We’ve answered a few FAQs to get you started. Still have questions? Please don’t hesitate to reach out!
The Best Solution Providers
Meet one-on-one with the partners best suited to tackle your unprecedented challenges.
Over 30 Speakers
Learn from the leaders driving manufacturing innovation in an ever-changing climate.
Since it isn’t quite safe to treat you to a high class hotel, enjoy some high class swag.
Using the same data-driven matching logic as our in-person events, we take the legwork out of finding new partners. Meet directly with companies vetted specifically for you to confidently tackle your challenges, within your budget and time frame. There is a minimum of 6 meetings, and no maximum.
The challenge of digital is no exotic location, no 5-star dining, and no face time. But we do have a quite brilliant system to reward you with SWAG. Take all 6 solution provider meetings and we’ll thank you generously. Climbing the ranks is hard; you’re well-deserving of an exceptional experience, no matter the limitations.
Watch it when it’s released, or later on demand. Your experience is up to you.
Please Join the Deputy Chief Information Officer of Zoom Video Communications, Gary Sorrentino in this Executive Interview where he will share insight on how organizations should be preparing to implement a hybrid work model.
Please Join the Field CISOs & Deputy CISO of Fortinet, Jim Richberg, Renee Tarun & Jonathan Nguyen-Duy in this Executive Interview where they will discuss why CISOs should include AI/ML into their arsenals and what you should look for in AI tools.
Please Join the Senior Product Manager Secure Mobility of Telos Corporation, Tom Badders in this Executive Interview where he will discuss the latest trends in network security such as, Zero Trust and SASE.
The goal of zero-touch automation across network assets can seem nearly impossible. Many enterprises gain measurable efficiencies by centralizing visibility of security policies across multiple vendors and assets. A unified security policy that defines access and connection rules can ensure that compliance is maintained, and audit preparedness time is significantly decreased. When automation is introduced and optimized, organizations see improved SLAs, reduced resource requirements, and significantly faster change implementation times. Gain the insights that can put you on the path to zero-touch automation and continuous compliance.
Damian Repolle’, AT&T Chief IT Architect & Executive Director Transformation, will discuss the top IT strategic pillars to allow companies to achieve their business and digital transformation goals. Damian will discuss the transition underway from physical to software defined IT. What are the top IT strategic transformation pillars to focus on, what does the Digital Enterprise of the Future look like, and what capabilities must it have to allow Enterprises to succeed over the next few years.
Despite significant investments in security each year, cybercriminals are constantly developing new attack vectors to thwart existing security controls. The growth of connected devices, IoT, and an increasingly remote workforce has widened the enterprise attack surface, enabling cybercriminals to find new ways to breach enterprise perimeter defenses.
A new paradigm shift needs to occur in security to deal with the eventual breach and lateral movement of cyber-attacks. Implementing an enterprise zero-trust security model can help to block the lateral movement of cyber attackers and isolate attacks to where they originate. Enterprises need to migrate to a Zero-Trust architecture, Ritesh Agrawal, CEO and Co-founder of Airgap Networks, will lead a detailed discussion on how to:
Please Join the VP, Global Head of Cyber GRC/ BISO, Patrick Benoit in this Executive Interview where he will discuss the role of the Business Information Security Officer (BISO).
Please Join the Director or Systems Engineering of Silver Peak, Kevin Russell in this Executive Interview where he will discuss the SASE framework and if it is right for your organization. He will also explain what you are missing out on by not transforming your WAN and security infrastructure.
Organizations struggle to balance the need for security and meeting the productivity requirements for enabling remote workers. Cybersecurity threats have increasingly grown in complexity and have evolved to exploit the rapid proliferation of bring-your-own-device and work-from-home scenarios. The legacy perimeter-centric security models rapidly breakdown as more and more organizational data is stored in the cloud, non-organizationally owned devices, at remote locations and with external entities. The Zero Trust security model is uniquely positioned to address these growing complications. Introducing an earned trust model can be far less complex than might be assumed and can help keep sensitive organizational data safe, regardless of where it travels.
The challenge for every business today is to innovate faster, and doing it once isn’t sufficient, it must be repeated over and over to keep pace. New technologies always sounds great, but are they mature enough, where are the gotchas, do you have the skills? How adopting a cloud-native strategy will accelerate innovation, drive efficiency, and create new business value. This discussion will give you the insight as to why Cloud Native is taking over the IT and application world. What are the most common challenges? And how can you give yourself the best chance for success.
The role of the CIO has been on a steady rise for the past several years. As the way people work continues to change, the demands from today’s global, mobile, and distributed workforce are also rapidly evolving. We’re at a point in time where the CIO is now front and center to defining the digital culture of an organization with a mega-trend at play that I like to call, ‘Systems of Experience.’ During my talk, I will focus on the role of the CIO amidst this shifting tide and what it takes to create a digital culture to support the future of work.
Please Join the Vice President, Corporate and Information Security, CSO CISM of RICOH USA, Inc., David Levine in this Executive Interview where he will discuss how a third party risk management program is a critical component of an effective cybersecurity plan.
Please Join the CIO & CSO of Hagerty, Kelly Smith in this Executive Interview where he will discuss the role company culture plays in digital transformation. He will also explain the positive impact digital transformation had on customer engagement, employee innovation, productivity and more.
Please Join the CIO & VP, Information Security and Compliance of OC Tanner, Niel Nickolaisen & Amy Knapp in this Executive Interview where they will discuss the steps, they took to become more proactive in the midst of dramatic changes in the market, client requirements, regulatory change and its own manufacturer-to-technology company transformation. OC Tanner had to overhaul an upgrade it approach to information security, privacy, and risk.
Please Join the SVP & CTO of Extra Space Storage, Bron McCall in this Executive Interview where he will discuss the digital transformation journey within his organization. He will also advise how to get started and some lessons learned along the way.
Please Join the SVP, Global CISO of Aflac, Tim Callahan in this Executive Interview where he will discuss the short term and long term wins with implementing a Public Private Partnership.
Please Join the MD, Head of Technology Risk & Compliance of TIAA, Vaughn Alliton in this Executive Interview where he will discuss Data Management and the risks that organizations face.
Please Join the Director, IT Security Education & Consulting of Harvard University, Sandy Silk in this Executive Interview where she will discuss how to recruit strong IT candidates and give great insight on setting employees up to success.
Artificial intelligence presents great opportunities for companies and government organizations to increase value and mission effectiveness. With these opportunities comes ethical risk. Bias is probably the ethical risk top of mind for most executives, but there are others. Such risks may demotivate leaders and organizations from using artificial intelligence. I recommend organizations embrace AI with ethics in mind since doing so will perpetuate organizational core values, mitigate risk, and likely lead to better business and mission outcomes.
Please Join the Chief Security Officer of Southern Methodist University, George Finney in this Executive Interview where he will discuss the 9 different cybersecurity habits and the process to help you and your employees break them.
CISO VISIONS is invitation-only for security executives. Exclusivity lets us cater to your specific challenges and keep you in the company of the leaders driving progress in your field.
We only work with the best in class. All solution providers are thoroughly vetted, and matched to you based on your specific challenges and current projects.
CISO VISIONS Virtual Summit is the digital counterpart to the invitation-only summit for security executives. CISO VISIONS bridges you to the most efficient solutions and information for your crowning priorities.
CISO VISIONS Virtual Summit is unique in its ability to connect you to qualified solution providers. They’re more than willing to underwrite the cost of your attendance in exchange for access to such an exclusive audience.
Your virtual pass includes:
– All sessions and their recordings
– 6 or 8 one-on-one meetings with vetted solution providers, specifically matched to you
$300 or $500 in swag upon meeting completion
Based on the details of your registration, we carefully select at least 6 best-fit solution providers for you to meet with. Each meeting is 30 minutes long and focused on solving a specific priority you have a listed. Once completed, you’re eligible to receive a swag package. All meetings will take place on Zoom and all logistics are handled for you!
We are looking for executives with genuine needs for new solutions and buying influence or authority. Invitations are extended to C-level executives, SVPs, VPs, Directors and Managers within all functions of Security and Information Technology
Yes! But only for your one-on-one meetings. The summit sessions, however, will all be available to you on demand to watch at your leisure, anytime, any place.
There’s a lot of reasons to attend! For starters, CISO VISIONS Virtual Summit is the only online event customized to help you with your current challenges. You’ll learn from industry veterans and connect to the solutions you need. Your time is valuable and sticking to your budget is more important than ever. CISO VISIONS is designed to help you maximize your time and money for the best possible results.