Bellagio, Las Vegas

Invitation-only means an exceptional experience, on us

Coordinated by your personal concierge, a schedule is tailored to your professional goals and company priorities.

assignment_ind

Complimentary Pass

Inventive learning, renowned speakers, executive networking. All free to you.

flight

Travel Reimbursement

$200 of your travel is covered if you’re trekking over 100 miles to attend.

local_hotel

Accommodations

Your first night’s stay is on us and a discounted rate is available thereafter.

restaurant

5 Star Catering

All of your meals and libations are complimentary throughout the event.

Join IT’s Distinguished Upper Tier

A curated audience reserved for the senior level of the Fortune 500 puts you in exceptional company.

150+

Affluent Peers

Meet the people who are just as invested in leveraging technology as you are.

20+

Influential Leaders

Learn valuable strategy components from today’s very best.

40+

Proven Solutions

Meet industry leading solution providers, hand picked for your priorities.

1.5K

Connections

Take this unprecedented opportunity to connect with high profile execs.

A curated experience to cultivate achievement

Based on your specific areas of responsibility, challenges and interests we’ll craft a personal agenda that paves your path to success.

3

Days of Insight

Jump in the discussion through focused educational sessions and networking opportunities.

40

Innovative Sessions

Keynotes, plenary sessions, industry panel discussions, case studies and more.

6

Networking Opportunities

Tie into contemporaries and mentors interested in the same avenues of opportunity as you.

10

Research Meetings

Meet one-on-one with executives delivering on the solutions that are shaping the industry.

play_circle_outline Watch Video

Peer-Led Education

The CISO Visions Steering Committee consists entirely of your contemporaries, meaning we tackle the themes that have profound significance to you performance and your company.

FEATURED SPEAKERS

Key Themes

close Network Security

The importance of network security is at an all-time high for businesses and consumers alike. Examine, debate and discuss organizational strategies of how to keep your network safe in today’s current environment.

Explore strategies for leveraging the cloud to drive down costs and the security implications that come with it. Dive deeper to understand the impact on employees, mobile strategy and more.
When dealing with multiple interconnections within your computer networks, what can you do to stay secure? Learn more about endpoint protection/ security and why it should be a critical part to developing your cybersecurity strategy.
Hear the latest recommendations and research about IAM from your peers. Learn about the latest trends in security and how to optimize your IAM processes to maximize results.
Navigating between technology initiatives and managing your staff can be profoundly challenging. The sharp learning curve detracts from communication, understanding of progress, strategy acceptance and appropriate resource allocation. Blow past these challenges to keep your company ticking upwards while keeping everyone on board.
Exchange ideas and views while learning the latest trends on how to protect your business from ransomware and phishing scams.
Stay ahead of the curve and get the latest information on machine learning. Consult and learn from experienced executives about the latest technologies and advancements on how to accelerate your progress, avoid pitfalls and overcome roadblocks.
The data produced by our digital systems and processes borders on overwhelming. In this track we will discuss the best practices for IT Leaders to set up their organizations for success during their digital transformation and how to identify the data that matters most.

High Profile Speakers

Hear strategic endeavors and skillful insights from 40+ IT leaders as they make way in today’s changing landscape.

CISO VISIONS Cybersecurity Spring Summit View More

Todd Barnum

CISO

GoPro, Inc.

CISO VISIONS Cybersecurity Spring Summit View More

Endre Walls

CISO

Customers Bank

CISO VISIONS Cybersecurity Spring Summit View More

Elliott Franklin

Director of IT Security

Loews Hotels

CISO VISIONS Cybersecurity Spring Summit View More

Gary Brantley

Chief Information Officer

City of Atlanta

CISO VISIONS Cybersecurity Spring Summit View More

Phil Miller

Director, Information Technology Risk & Security

J.R. Simplot

CISO VISIONS Cybersecurity Spring Summit View More

Mike Ehlers

CISO

Clearent

CISO VISIONS Cybersecurity Spring Summit View More

Niel Nickolaisen

CIO

OC Tanner

CISO VISIONS Cybersecurity Spring Summit View More

Prabodh Telang

Information Security Officer

Credit Union of Colorado

CISO VISIONS Cybersecurity Spring Summit View More

Sekhar Nagasundaram

VP of Cybersecurity Engineering

EllieMae

CISO VISIONS Cybersecurity Spring Summit View More

Brian Gillespie

Chief Technology Officer

Bardavon Health Innovations

CISO VISIONS Cybersecurity Spring Summit View More

Bryan Caporlette

CTO

G&G Outfitters, Inc

CISO VISIONS Cybersecurity Spring Summit View More

William Sweeney

CISO/CTO

Kemberton

CISO VISIONS Cybersecurity Spring Summit View More

Walt Carter

Chief Digital Officer & CIO

Homestar Financial Corp

CISO VISIONS Cybersecurity Spring Summit View More

Miguel Louzan

CIO/CTO

LifeScan

CISO VISIONS Cybersecurity Spring Summit View More

Russ Felker

Chief Technology Officer

GlobalTranz

CISO VISIONS Cybersecurity Spring Summit View More

Bonnie Johnson

SVP Security & Infrastructure

NGC US

CISO VISIONS Cybersecurity Spring Summit View More

Paul Jones

CIO

City of West Palm Beach

CISO VISIONS Cybersecurity Spring Summit View More

Mike Uster

CIO

ManTech

CISO VISIONS Cybersecurity Spring Summit View More

Andrew Anderson

Enterprise Client Partner

Toptal

CISO VISIONS Cybersecurity Spring Summit View More

Max Robin

Senior Cybersecurity Manager

Darktrace

CISO VISIONS Cybersecurity Spring Summit View More

Vinod Vasudevan

CTO

Paladion Networks Private

CISO VISIONS Cybersecurity Spring Summit View More

Cameron Seader

Technology Strategist

SUSE

CISO VISIONS Cybersecurity Spring Summit View More

Prasad Ramakrishnan

CIO

Freshworks

CISO VISIONS Cybersecurity Spring Summit View More

Gurpreet Kaur

Head of IS Strategy; Head of Global Analytics

Integra Life Sciences

2020 Full Agenda

Hear strategic endeavors and skillful insights from 40+ IT leaders as they make way in today’s changing landscape.

Reset Filter
Cloud Strategy
Endpoint Protection
Identity Access Management
Cybersecurity Staff Training
Digital Transformation
Ransomware/Phishing
Machine Learning
SundayNetworking

Welcome Cocktail Reception & Registration

MondayNetworking

Breakfast Buffet

MondayKeynote Presentation

close Don’t Believe What They Tell You…

Network SecurityGoPro, Inc. - CISO

The Security industry has many voices.  Each telling us where to focus, which tool to buy, which threats to focus on, which risks to mitigate, and how to avoid being the next headline news.  But where should a security team place its efforts and resources?  Do we have to buy the latest tool to keep our companies safe?  I don’t believe so.

Key Takeaways:

  • Provide a common-sense approach to cyber/information security
  • Evaluate whether your company’s security team is focused on the right areas
  • How to manage your company’s resources effectively

Speaker

Todd Barnum
CISOGoPro, Inc.
Monday

Targeted Research Meetings

Expo Hall
MondayBreakout Presentation

close Customer Obsession : Changing the Approach of Customer Service in a Digital Transformative World

Digital TransformationCity of Atlanta - Chief Information Officer

Great business efficiency can come from a single radical change. Within a year, Gary Brantley, CIO for the City of Atlanta, began the organizational transformation of shifting the focus of the City’s technology department, Atlanta Information Management, from customer-centric to customer obsessed.

According to Walter Rogers, CEO of CCI Global Holdings, who wrote in a recent post, “true customer obsession involves turning our customers into fans who believe in, advocate for, and keep coming back to our business.”

In this discussion, Gary will share his current journey through the planning and challenges of smart cities. He will also explain the importance of being insights-driven and operationally efficient while continuously invoking innovation in a digital transformative world.

Key Takeaways:

  • Obtain key ingredients to building a customer-obsessed culture
  • Identifying new possibilities of existing services in order to design and deliver a better experience for your customer
  • Creating the right culture of service and accountability measures necessary in the quest to become customer-obsessed

Speaker

Gary Brantley
Chief Information OfficerCity of Atlanta
MondayBreakout Presentation

close Driving the Future of Work with Data

Cybersecurity Staff TrainingToptal - Enterprise Client Partner

Talent strategy is critical to an organization’s ability to innovate and quickly pivot to fuel growth and stay ahead of competition. Andrew Anderson will share his unique insights on the industry-wide shift in talent management and how companies are increasing ROI from the “human cloud” and blended workforce operating model – the future of work.

Speaker

Andrew Anderson
Enterprise Client PartnerToptal
MondayBreakout Presentation

close The Secure Cloud 9

Cloud StrategyCustomers Bank - CISO

Gain 9 critical insights for securely adopting a cloud strategy to host your products, platforms, or business-critical technologies.

Key Takeaways:

  • Avoid the common pitfalls of cloud deployments.
  • Gain insights into what works and what doesn’t when it comes to cloud.
  • Rationalize your cloud strategy to ensure it’ll meet your business objectives.
  • Decrease risks to your business by deploying a secure cloud.

Speaker

Endre Walls
CISOCustomers Bank
MondayBreakout Presentation

close Threading the Needle Between Cyber Fusion and Cyber Resilience

Endpoint ProtectionEllieMae - VP of Cybersecurity Engineering

Cyber fusion and cyber resilience are misunderstood and overloaded terms. This talk will present pragmatic and effective approach to combining cyber threat intelligence and threat defense operations into a single, integrated cyber defense platform to provide all round situational awareness and protect critical assets.

Key Takeaways:

  • Definitions of cyber resilience, cyber fusion and cyber threat operations
  • Digital risk protection components
  • Key cyber fusion capabilities
  • CTI architecture and capabilities

Speaker

Sekhar Nagasundaram
VP of Cybersecurity EngineeringEllieMae
MondayBreakout Presentation

close Cyber AI: Fighting Back with Autonomous Response

Network SecurityDarktrace - Senior Cybersecurity Manager

The digital enterprise is constantly expanding, with new IoT, cloud, and operational technologies all challenging traditional notions of cyber security. Safeguarding these evolving environments against machine-speed attacks has never been more difficult

Yet the digital battleground now features its most formidable defender in Cyber AI — a self-learning technology that distinguishes friend from foe in order to thwart threats autonomously. With the Cyber AI Platform protecting your entire infrastructure in real time, it doesn’t matter whether the attack originates on a connected device, an industrial system, or in the cloud. Wherever it strikes, the AI fights back in seconds.

Key Takeaways:

  • Why only Autonomous Response can counter today’s machine-speed attacks
  • Where advanced threat-actors exploit vulnerabilities in the cloud and IoT
  • What achieving 100% visibility can reveal about your organization’s risk profile
  • How the Cyber AI Analyst reduces the time spent triaging threats by 92%

Speaker

Max Robin
Senior Cybersecurity ManagerDarktrace
MondayBreakout Presentation

close Building a Successful Cyber Security Program

Network SecurityJ.R. Simplot - Director, Information Technology Risk & Security

In this time of transformation, a strategic approach to cybersecurity is necessary. If you haven’t already, benchmark against a security framework. Determine which capabilities are most important to your organization’s needs. In parallel, ensure basic “hygiene” elements of a security program are addressed. With limited resources, your team’s soft skills are increasingly critical.

Key Takeaways:

  • There are many security frameworks out there. If you aren’t already locked into one (i.e. Government Sector – NIST) pick one.to benchmark against
  • For most, you cannot afford to do everything well, determine what is essential and focus resources there
  • Minimum Hygiene: multi-factor authentication, patching, 3rd party penetration test, and phishing your staff
  • Training your team is essential. Make sure it includes soft skills: communications, leadership development

Speaker

Phil Miller
Director, Information Technology Risk & SecurityJ.R. Simplot
MondayBreakout Presentation

close Staffing Security & It Teams - Successful Strategies in Today's Market

Cybersecurity Staff TrainingClearent - CISO

Traditional staffing approaches often don’t work for hiring security/IT staff in today’s market. Combination of school debt, useless degrees, and new generational expectations don’t exactly align with IT resourcing requirements these days. Session will show working hiring strategies in todays market: where to look, how to train and grow then next generation.

Key Takeaways:

  • Understand why traditional hiring methods don’t always work for IT
  • Where to find best talented security and developer resources
  • How to retain talent in today’s market
  • Criteria for building vs. buying your NOC and SOC

Speaker

Mike Ehlers
CISOClearent
MondayBreakout Presentation

close You Did What? Transforming a Manufacturing Company Into a Software Company

Digital TransformationOC Tanner - CIO

The market demanded that the 90 year old company become a technology company. We defined the four pragmatic “levers” we would pull to transform the company.

These were:
Modernize everything
Take a micro-services, platform approach
Suck less (continuously improve)
Change the IT leadership model

This formula works for everyone

Key Takeaways:

  • There is a repeatable, usable formula for digital transformation
  • By using Purpose Alignment to guide decisions, we can focus our innovation where it matters and also clean up our legacy messes
  • Through a combination of lean, agile and DevOps, everyone can achieve operational excellence
  • By using the Trust / Ownership Model for leadership everyone can achieve a high-performing culture

Speaker

Niel Nickolaisen
CIOOC Tanner
MondayNetworking

Lunch Hosted by T-Mobile

Monday

Targeted Research Meetings

Expo Hall
MondayBreakout Presentation

close Value Chain Assurances - "the Art of Being Properly Whelmed"

Identity Access ManagementHomestar Financial Corp - Chief Digital Officer & CIO

For many of us, our next biggest risk outside of our own folks, is in our supply chain or partner relationships. And many of those value chain members have access and the ability to bring “Trojan Horses” inside — past our gates and protections. We’ll discuss opportunities and solutions for helping them build your confidence and assure you that their participation in your ecosystem meets the minimum standards for a defensible cybersecurity stance.

Key Takeaways:

  • Who’s Watching the Watchers? – How do you measure what you cannot see?
  • “Aim small, miss small” – funneling down to what risk is addressed and what is not by your partner/suppliers’ programs
  • Avoid “Lack of Program” Risks – Low Bar requires at least a defined Cybersecurity Program in place

Speaker

Walt Carter
Chief Digital Officer & CIOHomestar Financial Corp
Monday Breakout Presentation

close Stop Breaches in AWS and Azure with Advanced Threat Detection and Response

Cloud StrategyPaladion Networks Private - CTO

Cloud computing is powering digital transformations for businesses across the globe. This mainstream adoption is making Cloud platforms a promising new vector for cyber criminals. Organisations of every size must prepare to defend against the coming wave of advanced attacks targeting their Cloud and hybrid infrastructures.

In this session, we will discuss how best to monitor AWS and Azure clouds. We will focus on key components and services that should be monitored along with use cases. We will detail the role of AI-driven threat detection and response to combat sophisticated cloud threats.

Speaker

Vinod Vasudevan
CTOPaladion Networks Private
MondayBreakout Presentation

close Strategy for Mitigating Emerging Threats

Machine LearningCredit Union of Colorado - Information Security Officer

What are some of the emerging threats of the future. How to utilize advance threat protection techniques including Machine Learning and Artificial Intelligence to mitigate such emerging threats.

Key Takeaways:

  • Learn about new / emerging threats
  • Advance mitigation techniques
  • Advance threat protection using Artificial Intelligence
  • Advance threat protection using Machine Learning

Speaker

Prabodh Telang
Information Security OfficerCredit Union of Colorado
MondayBreakout Presentation

close SUSE: Enabling Transformation from Edge to Core to Cloud

Digital TransformationSUSE - Technology Strategist

We will discuss how SUSE views the Digital Transformation that catches so much attention in the IT & business community today. What it can do to enable your business to achieve, the challenges often encountered on the journey and how SUSE is preparing to enable you to build, deploy, and operate your infrastructure and applications from the edge to the core to the cloud.

Key Takeaways:

  • SUSE Core Values
  • Digital Transformation
  • Consistent Platform from edge to core to cloud
  • Enterprise Resiliency and Scale
  • Deployment and Lifecycle Management
  • Application Delivery
  • Multi-cloud Management

Speaker

Cameron Seader
Technology StrategistSUSE
MondayBreakout Presentation

close Practical Application of AI in Healthcare for Specialized Revenue Cycle Management

Machine LearningKemberton - CISO/CTO

The presentation will be a case study of how Kemberton brought AI to bear on a critical workflow issue for the handling of complex healthcare claims involving motor vehicle accidents so that they could be deterministicly routed to the next step in the workflow more efficiently.

Key Takeaways:

  • Selecting the right case for AI
  • Critical decision points in the AI process
  • The essential role of SMEs
  • How to operationalize the results

Speaker

William Sweeney
CISO/CTOKemberton
MondayBreakout Presentation

close Leading Digital Transformation in a $1.2 B Global Medical Device Organization

Digital TransformationLifeScan - CIO/CTO

I led the full carve out of LifeScan from JNJ. It tooks 18 months to stand up a totally independent LIfeScan organization. During this technology and digital transformation process, we simplified the entire tech/digital landscape, implemented agile, drove cloud 1st strategy, automation, Analytics/AI driven organization. shift from being medical device to digital company, and many other new ways of working.

Key Takeaways:

  • Digital Transformation is real.. just need to make it concrete, one step at a time and result oriented
  • Speed vs perfection…. speed should always win
  • Learn to fail fast… and move on
  • AI, ML, Analytics are real examples on how transform organizations

Speaker

Miguel Louzan
CIO/CTOLifeScan
MondayBreakout Presentation

close Bridging the Gap: IT Security and the Service Desk

Network SecurityFreshworks - CIO

Information security is everyone’s business. Learn about the ever-changing IT security landscape as Prasad Ramakrishnan, CIO, Freshworks addresses the effect of breaches on businesses and ways to improve your infosec capabilities.

Key Takeaways:

  • How your service desk can become the eyes and ears of IT security
  • How to build an effective ‘Prevent-detect-correct’ security model
  • ITSM best practices and initiatives to beef up IT security
  • An IT security checklist for digital businesses

Speaker

Prasad Ramakrishnan
CIOFreshworks
MondayBreakout Presentation

close Cybersecurity & Resiliency: Protecting Your Business From Direct & Indirect Threats

Ransomware/PhishingGlobalTranz - Chief Technology Officer

Today’s businesses are more integrated than ever. However, integration with external partners has risks along with benefits. Russ Felker, Chief Technology Officer at GlobalTranz, a leading logistics technology provider and Top 10 3PL, shares his insights on how businesses can protect themselves against ransomware and other cyber threats coming in via both direct and indirect channels.

Key Takeaways:

  • Businesses must have both an internal and external focus
  • It’s not a question of “if” your business and your partners will be targeted; it is a question of “when” and “how”
  • Focusing on data security is important- but businesses need to focus on resiliency as well
  • How to you effectively measure and track internal and partner resiliency

Speaker

Russ Felker
Chief Technology OfficerGlobalTranz
MondayBreakout Presentation

close Governance in the Cloud at Scale

Cloud StrategyBardavon Health Innovations - Chief Technology Officer

Unleashing the full power of the public cloud adoption requires not only a technology shift but also a cultural and organizational transformation. This session will focus on establishing financial, technical and security governance while fostering rapid adoption of public cloud services.

Key Takeaways:

  • How to enable software development teams to move quickly in adopting cloud while maintain security
  • How to manage cloud budgets at scale for both flexibility and cost containment
  • Organization design of a Cloud Center of Excellence

Speaker

Brian Gillespie
Chief Technology OfficerBardavon Health Innovations
MondayNetworking

Industry Dinner

TuesdayNetworking

Breakfast Buffet

TuesdayKeynote Presentation

close We Are Lost in Cybersecurity, What We Need Is a Simple Map!

Network SecurityLoews Hotels - Director of IT Security

We are all tired of talking about cybersecurity and how we are losing the battle against the attackers. It’s like we are lost without a map. Instead of rushing to adopt the latest shiny security tool, we need to take a step back and adopt a standardized security framework.

Key Takeaways:

  • The NIST CSF uses a common business language to address cybersecurity concerns to leadership
  • Using a standard, the industry-recognized framework allows consistent program maturity mappings to budget requests.
  • Following the NIST CSF, you are demonstrating “due care” which may reduce claims of negligence or inattention following a breach
  • Easily maps to compliance and regulatory requirements reducing unnecessary or redundant efforts

Speaker

Elliott Franklin
Director of IT SecurityLoews Hotels
Tuesday

Targeted Research Meetings

Expo Hall
TuesdayBreakout Presentation

close Securing the Organization - It's More Than Technology

Network SecurityCity of West Palm Beach - CIO

Cyber security is not just and IT issue, it is and organizational issue and must be treated as such. This presentation will provide and overview of the key factors to must be incorporated to manage cyber security across the organization.

Topics will include:

The Three Tiers

1. The Administrative tier deals with having in place security policies, procedures, and processes designed to lay a foundation for managing and administering security across the organization.

2. The Compliance/Governance tier deals with the ongoing verification and validation of all security system implementations, including both the technical and administrative functions

3. The Technical tier deals with putting in place the technical infrastructure designed to recognize and prevent breaches from occurring.

In addition to the three tiers we will discuss other organizational best practices and must haves required to create a culture of security awareness in the organization.

Key Takeaways:

  • Key requirements for building an organization-wide security program
  • Security must be driven from the top down
  • Reducing liability by providing due diligence, due care and documentation at all levels
  • Building a culture of security awareness

Speaker

Paul Jones
CIOCity of West Palm Beach
TuesdayBreakout Presentation

close Express Lanes to PCI DSS

Network SecurityNGC US - SVP Security & Infrastructure

NGC takes the security of customer data very seriously, even when regulations don’t require it. NGC independently applied PCI DSS to 98% of infrastructure to ensure a strong security posture and protection of our customer data. Followed by HIPAA compliance, NGC has made customer security the number one priority in recent years.

Key Takeaways:

  • PCI DSS is prescriptive as an entree into regulatory compliance
  • If you wait until everything is perfect, you’ll never get it done
  • The 80/20 rule applies to almost everything

Speaker

Bonnie Johnson
SVP Security & InfrastructureNGC US
TuesdayBreakout Presentation

close How Email Became Your Worst Enemy - What to Do About It

Machine LearningManTech - CIO

At ManTech, a $2B+ enterprise with some 9,000 employees, we are replacing email with Slack. As the leader of this strategic change, I will discuss the advantages of ditching email in favor of moving to an innovative social media tool that lets users communicate in targeted groups, create discussions that advance vital programs, and accelerate performance on both company-internal and customer-focused initiatives.

Speaker

Mike Uster
CIOManTech
TuesdayBreakout Presentation

close Better Decisions Through Data Insights

Data Storage and AnalyticsIntegra Life Sciences - Head of IS Strategy; Head of Global Analytics

How to launch and enable the business through Data Analytics.

Key Takeaways:

  • Platform Considerations
  • Business Challenges
  • Methodology & Approach

Speaker

Gurpreet Kaur
Head of IS Strategy; Head of Global AnalyticsIntegra Life Sciences
TuesdayBreakout Presentation

close When You Can't Work Any Harder, Apply Some Technology!

Digital TransformationG&G Outfitters, Inc - CTO

G&G Outfitters had grown from a way to pay for a spring break to Florida, to a thriving branded merchandise business over a 20 year period. Embroidery and Screen Printing processes were all paper based, we initiated an initiative to build a new Order Management Platform to digitize the entire workflow processes. After 3 years we have transformed the legacy paper into a fully electronic workflow. This presentation will review how we transitioned our workforce from a paper process, the challenges and the benefits achieved.

Key Takeaways:

  • Building vs Buy Decision
  • Gaining employee adoption
  • Hurdles to implementation
  • Gains in order visibility and accountability

Speaker

Bryan Caporlette
CTOG&G Outfitters, Inc
TuesdayNetworking

Lunch

Executive Steering Committee

Experienced IT leaders work with us to focus our program on trends that will move the needle at your company.

Steering Committee Members

Jeffrey AguilarDeputy CISO
County of Los Angeles
Blake GarrabrantVP of IT & Security
AGS LLC
Tamika BassCISO
Georgia Department Of Public Health
Tolgay KizilelmaCISO
UC Merced
William FrybergerDirector - Information Security Operations
Procter & Gamble
John MichaelsCTO/CISO
Maxim Group

An Esteemed Audience

Over 80% of the Fortune 100 joins us each year for what has been voted the “most effective trade show” for over a decade. Use our tools to demonstrate ROI to your C-Suite.

Attendee Testimonials

Attendee List

Exhibitors

CISO Visions has quickly become established as the “deal generating show”.

Exhibitor Testimonials

Exhibitor List

About CISO Visions

CISO Visions is an invitation-only trade show for IT executives that bridges you to the most compelling solutions and information for your crowning priorities.

Have Questions?

We’ve answered a few FAQs to get you started. For any other questions, please don’t hesitate to contact us!

Our Team

Matt Velaer

Conference Director
(424) 334-5145
Send Message

Marin Silvers

Vice President of Operations
(424) 334-5141
Send Message

Hannah Greenlee

Conference Program Manager
(424) 334-5159
Send Message

Renee Mercer

Attendee Relations Executive
(424) 421-5150
Send Message

Clint Wilton

Account Executive
(424) 204-0856
Send Message

Shanna Delfs

Account Executive
(434) 334-5161
Send Message

Marissa Marsh

Account Executive
(424) 313-1172
Send Message

Hotel and Travel

Your conference pass includes overnight accommodations, travel reimbursement, meals and cocktail receptions.

The Hotel

Bellagio Hotel

Inspired by the villages of Europe, AAA Five Diamond Bellagio overlooks a Mediterranean-blue lake with fountains performing a magnificent ballet. Escape into an otherworldly plane of dance, music and acrobatics with “O” by Cirque du Soleil — aquatic theater in our Parisian-style opera house.

The hotel rooms and suites at the Bellagio offer the perfect blend of beauty and elegance. Our rooms will elevate your stay, whether you're traveling for business, celebrating a honeymoon, or just looking for a remarkable getaway. With views of the Las Vegas valley or the iconic Bellagio fountains right from your suite, your stay will be nothing short of unforgettable.
We’ll book your accommodations, cover your first night’s stay and offer a discounted rate thereafter. To make your reservations please contact:
The nearest airport is McCarran Airport located about 2 miles away. This hotel does not operate a shuttle, taxi or ride share is recommended.
Bellagio Hotel | 3600 S. Las Vegas Blvd. Las Vegas, NV 89109
×