Bellagio, Las Vegas

Invitation-only means an exceptional experience, on us

Coordinated by your personal concierge, a schedule is tailored to your professional goals and company priorities.

assignment_ind

Complimentary Pass

Inventive learning, renowned speakers, executive networking. All free to you.

flight

Travel Reimbursement

$200 of your travel is covered if you’re trekking over 100 miles to attend.

local_hotel

Accommodations

Your first night’s stay is on us and a discounted rate is available thereafter.

restaurant

5 Star Catering

All of your meals and libations are complimentary throughout the event.

Join IT’s Emerging Upper Tier

A curated audience reserved for the senior level of emerging mid-market organizations puts you in exceptional company.

150+

Affluent Peers

Meet the people who are just as invested in leveraging technology as you are.

20+

Influential Leaders

Learn valuable strategy components from today’s very best.

40+

Proven Solutions

Meet industry leading solution providers, hand picked for your priorities.

1.5K

Connections

Take this unprecedented opportunity to connect with high profile execs.

A curated experience to cultivate achievement

Your registration creates a truly customized agenda based on your specific areas of responsibility, challenges and interests.

3

Days of Insight

Jump in the discussion through focused educational sessions and networking opportunities.

40

Innovative Sessions

Keynotes, plenary sessions, industry panel discussions, case studies and more.

6

Networking Opportunities

Tie into contemporaries and mentors interested in the same avenues of opportunity as you.

10

Research Meetings

Meet one-on-one with executives delivering on the solutions that are shaping the industry.

play_circle_outline Watch Video

Peer-Led Education

The CIO Visions Steering Committee consists entirely of your contemporaries, meaning we tackle the themes that have profound significance to your performance and your company.

FEATURED SPEAKERS

Key Themes

close IT Leadership

Taking the lead in today’s organization is crucial for the CIO. With the ever-changing environment of new technologies, shifts in strategies and expanding technical needs, the expectations of being an IT leader are very different from 5 years ago. Learn from qualified professionals on how to transform and lead your team to success in this modern age.

  • Security Protocols: Network Security/Cyber Security/Data Security
  • The Use of AI in Data Security: Today’s Opportunities and Challenges
  • Successful Data Governance Approaches
  • Lowering the Risk of a Data Breach When Using the Cloud
  • Protecting Unstructured Data: How Secure Do I Need to Be?
  • Network Visibility and Integration with Security Needs
  • BYOD-Wireless Protection: Implementing Company-Wide Phone Wipes
  • How Do We Make It Easier to Keep Ourselves and Our User Communities Safe?
  • Integration of Security into Strategic Planning Processes and Operations
  • Security vs. Ease of Access
  • Disaster Plans & Business Continuity
Data is abundant, and this is where you learn how keep it clean and make it profitable. Review analytics platforms, apply machine learning and assess other techniques for locating and sifting through your gold mine.

High Profile Speakers

Hear strategic endeavors and skillful insights from 40+ IT leaders as they make way in today’s changing landscape.

 

CIO VISIONS Mid-Market Spring Summit View More

Allen Wuescher

CIO and VP

Toshiba International Corporation

CIO VISIONS Mid-Market Spring Summit View More

Michael Lee Sherwood

Director of Innovation and Technology

City of Las Vegas

CIO VISIONS Mid-Market Spring Summit View More

Vijay Anand

Vice President of Product Marketing

MicroStrategy Inc.

CIO VISIONS Mid-Market Spring Summit View More

Karen Davis

Business Group CIO & VP Research Computing

RTI International

CIO VISIONS Mid-Market Spring Summit View More

Prabodh Telang

Information Security Officer

Credit Union of Colorado

CIO VISIONS Mid-Market Spring Summit View More

Alisa Sheyn

Director of Business Operations, Product Development and Technology

AVID

CIO VISIONS Mid-Market Spring Summit View More

Mark Decker

CIO / Technology Director

Jackson County Oregon

CIO VISIONS Mid-Market Spring Summit View More

Mary J Leonardo Patry

Principle, IT Executive Advisor and Coach

ITeffectivity

CIO VISIONS Mid-Market Spring Summit View More

Michael Maier

CTO

City of Fort Lauderdale

CIO VISIONS Mid-Market Spring Summit View More

Mike Manrod

CISO

Grand Canyon Education

CIO VISIONS Mid-Market Spring Summit View More

Sai Billanuka

Vice President

Thomson Reuters

CIO VISIONS Mid-Market Spring Summit View More

Raphael Morozov

CTO

Eurofins DMS

CIO VISIONS Mid-Market Spring Summit View More

John Callon

Senior Director of Product Marketing

Cyren

CIO VISIONS Mid-Market Spring Summit View More

Thomas McNash

Lead Senior Solutions Engineer

Cyren

CIO VISIONS Mid-Market Spring Summit View More

Tom Babineau

Sr. Manager, Sales Engineering

T-Mobile

CIO VISIONS Mid-Market Spring Summit View More

Mark E. Glenn

CIO, Director

Washington State Military Department

CIO VISIONS Mid-Market Spring Summit View More

Missy Young

Chief Information Officer

Switch

CIO VISIONS Mid-Market Spring Summit View More

Ryan Loy

Chief Information Officer

EBSCO Industries, Inc.

CIO VISIONS Mid-Market Spring Summit View More

Mike Hendrickson

Vice President, Technology & Developer Products

Skillsoft

CIO VISIONS Mid-Market Spring Summit View More

Victor Ramos

Vice President of Enterprise Architecture

City National Bank

CIO VISIONS Mid-Market Spring Summit View More

Endre Walls

CISO

Customers Bank

CIO VISIONS Mid-Market Spring Summit View More

Chris Gebhardt

Director, InfoSec

TEEM/WeWork

CIO VISIONS Mid-Market Spring Summit View More

W. Curtis Preston

Chief Technologist

Druva

CIO VISIONS Mid-Market Spring Summit View More

David Holmes

Principal Security Strategist

Shape Security

CIO VISIONS Mid-Market Spring Summit View More

Max Robin

Director

Darktrace

CIO VISIONS Mid-Market Spring Summit View More

John Smiley

VP of Enterprise Solutions

PPT Solutions

CIO VISIONS Mid-Market Spring Summit View More

Scott Prater

VP of Technology

PPT Solutions

CIO VISIONS Mid-Market Spring Summit View More

Vinod Vasudevan

CTO

Paladion Networks Private

CIO VISIONS Mid-Market Spring Summit View More

James Bond

Chief Technologist

Hewlett Packard Enterprise

CIO VISIONS Mid-Market Spring Summit View More

Robert Barto

Director Health Information Systems

Michigan State University

CIO VISIONS Mid-Market Spring Summit View More

Prasad Ramakrishnan

CIO

Freshworks

CIO VISIONS Mid-Market Spring Summit View More

John Jacobs

Vice President of Systems Engineering

Fortinet

CIO VISIONS Mid-Market Spring Summit View More

Ben Schreiner

Dell Technologies, Global Business Development

Dell EMC

CIO VISIONS Mid-Market Spring Summit View More

Neil Pickard

Agile Talent Consultant

Toptal

CIO VISIONS Mid-Market Spring Summit View More

Meerah Rajavel

CIO

Forcepoint

CIO VISIONS Mid-Market Spring Summit View More

Irving Bruckstein

Chief Information Officer & Chief Information Security Officer

Council on International Educational Exchange

CIO VISIONS Mid-Market Spring Summit View More

Sean Bryson

Vice President of Solutions & Innovation

Hitachi Consulting

CIO VISIONS Mid-Market Spring Summit View More

David Richardson

Senior Director, Product Management

Lookout, Inc.

2020 Full Agenda

Your personal concierge will craft a custom schedule based on your interests and priorities. View the complete agenda below.

Reset Filter
CIO Leadership and Innovation
Cyber Security
Data Management: Strategy for Storage and Analytics
SundayNetworking

Welcome Cocktail Reception & Registration

MondayNetworking

Breakfast Buffet

MondayKeynote Presentation

close Digital Transformation – Six Steps to Success

IT LeadershipHitachi Consulting - Vice President of Solutions & Innovation

Digital transformation – driving operational improvements in your physical value stream using connected data from your digital value stream – is delivering unprecedented value across industries to those with a clear road map. In fact, a recent Harvard Business School report shows that companies that embrace digital transformation attain significantly better gross margins, earnings and net income than those that don’t. What’s more, those digital leaders are not spending much more on IT than laggards because the big investments have already been made. The challenge is knowing how to connect the data from the digital value stream to drive continuous improvement with real-time metrics and predictive analytics. No matter where you are on the journey of digital transformation – these six steps can help you connect your systems to drive new levels of productivity, profitability and value across your business.

Key Takeaways:

  • Learn how to connect your physical and digital value streams to create near real-time operating systems.
  • Identify areas of variation across the physical value stream that can be supported by better data and real-time analytics.
  • Gain knowledge through strategic partnerships with digital leaders to accelerate your journey to unlocking more organizational value.

Speaker

Sean Bryson
Vice President of Solutions & InnovationHitachi Consulting
Monday

Targeted Research Meetings

Expo Hall
MondayBreakout Presentation

close Accelerating Digital Transformation with Collaborative Communications

Cloud StrategyRingCentral - Vice President Office Public Sector and Education

Digital transformation is about meeting the needs of today’s modern business. The new workforce is increasingly mobile, global and distributed and is putting requirements on companies to support their on-the-go lifestyle. Discover how building a cloud ecosystem of integrated applications drives the speed, agility and data insights you need to generate meaningful business outcomes. With the right solutions in place, you can empower employees to work anytime, anywhere and on any device using the modality of their choice – whether online chat, video meetings or voice communications.

Key Takeaways:

  • Find out how you can unify your collaboration tools into one, single cloud-based platform
  • Learn how to empower employees to work anytime, anywhere and on any device
  • Hear how building a cloud ecosystem of integrated applications can cut costs while driving meaningful business outcomes

Speaker

Naveed Husain
Vice President Office Public Sector and EducationRingCentral
MondayBreakout Presentation

close Pathway to the Future How Cities Are Unlocking Data

City of Las Vegas - Director of Innovation and Technology

A review of the city of Las Vegas and its efforts to become the premier smart city of the future.

Key Takeaways:

  • Understand the smart city concept
  • How cities are using data
  • Discuss the infrastructure involved in building a smart city
  • Understand the business use cases

Speaker

Michael Lee Sherwood
Director of Innovation and TechnologyCity of Las Vegas
MondayBreakout Presentation

close Theory of Leadership

IT LeadershipCity National Bank - Vice President of Enterprise Architecture

What is the “essence” that a leader has that lets him or her lead? How can you get more of this “leadership essence”? What kind of things do you do day to day and over the long run that cause you to gain or lose this “leadership essence”? In this session we will talk about and describe some strategic skills and knowledge that effective leaders must possess.

Key Takeaways:

  • What are essential skills a leader must have?
  • Techniques for growing your leadership skills
  • Other skills and knowledge needed to be an effective leader

Speaker

Victor Ramos
Vice President of Enterprise ArchitectureCity National Bank
MondayBreakout Presentation

close Navigating Today's Top Web Threat: Defending Against Credential Stuffing Without Creating User Friction

CybersecurityShape Security - Principal Security Strategist

Fraudsters and thieves are weaponizing each new data breach with credential stuffing attacks. Their automation is working against the recent reductions in user friction that businesses have worked so hard to achieve. This talk helps you understand how to separate fake users from your real customers without jeopardizing your customers’ experiences through friction-full defenses CAPTCHA and mandatory 2FA.

Key Takeaways:

  • This unwanted automation problem is more severe than most realize
  • How can you keep out automation without treating your customers like criminals?
  • Where should you focus your defense?

Speaker

David Holmes
Principal Security StrategistShape Security
MondayBreakout Presentation

close The Secure Cloud 9

Cloud SecurityCustomers Bank - CISO

Gain 9 critical insights for securely adopting a cloud strategy to host your products, platforms, or business-critical technologies.

Key Takeaways:

  • Avoid the common pitfalls of cloud deployments.
  • Gain insights into what works and what doesn’t when it comes to cloud.
  • Rationalize your cloud strategy to ensure it’ll meet your business objectives.
  • Decrease risks to your business by deploying a secure cloud.

Speaker

Endre Walls
CISOCustomers Bank
Monday Breakout Presentation

close Software-Defined Composable Infrastructure, Automation, and Artificial Intelligence - The Path to The Autonomous Data Center

Hewlett Packard Enterprise - Chief Technologist

As organizations modernize internal IT with multiple private and public cloud platforms, managing this hybrid IT ecosystem requires new tools, automation, and processes.  With applications and data hosted across multiple data centers and cloud providers, it becomes challenging to monitor cost, utilization, health, performance, and security. HPE has evolved infrastructure management with the combination of composable software-defined compute, storage, and networking technologies leveraging automation, global dashboards, and hybrid IT management tools.  The next evolution of hybrid IT management utilizes artificial intelligence to collect and analyze millions of global sensors to provide predictive analytics, preemptive workload and data recommendations, detect and automatically correct problems, and ultimately lower operational expenses while improving reliability.  HPE is powering hybrid IT solutions with artificial intelligence to move closer to the goal of the autonomous data center.

Key Takeaways:

  • Traditional techniques for managing internal apps and data are insufficient to manage a multi-cloud or hybrid IT environment.
  • Discuss how compassable, software-defined hybrid IT management is evolving using automated self-healing, self-optimization and machine learning.
  • Explain how artificial intelligence is being used now and in coming years to create an autonomous data center.

Speaker

James Bond
Chief TechnologistHewlett Packard Enterprise
MondayBreakout Presentation

close Diversity in Technology Leadership - Yielding Business Outcomes

IT LeadershipAVID - Director of Business Operations, Product Development and Technology

In this session, we will explore the current state of diversity and representation in leadership and technology and address key business benefits to a more balanced workforce, such as revenue, cost savings and customer satisfaction. We’ll conclude with suggestions and steps to reaching a more diverse and engaged workforce.

Key Takeaways:

  • Diversity in workforce and leadership has been linked to tighter customer engagement, wider marketing reach and more efficient branding spend
  • Several studies identify companies with a more balanced representation in workforce and leadership having higher revenue numbers and stronger shareholder value
  • Innovation spikes with engaged and balanced teams and reduces intellectual property risk
  • Moving towards diversity and fair representation is easy and achievable

Speaker

Alisa Sheyn
Director of Business Operations, Product Development and TechnologyAVID
MondayBreakout Presentation

close AI-Based Autonomous Response: Are Humans Ready?

CybersecurityDarktrace - Director

Cyber security is quickly becoming an arms race, with machines fighting machines on the battleground of corporate networks. AI-based cyber defense can not only detect threats as they emerge, but also autonomously respond to attacks in real time. But are humans ready to accept the actions machines would take to neutralize threats?

Key Takeaways:

  • AI approaches and algorithms for detecting and responding to threats
  • How human teams adopt (or resist) automated defenses
  • The concepts of ‘human confirmation’ mode and ‘active defense’
  • Success stories across Smart Cities, genomics organizations, and industrial control systems

Speaker

Maddie Slater
DirectorDarktrace
MondayBreakout Presentation

close Mobility – The Backbone of the Digital Business

CIO Leadership and InnovationT-Mobile - Sr. Manager, Sales Engineering

Successful digital transformation hinges on the right partnerships, channels, and ecosystems, and the evolving mobile network is primed to connect the dots like never before. Join this informative discussion on the transforming capabilities of next generation wireless where CIO’s will explore:

  • New network capabilities can create flexibility and spark innovation
  • Enterprise connectivity to boost their transformation initiatives
  • Implementing private and public networks, SD WAN and edge computing

Speaker

Tom Babineau
Sr. Manager, Sales EngineeringT-Mobile
MondayBreakout Presentation

close Adapting to Evolving Threats and the Ongoing Challenge of Human Behavior

Cyber SecurityForcepoint - CIO

It is not a matter of if but when attackers are coming in the door, and a company’s own employees will most often be the portal to entry. Whether it is due to poor cyber hygiene, stolen credentials and employee impersonation, or malicious employees seeking to harm the business, insider threat poses one of the greatest cybersecurity challenges companies face today. And while employees can be a company’s weakest link in cybersecurity, they can also represent its strongest first line of defense.

To date, the security industry hasn’t spent a lot of time thinking about security through a human-focused lens. However, in understanding human behavior on a network, security teams can more quickly identify what is anomalous behavior and, most importantly, which digital identities are actual employees versus digital doppelgangers. Shutting down the theft of critical IP before it leaves the network is the modern security landscape we must address today.

Key Takeaways:

  • Mitigating today’s sophisticated threat landscape by pivoting from an infrastructure-centric approach to a user and data aware security posture
  • Identifying both anomalous data handling activity and intent in order to reduce the risk of fraudulent activity from insiders.
  • Best practices for implementing a user-and-data centric security approach, working cross-functionally, within your organization

Speaker

Meerah Rajavel
CIOForcepoint
MondayBreakout Presentation

close Evolving Automation from RPA to API to AI

AutomationThomson Reuters - Vice President

Every organization is going through some sort of digital transformation and automation is key aspect of it. How the automation is evolving and the strategy on starting simple and taking all the way to ML/AI.

Key Takeaways:

  • How to enhance your automation strategy
  • Learn digital transformation in the age AI
  • Embrace automation to bring efficiency

Speaker

Sai Billanuka
Vice PresidentThomson Reuters
MondayBreakout Presentation

close Securing a Hybrid-Cloud Environment

Cloud SecurityCredit Union of Colorado - Information Security Officer

Security controls that scale and extend from on-premise to cloud based workloads.

Key Takeaways:

  • Must have security controls for an hybrid environment
  • Maintain your regulatory and compliance requirements
  • Incident management and response
  • Securely adopt and benefit from cloud based technologies

Speaker

Prabodh Telang
Information Security OfficerCredit Union of Colorado
MondayNetworking

Lunch

Monday

Targeted Research Meetings

Expo Hall
Monday Breakout Presentation

close Mobile Threat Landscape - Phishing, Malware, Advanced Compromise and more

Lookout, Inc. - Senior Director, Product Management

Learn about the latest threats impacting Android and iOS devices. In this presentation, we’ll explore real-world examples of mobile threats across the app, device, network and web layers. We’ll focus specifically on how these threats can open up enterprises to potential data breaches.

Key Takeaways:

  • Your mobile device is the perfect surveillance device
  • Mobile threats go beyond malware
  • Mobile threats often act outside of your traditional security perimeter
  • Phishing is the number one threat on mobile

Speaker

David Richardson
Senior Director, Product ManagementLookout, Inc.
Monday Breakout Presentation

close On-Premises to Cloud Migrations: Successfully Transitioning General Telephony and Contact Center Services

Digital TransformationPPT Solutions - VP of Technology
PPT Solutions - VP of Enterprise Solutions

Cloud technology provides multi-dimensional solutions that minimize downtime and maximize ROI. Understanding the benefits of a cloud migration and its potential to transform some of the most critical components of an operation can be a major factor in determining if the move is the right one for your organization. The proper due diligence ahead of deployment along with avoiding the most common pitfalls are key in the implementation of successful cloud migrations.

Key Takeaways:

  • A general understanding of the advantages of cloud services for Contact Center as a Service (CCaaS) and Unified Communications as a Service (UCaaS) bring most organizations.
  • Better understanding of how to differentiate the capabilities of CCaaS and UCaaS vendors and how they fit an organization’s needs
  • The necessary steps to take in preparing your organization (technical and business) to move from premises solutions to CCaaS and UCaaS capabilities
  • Common pitfalls to avoid when making the transition

Speaker

Scott Prater
VP of TechnologyPPT Solutions
John Smiley
VP of Enterprise Solutions PPT Solutions
MondayBreakout Presentation

close SWAT Team Lessons for Cybersecurity and More

CybersecurityTEEM/WeWork - Director, InfoSec

There are many lessons and skills the Cybersecurity industry can learn from the intense, life and death world of Police SWAT Teams. Chris Gebhardt is a former Police Lieutenant and SWAT Team Leader who also specialized his career in IT and InfoSec. He will share some specialized skills he has applied to Cybersecurity operations to create an always win, open eyes mindset. You’ll hear stories from the field and server room about ‘keeping your head on a swivel’ and ‘two is one, one is none.’ He’ll show you how you can adopt these concepts to augment your cybersecurity thinking for the better.

Key Takeaways:

  • Incident response plans blind you
  • Be open to ideas
  • Your team can be more than it is

 

Speaker

Chris Gebhardt
Director, InfoSecTEEM/WeWork
Monday Breakout Presentation

close Maintaining Security Compliance via Automation and Integration

Fortinet - Vice President of Systems Engineering

Maintaining Security Compliance via Automation and Integration:
• Technology innovation is introducing new systems, tools and platforms available to accelerate business
• What is the better approach when it comes to new implementation: run, walk, or wait?
• How can you manage the ever-increasing number of devices and applications?
• The pool of capable workers is not keeping pace
• How can we shift workers up the technology stack to gain efficiencies?
• Guidance on how to choose the right new tools and making sure they work in concert with existing platforms via open orchestration and automation

Key Takeaways:

  • Best tactics for orchestration relating to new cybersecurity tools
  • How to best utilize your existing and pending staffing resources
  • Measurement of optimal adoption speed/pace for new technologies/platforms

 

Speaker

John Jacobs
Vice President of Systems EngineeringFortinet
MondayBreakout Presentation

close The Human Cloud, Demystified

Toptal - Agile Talent Consultant

What is the Human Cloud? Discover its origins and growing impact on individuals and organizations. We have entered the age of acceleration — not just of ideas and technology, but of the very elements that will allow us to keep up and stay ahead. In this session, learn how you can leverage the Human Cloud as a distinct, competitive advantage.

Key Takeaways:

  • How top talent operate has fundamentally shifted. Business leaders must adapt and consider new ways to access expertise globally.
  • A CIO’s ability to execute on a vision is only as high as the caliber of resources they make available to their organization.
  • “On-Demand” is becoming prevalent within modern organizations, as shown through the increasingly ubiquitous Talent Economy.

 

Speaker

Neil Pickard
Agile Talent ConsultantToptal
Monday Breakout Presentation

close Thirty Seconds Over Tokyo

IT LeadershipEBSCO Industries, Inc. - Chief Information Officer

Discussion on how EBSCO IT completely transformed itself while leveraging existing talent. The conversation will outline the difficulties and techniques used to preserve the culture of the organization. The Doolittle title reference refers to how, through effective leadership, you can completely retool what you have and be very effective. Often times, leaders feel the need to hire in ideas.

Key Takeaways:

  • Key building blocks needed before transforming
  • How to preserve the culture during transformation
  • How to measure yourself along the way

Speaker

Ryan Loy
Chief Information OfficerEBSCO Industries, Inc.
Monday Breakout Presentation

close Business Group CIO and Alignment with Corporate IT

IT LeadershipRTI International - Business Group CIO & VP Research Computing

Many IT organizations struggle with ensuring their strategy and directions aligns with that the overall business. One way to solve that issue is to have business staff with responsibility and authority that mirrors that of a corporate CIO, but is imbedded in the business. This session will cover a case study of such a design, including pros and cons and ongoing challenges.

Key Takeaways:

  • Understanding of the challenges of aligning corporate IT with a business that also delivers technology solutions to clients
  • Understanding of the solution design
  • Understanding of things that have worked well, and those that are still evolving

Speaker

Karen Davis
Business Group CIO & VP Research ComputingRTI International
MondayBreakout Presentation

close You are the New CIO. You’ve Made it. Now What?

IT LeadershipITeffectivity - Principle, IT Executive Advisor and Coach

You are the new CIO. Expectations of you are running high.  You know you have a limited time to get on board, make a difference and demonstrate your value.  In this participative workshop, Mary Patry will call on members of the audience to demonstrate the power of a coaching relationship to jump start your first 90 days.  Key takeaways include steps to:

Key Takeaways:

  • To get clear about what success means
  • Understand the culture and fit in
  • Create a development plan to grow professionally
  • Get small wins and begin to execute

Speaker

Mary J Leonardo Patry
Principle, IT Executive Advisor and CoachITeffectivity
MondayBreakout Presentation

close Bridging the Gap: IT Security and the Service Desk

Freshworks - CIO

Information security is everyone’s business. Learn about the ever-changing IT security landscape as Prasad Ramakrishnan, CIO, Freshworks addresses the effect of breaches on businesses and ways to improve your infosec capabilities.

Key Takeaways:

  • How your service desk can become the eyes and ears of IT security
  • How to build an effective ‘Prevent-detect-correct’ security model
  • ITSM best practices and initiatives to beef up IT security
  • An IT security checklist for digital businesses

Speaker

Prasad Ramakrishnan
CIOFreshworks
MondayBreakout Presentation

close Life After an Anonymous Attack on My City

Cyber SecurityCity of Fort Lauderdale - CTO

The city of Fort Lauderdale, Florida was hit by an Anonymous denial-of-service attack in December 2014 and was forced to immediately upgrade computer systems to thwart any potential future attacks.The city quickly spent $430,000 upgrading computer security systems to mitigate vulnerabilities it had previously identified. While the attack itself did not cost the city this money, it expedited the timeline for these necessary system upgrades. A complete A-Z approach for a new security awareness program was created.

Key Takeaways:

  • Even if sensitive information isn’t compromised, there can be political fallout from such an attack
  • If you’re aware of vulnerabilities that need to be remedied “when the budget allows,” would-be attackers will be too
  • A security strategy for a new division
  • How the city has changed its ways – both technologically, and behaviorally, in the time since

Speaker

Michael Maier
CTOCity of Fort Lauderdale
MondayNetworking

Industry Dinner

TuesdayNetworking

Breakfast Buffet

TuesdayKeynote

close The Next Wave of Business Intelligence

MicroStrategy Inc. - Vice President of Product Marketing

Despite widespread investment in analytics, only 35% of the workforce uses data to make better decisions today. So how can organizations today, successfully elevate the knowledge of every employee and drive a data-driven culture – especially in a world where transparency and personalization are paramount. In this Keynote, you’ll learn about:

Key Takeaways:

  • The future of analytics, where answers find you with zero-click intelligence
  • The potential of Federated Analytics, improve the tools your users already love
  • The impact of mobility, and how to go from insight to action, and get results.

Speaker

Vijay Anand
Vice President of Product MarketingMicroStrategy Inc.
Tuesday

Targeted Research Meetings

Expo Hall
TuesdayBreakout Presentation

close IT Leadership in a Multi-Cloud World

IT LeadershipDell EMC - Dell Technologies, Global Business Development

Digital & IT Transformation: Tackling Current IT Challenges
This presentation is not for the faint of heart: the IT struggle is real. How do you determine which technologies to adopt? Are you leveraging the cloud and should you? How can you protect everything? IT changes are radically happening across every industry; how will you keep up? Is your job getting any easier? Your technology decisions today dictate your companies agility and future competitiveness. Come hear a few stories and learn what you should and shouldn’t be doing to ensure success.

Key Takeaways:

  • IT Strategy
  • Digital Transformation
  • IT Transformation
  • Security

Speaker

Ben Schreiner
Dell Technologies, Global Business DevelopmentDell EMC
TuesdayBreakout Presentation

close Sustaining Our Physical World in a Digital Age

CybersecuritySwitch - Chief Information Officer

Technology advancement is poised to create a new revolution for humanity, and we must think and act in ways that ensure the sustainability of our planet and keep humans happy and thriving. Artificial Intelligence (AI) applications are influencing and improving health, science, communication, transportation and energy on a global scale – and it is our responsibility to design and build the infrastructure for this new digital age while preserving our humanity and the planet earth. We’re all in this together.

Key Takeaways:

  • Imagine an age when Digital + Physical + Biological lines are blurred
  • Complex issues such as sustainability, sourcing and making better choices for the planet and its people
  • How is physical infrastructure advancing to support all of this technology?
  • The critical role of STEAM (Science, Technology, Engineering, Arts, and Math) education initiatives as the path to building the workforce of the future
  • Challenges of keeping the humanity in technology in the age of analytics and technological transformation

Speaker

Missy Young
Chief Information OfficerSwitch
TuesdayBreakout Presentation

close Transforming Technology for IT Leaders

Digital TransformationMichigan State University - Director Health Information Systems

Modernizing technology is sometimes confused with reducing technical debt. Effective long-term viability of technology can be reached through a digital transformation. Transform technology to allow your business to grow and support the changing landscape. Build for tomorrows problems and not just solve the technical debt issues faced today.

Key Takeaways:

  • Lead with a value proposition for technology and sustainability. This is the foundation for supporting the business needs. Add value and the money will flow.
  • Focus the business in on hidden costs. Hidden costs are different in each organization. Our organization’s largest hidden cost is labor rates.
  • Build foundation to be flexible for tomorrow and not just solve the needs for today.
  • This is not an overnight process. Take a close look at your business and start the conversation!
  • Case study

Speaker

Robert Barto
Director Health Information SystemsMichigan State University
TuesdayBreakout Presentation

close Beyond Security Awareness - Becoming Foolproof

Ransomware/PhishingJackson County Oregon - CIO / Technology Director

Despite mandatory security training, most users remain highly vulnerable to social engineering. Awareness is not enough. Compliance-focused training can be worse than no training at all. To truly reduce breach risk, we need a more effective approach.

Key Takeaways:

  • A data breach may not be your worst-case scenario
  • Why social engineering is the best exploit ever
  • How mandatory security training can backfire
  • The 3 keys to a truly effective training program

Speaker

Mark Decker
CIO / Technology DirectorJackson County Oregon
TuesdayBreakout Presentation

close Innovative Strategies for Cultivating Security Talent

Cybersecurity Staff TrainingGrand Canyon Education - CISO

A look at how to bridge the massive gap in security talent we all face, as massive workforce shortages abound.

Key Takeaways:

  • There is a massive shortfall in security talent, due to rapid increase in demand for skills that take time to cultivate
  • Alternative methods of cultivating talent must be identified, if we are to be successful
  • If we find people with a strong technical foundation (or interest) and provide them with the required experiences, we can grow the talent we need
  • Mix together a few rock stars and lots of raw uncultivated talent, then simmer in a positive culture, pouring in generous quantities of hands-on experience

Speaker

Mike Manrod
CISOGrand Canyon Education
TuesdayBreakout Presentation

close Why the Cloud is Perfect for Data Protection

Cloud StrategyDruva - Chief Technologist

While more companies are now leveraging the cloud to increase their level of data protection and management, there are still many wondering “why?”

The answer:  the cloud actually brings substantial advancements to the data protection and management table that simply aren’t possible without it. The easiest advantage to envision? Unlimited scalability. If a data protection tool is properly designed, the capacity should automatically expand to meet any customer’s needs. The second advantage: the cloud is the simplest way to centralize the storage of all secondary data sources while also providing unlimited compute that can be used to gain additional insight and business value from that data. Finally, the ability to do automated Disaster Recovery (DR) without maintaining a DR facility is unquestionably a major value of the cloud, and simply isn’t possible otherwise. Join Curtis Preston, as he explains the benefits of cloud-based data protection and management, how to decide if a cloud-based solution is right for you, and best practices when evaluating data management vendors.

Speaker

W. Curtis Preston
Chief TechnologistDruva
TuesdayBreakout Presentation

close CIO Life – The Good, the Difficult and the Comical

Toshiba International Corporation - CIO and VP

The CIO of Toshiba International Corporation, Allen Wuescher, shares insights to working in a global, multi-cultural environment and lessons learned on the journey. Lessons include how to predict the future, methods for bringing people together to achieve common goals, and the art of the possible.

Key Takeaways:

  • The future is predictable
  • Everything different is more of the same
  • Crazy is okay
  • The power of diversity

Speaker

Allen Wuescher
CIO and VPToshiba International Corporation
TuesdayBreakout Presentation

close The New Era of Evasive Phishing: Why It’s Happening and How to Stop It

Ransomware/PhishingCyren - Senior Security Engineer
Cyren - Regional Security Account Director

Phishing is increasingly getting through to users and is the top source of breaches at companies. The rise of the Phishing-as-a-Service industry is driving phishing volumes while making attacks more targeted and sophisticated. This new era of evasive phishing requires not just new detection countermeasures, but a new security architecture.

Key Takeaways:

  • What is “evasive phishing,” what are examples of techniques being applied, and what has been the impact on IT security?
  • What’s currently on offer from the “Phishing-as-a-Service” industry, and what happens when they start using AI?
  • What does the growth of Office 365 mean for phishing security?
  • In the cat-and-mouse game with the cyber criminals, what’s the next move in terms of security architecture?

Speaker

Sam Wolfshohl
Senior Security EngineerCyren
Chris Hegberg
Regional Security Account DirectorCyren
Tuesday Breakout Presentation

close What to do in an IT Emergency

IT LeadershipWashington State Military Department - CIO, Director

In this educational session Mark will discuss how the community of professionals and experts from the public, private and tribal sectors within emergency communications work together to provide reliable and resilient emergency communications throughout times of crisis and how this impacts business. Crisis management and learning what to do is critical for any business organization, public or private. Mark will review and share a case study, on how the WECCWG has grown substantially and currently holds a tri-annual forum to bring their community together to raise the collective awareness of the unique emergencies and challenges we all must be ready to overcome together in an emergency.

Key Takeaways:

  • In this session we will discuss public & private sectors collaboration
  • How to be prepared in an emergency
  • What to do in an IT emergency
  • Who and how to coordinate with: Case study on WECCWG

Speaker

Mark E. Glenn
CIO, DirectorWashington State Military Department
TuesdayBreakout Presentation

close Optimizing Delivery - Using Risk and Value KPIs Towards a Rational Portfolio

IT LeadershipCouncil on International Educational Exchange - Chief Information Officer & Chief Information Security Officer

Successful delivery of projects is more than just delivering on time and on budget. Alignment with strategic goals, using Risk and Value KPIs is key to working on projects that make the most impact.

Key Takeaways:

  • Portfolio Optimization
  • Strategy for Architecture Agility
  • Effective resource balancing

Speaker

Irving Bruckstein
Chief Information Officer & Chief Information Security OfficerCouncil on International Educational Exchange
TuesdayBreakout Presentation

close Blockchain - The Next Generation of the Internet, What can it do and why is it important to you?

Digital TransformationCentral New Mexico Community College - Chief Information Officer

If the current Internet is the Internet of data, blockchain is the internet of value. As the distributed ledger technology (DLT), blockchain can significantly increase business value by improving business efficiency via smart contract process automation, cutting costs via disintermediation and therefore transforming customer experience (UX).

Key Takeaways:

  • How can blockchain transform customer experience (UX)?
  • How can blockchain increase business efficiency?
  • How can blockchain cut costs for business?
  • Why every business leader needs to adopt a blockchain strategy as a business priority?

Speaker

Feng Hou
Chief Information OfficerCentral New Mexico Community College
TuesdayNetworking

Lunch

Executive Steering Committee

Experienced IT leaders work with us to focus our program on trends that will move the needle at your company.

Steering Committee Members

Nishanth RodriguesChief Information Officer
University of Mississippi
Paul CotteyChief Information Officer
Water Street Healthcare Partners
Karen DavisBusiness Group CIO & VP, Research Computing
RTI International
Raphael MorozovCTO
Eurofins DMS
Adam WaldronChief Information Officer
Idaho Farm Bureau Insurance
Alan WhitehouseChief Information Officer
WellStar West Georgia Medical Center
Andrea GiantelliVP of Global IT Compliance & Portfolio Management
Platform Specialty Products
August AlfonsoCIO & VP for Facilities Operations &
Del Mar College
Carolyn SchmidtTastefully Simple
Chief Information Officer
Dr. Ken RusselCIO & VP, Digital Transformation
Pfeiffer University
Erwin EimersChief Information Officer
Valent U.S.A. LLC
Jack KingChief Technology Officer
State of Illinois
Meerah RajavelChief Information Officer
Forcepoint
Jason JamesChief Information Officer
Optima Healthcare Solutions
Jeffrey PotterChief Technology Officer
Davenport & Company LLC
Dean JensenAssistant Professor of Computer Science
Elmhurst College
Jonathan NeumarkAssistant VP, Technology Services
Flagship Credit Acceptance
Kumar PeriasamyVice President - Digital Transformation
United Nations FCU
Leah KrausChief Information Officer
North Carolina Central University
Mark SimonSVP, CIO and CISO
Benefis Health System
Michael McCartneyChief Marketing and Technology Officer
MoneySolver
Mujeebur RahmansaherChief Technology Officer
The Team Companies
Nader NematiQTC Management Inc
Chief Information Officer
Donna HarringtonChief Technology Officer
Southwestern College
Rezaul AbidGlobal Head of Information Systems and T Strategy Architecture and Innovation
Bechtel Global Corporation
Mike MaierCISO
City of Fort Lauderdale

An Esteemed Audience

Thousands of IT executives have joined us over the years for what has been voted the “most effective trade show” for over a decade. Use our tools to demonstrate ROI to your C-Suite.

Attendee Testimonials

Attendee List

Exhibitors

CIO Visions has quickly become established as the “deal generating show”.

Exhibitor Testimonials

Exhibitor List

About CIO Visions

CIO Visions is an invitation-only trade show for IT executives from mid-market companies, that bridges you to the most compelling solutions and information for your crowning priorities.

Have Questions?

We’ve answered a few FAQs to get you started. For any other questions, please don’t hesitate to contact us!

Our Team

Marin Silvers

Sponsor Relations
(424) 334-5141
Send Message

Britt Erler

Content Director
(424) 389-3287
Send Message

Hannah Greenlee

Attendee Relations Executive
(424) 334-5159
Send Message

Marissa Marsh

Account Executive
(424) 313-1172
Send Message

Shanna Delfs

Account Executive
(434) 334-5161
Send Message

Andrea Gomez

Account Executive
424-334-5149
Send Message

Hotel and Travel

Your conference pass includes overnight accommodations, travel reimbursement, meals and cocktail receptions.

The Hotel

Bellagio Hotel

Inspired by the villages of Europe, AAA Five Diamond Bellagio overlooks a Mediterranean-blue lake with fountains performing a magnificent ballet. Escape into an otherworldly plane of dance, music and acrobatics with “O” by Cirque du Soleil — aquatic theater in our Parisian-style opera house.

The hotel rooms and suites at the Bellagio offer the perfect blend of beauty and elegance. Our rooms will elevate your stay, whether you're traveling for business, celebrating a honeymoon, or just looking for a remarkable getaway. With views of the Las Vegas valley or the iconic Bellagio fountains right from your suite, your stay will be nothing short of unforgettable.
We’ll book your accommodations, cover your first night’s stay and offer a discounted rate thereafter. To make your reservations please contact:
The nearest airport is McCarran Airport located about 2 miles away. This hotel does not operate a shuttle, taxi or ride share is recommended.  
Bellagio Hotel | 3600 S. Las Vegas Blvd. Las Vegas, NV 89109
×