Have Questions?
We’ve answered a few FAQs to get you started. Still have questions? Please don’t hesitate to reach out!
The Best Solution Providers
Meet one-on-one with the partners best suited to tackle your unprecedented challenges.
Over 30 Speakers
Learn from the leaders driving IT innovation in an ever-changing climate.
Exclusive Swag
Since it isn’t quite safe to treat you to a high class hotel, enjoy some high class swag.
Using the same data-driven matching logic as our in-person events, we take the legwork out of finding new partners. Meet directly with companies vetted specifically for you to confidently tackle your challenges, within your budget and time frame. There is a minimum of 6 meetings, and no maximum.
The challenge of digital is no exotic location, no 5-star dining, and no face time. But we do have a quite brilliant system to reward you with SWAG. Take all 6 solution provider meetings and we’ll thank you generously. Climbing the ranks is hard; you’re well-deserving of an exceptional experience, no matter the limitations.
Watch it when it’s released, or later on demand. Your experience is up to you.
8:00 am - 9:00 am
Now that we have all been working from home for a few months, how has your security program held up? Are you still using the same metrics? Have you shifted anything? If your program was built on a framework and started with the basics, remote workers should not change much. Join me as we discuss the key points of a successful security program and how to gain buy-in and budget even during an economic downturn.
9:00 am - 10:00 am
To stay relevant and competitive in today's rapidly evolving business environment, companies need to be able to adapt quickly. Learn how to take advantage of cloud solutions to transform your business operations and understand the trade-offs and when to apply different options. And see how other companies have applied the latest solutions to make a material impact to both customer service and the bottom line.
10:00 am - 11:00 am
In today’s world, most security professionals will say it is not a matter of if it is a matter of when a breach happens. In this presentation we will discuss how the City of West Palm Beach is building an organization-wide information security program that centers on a strong technical platform, a robust administrative tier and a solid compliance infrastructure. Discussion points will include; reducing liability, leveraging audits, engaging the organization and building a culture of security awareness. Additionally, we will highlight some of the compliance tools used to ensure long term results.
11:00 am - 12:00 pm
2020 is the year that keeps on giving. How can we as leaders lead ourselves, our team, and our businesses through a year filled with remote working, quarantine, social unrest, natural disasters, and a presidential election? Good news: there is hope and you are the source.
12:00 pm - 1:00 pm
The events of this year have vastly accelerated the transformation of how organizations work, and how they protect their work. Protecting distributed teams and their enabling technologies in a world prone to cataclysmic events is not only possible but, when done correctly and on its own unique terms, brings more robust and proactive security. We draw upon our experience in helping distributed organizations with blended teams implement security and navigate crises to offer a new security playbook to turn the many changes in the world into your most proactive means of defense.
1:00 pm - 2:00 pm
Indiana University of Pennsylvania (IU) is among the few thousand traditional higher education institutions that had their historic face-to-face student experience shattered (at least temporarily) virtually overnight beginning in March, 2020. More than 1,500 course sections at IUP, the vast majority taught by faculty with no experience teaching fully online, had to be migrated in the middle of a semester over about a 10-day period. All of this is occurring in heart of a highly disrupted industry trying to survive. This webinar will describe the onset of the crisis and the monumental immediate challenges it presented, the critical decisions that resulted and the valuable lessons learned that could have value to IT leaders from any industry.
2:00 pm - 3:00 pm
Enabling employees for remote work has created vulnerabilities that cyber criminals are eager to exploit. Organizations need to be aware of and prepared to protect, defend, and respond to these new cybersecurity risks. Learn how these risks are evolving as organizations now shift towards a mixed physical-remote office model, how IBM has helped clients address these concerns, and discover actions you can take to protect your critical systems and data.
3:00 pm - 4:00 pm
CIOs and IT practitioners are in the midst of unprecedented change due to the pandemic. They are called upon to quickly adapt to a fluid environment while not losing sight of longer-term digital transformation initiatives. Their WAN must deliver flexibility, security, scalability and offer seamless handoffs between on-premise and remote workers in a lights-out environment. Learn how a managed WAN meets these diverse requirements by integrating connectivity, security, application optimization, multi-cloud fabrics, and real-time visibility with SLA verification to meet their needs both today and in the future. We provide examples of how Aryaka’s customers are reaping the benefits of a cloud-first managed WAN that delivers all of the above based on the OPEX-driven cloud consumption model.
8:00 am - 9:00 am
Aflac’s threat intelligence program provides decisive operational insight into what threat actors are doing right now and how threats are trending over time. By combining deep visibility into threat actor techniques with automation supported by millions of data points that are integrated into an adaptive security framework, Aflac’s systems and environments are significantly more resilient to attacks. Learn how a clear understanding of your adversaries’ motivations, methods and capabilities, enable you to make effective decisions regarding how you prioritize your efforts and investments to protect your organization.
9:00 am - 10:00 am
Gauging the risk and security of our partners, third parties and solutions is something we all must do but is a painful and dysfunctional process today. In this presentation we will look at the current state of the union, what is working and what is not and what we need to do going forward. Some of the specific things I will touch on include: Internal processes are frequently flawed as well as the tools and technology that support those processes (Lack of understanding, bad questionnaires, unreasonable timeframes etc.) The people involved aren't always the right contacts and the use of third parties to run your TPRM program only complicates matters Applicability is key but frequently not part of the discussion We need to drive to consistent platforms and standards
10:00 am - 11:00 am
The threat of data breaches impacts every organization, large and small. In the aftermath of a data breach, companies must deal with financial loss, hefty fines, a reputational hit, and customers leaving. Ensuring you have the right people and processes in place before an attack occurs will make a significant difference in how an attack impacts your company's operations, reputation, and bottom line. Experian's Michael Bruemmer takes you through real-life examples of why most breach responses fail both the affected company and their consumers. Do not make the same mistakes!
11:00 am - 12:00 pm
The future of work remains unpredictable and uncertain. More than ever before, business leaders need to remain confident that their operations can continue securely in the face of global or even regional crises, and while sections of the economy are slowly re-opening, cyber-attackers are ramping up their campaigns. As businesses look set to rely on cloud and SaaS tools for the long term, our digital environments are going to be more dynamic than ever. Yet organizations are finding themselves undergoing a delicate balancing act—each new work practice and technology that is introduced also brings unforeseen risk. Static, legacy approaches have become redundant, both unintelligent and ill-equipped to adapt. Organizations must rethink their approach to security,and rely on new technologies like AI to achieve much-needed adaptability and resilience. Darktrace is the world leader in cyber AI technology, and leverages unsupervised machine learning to seamlessly adapt and integrate into changing environments, and to detect and respond to attacks in the earliest moments. In the face of an uncertain present and future, Cyber AI enables businesses to continue communicating, operating, and innovating.
12:00 pm - 1:00 pm
What got you here will not get you there - moving from a technical role to an executive leadership role requires learning new skills. This session follows one technician's journey to a CIO role, and the lessons learned along the way.
1:00 pm - 2:00 pm
Current reality and trends require leaders and managers to think differently about retention. Walt will present you with some ideas and tools to help you recruit, retain, and release key-value contributors as we move forward from today and help you improve how you build your teams and your reputation for getting things done in your organization! We'll cover what is NOT changing; what is definitely changing and what you can do to improve your position as a leader now. The future of work is here - help yourself be ready.
2:00 pm - 3:00 pm
Keeping employees engaged in their work is a constant challenge, especially when workers are distracted by external developments. But the benefits of employee engagement, including potential improvements to productivity and customer satisfaction, make the efforts to drive it worthwhile. Technology is playing a critical role in driving employee engagement within organizations, and IT is at the forefront in ensuring employees are equipped with the right technology to excel in the new normal. Productivity flourishes when IT/ non-IT issues of employees get addressed efficiently and quickly. To keep the communication processes streamlined and engagement level climbing, organizations should take a more in-depth look into the technological pain points that employees might encounter regularly.
8:00 am - 9:00 am
This has been an unprecedented time for the planet and now we are transitioning to “The Next Normal”. Business leaders are discovering new ways to build a culture of productivity and accommodate remote yet highly productive collaborative teams, all while accelerating growth. In this session, Harry Moseley, Global CIO at Zoom, will share how organizations are successfully adapting, discuss how Zoom’s Unified Communications Platform allows your teams to stay securely connected and get more done, and showcase new innovations to support better collaboration and communications.
9:00 am - 10:00 am
Throughout her career, Elizabeth has run or been a part of over 10 implementation projects and has overseen different areas of IT operations. The one thing that has been critical throughout is communication, and she will share some lessons learned and provide 5 takeaways to improve communication at all levels.
10:00 am - 11:00 am
The session describes a simple method of estimating a development team's security maturity, i.e. how well they make a secure software product, by looking at 5 key factors. The factors and a simple rating system will be shown coupled with real world samples. Applicable usage scenarios as well as comparison to other security maturity models will be given.
11:00 am - 12:00 am
Data is exploding and it is necessary for every organization to make sense and monetize this data in a timely fashion. Cloud makes it possible to try out and iterate quickly with many different solutions and allows access to highly scalable compute and storage demand.. This presentation will highlight the main advantages of the cloud in the Data and Analytics space.
1:00 pm - 2:00 pm
The workplace as we know it will never be the same again. As we look to a future where a return to the office will be the exception rather than the norm, how can IT professionals best prepare to manage the new hybrid work environment? In this session, Maarten Van Horenbeeck will explore how Zendesk has adapted to the COVID-19 pandemic and discuss stages the company went through to identify an (ever-changing) path forward.
2:00 pm - 3:00 pm
With robotic process automation, software robots can work alongside humans to share the workload in real-time. Humans collaborating with robots can get more done, faster, and with fewer errors. Their robots can do the dull, tedious tasks so employees can focus on the work they love. The idea is to automate more and more knowledge work, and engage everyone in an organization to be part of the transformation.
8:00 am - 9:00 am
The rapid evolution of the digital world has driven great technology innovation as well as spawned growth in cyberthreats. In today’s IT environment both CIOs and CISOs are integral to an organization’s success. The CIO relies upon the CISO for advice, guidance, and risk evaluation while the CISO depends on the CIO for support and infrastructure resources. They must work together to empower every business department within the organization with a clear vision. Information security is no longer an IT support issue, but a strategic business responsibility where both executives must share common goals for security and IT operations to be successful. In this session, McAfee CIO Scott Howitt will explore how CIOs and CISOs can work together to ensure the needs of the organization are securely me.
9:00 am - 10:00 am
Today's environment has become a dynamic place of change. Savvy IT leaders use the opportunity to reposition IT to play a more strategic role in supporting, enhancing, and leading their organizations, thinking broadly about developing levers of change and expanding their sphere of influence.
11:00 am - 12:00 pm
The current Covid-19 situation has forced many organizations to quickly adopt remote work capabilities for their employees. In the months and years ahead, experts say remote work will only become more prevalent. Securing your remote work environment has become more critical than ever before. This webinar covers details about the security controls required for a secured remote work environment.
12:00 pm - 1:00 pm
Ask many in your technical teams and they will tell you databases are boring, old, expensive, and dated. But they are the holder of the most critical asset available in modern IT. The database ecosystem has and is still undergoing a massive transformation. The rise of DBaaS, Cloud-Native Applications, Hackers looking to grab databases, and developer-driven technology choices are all making the future of the database space less certain. We will uncover what these trends are and how people are dealing with them.
1:00 pm - 2:00 pm
Unless you have an absolute Cloud-First strategy that is well-funded, you need to make decisions about what applications and services you base in the cloud. When do you look at hybrid or SaaS solutions? During this presentation we will discuss the decision-making process, particularly in Higher Education and Non-profit institutions. What information do you need to make the decision? How are other technology leaders deciding?
8:00 am - 9:00 am
Today’s businesses must contend with challenges raging from cybercrimes to COVID-19. As a result, organizational resilience is top of mind for many business leaders. Russ Felker, GlobalTranz’s CEO shares proactive steps leaders can take to develop a plan for building and maintaining organizational resiliency in his webinar Supporting Organizational Resiliency. Russ leverages his 25+ years in technology leadership roles to provide organizations an overview of the importance of interconnected technology tools to build a resilient and robust organization as well as steps organizations can take to prepare, protect, respond, and recover from challenges and disruptions.
9:00 am - 10:00 am
Inflection points occur in the lives of individuals, organizations and within our digital transformation efforts. Recognizing our inflection point is what separates good organizations from great organizations and successful digital transformation efforts from failed ones. It is at the inflection point where choices are made that will determine if we achieve breakthrough results in our digital transformation or whether we remain in the territory of the average. The presentation will leverage case studies to help you recognize your inflection point, take action, and achieve breakthrough results.
10:00 am - 11:00 am
Security Operations Center transforms how financial services approach threat management, identification, and response. Organizations need to automate vulnerability discovery and ingestion to better mitigate risk. This can lead to security expert retention and reduces burnout and add their time and expertise towards higher-value tasks.
11:00 am - 12:00 pm
If you don’t begin with the end, you’ll likely end with a mess. Regardless of the methodology, deep thinking and discussion regarding the final results, features and how to adopt them will guide design, build, release and funding decisions.
12:00 pm - 1:00 pm
Too often is cybersecurity either "tool driven" or purely "capability driven." Taking a risk based approach provides a more precise and cost effective approach to building and executing cybersecurity programs. There is also confusion about what "cyber risk" is, how to measure it, how to govern it, and how to communicate it effectively to executives such as the Board. This webinar presents some perspectives on taking such as risk centric approach, defining a framework to measure it using key risk indicators (KRIs) and key performance indicators (KPIs). It also talks about the ingredients of what a communication to the Board could look like.
1:00 pm - 2:00 pm
What lessons have we learned in transitioning OC Tanner from being a manufacturing company to a software company? And, how can you apply those lessons to whatever transformation you are leading? In this webinar, Niel Nickolaisen describes what he terms the "formula for digital transformation" and how OC Tanner has used that formula to modernize its products, focus innovation, implement DevOps, improve the culture and influence the direction of the organization.
CIO VISIONS is invitation-only for IT executives. Exclusivity lets us cater to your specific challenges and keep you in the company of the leaders driving progress in your field.
We only work with the best in class. All solution providers are thoroughly vetted, and matched to you based on your specific challenges and current projects.
CIO VISIONS Virtual Summit is the digital counterpart to the invitation-only summit for IT executives. CIO VISIONS bridges you to the most efficient solutions and information for your crowning priorities.
We’ve answered a few FAQs to get you started. Still have questions? Please don’t hesitate to reach out!
CIO VISIONS Virtual Summit is unique in its ability to connect you to qualified solution providers. They’re more than willing to underwrite the cost of your attendance in exchange for access to such an exclusive audience.
Your virtual pass includes:
– All sessions and their recordings
– 6 or 8 one-on-one meetings with vetted solution providers, specifically matched to you
$300 or $500 in swag upon meeting completion
Based on the details of your registration, we carefully select at least 6 best-fit solution providers for you to meet with. Each meeting is 30 minutes long and focused on solving a specific priority you have a listed. Once completed, you’re eligible to receive a swag package. All meetings will take place on Zoom and all logistics are handled for you!
We are looking for executives with genuine needs for new solutions and buying influence or authority. Invitations are extended to C-level executives, SVPs, VPs, Directors and Managers within all functions of Information Technology.
Yes! But only for your one-on-one meetings. The summit sessions, however, will all be available to you on demand to watch at your leisure, anytime, any place.
There’s a lot of reasons to attend! For starters, CIO VISIONS Virtual Summit is the only online event customized to help you with your current challenges. You’ll learn from industry veterans and connect to the solutions you need. Your time is valuable and sticking to your budget is more important than ever. CIO VISIONS is designed to help you maximize your time and money for the best possible results.