The Red Rock Casino Resort & Spa, Las Vegas

Invitation-only means an exceptional experience, on us

Coordinated by your personal concierge, a schedule is tailored to your professional goals and company priorities.


Complimentary Pass

Inventive learning, renown speakers, executive networking. All free to you.


Travel Reimbursement

$200 of your travel is covered if you’re trekking over 100 miles to attend.



Your first night’s stay is on us and a discounted rate is available thereafter.


5 Star Catering

All of your meals and libations are complimentary throughout the event.

Join IT’s Emerging Upper Tier

A curated audience reserved for the senior level of emerging mid-market organizations puts you in exceptional company.


Affluent Peers

Meet the people who are just as invested in leveraging technology as you are.


Influential Leaders

Learn valuable strategy components from today’s very best.


Proven Solutions

Meet industry leading solution providers, hand picked for your priorities.



Take this unprecedented opportunity to connect with high profile execs.

A curated experience to cultivate achievement

Your registration creates a truly customized agenda based on your specific areas of responsibility, challenges and interests.


Days of Insight

Jump in the discussion through focused educational sessions and networking opportunities.


Innovative Sessions

Keynotes, plenary sessions, industry panel discussions, case studies and more.


Networking Opportunities

Tie into contemporaries and mentors interested in the same avenues of opportunity as you.


Research Meetings

Meet one-on-one with executives delivering on the solutions that are shaping the industry.

play_circle_outline Watch Video

Peer-Led Education

The CIO Visions Steering Committee consists entirely of your contemporaries, meaning we tackle the themes that have profound significance to your performance and your company.


Key Themes

  • Security Protocols: Network Security/Cyber Security/Data Security
  • The Use of AI in Data Security: Today’s Opportunities and Challenges
  • Successful Data Governance Approaches
  • Lowering the Risk of a Data Breach When Using the Cloud
  • Protecting Unstructured Data: How Secure Do I Need to Be?
  • Network Visibility and Integration with Security Needs
  • BYOD-Wireless Protection: Implementing Company-Wide Phone Wipes
  • How Do We Make It Easier to Keep Ourselves and Our User Communities Safe?
  • Integration of Security into Strategic Planning Processes and Operations
  • Security vs. Ease of Access
  • Disaster Plans & Business Continuity
When everything needs to be done yesterday, and even when it doesn’t, operational strategy can make or break the future success of your applications and technology. Learn top practices, emerging trends, discuss old ones like Agile, and stay on the bleeding edge of technology to accelerate your push forwards without breaking the bank, or the backend.

High Profile Speakers

Hear strategic endeavors and skillful insights from 20+ IT leaders as they make way in today’s changing landscape.


CIO VISIONS Mid-Market Spring Summit View More

Todd Barnum


GoPro, Inc.

CIO VISIONS Mid-Market Spring Summit View More

Rafael Diaz


Northrop Grumman

CIO VISIONS Mid-Market Spring Summit View More

Nick Curcuru

VP, Big Data Security


CIO VISIONS Mid-Market Spring Summit View More

Jeffrey Fudge

Director of IT Operations

Ashley Furniture Industries

CIO VISIONS Mid-Market Spring Summit View More

Corey Thompson

VP of IT

Pacific Drilling

CIO VISIONS Mid-Market Spring Summit View More

Tom Jurlina


National Able Network Inc

CIO VISIONS Mid-Market Spring Summit View More

Jim Gilbert


Rapid City South Dakota

CIO VISIONS Mid-Market Spring Summit View More

Paul Cottey


Water Street Healthcare Partners

CIO VISIONS Mid-Market Spring Summit View More

Tom Andriola


University of California System

CIO VISIONS Mid-Market Spring Summit View More

Karthik Devarajan

Director of IT

Legal Aid Bureau

CIO VISIONS Mid-Market Spring Summit View More

Roy French


Saint Elizabeth Health Care

CIO VISIONS Mid-Market Spring Summit View More

Eddie Ho


Los Alamos National Bank

CIO VISIONS Mid-Market Spring Summit View More

Ryan Loy



CIO VISIONS Mid-Market Spring Summit View More

Carolyn Bogan

VP, IT Shared Services

KAR Auction Services

CIO VISIONS Mid-Market Spring Summit View More

Adip Dsouza

Director of IT

Professional Finance Company, Inc

CIO VISIONS Mid-Market Spring Summit View More

Christopher Harrison


Nova Southeastern University

CIO VISIONS Mid-Market Spring Summit View More

Jim Garrett


American Healthcare LLC

CIO VISIONS Mid-Market Spring Summit View More

Tris Lingen


TCF Bank

CIO VISIONS Mid-Market Spring Summit View More

Stephen Engel

SVP, Practice Lead


CIO VISIONS Mid-Market Spring Summit View More

Michael Thaw

VP of Software Selection

Technology Evaluation Centers

CIO VISIONS Mid-Market Spring Summit View More

Zoe Lindsey

Security Advocate

Duo Security

CIO VISIONS Mid-Market Spring Summit View More

Parker Ashley



CIO VISIONS Mid-Market Spring Summit View More

Prashant Kumar



CIO VISIONS Mid-Market Spring Summit View More

Joseph Costello


Information Clearinghouse Inc

CIO VISIONS Mid-Market Spring Summit View More

Mouli Radhakrishnan

Sr. Director, Product Management

Aryaka Networks

CIO VISIONS Mid-Market Spring Summit View More

Tim Keeler



CIO VISIONS Mid-Market Spring Summit View More

Joey Poarch

VP of Platform Services


CIO VISIONS Mid-Market Spring Summit View More

Jack Dolan

Regional Sales Director

Cato Networks

2019 Full Agenda

Your personal concierge will craft a custom schedule based on your interests and priorities. View the complete agenda below.

Reset Filter
CIO Leadership and Innovation
Cyber Security
Data Management: Strategy for Storage and Analytics

Welcome Cocktail Reception & Registration


Breakfast Buffet

MondayKeynote Presentation

close Digital Transformation – Six Steps to Success

CIO Leadership and InnovationHitachi - SVP, Practice Lead

Digital transformation – driving operational improvements in your physical value stream using connected data from your digital value stream – is delivering unprecedented value across industries to those with a clear road map. In fact, a recent Harvard Business School report shows that companies that embrace digital transformation attain significantly better gross margins, earnings and net income than those that don’t. What’s more, those digital leaders are not spending much more on IT than laggards because the big investments have already been made. The challenge is knowing how to connect the data from the digital value stream to drive continuous improvement with real-time metrics and predictive analytics. No matter where you are on the journey of digital transformation – these six steps can help you connect your systems to drive new levels of productivity, profitability and value across your business.

Key Takeaways:

  • Learn how to connect your physical and digital value streams to create near real-time operating systems.
  • Identify areas of variation across the physical value stream that can be supported by better data and real-time analytics.
  • Gain knowledge through strategic partnerships with digital leaders to accelerate your journey to unlocking more organizational value.


Stephen Engel
SVP, Practice LeadHitachi

Targeted Research Meetings

Expo Hall
MondayBreakout Presentation

close Connecting the Healthcare “Internet of Things” (IoT) through Information Logistics (The Internet of Data)

Data Management: Strategy for Storage and AnalyticsNorthrop Grumman - CTO

Advances in hybrid computing environments, data management frameworks, mobile capabilities, security protocols, and analytics platforms make information logistics a necessary and important capability for every organization. The promise of IoT analytics offers timely medical delivery capabilities while addressing data management issues, security and privacy concerns, and computing and analytical options.

Key Takeaways:

  • Why IoT analytis is a key capability for large enterprises with remote, mobile staff
  • How the latest technologies in computing – cloud, edge, device, on-premise – are facilitating the IoT
  • Data, identity, network security and data pivacy concerns remain critical
  • Developing a strategy and architecture that fits the operations model is a key step to success


Rafael Diaz
CTONorthrop Grumman
MondayBreakout Presentation

close Hidden Secrets of a Breach That Every Leader MUST Know

Cyber Security[24]7 - Chief Information Security Officer & Vice President Internal Audit

Every leader prepares for the worst and hopes for the best. With a cyber breach, you need more than preparation. You need true experience on your side. A cyber breach is the wrong time to learn. This presentation will highlight what to expect and have to come out on top.

Key Takeaways:

  • Know what questions to ask and when
  • Learn your stakeholders, partners, and distractors
  • Learn why communication is your biggest challenge
  • Learn how to lead alpha co-workers during this challenging time


Edward Contreras
Chief Information Security Officer & Vice President Internal Audit[24]7
MondayBreakout Presentation

close Autonomous Cyber Defense: AI and the Immune System Approach

Cyber SecurityDarktrace - Director of Sales

From insiders to sophisticated external attackers, the reality of cyber security today is that the threat is already inside. Legacy approaches to cyber security, which rely on knowledge of past attacks, are simply not sufficient to combat new, evolving attacks, and no human cyber analyst can watch so much or react quickly enough. A fundamentally new approach to cyber defense is needed to detect and respond to these threats that are already inside the network – before they turn into a full-blown crisis. Self-learning systems represent a fundamental step-change in automated cyber defense, are relied upon by organizations around the world, and can cover up to millions of devices. Based on machine learning and probabilistic mathematics, these new approaches to security can establish a highly accurate understanding of normal behavior by learning an organization’s ‘pattern of life,’. They can therefore spot abnormal activity as it emerges and even take precise, measured actions to automatically curb the threat. Discover why autonomous response and machine learning is the future of defense and how the ‘immune system’ approach to cyber security provides complete network visibility and the ability to prioritize threats in order to better allocate time and resources.

Key Takeaways:

  • How new machine learning and mathematics are automating advanced cyber defense
  • Why full network visibility allows you to detect and autonomously respond to threats
  • How smart prioritization and visualization of threats allows for better resource allocation and lower risk
  • Real-world examples of unknown threats detected by ‘immune system’ technology


Georgiana Wagemann
Director of SalesDarktrace
MondayBreakout Presentation

close Accelerating Digital Transformation with Collaborative Communications

Cloud StrategyRingCentral - SVP of Cloud Operations

Digital transformation is about meeting the needs of today’s modern business. The new workforce is increasingly mobile, global and distributed and is putting requirements on companies to support their on-the-go lifestyle. Discover how building a cloud ecosystem of integrated applications drives the speed, agility and data insights you need to generate meaningful business outcomes. With the right solutions in place, you can empower employees to work anytime, anywhere and on any device using the modality of their choice – whether online chat, video meetings or voice communications.

Key Takeaways:

  • Find out how you can unify your collaboration tools into one, single cloud-based platform
  • Learn how to empower employees to work anytime, anywhere and on any device
  • Hear how building a cloud ecosystem of integrated applications can cut costs while driving meaningful business outcomes


Curtis Peterson
SVP of Cloud OperationsRingCentral
MondayBreakout Presentation

close The Cloud: A Survival Guide

Cloud StrategyAshley Furniture Industries - Director of IT Operations

The word “cloud” was a wise marketing choice – it implies abstraction and simplicity. And your migration to the cloud certainly almost always starts that way. But how do you maintain the same level of success as complexity increases and the cloud providers continue to unleash new features at a frantic pace? I have helped four companies migrate to the cloud, and I will share my experiences in terms of what worked well and what I learned NOT to do.

Key Takeaways:

  • How to Keep Your Head Above Water
  • Security – Not an Afterthought
  • Migration Options
  • Real Life Experiences


Jeffrey Fudge
Director of IT OperationsAshley Furniture Industries
MondayBreakout Presentation

close Life After an Anonymous Attack on My City

Cyber SecurityCity of Fort Lauderdale - CTO

The city of Fort Lauderdale, Florida was hit by an Anonymous denial-of-service attack in December 2014 and was forced to immediately upgrade computer systems to thwart any potential future attacks.The city quickly spent $430,000 upgrading computer security systems to mitigate vulnerabilities it had previously identified. While the attack itself did not cost the city this money, it expedited the timeline for these necessary system upgrades. A complete A-Z approach for a new security awareness program was created.

Key Takeaways:

  • Even if sensitive information isn’t compromised, there can be political fallout from such an attack
  • If you’re aware of vulnerabilities that need to be remedied “when the budget allows,” would-be attackers will be too
  • A security strategy for a new division
  • How the city has changed its ways – both technologically, and behaviorally, in the time since


Michael Maier
CTOCity of Fort Lauderdale

close What’s Next for MFA? Authentication Challenges, Trends, and Tips

Cyber SecurityWatchGuard Technologies, Inc - Director of Authentication

MFA is invaluable in preventing unauthorized access to sensitive data – and the headline-making breaches that often result. However, conventional MFA is difficult to deploy, time consuming to manage, and often frustrating to use. Looking to the future, how do we make MFA adapt, not users?

Join WatchGuard’s Director of Authentication as he dives into key trends impacting authentication now, and what’s next for MFA.

Key Takeaways:

  • Learn about the current challenges and trends impacting multi-factor authentication
  • Hear key tips for deploying effective, easy MFA at your business
  • See a password hack in action – and how to prevent it


Alexandre Cagnoni
Director of AuthenticationWatchGuard Technologies, Inc
MondayBreakout Presentation

close Unlocking the mysteries of common sense data security implementation a.k.a. don’t be that annoying guy!

Cyber SecurityRockefeller University - CISO

Data security controls are critical to protect valuable information assets; however, they are only effective if users actually implement them. This presentation will describe techniques to implement security policies while still maintaining positive relationships with your end-users. Choose security controls wisely and make them count!

Key Takeaways:

  • Practice what you preach
  • Don’t be intimidated by information security or ease-of-use
  • Know your organization, its usage patterns and culture in order to determine what they consider acceptable
  • Be able to switch roles from guru technician to non-techie end-user


Marty Leidner
CISORockefeller University
MondayBreakout Presentation

close Leveraging Analytics for Growth

Data Management: Strategy for Storage and AnalyticsGeorgia Aquarium - VP of IT

Ranked the number one Aquarium in the United States by TripAdvisor, Georgia Aquarium will serve more than 2.4 million guests this year. Since the aquarium’s mission of self-sufficiency generates just 10% of its budget from fund-raising, it manages for growth by leveraging data for crowd management, attendance forecasting and to measure guest sentiment and satisfaction. Join us to learn more about their data journey, and how they are now embarking on revenue management and price optimization using data.

Key Takeaways:

  • Analytics once reserved for Industries like financial services are now being used in many industries
  • Analytics is as much about the journey as the destination
  • Results of projects can be measured by Revenue Growth


Beach Clark
VP of ITGeorgia Aquarium
MondayBreakout Presentation

close Privileged Access on 500,000 endpoints? 5 lessons learned

Cyber SecurityRemediant - CRO

Rolling out Privileged Access Management to more than half a million servers, workstations and VMs has resulted in some lessons well learned. Join us for this interactive session to learn the top 5 best lessons learned through hands-on rollouts at organizations ranging from small non-profits to mega Fortune 100 companies. We guarantee you will walk away with information that can save your next PAM project… or maybe rescue your current PAM implementation!

Key Takeaways:

  • Privilege Access Remains the #1 Concern for Organizations
  • Gain visibility and transparency into where access is
  • Create Zero Trust without agents-on prem and in the cloud
  • Deployment doesn’t have to be hard


JD Sherry
MondayBreakout Presentation

close CIO, CDO, and CMO: Managing Relationships, Maintaining Relevance and Preparing for Change

CIO Leadership and InnovationAlain Pinel Realtors - VP Digital Innovation & Technology

Who owns what within an organization, and what should we be doing to fully realize our leadership responsibilities and potential? Changing organizational landscapes have brought confusion and frustration to all three positions- is there a need for them all? If so, how do we maintain harmony and efficiency.

Key Takeaways:

  • How to own digital decision making
  • How to maintain relevance in a landscape of native digital fluency
  • How to balance security with compatibility and innovation
  • How to foster a collaborative environment with the CMO


Zane Burnett
VP Digital Innovation & TechnologyAlain Pinel Realtors

close Securing Your Environment.....One Device at a Time

University of Mississippi - CIO

Securing Your Environment…..One Device at a Time

In an institution where academic freedom prevails, implementing security changes that are a necessity these days can prove challenging across numerous fronts as they are seen as limiting the ability of the individual to succeed in their mission. This presentation will share ideas that have proven successful through communication, conversation and significant buy-in which mentally on-boards the constituents after which the virtual/physical changes are experienced.


  • Defining the approach to justify the changes
  • Helping the constituents understand the objective
  • Executing the changes toward a successful outcome


Nishanth Rodrigues
CIOUniversity of Mississippi

close The Future of SD-Wan

Cato Networks - Regional Sales Director

SD-WAN is a new and exciting opportunity to transform enterprises costly and rigid MPLS-based wide area networks (WAN). It promises to make the WAN more affordable and agile, boost capacity, and improve resiliency. But, SD-WAN goes far beyond replacing MPLS. It can optimize global connectivity, streamline network security, and seamlessly integrate cloud resources and mobile users into a simple coherent network.

Key Takeaways:

  • The requirements for full WAN transformation when business applications have moved to the cloud and need to be accessed from anywhere
  • The security challenges facing organizations with distributed locations, cloud applications, and mobile users.
  • How the convergence of edge SD-WAN, a global backbone, and firewall as a service enables you to do more with less, and reduce costs, complexity, and risks
  • Real-life examples and case studies of how enterprises of all sizes use Cato Networks to securely connect their global and regional locations, mobile users, and cloud resources.


Jack Dolan
Regional Sales DirectorCato Networks
MondayBreakout Presentation

close Machine Learning for Dev Teams

DevOps StrategyEurofins DMS - CTO

From predictive analytics to chatbots to security, machine learning is everywhere – except for your company… So how does a mid-market CIO bring machine learning into their enterprise? In this talk, we will explore how one can leverage the latest tools to turn machine learning into just another dev practice.

Key Takeaways:

  • Much like the cloud a decade ago, machine learning can no longer be ignored by forward-thinking CIOs
  • CIOs can help their companies gain a strategic advantage by identifying applications for AI/ML
  • It is no longer necessary to build out a data science team to begin to leverage AI/ML
  • ML can become just another tool in your dev team’s toolbelt


Raphael Morozov
CTOEurofins DMS



Targeted Research Meetings

Expo Hall
MondayBreakout Presentation

close Building a DevSecOps Culture

DevOps StrategyYello - CIO

We’ve heard a lot about the benefits of DevSecOps recently, but how do you build a culture that leverages the union of security, operations, and development effectively? My talk will explore Yello’s approach to DevSecOps, and I’ll also talk about how a new breed of technology companies leverage the combined model to build high-quality software quickly and securely.

Key Takeaways:

  • DevSecOps is the new DevOps
  • Security is everyone’s responsibility
  • Building a DevSecOps culture requires both and top down and bottom-up approach


Jason Allen
MondayBreakout Presentation

close SD-WAN Explosion: The Emerging Solution for a Cloud-First Enterprise

Cloud StrategySilverPeak - Lead Global Enterprise Architect for Dover Corporation

As enterprises continue to adopt cloud infrastructure and applications, exploding traffic levels and changing traffic patterns are driving them to re-evaluate their WANs. The WAN is a key enabler in transforming businesses to the new digital economy, but the current WAN infrastructure based on conventional routers was not designed for the cloud. To keep branch offices protected from threats, all web-bound traffic is backhauled to headquarters-based security services, which negatively impacts cloud application performance. As a result, enterprises are faced with architectural complexity, inconsistent application performance, and security challenges for applications and users.

Dover Corporation is a global manufacturing company with 22 Operating companies across five Continents.  Hear from Bill Wolfe, Lead Global Enterprise Architect for Dover Corporation, on how they incorporated SD-WAN to simplify and automate their network, integrate new sites easily, have better visibility and save substantially on connectivity costs as part of their goal to improve business operations and become a cloud-first enterprise.

Bill believes businesses should embrace technology for the purpose of improving business operations, providing a platform for competitive advantage and delivery of new service and product offerings.  Learn how Dover Corporation embraced SD-WAN and the results they are getting from the investment.


William H. Wolfe II
Lead Global Enterprise Architect for Dover CorporationSilverPeak

close GDPR: What Now?

CIO Leadership and InnovationInfo-Tech Research Group - Senior Consulting Analyst

Having passed the May 25th deadline, your organization-wide panic may have subsided but the compliance requirements remain, what now? Despite a delay in imposed fines, the consequences of non-compliance with the General Data Protection Regulation (GDPR) will continue to be dictated by channel partners, customers, and vendors – across all industries. Understand how your organization can develop a right-sized approach to compliance, that meets all stakeholder (including regulators’) requirements.

Next, look beyond GDPR, and you’ll find a myriad of new privacy regulations (hint: CaCPA) that add additional complexities to your existing privacy program. This presentation will help you understand the evolving privacy landscape and the alignment between new privacy regulations and GDPR.


Rita Zurbrigg
Senior Consulting AnalystInfo-Tech Research Group
MondayBreakout Presentation

close Building a Sustainable Cyber Program

Cyber SecurityMastercard - VP, Big Data Security

Building a Sustainable Cyber Security Program – Cyber Security is at the top of mind of executives, shareholders and government officials. Enterprises can no longer put of creating a cyber program. Programs do not need to be complicated nor cumbersome to manage. Nick will talk about how enterprises need work within a framework an follow 5 key principles to create a sustainable program which will not bury and organization. The session will show how to build trust and confidence with your cyber program.

Key Takeaways:

  • Top 5 things to do to create a sustainable program
  • Key cyber metrics to track
  • Key questions your program must answer for your execs
  • Why a framework is important and how to use it


Nick Curcuru
VP, Big Data SecurityMastercard
MondayBreakout Presentation

close Finding, Retaining and Growing IT Talent

CIO Leadership and InnovationOptima Healthcare Solutions - CIO

The technology sector is outperforming the rest of the U.S. economy, with unemployment rates at roughly 2.5%, according new data from the U.S. Bureau of Labor Statistics—compared to 4.1% national average. Today’s technology professionals are benefiting. With greater opportunity, they’re actively seeking out the best jobs to match their skills. As an employer, it’s never been harder to find and retain the best talent. Are your best IT resources on the verge of leaving? If they do leave unexpectedly, how will you deliver on critical IT projects? And once you find quality staff, how do you motivate them to achieve their fullest potential, so you can grow a successful team?

Key Takeaways:

  • Formalize an internal referral program – Employee referrals continue to be employers’ top source of hires, delivering more than 30 percent of all hires overall in 2016 and 45 percent of internal hires – Source: Society for Human Resources Manager (SHRM)
  • Think local, hire global – Does it matter where your IT team is? Not all IT orgs are hiring overseas. Rural sourced options continue to exist with talent in more affordable markets like Alabama, Oklahoma, Tennessee, and Michigan.
  • Growing IT Talent – The reduces overall attrition. This is important when digital transformation projects take 18-36 months. Losing top talent during one of these projects can delay the project and increase costs.
  • Dedicated Mentoring – Set dedicated office hours for your team. Make sure those time slots are dedicated each week.


Jason James
CIOOptima Healthcare Solutions
MondayBreakout Presentation

close How to Maximize your ERP Selection and Negotiation

CIO Leadership and InnovationTechnology Evaluation Centers - VP of Software Selection

Selecting the right ERP solution is key to improve business productivity and make the growth plan viable. As a Global Consulting and Advisory firm with 25 years in the market, TEC prepared a presentation that will help any company in a process of selecting a software solution that will fit better in the company’s needs and support the growing projects.

Key Takeaways:

  • Use an structured easy to follow approach to Software Selection
  • Get hands-on expert advice to lead, coach and support your evaluation
  • Find out how to score the deciding factors in your evaluation
  • Build consensus among the stakeholders and an audit trail, leveraging the information for your selection and negotiation


Michael Thaw
VP of Software SelectionTechnology Evaluation Centers

close A New Approach to Email Security for Office 365

Vade Secure - Director of Corporate Markets

For hackers, Office 365 is the new black!

Because a simple set of Office 365 credentials can give you access to sensitive documents, applications and confidential business information, Office 365 is now the go-to place for cybercriminals looking to make a fast and high profit.

Each day these hackers implement new and always more creative phishing and spear-phishing attacks, that easily bypass the traditional email security solutions.

Discover what their techniques are, and learn what you can do to prevent cybercriminals from breaking into your organization with just a single email.

Key Takeaways:

  • Office 365
  • Email Security
  • Phishing
  • Cyber Security


James Duff
Director of Corporate MarketsVade Secure
MondayBreakout Presentation

close A Shifting Focus to a Data-Centric Security

Cyber SecurityCity of Riverside - ISO

Information is at the heart of everything CIO’s do, yet we often forget what we’re trying to protect and focus on specific tools, losing sight of our crown jewels and leading to major gaps in our defense strategies. And even with programs and protocols in place, if users (employees) do not understand cybersecurity is an integral job responsibility, the enterprise is at risk.

Key Takeaways:

  • Data life cycle management
  • Data Defense in depth
  • Business engagement
  • Risk management


George Khalil
ISOCity of Riverside
MondayBreakout Presentation

close Putting the Human Back Into Network Security

Cyber SecurityForcepoint - Director of Network Security Architects

Network security technology is shifting from just being a way to keep threats out of your network to providing operational insights that can make your people more effective and your organization more efficient. With the growth of unmanaged devices like phones, tables, appliances and Internet of Things (IoT) gadgets, the network often is the only place where sensing and enforcement can be done consistently.

Key Takeaways:

  • Learn about advances in behavioral monitoring, analytics and machine learning enabling security to go beyond a threat-centric approach
  • How to addres the fuzzy “gray” area where today’s greatest productivity and greatest risks are found.
  • How network security products are making it easier to understand people’s intent so that you can take a modern risk-adaptive approach connecting and protecting your people and data


Michael Knapp
Director of Network Security ArchitectsForcepoint
MondayBreakout Presentation

close Strategic & Tactical Alignment with Your Business Partners - A Killer Standard Deck/Process

CIO Leadership and InnovationWestmoreland Coal Company - VP of IT

CIO stands for “career is over” for those IT leaders who do not proactively engage their business partners in a holistic manner aligning strategy, projects, priorities, incidents, customer satisfaction, etc. At this session we will walk through an actual tool and standard deck for you to take back and start using.

Key Takeaways:

  • Standard deck for “account management”
  • Recommended KPIs
  • Recommended project prioritization
  • Recommended resource allocation schema


Adam Bricker
VP of ITWestmoreland Coal Company
MondayBreakout Presentation

close Experiences Building an Information Security Program in 180 Days

Cyber SecurityNorth Carolina A&T State University - CIO, Vice Chancellor of IT

In January 2018, NC A&T launched a major IT Development Initiative that will culminate in a new Information Security Program. The initiative includes new policies and operating standards, organization of a governance structure, over two dozen projects related to cybersecurity, major changes in the management of technology across campus, and realignment of campus IT resources. The new program will implement a continuous improvement cycle to ensure sustained efforts to manage and improve information security, and to comply with accreditation standards and system policies. NC A&T’s CIO will present the initiative from its inception and progress made into the fall.

Key Takeaways:

  • Information Security Program structure and organization
  • Summary of organizational issues affecting information security
  • Information security education for the executive committee


Tom Jackson
CIO, Vice Chancellor of ITNorth Carolina A&T State University

close Innovating at Scale with On-Demand Talent

CIO Leadership and InnovationTopcoder - VP of Security

It’s easy to talk about innovation, and harder to get big ideas off the ground. Without access to the right talent, businesses fail to use the most in-demand technologies to their advantage. Learn how to make the gig economy work for you, innovate effectively, and get to market faster.

Key Takeaways:

  • Make better use of today’s most in-demand technologies
  • Understand how to leverage crowdsourcing for on-demand talent
  • Incorporate innovation into your everyday design and development projects


John Wheeler
VP of SecurityTopcoder

Industry Dinner


Breakfast Buffet


close Don’t Forget the Basics While Chasing the Shiny Objects in Defending Against Today’s Cyber Threats

CIO Leadership and InnovationBlue Cross Blue Shield - Vice President and Chief Information Security Officer (CISO)

Cybersecurity breaches continue to dominate the headlines, in spite of investments made to defend enterprises. Past several years saw a sharp
rise in the number and severity of breaches, and emergence of threat actors and groups who appear to specialize in targeting specific industries.
This presentation explores some high-profile threats while highlighting little known details about methods and tactics used, in an effort to
explain the discrepancy between security mind-share, and the apparent lack of effect.


Petar Naumovski
Vice President and Chief Information Security Officer (CISO)Blue Cross Blue Shield

Targeted Research Meetings

Expo Hall
TuesdayBreakout Presentation

close Practical Methods for IT to Truly Connect With the Business

CIO Leadership and InnovationPacific Drilling - VP of IT

CIO’s very often talk about the real or perceived gap between IT and the business. This discussion talks about the indicators and practical steps CIO’s can take to begin to eliminate that gap.

Key Takeaways:

  • Real business problems cannot be solved sitting in the corporate office
  • Understand the three basic areas of IT and know what areas you should focusing on: 1. Basic IT 2. IT in use 3. Disruptive IT
  • How your IT organization identifies themselves
  • Common obstacles to be aware of and how to address them


Corey Thompson
VP of ITPacific Drilling
TuesdayBreakout Presentation

close The Nine Cybersecurity Habits

CIO Leadership and InnovationSouthern Methodist University - CSO

Cybersecurity is a people problem, not a technology problem. To change behaviors, we need to understand the underlying habits that govern our responses. This presentation will explore nine key cybersecurity habits, and will look at how you can use those habits to focus on changing behaviors in your security training.

Key Takeaways:

  • Security is a behavior, not a skill
  • We need different tools to influence people: Psychology, Neuroscience, Economics
  • Changing habits requires time and consistency


George Finney
CSOSouthern Methodist University
TuesdayBreakout Presentation

close Trends in Data Management

Data Management: Strategy for Storage and AnalyticsDruva - VP Product & Alliances

The data landscape has changed, leaving organizations to build data management strategies that must withstand increasing scrutiny. Critical data must be protected from loss or breach, while data privacy regulations, make it even more critical that organizations understand what data they have and be able to make actionable decisions regarding it. This creates pressure for IT teams, which are already struggling to meet the myriad of needs posed by the different types of data distributed across organizations. Join us for an informative session on the latest trends in Data Management & Protection. Share best practices & learn how organizations addressing the challenges of:

  1. Multiple, disparate data sources
  2. Exponential data growth
  3. Today’s complex data environment

Key Takeaways:

  • How companies are using data management and solve for privacy challenges
  • Strategies for GDPR compliance and other upcoming regulations
  • How to manage data across heterogeneous environments


Dave Packer
VP Product & AlliancesDruva
TuesdayBreakout Presentation

close CIO: Driving Marketing Technology Innovation

CIO Leadership and InnovationNewDay USA , LLC - Chief Digital Officer

The biggest challenges is that the role of technology is evolving and marketers are making decision on technology as well. What should CIO’s consider and how they should partner with their marketing and digital team to help organizations succeed.

Key Takeaways:

  • Partnership of the CIO with the CMO and CDO
  • Technologies and processes that are helping business grow
  • Organization proceses and team that will help CIOs succeed
  • Thinking like a marketer and leading the charge with innovation


Gaurav Bhatia
Chief Digital OfficerNewDay USA , LLC

close Unified Access Security

Cyber SecurityDuo Security - Solutions Engineer

The perimeter-based security approach of the last century is no longer adequate for securing the modern enterprise. Today, organizations must secure a mobile workforce that uses a mix of corporate-owned and personal devices to access cloud-based applications and services, often from outside corporate networks. The zero trust access model delivers that security without cumbersome and antiquated technologies such as VPN and MDM.

Attend this session to learn how the zero trust access model works, how leading organizations such as Google use this approach to secure access to their critical applications and data, and how you can implement this model in your organization.

Key Takeaways:

  • Why the traditional perimeter-focused security model won’t meet the needs of most modern organizations
  • How a zero-trust security model can overcome these challenges
  • How you can incorporate this approach into your existing architecture without starting from scratch



Karl Lewis
Solutions EngineerDuo Security
TuesdayBreakout Presentation

close Ransomware: A HigherEd Personal Testimony

Cyber SecurityWallace State Community College - Information Technology Director

Ransomware is now a $2 billion-per-year criminal industry. Prevention has become apart of a CIOs daily activities. What happens when you find yourself a Target? What happens when you fall Victim? Hear a personal testimony of a University that has walked through that experience and lived to tell the story.

Key Takeaways:

  • Why are HigherEd Institutions Targeted?
  • Tips and Tricks in the aftermath.
  • No cost Prevention practices.


Kirk Nugent
Information Technology DirectorWallace State Community College
TuesdayBreakout Presentation

close Digital Transformation and Emerging Technologies - Hype or Reality?

CIO Leadership and InnovationBerkley Risk Administrators Company, LLC - CIO

You’ve heard it – Digital Transformation and Emerging Technologies such as Blockchain, AI, Deep Learning, IoT, RPA, Cloud, etc. You may also heard the phrase “Be the Disruptor not the Disrupted”. What does all this mean? Hype? Of course it’s a hype for consulting companies like Accenture, IBM and hundreds of other companies to thrive, survive, or stay relevant. Reality? Yes, it’s a reality for companies like the Fintechs, Insuretechs, and FAANG since it’s who they are and it’s in their DNA. What about most of us?

Key Takeaways:

  • Understand the hypes
  • Understand the realities
  • Understand the technologies
  • Understand what are the potential next steps


William Tran
CIOBerkley Risk Administrators Company, LLC


Executive Steering Committee

Experienced IT leaders work with us to focus our program on trends that will move the needle at your company.

Steering Committee Members

Nishanth Rodrigues Chief Information Officer
University of Mississippi
Paul Cottey Chief Information Officer
Water Street Healthcare Partners
Karen Davis Business Group CIO & VP, Research Computing
RTI International
Raphael Morozov CTO
Eurofins DMS
Adam Waldron Chief Information Officer
Idaho Farm Bureau Insurance
Alan Whitehouse Chief Information Officer
WellStar West Georgia Medical Center
Andrea Giantelli VP of Global IT Compliance & Portfolio Management
Platform Specialty Products
August Alfonso CIO & VP for Facilities Operations &
Del Mar College
Carolyn Schmidt Tastefully Simple
Chief Information Officer
Dean Jensen Assistant Professor of Computer Science
Elmhurst College
Donna Harrington Chief Technology Officer
Southwestern College
Dr. Ken Russel CIO & VP, Digital Transformation
Pfeiffer University
Erwin Eimers Chief Information Officer
Valent U.S.A. LLC
Jack King Chief Technology Officer
State of Illinois
Jason James Chief Information Officer
Optima Healthcare Solutions
Jeffrey Potter Chief Technology Officer
Davenport & Company LLC
Jonathan Neumark Assistant VP, Technology Services
Flagship Credit Acceptance
Kumar Periasamy Vice President - Digital Transformation
United Nations FCU
Leah Kraus Chief Information Officer
North Carolina Central University
Mark Simon SVP, CIO and CISO
Benefis Health System
Michael McCartney Chief Marketing and Technology Officer
Mujeebur Rahmansaher Chief Technology Officer
The Team Companies
Nader Nemati QTC Management Inc
Chief Information Officer
Rezaul Abid Global Head of Information Systems and T Strategy Architecture and Innovation
Bechtel Global Corporation
Mike Maier CISO
City of Fort Lauderdale

An Esteemed Audience

Thousands of IT executives have joined us over the years for what has been voted the “most effective trade show” for over a decade. Use our tools to demonstrate ROI to your C-Suite.

Attendee Testimonials

"The format of the sessions and one-on-one meeting with vendors was a very effective use of my time. The best part of the event is the experts from various areas of information security and solution providers under one roof. It provided an opportunity to learn in a succinct manner without spending too many days out of the office."

"CIO VISIONS is time well spent. In the office, I often don't have time to answer all the emails I received from vendors and then find out which one is the right fit for what I need. The personalized research meeting format allows me to have conversations with vendors that I currently have initiatives for, so the conversations with them are very productive. The sessions are in line with current industry and the networking experience with industry peers is phenomenal!"

"As CIOs we understand the need to network and learn from our peers and experts in the market place. The good news is that there are a plethora of opportunities for us to attend CIO centric events, but sadly, therein lies the difficulty. We have limited time and need to select the events that help us provide the best technological guidance to the enterprises we serve. Having served on many panels and chaired many sessions across many of these events, I have narrowed down the events I attend to a handful. CIO VISIONS is one of them. "

"CIO VISIONS Mid-Marekt is an excellent event for IT leaders to connect, network and discuss the current state of IT. With practitioners providing the presentations and key talks, this is a very practical and "real" event for the attendees."

Attendee List


CIO Visions has quickly become established as the “deal generating show”.

About CIO Visions

CIO Visions is an invitation-only trade show for IT executives from mid-market companies, that bridges you to the most compelling solutions and information for your crowning priorities.

Have Questions?

We’ve answered a few FAQs to get you started. For any other questions, please don’t hesitate to contact us!

Our Team

Matt Velaer

Conference Director
(424) 334-5145
Send Message

Marin Silvers

Sponsor Relations
(424) 334-5141
Send Message

Carlos Rodriguez

Conference Producer
(424) 389-3287
Send Message

Laura Dion

Attendee Relations Executive
(424) 363-9967
Send Message

Shanna Delfs

Account Executive
(434) 334-5161
Send Message

Andrea Gomez

Account Executive
Send Message

Alex Flamer

Account Executive
Send Message

Hotel and Travel

Your conference pass includes overnight accommodations, travel reimbursement, meals and cocktail receptions.

The Hotel

Red Rock Casino Resort & Spa

Luxurious accomodations, an Eden-esque pool nirvana complete with waterfalls, sumptuous spa treatments, award winning restaurants, miles of trail and a top notch casino–all overlooking the stunning Red Rock Canyon National Conservation Area.

Nestled at the entrance of the Red Rock Canyon National Recreation area,  just minutes from the Strip, Red Rock Resort Casino & Spa offers the best of both sides of Vegas. Enjoy the shows, the gambling, and all the pizazz Vegas is famous for, or feed your thirst for adventure with mountain climbing and exploration. Stunning views and an even more stunning atmosphere make Red Rock one of the best that Vegas has to offer.
Accommodations must be booked through the conference organizers and not through the venue directly. We cover the first night and offer a discounted rate. Spouses welcomed. For reservations please contact:
Red Rock operates a complimentary shuttle to and from McCarran Airport (LAS). The shuttle schedule is located here. Taxis and other ride sharing is also available and cost approximately $50 each way.  
Red Rock Resort, Casino & Spa | 11011 W. Charleston Blvd. Las Vegas, NV 89135