Presentation

close How Do We Make it Easier to Keep Ourselves and Our IT Communities Safe?

Cyber SecurityAmerican Healthcare LLC - CISO & VP of IT

Understand and spread the importance of online safety. Ensure protection of information from email to a friend to financial and medical records. As with most environments, the use of wireless networks sometimes provides more vulnerabilities than usefulness. With all the malware (especially ransom-ware) exploding, training and awareness is key to protecting personal and business information.

Key Takeaways:

  • Online? How to relax
  • Ransom-ware is on the rise and everyone has to be aware
  • The internet is useful but dangerous so understand how to use technology to protect yourself
  • Best practices to enforce procedures to ensure safe computing in your place of business


Jim Garrett
CISO & VP of ITAmerican Healthcare LLC
Tuesday, June 12Breakout Presentation

close Business Intelligence - Everything You Need to Know to Get Started

Data Management – Strategy for Storage and AnalyticsProfessional Finance Company, Inc - Director of IT

Business Intelligence is extremely important in today’s world. It is absolutely imperative every organization uses BI to gain insights into consumer behavior, improve visibility in their organization, and turn data into actionable information. In turn, this will significantly improve efficiency. BI systems must be made available to the entire organization to fully reap all the benefits.

Key Takeaways:

  • Understand the importance of BI
  • How to plan for a successful BI system
  • How to obtain organization wide buy-in


Adip Dsouza
Director of ITProfessional Finance Company, Inc
Tuesday, June 12Breakout Presentation

close Locking Down Access to Ephemeral Cloud Workloads

Cloud StrategyRemediant - CEO

Organizations should look at how to automate and lock-down administrative privileges as workloads are spun up in the cloud. Using stolen administrator credentials is the #1 method attackers use to breach your organization. CEO and co-founder Tim Keeler will walk us through the process of the Do’s and Don’ts for administrative access in the cloud.

Key Takeaways:

  • Accelerate your security posture as you move to the cloud.
  • Build in secure configurations for admin access inside your CI/CD ecosystem.
  • Deploy security in a fashion that doesn’t impede operations.
  • Achieve regulatory and compliance standards, such as GDPR, PCI, SOX in the cloud.


Tim Keeler
Tuesday, June 12Breakout Presentation

close IT Turnaround: Strategic Rebuilding

CIO Leadership & InnovationLos Alamos National Bank - CIO

Information technology is the center-point of all business operations. Degeneration of I/T is common in a wide variety of businesses due to neglect. As a turnaround CIO, I have experienced this in many industries, and have been brought in to perform quick turnarounds to mitigate serious risks to the company. The risks include critical applications failure with serious customer impacts, daily front-page negative reporting, poor employee morale with high turnover, and regulators on-site conducting probes and discovery.

Key Takeaways:

  • Design the turnaround road map and flipping strategy
  • Drive the cultural program, talent refresh, and team building
  • Build standard-based internal control program: COBIT and COSO
  • Learn from real-world case studies


Eddie Ho
CIOLos Alamos National Bank
Tuesday, June 12Breakout Presentation

close Leveraging Big Data and Business Intelligence to Create Market Differentiation Through Technology

CIO Leadership & InnovationBeavEx Incorporated - CIO

Beavex Logistics is a challenger in the Courier industry. We are a nationwide provider of Final Mile Delivery services, but don’t have the brand recognition of companies such as Fedex and UPS. Since we are lesser known, we need to be faster and more progressive than our competitors. This talk will cover how we leveraged Big Data and Business Intelligence to create an innovative, customer facing Analytics Dashboard that was added to our customer portal. The Dashboard created market differentiation for Beavex, and has led to reduced churn as well as increased wins of new customers.

Key Takeaways:

  • Innovation through Technology is a powerful weapon for creating market differentiation
  • A positive online customer experience is priceless for retaining customers and winning new business
  • Innovative technology doesn’t have to be expensive and/or complex to be incredibly useful
  • Making your customer’s life easier through technology is a great way to retain them


Eric Kierstead
CIOBeavEx Incorporated
Tuesday, June 12Breakout Presentation

close The Future of SD-WAN: WAN Transformation in the Cloud and Mobile Era

Cloud StrategyCato Networks - Regional Sales Director

SD-WAN is a new and exciting opportunity to transform enterprises costly and rigid MPLS-based wide area networks (WAN). It promises to make the WAN more affordable and agile, boost capacity, and improve resiliency. But, SD-WAN goes far beyond replacing MPLS. It can optimize global connectivity, streamline network security, and seamlessly integrate cloud resources and mobile users into a simple coherent network. Join this session to learn: The requirements for full WAN transformation when business applications have moved to the cloud and need to be accessed from anywhere. The security challenges facing organizations with distributed locations, cloud applications, and mobile users. How the convergence of edge SD-WAN, a global backbone, and firewall as a service enables you to do more with less, and reduce costs, complexity, and risks. Real-life examples and case studies of how enterprises of all sizes use Cato Networks to securely connect their global and regional locations, mobile users, and cloud resources.

Key Takeaways:

  • The requirements for full WAN transformation when business applications have moved to the cloud and need to be accessed from anywhere.
  • The security challenges facing organizations with distributed locations, cloud applications, and mobile users.
  • How the convergence of edge SD-WAN, a global backbone, and firewall as a service enables you to do more with less, and reduce costs, complexity, and risks.
  • Real-life examples and case studies of how enterprises of all sizes use Cato Networks to securely connect their global and regional locations, mobile users, and cloud resources.


Jack Dolan
Regional Sales DirectorCato Networks



Active IT pros help us design a relevant and 100% peer-led educational program.

Steering Committee Members

Alan Larson CIO
DePaul Community Services
Antony D'Cruz VP of IT
Johnson Controls, Inc.
Audrey Williams VP of IS and CIO
Pellissippi State TCC
Bhargav Shah CIO
IntegraCore LLC
Cliff Cree EVP, CIO
Horizon Media, Inc.
Matt Morton CISO
University of Nebraska
Mark Ohlund CIO
Jon Biskner VP of IT
Nicolet National Bank
George Ingram Director General
Global Intelligence Corporation
Jim Wisnionski EVP, Customer Intelligence and CIO
Jeff Potter SVP, CTO
Davenport & Company LLC
Michael Gabriel Founder & CEO
Double Angel Productions LLC
Nader Nemati CIO
QTC Management Inc
Koby Avital CTO
Lectra Lawhorne Associate CIO and AVP
Kennesaw State University


Over the year’s we’ve help thousands of senior level IT executives connect with peers in different industries to discuss their top-of-mind directives.

Attendee Testimonials

"It’s a great event with a fresh approach on how to make these conferences more productive. I enjoyed comparing notes with the IT and Business leaders of companies who are going through rapid growth and having similar challenges. The vendor meeting format, makes the best use of time for both the attendees and vendors, to better understand their offerings in a personalized and focused environment."

"I enjoy attending these events as I am able to gather information on emerging technologies and discuss current trends, all in a short time frame. I can quickly arrive at conclusions on what will best serve my needs as an IT leader. I would recommend the event to anyone who shares leadership roles in IT as an avenue for education and real-world solutions. I find that it connects me with partners in the industry on a national global level."

"As CIOs we understand the need to network and learn from our peers and experts in the market place. The good news is that there are a plethora of opportunities for us to attend CIO centric events, but sadly, therein lies the difficulty. We have limited time and need to select the events that help us provide the best technological guidance to the enterprises we serve. Having served on many panels and chaired many sessions across many of these events, I have narrowed down the events I attend to a handful. CIO VISIONS is one of them. "

Attendee List


CIO VISIONS is the IT industry’s fastest growing event, quickly establishing a reputation as the boiling pot of information, ideas and solutions.

Exhibitor Testimonials

"CIO VISIONS continues to attract an array of bright-minded and forward thinking IT professionals, and to showcase impressive industry thought-leaders – benefits every conference goer looks to realize. The unique networking opportunities combined with the stimulating atmosphere make this event one in a class of it’s own."

Exhibitor List


North America's leading IT executive level event plays host to over 500 attendees each year. In the last decade, we’ve produced 15 large scale CIO VISIONS summits across America.


Here is a quick FAQ to help you get started. For more information contacts us, we're happy to talk to you.

Our Team

Matt Velaer

Conference Director
(424) 334-5145
Send Message

Marin Silvers

Sponsor Relations
(424) 334-5141
Send Message

Krizzle Silva

Attendee Relations
(424) 334-5159
Send Message

Riley McLaughlin

Conference Program Manager
(424) 334-5149
Send Message

Jeff Barnett

Sales Manager
(424) 334-5146
Send Message

Shanna Delfs

Account Executive
(434) 334-5161
Send Message


Your full access conference pass includes overnight accommodations, meals and cocktail receptions.

The Hotel

Renaissance Schaumburg

Experience refined style at the Renaissance Hotel in Schaumburg where stunning design blends seamlessly with impeccable service.

Our Schaumburg hotel accommodations boast stylish design and luxurious comfort. Located in an accessible hub with a sophisticated collection of retail and culinary options such as Sam & Harry’s and Woodfield Mall, this Schaumburg, Illinois hotel serves as an indigenous ambassador for entire Chicagoland area…and a gateway for the entire Midwest.
Accommodations must be booked through the conference organizers and not through the venue directly. To book your stay please contact:
The nearest airport is Chicago O'Hare International Airport (ORD), which is less than 15 miles away. Alternatively, you may fly into Chicago Midway International Airport (MDW). This hotel does not provide shuttle service. Taxis are readily available at the airport.
The Renaissance Schaumburg  | 1551 N. Thoreau Drive Schaumburg, IL 60173