The Red Rock Casino Resort & Spa, Las Vegas

What You Get

Our ‘invitation-only’ approach allows us to provide exceptional service for our audience.


Conference Pass

Full access to the event, from educational sessions to networking events.


Flight Voucher

Traveling more than 100 miles? We'll help with a $200 flight reimbursement.


Overnight Hotel

We cover the first night and offer a discounted rate. Spouses welcomed.


5 Star Catering

Let us treat you to breakfast, lunch, networking receptions and dinner.

Who You'll Meet

A unique engagement opportunity with IT executives from emerging mid-market companies.


Influential Peers

Learn from the best in the field and walk away with actionable insights.



Gain valuable and actionable insights from knowledgable IT experts.


Leading Partners

Meet only the solution providers most relevant for your projects and initiatives.



Unparalleled networking opportunities with high profile industry leaders.

What You'll Do

Your registration creates a truly customized agenda based on your specific areas of responsibility, challenges and interests.


Peer-Led Learning

Spend most of your time participating in educational sessions and networking activities.


Educational Sessions

Keynotes, case studies, plenary sessions, industry panel discussions, and more.


Networking Activities

The ideal event to connect with peers who can truly make a difference to your career.


Research Meetings

Discover and validate leading solutions guided by knowledgable executives.

play_circle_outline Watch Video


A 100% peer-driven educational program centered around 5 key themes addressing the mid-market IT challenges.


Key Themes

close Cloud Strategy
  • Advantages & Disadvantages of Public vs Private Cloud
  • Staffing Changes in a Cloud Environment
  • Controlling Cloud Costs: Leveraging Cloud to Drive Your IT Cost Down
  • Challenges & Opportunities When Switching to the Cloud
  • Developing a Mobile Cloud Strategy for Business
  • Cloud Based Initiatives How to Support Cloud vs. Security
  • Network Integration Between Public and Private Cloud
  • The Future of VoIP & It’s Reliability
  • Security Protocols: Network Security/Cyber Security/Data Security
  • The Use of AI in Data Security: Today’s Opportunities and Challenges
  • Successful Data Governance Approaches
  • Lowering the Risk of a Data Breach When Using the Cloud
  • Protecting Unstructured Data: How Secure Do I Need to Be?
  • Network Visibility and Integration with Security Needs
  • BYOD-Wireless Protection: Implementing Company-Wide Phone Wipes
  • How Do We Make It Easier to Keep Ourselves and Our User Communities Safe?
  • Integration of Security into Strategic Planning Processes and Operations
  • Security vs. Ease of Access
  • Disaster Plans & Business Continuity
  • How to Personalize A.I. and Customer Engagement
  • Leadership Challenges and the Resistance in Changing Processes
  • Strategies on IT Governance - Budgeting and Prioritization
  • Vendor Relations & Contract Negotiations
  • How to Strive in an Environment Where Stated Goals Do Not Match Observed Behavior
  • Understanding the Mechanics of Teaching & Delivering
  • Managing IOT Infrastructure Growth Without the Infrastructure Staff
  • Data Loss Prevention and Backups
  • Enterprise Data Management and Data Classification
  • Utilizing Big Data Analytics: New Tools, New Insights
  • Machine learning and Big Data, What Can Our Data Teach the Machine?
  • How to Monetize Data: Finding the Right Data Analytics Software for Your Needs
  • Dark Data: How to Look at Previously Collected Data, and Use it for Multiple Purposes
  • DevOps approach into IT infrastructure
  • Top Practices for SaaS Application Development
  • Keeping Up with Emerging Software Technologies
  • Using Technology to Support Anticipated Changes
  • Does Agile Work in All Software Development Projects? When Does it Work? When Does it Hurt?


Get insights from 20+ specialized mid-market IT executives making way in the ever-changing world of emerging technologies. Presenters from the 2017 series included:

CIO VISIONS Mid-Market Spring Summit View More

Todd Barnum


GoPro, Inc.

CIO VISIONS Mid-Market Spring Summit View More

Moy Chambers


Canary Speech

CIO VISIONS Mid-Market Spring Summit View More

Bill Packer


American Financial Resources

CIO VISIONS Mid-Market Spring Summit View More

Tom Jurlina


National Able Network Inc

CIO VISIONS Mid-Market Spring Summit View More

Jacob Margolis


County of Orange, CA

CIO VISIONS Mid-Market Spring Summit View More

Jim Gilbert


Rapid City South Dakota

CIO VISIONS Mid-Market Spring Summit View More

Eric Kierstead


BeavEx Incorporated

CIO VISIONS Mid-Market Spring Summit View More

Paul Cottey


Water Street Healthcare Partners

CIO VISIONS Mid-Market Spring Summit View More

Tom Andriola


University of California System

CIO VISIONS Mid-Market Spring Summit View More

Pierre Merlin



CIO VISIONS Mid-Market Spring Summit View More

Douglas Duncan


Columbia Insurance Group

CIO VISIONS Mid-Market Spring Summit View More

Karthik Devarajan

Director of IT

Legal Aid Bureau

CIO VISIONS Mid-Market Spring Summit View More

Roy French


Saint Elizabeth Health Care

CIO VISIONS Mid-Market Spring Summit View More

Eddie Ho


Los Alamos National Bank

CIO VISIONS Mid-Market Spring Summit View More

Ryan Loy



CIO VISIONS Mid-Market Spring Summit View More

Carolyn Bogan

VP, IT Shared Services

KAR Auction Services

CIO VISIONS Mid-Market Spring Summit View More

Adip Dsouza

Director of IT

Professional Finance Company, Inc

CIO VISIONS Mid-Market Spring Summit View More

Christopher Harrison


Nova Southeastern University

CIO VISIONS Mid-Market Spring Summit View More

Jim Garrett


American Healthcare LLC

CIO VISIONS Mid-Market Spring Summit View More

Tris Lingen


TCF Bank

CIO VISIONS Mid-Market Spring Summit View More

Stephen Engel

SVP, Practice Lead


CIO VISIONS Mid-Market Spring Summit View More

Zoe Lindsey

Security Advocate

Duo Security

CIO VISIONS Mid-Market Spring Summit View More

Chris Johnson

Busniess Solutions Director


CIO VISIONS Mid-Market Spring Summit View More

Adrien Gendre

Chief Solution Architect


CIO VISIONS Mid-Market Spring Summit View More

Nicole Eagan



CIO VISIONS Mid-Market Spring Summit View More

Prashant Kumar




Make every session valuable by selecting up to 3 key themes to mix and match the most relevant topics to you. Sessions from our 2017 series included:

Reset Filter
CIO Leadership & Innovation
Cyber Security

Welcome Cocktail Reception & Registration


Breakfast Buffet

Monday, June 11Keynote Presentation

close Digital Transformation – Six Steps to Success

CIO Leadership & InnovationHitachi - SVP, Practice Lead

Digital transformation – driving operational improvements in your physical value stream using connected data from your digital value stream – is delivering unprecedented value across industries to those with a clear road map. In fact, a recent Harvard Business School report shows that companies that embrace digital transformation attain significantly better gross margins, earnings and net income than those that don’t. What’s more, those digital leaders are not spending much more on IT than laggards because the big investments have already been made. The challenge is knowing how to connect the data from the digital value stream to drive continuous improvement with real-time metrics and predictive analytics. No matter where you are on the journey of digital transformation – these six steps can help you connect your systems to drive new levels of productivity, profitability and value across your business.

Key Takeaways:

  • Learn how to connect your physical and digital value streams to create near real-time operating systems.
  • Identify areas of variation across the physical value stream that can be supported by better data and real-time analytics.
  • Gain knowledge through strategic partnerships with digital leaders to accelerate your journey to unlocking more organizational value.


Stephen Engel
SVP, Practice LeadHitachi

Targeted Research Meetings

Expo Hall
Monday, June 11Breakout Presentation

close Debunking Cybersecurity Myths Around Public Cloud

Cyber SecurityNational Able Network Inc - CIO

Most organizations claim to have a cloud first mentality. Everyone knows that cloud computing is here to stay and is a necessary business driver. Unfortunately, cloud security myths keep circulating causing many IT executives to delay, fear and drag their feet with public cloud adoption. Presentation will delve into some of these myths.

Key Takeaways:

  • Cloud typically provides better protections than on premise
  • Easier management and reporting with cloud solutions
  • More cloud security resources and stopping shadow IT
  • Easier BYOD and less hardware/user management


Tom Jurlina
CIONational Able Network Inc
Monday, June 11Breakout Presentation

close Intelligent by Design: AI and the Future of Cyber Security

Cyber SecurityDarktrace - CEO

Cyber security has turned into an arms race—machines fighting machines on the battleground of corporate networks. Catching today’s most sophisticated cyber-attacks requires finding the slightest and subtlest anomalies inside networks containing millions of constantly changing data points, where billions of events take place every day. Artificial intelligence-based systems are now being deployed to continually assess complex business environments. Known as ‘immune system’ cyber defense, this approach is used to uncover threats that have already penetrated the network border and then autonomously respond, fighting back with precise, targeted actions. Learn how to distinguish the hyperbole surrounding machine learning from proven AI technology that delivers real results for organization of all sizes – and stops attackers in their tracks.

Key Takeaways:

  • New machine learning and AI algorithms that are automating advanced cyber defense
  • The many ways AI can augment human security teams
  • How to navigate the challenges of implementing AI in a business environment
  • Real-world examples of unknown threats detected and contained by ‘immune system’ technology


Nicole Eagan
Monday, June 11Breakout Presentation

close Steph Curry Cybersecurity:  Nothing But Net!

Cyber SecurityGoPro, Inc. - CISO

At RSA 2017, over 75% of the CISOs polled said they were looking for new positions.  Are CISOs wearing out their welcome with employers? In their effort to secure the company’s sensitive data, many CISOs end up alienating many of their colleagues or creating “hostile work environments.”  Is it a requirement of the job that CISOs live at odds with their organizations?

This session will present helpful tips on keeping your company secure while maintaining positive relationships and job security; what we in the security community might call a true “nothing but net” play.


Todd Barnum
CISOGoPro, Inc.
Monday, June 11Breakout Presentation

close How Do We Make it Easier to Keep Ourselves and Our IT Communities Safe?

Cyber SecurityAmerican Healthcare LLC - CISO & VP of IT

Understand and spread the importance of online safety. Ensure protection of information from email to a friend to financial and medical records. As with most environments, the use of wireless networks sometimes provides more vulnerabilities than usefulness. With all the malware (especially ransom-ware) exploding, training and awareness is key to protecting personal and business information.

Key Takeaways:

  • Online? How to relax
  • Ransom-ware is on the rise and everyone has to be aware
  • The internet is useful but dangerous so understand how to use technology to protect yourself
  • Best practices to enforce procedures to ensure safe computing in your place of business


Jim Garrett
CISO & VP of ITAmerican Healthcare LLC
Monday, June 11Breakout Presentation

close Combating Broken Culture With DevOps

DevOps StrategyPSC Group LLC - Busniess Solutions Director

The time for IT leaders to play a pivotal role in business strategy is now. So how do you disrupt the sometimes-contentious relationship between IT and the business to affect real organizational change? This session provides a blueprint for transforming IT’s relationship with the business by delivering measurable value with open and honest communication in both directions, drawing from consulting experience introducing Agile and DevOps to clients large and small. We’ll cover landmines to watch out for, common paths to quick wins, useful tools and lessons learned from successful and not-so-successful Agile projects. When we’re done, you’ll understand the impact that Agile and DevOps can have not only on IT culture, but on the culture surrounding the critical partnership between IT and the rest of the business.

Key Takeaways:

  • Transforming IT’s relationship with the business by delivering measurable value with open and honest communication in both directions.
  • Landmines, common paths to quick wins, useful tools and lessons learned from successful and not-so-successful Agile projects.
  • Understand the impact that DevOps can have not only on IT culture, but on the culture surrounding the critical partnership between IT and the rest of the business.


Chris Johnson
Busniess Solutions DirectorPSC Group LLC
Monday, June 11Breakout Presentation

close A New Approach to Email Security

Cyber SecurityVadeSecure - Chief Solution Architect

Through real-life examples, learn how malwares can easily circumvent classical detection methods such as fingerprint, reputation and sandboxing, and discover how Vade Secure unique predictive email defense can stop ransomwares and phishing attempts before they reach your employees.

Key Takeaways:

  • Email Security
  • Ransomware
  • Phishing


Adrien Gendre
Chief Solution ArchitectVadeSecure
Monday, June 11Breakout Presentation

close Does Agile Work in All Software Development Projects? When Does it Work? When Does it Hurt?

DevOps StrategyInformation Clearinghouse Inc - CIO

In one camp, you have the traditional project approach to Software Development, where development is handled as a linear series of events from conception to production. In the other camp, you have Agile, a flexible, team-centric, iterative approach to lean development. Both strive to streamline the way we get software development projects done, just in different ways. So what makes these two workflow management approaches different? When does Agile work? When does it hurt?

Key Takeaways:

  • Understanding the differences between Agile and Traditional project Methodologies
  • What are the pros and cons of each?
  • When does the Agile approach work?
  • When does the Agile approach hurt?


Joseph Costello
CIOInformation Clearinghouse Inc
Monday, June 11Breakout Presentation

close Digital Innovation @Enterprises

CIO Leadership & InnovationTechBlocks - CEO

Although this sounds like an oxymoron – this can be done and has been done. Lets break down some simple yet successful ways at innovating and making simple digital solutions a reality while transforming businesses.

Key Takeaways:

  • See how digital innovation and transformation can happen at the Enterprise level.
  • Learn the ethos, process and environment needed for digital transformation
  • Re-imagine and revitalize your business through an innovation lens


Prashant Kumar
Monday, June 11Breakout Presentation

close Giving Up Privacy for Convenience

Cyber SecurityEbsco - CIO

Discussion from an IT leader on how we need to think differently to better protect our most valuable corporate assets. Discussion will focus on the societal shift of this digital generation

Key Takeaways:

  • Discussion on current digital landscape
  • Overview of behavioral risks to security
  • Mitigation strategies
  • Key Questions to grade yourself/organization


Ryan Loy
Monday, June 11Breakout Presentation

close How to Leverage Cloud Technologies and When

Cloud StrategyCanary Speech - SVP of IT

Today’s technology platforms enable companies to approach team building, training and selling opportunities in ways that were previously unimaginable. This quantum leap forward has introduced new challenges: as we scramble to implement the latest and greatest, we may not allow our previous technology investments to reach their full promise.

Key Takeaways:

  • How to leverage Cloud technologies and when
  • How will AI affect your Cloud Strategy
  • Understand that change has changed
  • When to cut and run away from an investment


Moy Chambers
SVP of ITCanary Speech
Tuesday, June 12Breakout Presentation

close Getting Better Every Year

CIO Leadership & InnovationWater Street Healthcare Partners - CIO

CIO’s complain about a lack of budget, but by delivering on the same work as last year with 10% more efficiency, there is “free money” to be found and spent on cool, new things. If the business were to be exactly the same as last year, IT should be able to deliver the same for less money. This is your source of innovation, staff development, and “slush” funds.

Key Takeaways:

  • You must get better every year
  • The money you save is the same as additional budget
  • Your ability to articulate this separates you from others
  • You should be able to spend this money to do cool things!


Paul Cottey
CIOWater Street Healthcare Partners
Monday, June 11Breakout Presentation

close A.I. - The Future Technology Disruptor of all Industries and Sectors

CIO Leadership & InnovationNova Southeastern University - CTO

Over the last few years, Artificial Intelligence (A.I.) has been gaining momentum across all industries and all spectrums of the world from consumer solutions such as Siri and Alexa leveraging Machine Learning to disruptive technologies such as Uber and Lyft as well as Social Media channels such as Facebook, Instagram, Snapchat and Twitter to the extreme side of Quantum computing attempting to solve the world’s biggest and most complex challenges. Some of the key advantages of A.I., are the ability to gain deeper knowledge from data, and to leverage that intelligence into providing significantly better services, support, marketing and sales efforts so as help accelerate, grow and scale companies and organizations across the globe and industries.

Key Takeaways:

  • Understand what is AI
  • How to apply AI
  • Key disruptors of AI in Higher Ed
  • Additional opportunities of AI


Christopher Harrison
CTONova Southeastern University
MondayBreakout Presentation

close Technology Infrastructure Program: A Process to Grid Modernization

Otter Tail Corporation - VP of Information Technology

Long-term vision and framework for proactive investments in technology and infrastructure, which enable a mobile, automated, analytics-based future to optimally and efficiently operate utility.

Key Takeaways:

  • GIS will be the primary source for most company data unless disproven and GIS will be integrated with nearly all major company systems to improve decision making
  • AMI will be strategically deployed to minimize employee change and maximize benefits
  • Greater interconnected systems that minimize redundancy of feature sets
  • Communications and other operational systems will enable switches to operate remotely to isolate system issues. This will enable demand savings and energy efficiency possibilities through automated regulator and capacitor control (i.e. Conservation Voltage Reduction, Volt/Var Optimization) Customer loads will be synched to the markets to react in real time to pricing signals to improve load factors and system efficiency. (DERMS) This communication system will be used to support all utility applications from SCADA, to AMI, to load management.


Don Reed
VP of Information TechnologyOtter Tail Corporation
Monday, June 11Breakout Presentation

close Leadership Framework for Building Elite Teams

CIO Leadership & InnovationColumbia Insurance Group - CIO

Building an elite team is hard, and having a good plan may not be enough without a framework customized for your specific organizational environment. We will examine six key relationships, such as the intersection of management approach versus organizational design. The insights provided will improve your team building success.

Key Takeaways:

  • Building elite teams requires understanding the organizational environment
  • Evaluating the relationship between key environmental factors within the company provides insights into optimal approach
  • Organizational conditions need not be ideal for building an elite team


Douglas Duncan
CIOColumbia Insurance Group
Monday, June 11Breakout Presentation

close A Strong Relationship is need in these Trying CyberSecurity times

Cyber SecurityTCF Bank - EVP, CISO

Opening discussion of today’s environment around CyberSecurity threats.  Presentation moves into what a CIO should expect from a CISO in these times along with what should a CISO expect from a CIO to ensure a successful and effective working relationship.

Key Takeaways:

  • Understanding of the cybersecurity world from a CISO perspective
  • Expectations of a CISO
  • Expectations of a CIO from a CISO perspective
  • Tips for an effective CIO/CISO relationship


Tris Lingen



Targeted Research Meetings

Expo Hall
MondayBreakout Presentation

close How To Recover From an IT Crisis?

Classic Hotels & Resorts - VP of IT & Cyber Security

Steps on what to do during a technology crisis. Wrong and right ways and how others handle similar situations. Necessary to have audience involvement as there is no right way.

Key Takeaways:

  • Its going to happen?
  • What to do when it happens?
  • Multiple levels to what a crisis is, virus, system failure, power outage, INTERNET outage, data breach.
  • How to utilize your resources and recover?
  • How to translate IT speak to the masses in your business? This is key as communication and recovery steps are most likely overlapping as you and your teams try to recover from the IT Crisis.


Esteban Velez
VP of IT & Cyber SecurityClassic Hotels & Resorts
Monday, June 11Breakout Presentation

close Innovate Your Way to Top Performance

CIO Leadership & InnovationAmerican Financial Resources - CIO

In the competition for talent and revenue being innovative is an important component of a holistic positioning strategy. In this presentation we will examine how the technology leader can use innovation concepts to (1) hire and retain great talent; and (2) bring to market key product discoveries that will help propel your company forward.

Key Takeaways:

  • Innovation reduces key employee turnover
  • Innovation allows you to attract the “best” talent
  • Innovation can propel the technology team to be a thought leader within the company
  • Innovation can be accretive to your financial performance


Bill Packer
CIOAmerican Financial Resources
Monday, June 11Breakout Presentation

close Moving from Data Assets to Data Currencies

Data Management – Strategy for Storage and AnalyticsUniversity of California System - VP & CIO

Most organization understand and have built their strategies for “Data as an Asset.” Far fewer have fully leverage the full potential of data in a way a venture or private-equity firm would think about it. For those that do, they evolve their strategies to be “Data as a Currency” and think broadly about not only its uses but the ecosystems it may stimulate, evolve or create.

Key Takeaways:

  • Understand “Data as a Currency” thinking
  • Exposure to a methodology for DaaC thinking
  • Specific examples from companies & the extreme value they create


Tom Andriola
VP & CIOUniversity of California System
MondayBreakout Presentation

close Analytics, Machine Learning & Artificial Intelligence: The What and How?


This presentation will explain big data analytics, internet of things (IoT), machine learning, neural networks, deep learning artificial intelligence (AI) and data science. It will also cover how these technologies are being leveraged to increase efficiencies in enterprise’s daily operations, to identify new business opportunities and to enhance customer service.

Key Takeaways:

  • Distinction between and understanding of: Analytics, Machine Learning, Artificial Intelligence (AI), Neural Nets, etc.
  • Examples of how these technologies are being used to create new business models and enhance customer service
  • How to integrate data from various sensors (IoT) – Challenges and opportunities
  • How sensors are being used in Precision Agriculture to increase profit
  • How to initiate digital transformation in a legacy organization


Dr. Michael Valivullah
Monday, June 11Breakout Presentation

close Moving Operational Computing Resources to Microsoft Cloud

Cloud StrategyLegal Aid Bureau - Director of IT

The focus will be specifically on how Maryland Legal Aid extended its on-premises infrastructure and operational computing resources to the cloud and provide some real world scenarios on what workloads you could move to Azure for minimal cost. There will be a live demonstration of Azure portal.

Key Takeaways:

  • Better insights on Microsoft Azure Platform
  • Simple services that could be moved to the cloud
  • Identify if cloud is a better fit


Karthik Devarajan
Director of ITLegal Aid Bureau
Monday, June 11Breakout Presentation

close Zero Trust Access: Five Steps to Securing the Distributed Enterprise

Cyber SecurityDuo Security - Security Advocate

The perimeter-based security approach of the last century is no longer adequate for securing the modern enterprise. Today, organizations must secure a mobile workforce that uses a mix of corporate-owned and personal devices to access cloud-based applications and services, often from outside corporate networks. The zero trust access model delivers that security without cumbersome and antiquated technologies such as VPN and MDM.

Key Takeaways:

  • Learn how the zero trust access model works
  • Learn how leading organizations such as Google use this approach to secure access to their critical applications and data
  • Learn how you can implement this model in your organization in five logical steps


Zoe Lindsey
Security AdvocateDuo Security
MondayBreakout Presentation

close Building a Transformational IT Team: Create the Future and Make it Sustainable

Ash Brokerage - EVP & CIO

Talent acquisition, development and retention are critical to all IT projects, and especially to digital transformation. Building transformational and high performance teams requires a general framework, a vision towards the future and a means to sustain progress in the event of team, talent and market disruptions. In this session we’ll discuss how you can acquire, create and retain highly performing IT teams despite adversity and change.

Key Takeaways:

  • Surround yourself with exceptional senior leadership, 3 to 5 key members
  • Tie into the local universities in a big way – advisory committees, adjuncts, etc.
  • Build your intern bench as large as your organization will allow
  • Create a social contract – everyone must develop their replacement
  • Develop future technical, managerial and executive leaders
  • For complete employee buy-in, make your framework organizationally agnostic
  • Pay employees at or slightly above area market


David Threm
EVP & CIOAsh Brokerage
Monday, June 11Breakout Presentation

close IT Turnaround: Strategic Rebuilding

CIO Leadership & InnovationLos Alamos National Bank - CIO

Information technology is the center-point of all business operations. Degeneration of I/T is common in a wide variety of businesses due to neglect. As a turnaround CIO, I have experienced this in many industries, and have been brought in to perform quick turnarounds to mitigate serious risks to the company. The risks include critical applications failure with serious customer impacts, daily front-page negative reporting, poor employee morale with high turnover, and regulators on-site conducting probes and discovery.

Key Takeaways:

  • Design the turnaround road map and flipping strategy
  • Drive the cultural program, talent refresh, and team building
  • Build standard-based internal control program: COBIT and COSO
  • Learn from real-world case studies


Eddie Ho
CIOLos Alamos National Bank
Monday, June 11Breakout Presentation

close Implementing a Cybersecurity Program and Initiatives

Cyber SecurityCounty of Orange, CA - CISO

Implementing a Cybersecurity program that is sustainable and meets the needs of an organization is challenging and requires CISOs/CIOs to use a risk management approach to this endeavor. This is, of course, while balancing security with innovation.

Key Takeaways:

  • Using Risk Management to Drive Cybersecurity Decisions
  • Components of a Cybersecurity Program
  • Key Steps to Implementing a Cybersecurity Program\Initiative
  • Blending Cybersecurity with Innovation


Jacob Margolis
CISOCounty of Orange, CA
MondayBreakout Presentation

close Technology Development at Scale: a LeSS Overview

Goldline LLC - Chief Information Officer

Traditional sequential-lifecycle application development doesn’t work well.  Since 2001, Agile development and Scrum in particular have revolutionized software development.  LeSS is a scaling framework that finds the sweet spot between defined concrete elements and empirical process control.  LeSS as a framework is more than a set of principles and experiments. It also provides a framework with rules. The LeSS Rules define what is LeSS (and what isn’t) and they provide a concrete framework for applying LeSS.

Key Takeaways:

  • LeSS Principles
  • A Framework that Focuses on Customer Value and Rapid Innovation
  • Organizational Impact of Agile at Scale


Doug Spencer
Chief Information OfficerGoldline LLC
Monday, June 11Breakout Presentation

close Question Everything: Guiding Data Science Projects Through Questions

Data Management – Strategy for Storage and AnalyticsRapid City South Dakota - CTO

Asking the right questions during all phases of the project can be the difference between success and failure. Knowing the right questions to ask is difficult, especially if you don’t have a Data Science background. This presentation will help you guide your projects by asking these questions.

Key Takeaways:

  • The importance of scoping a data science project correctly
  • Understanding Mode and Method
  • Building a successful project team
  • Ways to recognize and eliminate bias


Jim Gilbert
CTORapid City South Dakota
Monday, June 11Breakout Presentation

close Adopting Android for a Mobile Workforce

CIO Leadership & InnovationSaint Elizabeth Health Care - CIO

This presentation will outline the 7 year mobility journey of one of Canada’s leading homecare agencies, and will present the challenges faced during the four iterations of the mobile platform, what prompted the change, and how this has challenged the IS team in terms of providing support and leadership to the organization.

Key Takeaways:

  • Why Android and not IOS
  • Implications of changing devices (Smartphone vs Tablet)
  • Resources needed for support
  • Unexpected consequences


Roy French
CIOSaint Elizabeth Health Care

Industry Dinner


Breakfast Buffet

Tuesday, June 12Keynote Presentation

close Fielding Your Vendor Dream Team: MoneyBall for Software

Info-Tech Research Group Inc. - Director, Commercial Strategy

Each year, organizations cumulatively spend nearly 1 trillion dollars on enterprise software & services, and that number is rapidly increasing. The challenge Info-Tech has found is that over 50% of software purchasing decisions are ineffective. Worse, organizations are extremely likely to renew their software regardless of whether they are satisfied with it.

In this session we will share analytical insights from over 5000 in-depth enterprise software reviews we’ve collected from IT and business leaders to help you understand how you can more effectively select and manage enterprise software, and save money while doing it. Learn what processes are most and least effective, and where the risks are.

Hint: it’s not where you think.


Matthew Mandich
Director, Commercial StrategyInfo-Tech Research Group Inc.

Targeted Research Meetings

Expo Hall
TuesdayBreakout Presentation

close Cybersecurity War Stories: Tales from the Trenches

Arctic Wolf Networks - Co-Founder and CEO

In today’s world, it’s imperative for organizations of all sizes to have an online presence to succeed in business. But there’s a risk to always being connected—organizations are prime targets for cyber attacks. Recent ransomware strains like Petya and WannaCry demonstrate how business can be brought to a grinding halt by encrypting your business critical data. Join CEO and Founder of Arctic Wolf Networks (AWN), Brian NeSmith, as he highlights some of the most interesting attacks that Arctic Wolf Networks has seen in 2017. You’ll also hear why a robust SOC-as-a-service with human augmented machine learning is critical to bolster your defenses against the most advanced of threats.


Brian NeSmith
Co-Founder and CEOArctic Wolf Networks
Tuesday, June 12Breakout Presentation

close Cybersecurity Vs. Compliance

Cyber SecurityRBCU - CIO & CISO

Compliance based approaches to cybersecurity have helped implement a minimum level of security but have failed to protect organizations. In a dynamic threat environment, organizations have come to the conclusion that a risk-based approach to management of cyber-security is necessary.

Key Takeaways:

  • Compliance
  • Data Breach Exercise
  • Data Classification
  • Risk-based Cybersecurity


Pierre Merlin
Tuesday, June 12Breakout Presentation

close It's All About Them...Your Employees!

CIO Leadership & InnovationKAR Auction Services - VP, IT Shared Services

Your employees will determine the success of your business. Focusing on your employees’ well-being and happiest does matter in today’s work environment. The company first mentality is a thing of the past. Taking the time to “get to know” your workforce, not just their skillset, will increase employee’s engagement. It’s all about them, our employees!

Key Takeaways:

  • The benefits of a strong employee-centric work environment
  • Tools to help you understand your employee’s engagement
  • How to create structure to sustain employee engagement


Carolyn Bogan
VP, IT Shared ServicesKAR Auction Services
Tuesday, June 12Breakout Presentation

close Business Intelligence - Everything You Need to Know to Get Started

Data Management – Strategy for Storage and AnalyticsProfessional Finance Company, Inc - Director of IT

Business Intelligence is extremely important in today’s world. It is absolutely imperative every organization uses BI to gain insights into consumer behavior, improve visibility in their organization, and turn data into actionable information. In turn, this will significantly improve efficiency. BI systems must be made available to the entire organization to fully reap all the benefits.

Key Takeaways:

  • Understand the importance of BI
  • How to plan for a successful BI system
  • How to obtain organization wide buy-in


Adip Dsouza
Director of ITProfessional Finance Company, Inc
Tuesday, June 12Breakout Presentation

close Leveraging Big Data and Business Intelligence to Create Market Differentiation Through Technology

CIO Leadership & InnovationBeavEx Incorporated - CIO

Beavex Logistics is a challenger in the Courier industry. We are a nationwide provider of Final Mile Delivery services, but don’t have the brand recognition of companies such as Fedex and UPS. Since we are lesser known, we need to be faster and more progressive than our competitors. This talk will cover how we leveraged Big Data and Business Intelligence to create an innovative, customer facing Analytics Dashboard that was added to our customer portal. The Dashboard created market differentiation for Beavex, and has led to reduced churn as well as increased wins of new customers.

Key Takeaways:

  • Innovation through Technology is a powerful weapon for creating market differentiation
  • A positive online customer experience is priceless for retaining customers and winning new business
  • Innovative technology doesn’t have to be expensive and/or complex to be incredibly useful
  • Making your customer’s life easier through technology is a great way to retain them


Eric Kierstead
CIOBeavEx Incorporated



Active mid-market IT pros help us design a relevant and 100% peer-led educational program. Members from the 2017 series included:

Steering Committee Members

Jeffrey Potter SVP, CTO
Davenport & Company LLC
Nick Roethel CIO - Director of Technology Services
Metropolitan Transportation Comm
Borys Harmaty CIO
FolioFN Inc
Armin Roeseler CIO
Swanson Health Products
John Martin CIO
Georgia Department of Natural Resources
Larry Schachter CIO
Benderson Development Co. LLC
Grady Ligon CIO
Berkshire Hathaway HomeServices
Robert Bierwagen CIO & VP
MPI Corp
Mitchell Morris CIO
The Huntington
Douglas Duncan CIO
Columbia Insurance Group
David Finkelstein CIO
RiverSpring Health
Bert Sams VP, IT
Haggai Institute
Adip Dsouza Director - IT
Professional Finance Company, Inc.
Karl Schubert CIO/CTO
TechNova Consulting LLC
Nathan Mumm CTO
Copiers Northwest
Karthik Devarajan Director of IT
Legal Aid Bureau
Keith Scott Director of IT
Ron Dinwiddie CIO
Texas Trust Credit Union
Scott Walker VP of IT
Top Rx
Stephanie Sylvestre CIO & Chief Programs Officer
The Children's Trust
Tony Rehmer SVP of IT
Children's Miracle Network Hospitals
Trent Baker CISO/CTO
InSync Healthcare Solutions
Tyrone Grandison CIO
Institute for Health Metrics and Evaluation
Val King CIO
Val Verde Regional Medical Center
William Mahoney VP of IT & Compliance
Centric Technology Solutions, LLC
Ben Cranmore CIO
Furniture Outlets USA Inc.
Brian Mehle CIO
Atlantic Specialty Lines
Ed Jarecki Assistant VP Enterprise IT and PMO
Bellevue University
Frank Zalich VP of IT
Neighborhood House Association
George Prior CIO
Burgess Group
Hugh Miller CIO, CTA
San Antonio
James Peterson CIO
Joseph Meadors SVP, IT and Facilities, CISO
Harrison College
Joseph Moreau Vice Chancellor of Technology & CTO
Foothill-De Anza Community College District
Michael Ouren CIO
Mugunth Vaithylingam CIO
College of Southern Nevada
Sean Hagarty CIO - VP of IT
Steve Gebhart CTO
Willis Marti CISO
Texas A&M University
Saravanan Gurumurthy CTO
ForwardLine LLC


Over the year’s we’ve help thousands of senior-level IT executives connect with peers in different industries to discuss their top-of-mind directives. Delegates from the 2017 series included:

Attendee Testimonials

"The format of the sessions and one-on-one meeting with vendors was a very effective use of my time. The best part of the event is the experts from various areas of information security and solution providers under one roof. It provided an opportunity to learn in a succinct manner without spending too many days out of the office."

"CIO VISIONS is time well spent. In the office, I often don't have time to answer all the emails I received from vendors and then find out which one is the right fit for what I need. The personalized research meeting format allows me to have conversations with vendors that I currently have initiatives for, so the conversations with them are very productive. The sessions are in line with current industry and the networking experience with industry peers is phenomenal!"

"As CIOs we understand the need to network and learn from our peers and experts in the market place. The good news is that there are a plethora of opportunities for us to attend CIO centric events, but sadly, therein lies the difficulty. We have limited time and need to select the events that help us provide the best technological guidance to the enterprises we serve. Having served on many panels and chaired many sessions across many of these events, I have narrowed down the events I attend to a handful. CIO VISIONS is one of them. "

"CIO VISIONS Mid-Marekt is an excellent event for IT leaders to connect, network and discuss the current state of IT. With practitioners providing the presentations and key talks, this is a very practical and "real" event for the attendees."

Attendee List


CIO VISIONS is the IT industry’s fastest growing event, quickly establishing a reputation as the boiling pot of information, ideas and solutions. Sponsors from the 2017 series included:


North America's leading IT executive-level event plays host to over 500 attendees each year. In the last decade, we’ve produced 15 large scale CIO VISIONS summits across America.


Here is a quick FAQ to help you get started. For more information contacts us, we're happy to talk to you.

Our Team

Marin Silvers

Sponsor Relations
(424) 334-5141
Send Message

Marissa Marsh

Attendee Relations Executive
(424) 313-1172
Send Message

Matt Velaer

Conference Director
(424) 334-5145
Send Message

Jeff Barnett

Sales Manager
(424) 334-5146
Send Message

Shanna Delfs

Account Executive
(434) 334-5161
Send Message

Riley McLaughlin

Conference Program Manager
(424) 334-5149
Send Message


Your full access conference pass includes overnight accommodations, meals and cocktail receptions.

The Hotel

Red Rock Casino Resort & Spa

Featuring luxurious hotel rooms and suites, three-acre pool backyard, sensuous spa treatments, delectable dining and exciting casino gaming–all overlooking the stunning Red Rock Canyon National Conservation Area.

Inspired by the natural beauty of the neighboring mountains, Red Rock Casino Resort & Spa, Las Vegas; Spa pays homage to the elegant mid-century modern resorts that made Las Vegas famous. Spacious accommodations are designed with modern contemporary décor and a wealth of amenities like no other hotel rooms in Las Vegas, and include a 42-inch HD TV, VOIP internet phones, an automated, fully-stocked private bar and in-room safe.
Accommodations must be booked through the conference organizers and not through the venue directly. We cover the first night and offer a discounted rate. Spouses welcomed. For reservations please contact:
The closest airport to the hotel is McCarran International Airport (LAS). Red Rock does operate a complimentary shuttle between McCarran Airport and the hotel. You can see the shuttle schedule here. Taxis are also available at the airport and cost approximately $50 each way.
Red Rock Resort, Casino & Spa | 11011 W. Charleston Blvd. Las Vegas, NV 89135