Bellagio, Las Vegas

Invitation-only means an exceptional experience, on us

Coordinated by your personal concierge, a schedule is tailored to your professional goals and company priorities.

assignment_ind

Complimentary Pass

Inventive learning, renowned speakers, executive networking. All free to you.

flight

Travel Reimbursement

$200 of your travel is covered if you’re trekking over 100 miles to attend.

local_hotel

Accommodations

Your first night’s stay is on us and a discounted rate is available thereafter.

restaurant

5 Star Catering

All of your meals and libations are complimentary throughout the event.

Join IT’s Distinguished Upper Tier

A curated audience reserved for the senior level of the Fortune 500 puts you in exceptional company.

150+

Affluent Peers

Meet the people who are just as invested in leveraging technology as you are.

20+

Influential Leaders

Learn valuable strategy components from today’s very best.

40+

Proven Solutions

Meet industry leading solution providers, hand picked for your priorities.

1.5K

Connections

Take this unprecedented opportunity to connect with high profile execs.

Take this unprecedented opportunity to connect with high profile execs.

Based on your specific areas of responsibility, challenges and interests we’ll craft a personal agenda that paves your path to success.

3

Days of Insight

Jump in the discussion through focused educational sessions and networking opportunities.

40

Innovative Sessions

Keynotes, plenary sessions, industry panel discussions, case studies and more.

6

Networking Opportunities

Tie into contemporaries and mentors interested in the same avenues of opportunity as you.

10

Research Meetings

Meet one-on-one with executives delivering on the solutions that are shaping the industry.

play_circle_outline Watch Video

Peer-Led Education

The CIO Visions Steering Committee consists entirely of your contemporaries, meaning we tackle the themes that have profound significance to your performance and your company.

FEATURED SPEAKERS

Key Themes

close Cybersecurity

Protecting yourself and your company are always top priority. Cover a wide breadth of cyber security initiatives including protocol, network and data protection, operational integration, balancing visibility needs and much more. Minimize the possibility of breaches using AI and learn how to plan for the worst to minimally impact business continuity.

Navigating between technology initiatives and managing your staff can be profoundly challenging. The sharp learning curve detracts from communication, understanding of progress, strategy acceptance and appropriate resource allocation. Blow past these challenges to keep your company ticking upwards while keeping everyone onboard.
Taking the lead in today’s organization is crucial for the CIO. With the ever-changing environment of new technologies, shifts in strategies and expanding technical needs, the expectations of being an IT leader are very different from 5 years ago. Learn from qualified professionals on how to transform and lead your team to success in this modern age.
Explore strategies for leveraging the artificial intelligence to drive down costs and the security implications that come with it. Dive deeper to understand the impact on employees, mobile strategy and more.
Automation plays a large role in operations and application performance management. Learn how organizations and their CIOs are optimizing the use of automation technologies, moving from simple process improvement to true process transformation.  
When everything needs to be done yesterday, and even when it doesn’t, operational strategy can make or break the future success of your applications and technology. Learn top practices, emerging trends, discuss old ones like Agile, and stay on the bleeding edge of technology to accelerate your push forwards without breaking the bank, or the back end.
Data is abundant, and this is where you learn how keep it clean and make it profitable. Review analytics platforms, apply machine learning and assess other techniques for locating and sifting through your gold mine.
The data produced by our digital systems and processes borders on overwhelming. In this track we will discuss the best practices for IT Leaders to set up their organizations for success during their digital transformation and how to identify the data that matters most.

High Profile Speakers

Hear strategic endeavors and skillful insights from 40+ IT leaders as they make way in today’s changing landscape.

CIO VISIONS Leadership Spring Summit View More

Todd Barnum

CISO

GoPro, Inc.

CIO VISIONS Leadership Spring Summit View More

Endre Walls

CISO

Customers Bank

CIO VISIONS Leadership Spring Summit View More

Michael Lee Sherwood

Director of Innovation and Technology

City of Las Vegas

CIO VISIONS Leadership Spring Summit View More

Elliott Franklin

Director of IT Security

Loews Hotels

CIO VISIONS Leadership Spring Summit View More

Vikram Marathe

Senior Director of Technology

WarnerMedia

CIO VISIONS Leadership Spring Summit View More

Gary Brantley

Chief Information Officer

City of Atlanta

CIO VISIONS Leadership Spring Summit View More

Phil Miller

Director, Information Technology Risk & Security

J.R. Simplot

CIO VISIONS Leadership Spring Summit View More

Carlos Sanchez

CIO

Suez - Water Technologies Solution

CIO VISIONS Leadership Spring Summit View More

Mike Ehlers

CISO

Clearent

CIO VISIONS Leadership Spring Summit View More

Steve Evans

Senior Director of IT

Global Partners

CIO VISIONS Leadership Spring Summit View More

Niel Nickolaisen

CIO

OC Tanner

CIO VISIONS Leadership Spring Summit View More

Prabodh Telang

Information Security Officer

Credit Union of Colorado

CIO VISIONS Leadership Spring Summit View More

Wes Knight

CISO

GA Department of Revenue

CIO VISIONS Leadership Spring Summit View More

Sekhar Nagasundaram

VP of Cybersecurity Engineering

EllieMae

CIO VISIONS Leadership Spring Summit View More

Brian Gillespie

Chief Technology Officer

Bardavon Health Innovations

CIO VISIONS Leadership Spring Summit View More

Bryan Caporlette

CTO

G&G Outfitters, Inc

CIO VISIONS Leadership Spring Summit View More

William Sweeney

CISO/CTO

Kemberton

CIO VISIONS Leadership Spring Summit View More

Walt Carter

Chief Digital Officer & CIO

Homestar Financial Corp

CIO VISIONS Leadership Spring Summit View More

Miguel Louzan

CIO/CTO

LifeScan

CIO VISIONS Leadership Spring Summit View More

Russ Felker

Chief Technology Officer

GlobalTranz

CIO VISIONS Leadership Spring Summit View More

John Regula

SVP/CIO

Woods Services

CIO VISIONS Leadership Spring Summit View More

Tom Wallace

VP of IT

Jellyvision

CIO VISIONS Leadership Spring Summit View More

Harvey Guindi

CIO

Health Network Laboratories, LP

CIO VISIONS Leadership Spring Summit View More

Sunila Levi

CIO/CTO

Integral Care

CIO VISIONS Leadership Spring Summit View More

Bill Balint

CIO

Indiana University of Pennsylvania

CIO VISIONS Leadership Spring Summit View More

Bonnie Johnson

SVP Security & Infrastructure

NGC US

CIO VISIONS Leadership Spring Summit View More

Eric Hawley

CIO

Utah State University

CIO VISIONS Leadership Spring Summit View More

Helen Norris

Vice President and CIO

Chapman University

CIO VISIONS Leadership Spring Summit View More

Don Pawlowski

CTO

University Tees

CIO VISIONS Leadership Spring Summit View More

Eric Roelofs

VP of Technology

The Wine Enthusiast

CIO VISIONS Leadership Spring Summit View More

Eric Kierstead

CIO

Material Handling Systems

CIO VISIONS Leadership Spring Summit View More

Jeff Bowden

Regional CIO

Seco Tools, LLC

CIO VISIONS Leadership Spring Summit View More

Chuck Foster

CTO

Perks Worldwide

CIO VISIONS Leadership Spring Summit View More

Gurpreet Kaur

Head of IS Strategy; Head of Global Analytics

Integra Life Sciences

CIO VISIONS Leadership Spring Summit View More

Paul Jones

CIO

City of West Palm Beach

CIO VISIONS Leadership Spring Summit View More

Mike Uster

CIO

ManTech

2020 Full Agenda

Your personal concierge will craft a custom schedule based on your interests and priorities. View the complete agenda below.

Reset Filter
DevOps Strategy
Data Storage and Analytics
Cybersecurity
IT Leadership
Digital Transformation
Artificial Intelligence
Staff Training and Retention
Automation
SundayNetworking

Welcome Cocktail Reception & Registration

MondayNetworking

Breakfast Buffet

MondayKeynote Presentation

close Don’t Believe What They Tell You…

Big Data and AnalyticsGoPro, Inc. - CISO

The Security industry has many voices.  Each telling us where to focus, which tool to buy, which threats to focus on, which risks to mitigate, and how to avoid being the next headline news.  But where should a security team place its efforts and resources?  Do we have to buy the latest tool to keep our companies safe?  I don’t believe so.

Key Takeaways:

  • Provide a common-sense approach to cyber/information security
  • Evaluate whether your company’s security team is focused on the right areas
  • How to manage your company’s resources effectively

Speaker

Todd Barnum
CISOGoPro, Inc.
Monday

Targeted Research Meetings

Expo Hall
MondayBreakout Presentation

close We Are Lost in Cybersecurity, What We Need Is a Simple Map!

CybersecurityLoews Hotels - Director of IT Security

We are all tired of talking about cybersecurity and how we are losing the battle against the attackers. It’s like we are lost without a map. Instead of rushing to adopt the latest shiny security tool, we need to take a step back and adopt a standardized security framework.

Key Takeaways:

  • The NIST CSF uses a common business language to address cybersecurity concerns to leadership
  • Using a standard, the industry-recognized framework allows consistent program maturity mappings to budget requests.
  • Following the NIST CSF, you are demonstrating “due care” which may reduce claims of negligence or inattention following a breach
  • Easily maps to compliance and regulatory requirements reducing unnecessary or redundant efforts

Speaker

Elliott Franklin
Director of IT SecurityLoews Hotels
MondayBreakout Presentation

close Customer Obsession : Changing the Approach of Customer Service in a Digital Transformative World

Digital TransformationCity of Atlanta - Chief Information Officer

Great business efficiency can come from a single radical change. Within a year, Gary Brantley, CIO for the City of Atlanta, began the organizational transformation of shifting the focus of the City’s technology department, Atlanta Information Management, from customer-centric to customer obsessed.

According to Walter Rogers, CEO of CCI Global Holdings, who wrote in a recent post, “true customer obsession involves turning our customers into fans who believe in, advocate for, and keep coming back to our business.”

In this discussion, Gary will share his current journey through the planning and challenges of smart cities. He will also explain the importance of being insights-driven and operationally efficient while continuously invoking innovation in a digital transformative world.

Key Takeaways:

  • Obtain key ingredients to building a customer-obsessed culture
  • Identifying new possibilities of existing services in order to design and deliver a better experience for your customer
  • Creating the right culture of service and accountability measures necessary in the quest to become customer-obsessed

Speaker

Gary Brantley
Chief Information OfficerCity of Atlanta
MondayBreakout Presentation

close Driving the Future of Work with Data

Cybersecurity Staff TrainingToptal - Enterprise Client Partner

Talent strategy is critical to an organization’s ability to innovate and quickly pivot to fuel growth and stay ahead of competition. Andrew Anderson will share his unique insights on the industry-wide shift in talent management and how companies are increasing ROI from the “human cloud” and blended workforce operating model – the future of work.

Speaker

Andrew Anderson
Enterprise Client PartnerToptal
MondayBreakout Presentation

close The Secure Cloud 9

Cloud SecurityCustomers Bank - CISO

Gain 9 critical insights for securely adopting a cloud strategy to host your products, platforms, or business-critical technologies.

Key Takeaways:

  • Avoid the common pitfalls of cloud deployments.
  • Gain insights into what works and what doesn’t when it comes to cloud.
  • Rationalize your cloud strategy to ensure it’ll meet your business objectives.
  • Decrease risks to your business by deploying a secure cloud.

Speaker

Endre Walls
CISOCustomers Bank
MondayBreakout Presentation

close Why Cloud Must Be a Part of Your Data/Analytics Strategy

Data Storage and AnalyticsWarnerMedia - Senior Director of Technology

Data is exploding and it is necessary for every organization to make sense and moneitze this data in a timely fashion. Cloud makes it possible to try out and iterate quickly with many different solutions and allows access to highly scalable compute and storage on demand.. This presentation will highlight the main advantages of the cloud in the Data and Analytics space.

Key Takeaways:

  • Scalability
  • Number of solutions that are available quickly
  • Separation of Compute and Storage

Speaker

Vikram Marathe
Senior Director of TechnologyWarnerMedia
MondayBreakout Presentation

close How a Novice Hacked the Executive Buy-In Game: Secrets to Building Trust, Gaining Backing, and Locking up Investments

IT LeadershipJellyvision - VP of IT

This is a case study on how a novice to the IT space hacked the game of getting executive buy-in and accelerated a SaaS company’s digital transformation in less than a year. By asking disruptive questions, actively listening, and then ultimately telling a relatable, compelling story support by data, I was able to breakdown executive barriers that previous seasoned IT leaders could not break for years.

Key Takeaways:

  • Tell a compelling story. — Relatable storytelling is critical to gaining any buy-in
  • Know an executive’s motivations. — Each executive has something specific driving their decisions and opinions. Know how to read these to enable a deeper investment
  • Connect the dots with data. — Without compelling data, no story can stand firm
  • Show them the money. — From cost savings to ROI, executives need to see real value in a decision

Speaker

Tom Wallace
VP of ITJellyvision
MondayBreakout Presentation

close Threading the Needle Between Cyber Fusion and Cyber Resilience

CybersecurityEllieMae - VP of Cybersecurity Engineering

Cyber fusion and cyber resilience are misunderstood and overloaded terms. This talk will present pragmatic and effective approach to combining cyber threat intelligence and threat defense operations into a single, integrated cyber defense platform to provide all round situational awareness and protect critical assets.

Key Takeaways:

  • Definitions of cyber resilience, cyber fusion and cyber threat operations
  • Digital risk protection components
  • Key cyber fusion capabilities
  • CTI architecture and capabilities

Speaker

Sekhar Nagasundaram
VP of Cybersecurity EngineeringEllieMae
MondayBreakout Presentation

close AI-Based Autonomous Response: Are Humans Ready?

CybersecurityDarktrace - Director

Cyber security is quickly becoming an arms race, with machines fighting machines on the battleground of corporate networks. AI-based cyber defense can not only detect threats as they emerge, but also autonomously respond to attacks in real time. But are humans ready to accept the actions machines would take to neutralize threats?

Key Takeaways:

  • AI approaches and algorithms for detecting and responding to threats
  • How human teams adopt (or resist) automated defenses
  • The concepts of ‘human confirmation’ mode and ‘active defense’
  • Success stories across Smart Cities, genomics organizations, and industrial control systems

Speaker

Maddie Slater
DirectorDarktrace
MondayBreakout Presentation

close Technology Platform Strategy That Maximizes the Value of the It Investment

IT LeadershipIntegral Care - CIO/CTO

There are many ways to create technology strategies but what is best practice? Overview of strategy creation, frameworks and methodologies. Approach to maximize investment.

Key Takeaways:

  • Aligning IT efforts with organization strategy maximizes the value of the IT investment while minimizing the risk
  • Technology ROI is maximized when business needs drive information technology investments
  • Its not about Technology but about modernization, innovation, and Business Intelligence and Business models that are enabled by technology

Speaker

Sunila Levi
CIO/CTOIntegral Care
MondayBreakout Presentation

close Building a Successful Cyber Security Program

CybersecurityJ.R. Simplot - Director, Information Technology Risk & Security

In this time of transformation, a strategic approach to cybersecurity is necessary. If you haven’t already, benchmark against a security framework. Determine which capabilities are most important to your organization’s needs. In parallel, ensure basic “hygiene” elements of a security program are addressed. With limited resources, your team’s soft skills are increasingly critical.

Key Takeaways:

  • There are many security frameworks out there. If you aren’t already locked into one (i.e. Government Sector – NIST) pick one.to benchmark against
  • For most, you cannot afford to do everything well, determine what is essential and focus resources there
  • Minimum Hygiene: multi-factor authentication, patching, 3rd party penetration test, and phishing your staff
  • Training your team is essential. Make sure it includes soft skills: communications, leadership development

Speaker

Phil Miller
Director, Information Technology Risk & SecurityJ.R. Simplot
MondayBreakout Presentation

close Effectively Communicating Risk

CybersecurityGA Department of Revenue - CISO

Most of us don’t communicate well and I think all of us can always use some help and some pointers when we are talking to someone and trying to communicate a matter of risk. I want to give you the four basic points that one needs to communicate effectively.

Key Takeaways:

  • Risk does not belong to Information Security in the first place. It’s not ours to own. Instead the risk belongs to the business unit. Your attendees will learn the best and worst case outcomes
  • Identify who above them in their organizational structure needs to hear this. They will learn to identify the owner of the risk as well as who is involved in the mitigation of the risk
  • Identify who below them within their organizational structure needs to be involved in the risk mitigation and what tasks need to be executed

Speaker

Wes Knight
CISOGA Department of Revenue
MondayBreakout Presentation

close You Did What? Transforming a Manufacturing Company Into a Software Company

Digital TransformationOC Tanner - CIO

The market demanded that the 90 year old company become a technology company. We defined the four pragmatic “levers” we would pull to transform the company.

These were:
Modernize everything
Take a micro-services, platform approach
Suck less (continuously improve)
Change the IT leadership model

This formula works for everyone

Key Takeaways:

  • There is a repeatable, usable formula for digital transformation
  • By using Purpose Alignment to guide decisions, we can focus our innovation where it matters and also clean up our legacy messes
  • Through a combination of lean, agile and DevOps, everyone can achieve operational excellence
  • By using the Trust / Ownership Model for leadership everyone can achieve a high-performing culture

Speaker

Niel Nickolaisen
CIOOC Tanner
MondayBreakout Presentation

close Staffing Security & It Teams - Successful Strategies in Today's Market

Staff Training and RetentionClearent - CISO

Traditional staffing approaches often don’t work for hiring security/IT staff in today’s market. Combination of school debt, useless degrees, and new generational expectations don’t exactly align with IT resourcing requirements these days. Session will show working hiring strategies in todays market: where to look, how to train and grow then next generation.

Key Takeaways:

  • Understand why traditional hiring methods don’t always work for IT
  • Where to find best talented security and developer resources
  • How to retain talent in today’s market
  • Criteria for building vs. buying your NOC and SOC

Speaker

Mike Ehlers
CISOClearent
MondayBreakout Presentation

close Mentoring the Mediocre and Taming the Team Tyrant

Staff Training and RetentionGlobal Partners - Senior Director of IT

Increasingly tight labor markets mean each and every new hire counts. However, true success hinges on employees developing into high performing team members.
This session presents tips, tools and tricks for turning good performers into great performers.

Key Takeaways:

  • The real cost of employee disengagement and under performance
  • A framework for measuring and mentoring team members
  • What research reveals about motivation
  • Practical ideas for application

Speaker

Steve Evans
Senior Director of ITGlobal Partners
MondayNetworking

Lunch Hosted by T-Mobile

Monday

Targeted Research Meetings

Expo Hall
Monday Breakout Presentation

close Stop Breaches in AWS and Azure with Advanced Threat Detection and Response

CybersecurityPaladion Networks Private - CTO

Cloud computing is powering digital transformations for businesses across the globe. This mainstream adoption is making Cloud platforms a promising new vector for cyber criminals. Organisations of every size must prepare to defend against the coming wave of advanced attacks targeting their Cloud and hybrid infrastructures.

In this session, we will discuss how best to monitor AWS and Azure clouds. We will focus on key components and services that should be monitored along with use cases. We will detail the role of AI-driven threat detection and response to combat sophisticated cloud threats.

Speaker

Vinod Vasudevan
CTOPaladion Networks Private
MondayBreakout Presentation

close Value Chain Assurances - "the Art of Being Properly Whelmed"

Data Storage and AnalyticsHomestar Financial Corp - Chief Digital Officer & CIO

For many of us, our next biggest risk outside of our own folks, is in our supply chain or partner relationships. And many of those value chain members have access and the ability to bring “Trojan Horses” inside — past our gates and protections. We’ll discuss opportunities and solutions for helping them build your confidence and assure you that their participation in your ecosystem meets the minimum standards for a defensible cybersecurity stance.

Key Takeaways:

  • Who’s Watching the Watchers? – How do you measure what you cannot see?
  • “Aim small, miss small” – funneling down to what risk is addressed and what is not by your partner/suppliers’ programs
  • Avoid “Lack of Program” Risks – Low Bar requires at least a defined Cybersecurity Program in place

Speaker

Walt Carter
Chief Digital Officer & CIOHomestar Financial Corp
MondayBreakout Presentation

close Strategy for Mitigating Emerging Threats

CybersecurityCredit Union of Colorado - Information Security Officer

What are some of the emerging threats of the future. How to utilize advance threat protection techniques including Machine Learning and Artificial Intelligence to mitigate such emerging threats.

Key Takeaways:

  • Learn about new / emerging threats
  • Advance mitigation techniques
  • Advance threat protection using Artificial Intelligence
  • Advance threat protection using Machine Learning

Speaker

Prabodh Telang
Information Security OfficerCredit Union of Colorado
MondayBreakout Presentation

close What Is RPA and EDA Why Should You Care?

AutomationHealth Network Laboratories, LP - CIO

Improving experience and operational excellence through out an enterprise is often more than just replacing or modernization an application, it required integration, providing asynchronous, event driven architecture and automation. By looking at development from an EDA (Event Driven Architecture) perspective and understanding where and how RPA (Robotic Process Automation) can be used, classic hurdles of legacy applications can be overcome along with actionable engagement.

Key Takeaways:

  • Understand RPA and where its applicable and valuable
  • Understand the concept of EDA not a tool, but a philosophy of design
  • Real-world implemented examples of both in Healthcare

Speaker

Harvey Guindi
CIOHealth Network Laboratories, LP
MondayBreakout Presentation

close SUSE: Enabling Transformation from Edge to Core to Cloud

Digital TransformationSUSE - Technology Strategist

We will discuss how SUSE views the Digital Transformation that catches so much attention in the IT & business community today. What it can do to enable your business to achieve, the challenges often encountered on the journey and how SUSE is preparing to enable you to build, deploy, and operate your infrastructure and applications from the edge to the core to the cloud.

Key Takeaways:

  • SUSE Core Values
  • Digital Transformation
  • Consistent Platform from edge to core to cloud
  • Enterprise Resiliency and Scale
  • Deployment and Lifecycle Management
  • Application Delivery
  • Multi-cloud Management

Speaker

Cameron Seader
Technology StrategistSUSE
MondayBreakout Presentation

close Leading Digital Transformation in a $1.2 B Global Medical Device Organization

Digital TransformationLifeScan - CIO/CTO

I led the full carve out of LifeScan from JNJ. It tooks 18 months to stand up a totally independent LIfeScan organization. During this technology and digital transformation process, we simplified the entire tech/digital landscape, implemented agile, drove cloud 1st strategy, automation, Analytics/AI driven organization. shift from being medical device to digital company, and many other new ways of working.

Key Takeaways:

  • Digital Transformation is real.. just need to make it concrete, one step at a time and result oriented
  • Speed vs perfection…. speed should always win
  • Learn to fail fast… and move on
  • AI, ML, Analytics are real examples on how transform organizations

Speaker

Miguel Louzan
CIO/CTOLifeScan
MondayBreakout Presentation

close Practical Application of AI in Healthcare for Specialized Revenue Cycle Management

Artificial IntelligenceKemberton - CISO/CTO

The presentation will be a case study of how Kemberton brought AI to bear on a critical workflow issue for the handling of complex healthcare claims involving motor vehicle accidents so that they could be deterministicly routed to the next step in the workflow more efficiently.

Key Takeaways:

  • Selecting the right case for AI
  • Critical decision points in the AI process
  • The essential role of SMEs
  • How to operationalize the results

Speaker

William Sweeney
CISO/CTOKemberton
MondayBreakout Presentation

close Organizational Alignment and Agile Development

IT LeadershipPerks Worldwide - CTO

Our organization has seen great success in projects, growth, and client satisfaction by starting at the top and aligning corporate goals all the way down to individual contributor goals. I will walk through the simple, but time consuming process of aligning software development to corporate goals and explain how to achieve maximum success.

Key Takeaways:

  • Don’t Silo Goals within Teams
  • Make Transparent Top-Level Goals
  • Engage ICs by Showing Them How Their Work Supports the CEO’s Goals

Speaker

Chuck Foster
CTOPerks Worldwide
MondayBreakout Presentation

close Bridging the Gap: IT Security and the Service Desk

CybersecurityFreshworks - CIO

Information security is everyone’s business. Learn about the ever-changing IT security landscape as Prasad Ramakrishnan, CIO, Freshworks addresses the effect of breaches on businesses and ways to improve your infosec capabilities.

Key Takeaways:

  • How your service desk can become the eyes and ears of IT security
  • How to build an effective ‘Prevent-detect-correct’ security model
  • ITSM best practices and initiatives to beef up IT security
  • An IT security checklist for digital businesses

Speaker

Prasad Ramakrishnan
CIOFreshworks
MondayBreakout Presentation

close Cybersecurity & Resiliency: Protecting Your Business From Direct & Indirect Threats

CybersecurityGlobalTranz - Chief Technology Officer

Today’s businesses are more integrated than ever. However, integration with external partners has risks along with benefits. Russ Felker, Chief Technology Officer at GlobalTranz, a leading logistics technology provider and Top 10 3PL, shares his insights on how businesses can protect themselves against ransomware and other cyber threats coming in via both direct and indirect channels.

Key Takeaways:

  • Businesses must have both an internal and external focus
  • It’s not a question of “if” your business and your partners will be targeted; it is a question of “when” and “how”
  • Focusing on data security is important- but businesses need to focus on resiliency as well
  • How to you effectively measure and track internal and partner resiliency

Speaker

Russ Felker
Chief Technology OfficerGlobalTranz
MondayBreakout Presentation

close Governance in the Cloud at Scale

Artificial IntelligenceBardavon Health Innovations - Chief Technology Officer

Unleashing the full power of the public cloud adoption requires not only a technology shift but also a cultural and organizational transformation. This session will focus on establishing financial, technical and security governance while fostering rapid adoption of public cloud services.

Key Takeaways:

  • How to enable software development teams to move quickly in adopting cloud while maintain security
  • How to manage cloud budgets at scale for both flexibility and cost containment
  • Organization design of a Cloud Center of Excellence

Speaker

Brian Gillespie
Chief Technology OfficerBardavon Health Innovations
MondayBreakout Presentation

close Sustaining Our Physical World in a Digital Age

Artificial IntelligenceSwitch - Chief Information Officer

Technology advancement is poised to create a new revolution for humanity, and we must think and act in ways that ensure the sustainability of our planet and keep humans happy and thriving. Artificial Intelligence (AI) applications are influencing and improving health, science, communication, transportation and energy on a global scale – and it is our responsibility to design and build the infrastructure for this new digital age while preserving our humanity and the planet earth. We’re all in this together.

Key Takeaways:

  • Imagine an age when Digital + Physical + Biological lines are blurred
  • Complex issues such as sustainability, sourcing and making better choices for the planet and its people
  • How is physical infrastructure advancing to support all of this technology?
  • The critical role of STEAM (Science, Technology, Engineering, Arts, and Math) education initiatives as the path to building the workforce of the future
  • Challenges of keeping the humanity in technology in the age of analytics and technological transformation

Speaker

Missy Young
Chief Information OfficerSwitch
MondayBreakout Presentation

close Erecting the Technology Backbone of a Global $2.7 B Company Operates in 60+ Countries Under 18 Months

IT LeadershipSuez - Water Technologies Solution - CIO

Suez and CDPQ created a JV to build Water Technologies and Solutions (WTS), a global $2.7B company. The new business would be carved out from GE centralized operations and the decentralized operations of Suez. The challenge and success were to design/build new IT operations from scratch in under 18 months without any material impact to day to day operations.

Key Takeaways:

  • Global scale IT operations design/built and deployed without any material impact to business operations
  • The “how” involved working the parameters of risk and the “tribal effect” associated with acquisitions and divestitures
  • Monumental changes are deliver with an understanding the “social vs organizational” structure within an enterprise
  • The critical need to develop and foster horizontal leadership

Speaker

Carlos Sanchez
CIOSuez - Water Technologies Solution
MondayBreakout Presentation

close Change, People, & the Evolution of Security Culture

Staff Training and RetentionUtah State University - CIO

You can’t ignore human dynamics — a forced change is often accompanied by disappointing or frustrating outcomes. In this session we will explore cultural reaction to change, the human dynamic, four keys to great decision making, and the effectiveness (or ineffectiveness) of approaches that enhance motivation or resistance to change efforts using examples in security. Can we stack the deck to be more naturally effective and accepted?

Key Takeaways:

  • Identify 4 practices that cause us to make poor decisions, and tactics to avoid
  • Using “fear and facts” can often decrease and organization’s security
  • Discover more motivating approaches to changing behavior

Speaker

Eric Hawley
CIOUtah State University
MondayNetworking

Industry Dinner

TuesdayNetworking

Breakfast Buffet

TuesdayKeynote Presentation

close Pathway to the Future How Cities Are Unlocking Data

City of Las Vegas - Director of Innovation and Technology

A review of the city of Las Vegas and its efforts to become the premier smart city of the future.

Key Takeaways:

  • Understand the smart city concept
  • How cities are using data
  • Discuss the infrastructure involved in building a smart city
  • Understand the business use cases

Speaker

Michael Lee Sherwood
Director of Innovation and TechnologyCity of Las Vegas
Tuesday

Targeted Research Meetings

Expo Hall
TuesdayBreakout Presentation

close Coping With Changes in Employee Expectations: Attracting and Retaining the Best Employees

Staff Training and RetentionSeco Tools, LLC - Regional CIO

As experienced IT workers retire and technical needs expand, how do you attract and retain the right employees that fit well within your company? With record numbers of applicants, it’s important to look for the right credentials, offer the right incentives, and understand how tech employee expectations are evolving.

Key Takeaways:

  • The number of people entering the IT workforce is increasing steadily
  • The number of experienced & highly skilled employees is on the decline
  • Careful hiring practices will allow you to target employees most likely to be successful
  • Shifts in benefits offered will allow you to retain that top talent

Speaker

Jeff Bowden
Regional CIOSeco Tools, LLC
TuesdayBreakout Presentation

close Application Development and What Works for You

DevOps StrategyThe Wine Enthusiast - VP of Technology

Software Development can be a huge cost savings and poor development can cost you for years. Based upon 30 years of application development experience amongst a half dozen firms in varying industries, this presentation shows which first hand experiences have proven to work (and not work). With projects ranging from small enhancements to $100 Million Digital Transformations, hear lessons on decades of working with internal and external software development projects to learn what could work for you.

Most companies are not in the software business, but almost all use software in their line of work. Spending time and money on that software is core to the decision making process for all CIOs. Build versus buy decision making requires the mixture of business knowledge and tech savvy.

What are the right partnerships you need to help you achieve your development goals and what partnerships do you need to avoid from bleeding you dry. What type of Software Development LifeCycle(SDLC) do you need for your firm. Different SDLC methods fit varying companies.

With humility and insight this presentation will cover a variety of potential pitfalls along the way to successfully delivering for your internal or external customers.

Key Takeaways:

  • Building software applications for companies where software is not their primary business
  • Pros and Cons of building applications with a variety of sources
  • Cost benefits related to different contract options
  • Building the right sized team that fits your needs

Speaker

Eric Roelofs
VP of TechnologyThe Wine Enthusiast
TuesdayBreakout Presentation

close Express Lanes to PCI DSS

Data Storage and AnalyticsNGC US - SVP Security & Infrastructure

NGC takes the security of customer data very seriously, even when regulations don’t require it. NGC independently applied PCI DSS to 98% of infrastructure to ensure a strong security posture and protection of our customer data. Followed by HIPAA compliance, NGC has made customer security the number one priority in recent years.

Key Takeaways:

  • PCI DSS is prescriptive as an entree into regulatory compliance
  • If you wait until everything is perfect, you’ll never get it done
  • The 80/20 rule applies to almost everything

Speaker

Bonnie Johnson
SVP Security & InfrastructureNGC US
TuesdayBreakout Presentation

close Leading the Uncomfortable Journey: Leaving the Old It Behind

IT LeadershipIndiana University of Pennsylvania - CIO

Many IT organizations are either losing or simply maintaining capacity of ‘money, people and time’ to operate and maintain services while implementing a seemingly endless list of SaaS applications. Moreover, the IT organization’s traditional role of running data centers, servers, storage, backup/recovery, email, etc. is quickly fading away.

How can these organizations thrive instead of just survive?

Key Takeaways:

  • IT organizations must transform into the enterprise’s trusted integrator, facilitator and protector of IT assets as opposed to retaining their traditional role of being provider of them
  • It wasn’t IT’s fault, but traditional information systems took too much money up front, too long to implement, too much hassle to upgrade and too much expensive personnel to operate
  • Great leadership is needed now more than ever and IT leaders are often uniquely positioned to fill that void

Speaker

Bill Balint
CIOIndiana University of Pennsylvania
TuesdayBreakout Presentation

close Securing the Organization - It's More Than Technology

CybersecurityCity of West Palm Beach - CIO

Cyber security is not just and IT issue, it is and organizational issue and must be treated as such. This presentation will provide and overview of the key factors to must be incorporated to manage cyber security across the organization.

Topics will include:

The Three Tiers

1. The Administrative tier deals with having in place security policies, procedures, and processes designed to lay a foundation for managing and administering security across the organization.

2. The Compliance/Governance tier deals with the ongoing verification and validation of all security system implementations, including both the technical and administrative functions

3. The Technical tier deals with putting in place the technical infrastructure designed to recognize and prevent breaches from occurring.

In addition to the three tiers we will discuss other organizational best practices and must haves required to create a culture of security awareness in the organization.

Key Takeaways:

  • Key requirements for building an organization-wide security program
  • Security must be driven from the top down
  • Reducing liability by providing due diligence, due care and documentation at all levels
  • Building a culture of security awareness

Speaker

Paul Jones
CIOCity of West Palm Beach
TuesdayBreakout Presentation

close Growing Together: It Takes Teamwork to Make a Team Work

IT LeadershipWoods Services - SVP/CIO

This session is designed to facilitate a discussion around proven methodologies to build teams. Session will focus on what attributes best embody an excellent team leader and what techniques a team leader could employ to get the most from their team. Whether you are new to a CIO role, new to a company, or newly assigned as a team leader, this session gives the tools you need to make your team successful!

Key Takeaways:

  • 4 characteristics of a great team leader
  • Starting with baby steps (hint #1 – find common baseline areas of agreement)
  • Myth vs. Reality check up. (Interactive experience to re-enforce what we know and think we know about mgmt)
  • There is not a one size fits all solution to building teams

Speaker

John Regula
SVP/CIOWoods Services
TuesdayBreakout Presentation

close Do Not Over-Complicate Hiring

Staff Training and RetentionUniversity Tees - CTO

Hiring the right people is the most important, and most difficult, job of a leader. So, I simplified it. I look for the following three attributes in each candidate I hire: they demonstrate an ability to learn, they are motivated and they are nice.

Key Takeaways:

  • A team member who can learn, is a team member who can adapt
  • Hire a nice person, not a culture fit. Culture fits are automatically exclusionary
  • You cannot teach motivation. Team members must be inherently motivated

Speaker

Don Pawlowski
CTOUniversity Tees
TuesdayBreakout Presentation

close How Email Became Your Worst Enemy - What to Do About It

Artificial IntelligenceManTech - CIO

At ManTech, a $2B+ enterprise with some 9,000 employees, we are replacing email with Slack. As the leader of this strategic change, I will discuss the advantages of ditching email in favor of moving to an innovative social media tool that lets users communicate in targeted groups, create discussions that advance vital programs, and accelerate performance on both company-internal and customer-focused initiatives.

Speaker

Mike Uster
CIOManTech
TuesdayBreakout Presentation

close Better Decisions Through Data Insights

Data Storage and AnalyticsIntegra Life Sciences - Head of IS Strategy; Head of Global Analytics

How to launch and enable the business through Data Analytics.

Key Takeaways:

  • Platform Considerations
  • Business Challenges
  • Methodology & Approach

Speaker

Gurpreet Kaur
Head of IS Strategy; Head of Global AnalyticsIntegra Life Sciences
TuesdayBreakout Presentation

close Predictive Analytics

Data Storage and AnalyticsMaterial Handling Systems - CIO

Data mining to determine profitability of our customer engagements in a highly dynamic environment.

Key Takeaways:

  • Transforming Data into Information can be difficult and tedious, but the return on investment is worth it
  • New, easy to use commercial platforms are bringing Business Intelligence and Data Mining to the masses
  • Customers will pay for business intelligence that either makes them money or saves them money. This can represent a new, highly profitable line of business for companies

Speaker

Eric Kierstead
CIOMaterial Handling Systems
TuesdayBreakout Presentation

close When You Can't Work Any Harder, Apply Some Technology!

Digital TransformationG&G Outfitters, Inc - CTO

G&G Outfitters had grown from a way to pay for a spring break to Florida, to a thriving branded merchandise business over a 20 year period. Embroidery and Screen Printing processes were all paper based, we initiated an initiative to build a new Order Management Platform to digitize the entire workflow processes. After 3 years we have transformed the legacy paper into a fully electronic workflow. This presentation will review how we transitioned our workforce from a paper process, the challenges and the benefits achieved.

Key Takeaways:

  • Building vs Buy Decision
  • Gaining employee adoption
  • Hurdles to implementation
  • Gains in order visibility and accountability

Speaker

Bryan Caporlette
CTOG&G Outfitters, Inc
TuesdayBreakout Presentation

close From Engineer to Executive: How to Make the Leap

IT LeadershipChapman University - Vice President and CIO

What got you here won’t get you there – moving from a technical role to an executive leadership role requires learning new skills. This session follows one technician’s journey to a CIO role, and the lessons learned along the way.

Key Takeaways:

  • Communication Skills needed at the executive level
  • Empathy as a key to leadership
  • How to mentor and how to be mentored
  • Leadership can be learned

Speaker

Helen Norris
Vice President and CIOChapman University
TuesdayNetworking

Lunch

Executive Steering Committee

Experienced IT leaders work with us to focus our program on trends that will move the needle at your company.

Steering Committee Members

Tim NewtonVP of International Technology
Papa John's International
Steve CheathamVP & CIO
Game Show Network
Ronda BukerDeputy CIO
City of Phoenix
Michael LavertyDirector IT Security
Dole Packaged Foods, LLC
Michael FultonAVP, Technology Strategy & Innovation
Nationwide
Justin GlatzGlobal Head of IT
Vita Coco
Harpreet SuriGlobal Head of IT Service Delivery
Hogan Lovells

An Esteemed Audience

Over 80% of the Fortune 100 joins us each year for what has been voted the “most effective trade show” for over a decade. Use our tools to demonstrate ROI to your C-Suite.

Attendee Testimonials

Attendee List

Exhibitors

CIO Visions has quickly become established as the “deal generating show”.

Exhibitor Testimonials

Exhibitor List

About CIO Visions

CIO Visions is an invitation-only trade show for IT executives that bridges you to the most compelling solutions and information for your crowning priorities.

Have Questions?

We’ve answered a few FAQs to get you started. For any other questions, please don’t hesitate to contact us!

Our Team

Matt Velaer

Conference Director
(424) 334-5145
Send Message

Marin Silvers

Vice President of Operations
(424) 334-5141
Send Message

Hannah Greenlee

Conference Program Manager
(424) 334-5159
Send Message

Renee Mercer

Attendee Relations Executive
(424) 421-5150
Send Message

Clint Wilton

Account Executive
(424) 204-0856
Send Message

Shanna Delfs

Account Executive
(434) 334-5161
Send Message

Marissa Marsh

Account Executive
(424) 313-1172
Send Message

Hotel and Travel

Your conference pass includes overnight accommodations, travel reimbursement, meals and cocktail receptions.

The Hotel

Bellagio Hotel

Inspired by the villages of Europe, AAA Five Diamond Bellagio overlooks a Mediterranean-blue lake with fountains performing a magnificent ballet. Escape into an otherworldly plane of dance, music and acrobatics with “O” by Cirque du Soleil — aquatic theater in our Parisian-style opera house.

The hotel rooms and suites at the Bellagio offer the perfect blend of beauty and elegance. Our rooms will elevate your stay, whether you're traveling for business, celebrating a honeymoon, or just looking for a remarkable getaway. With views of the Las Vegas valley or the iconic Bellagio fountains right from your suite, your stay will be nothing short of unforgettable.
We’ll book your accommodations, cover your first night’s stay and offer a discounted rate thereafter. To make your reservations please contact:
The nearest airport is McCarran Airport located about 2 miles away. This hotel does not operate a shuttle, taxi or ride share is recommended.
Bellagio Hotel | 3600 S. Las Vegas Blvd. Las Vegas, NV 89109
×