The Red Rock Resort, Las Vegas NV
April 23-25th 2017

This event is co-located with

The Red Rock Resort, Las Vegas NV
April 23-25th, 2017

Educational Program

At the Spring 2017 CIO Visions Leadership Summit, you can customize your schedule by choosing topics from the 6 difference Key Themes to fit your specific needs and challenges.  Take control of your learning experience and design your own agenda!

Program 6 Key Themes:

 

I. CIO Leadership & Innovation

  • New talent Sourcing Methods
  • Balancing Innovation & Compliance
  • Strategies on IT Governance - Budgeting and Prioritization
  • Vendor Relations & Contract Negotiations
  • Optimizing IT Operations and Resources
  • Training the modern IT workforce

II. Cloud Strategy

  • Balancing public, private, and hybrid clouds
  • Why cloud architecture matters
  • Open Source Cloud platform
  • Cloud Simplification
  • Log Correlation and Auditing in Cloud
  • Cloud use/governance, Rules of Behavior, Managing Costs

III. Data Solutions: Strategy for Storage and Analytics

  • Utilizing available business data from across the enterprise/ mid-market
  • How to maintain 10 years’ worth of data – Storage how to manage it.
  • Big Data the 2nd Generation- improving analytics and security
  • Data Governance- How it works, why you need it, what is it, and who is responsible for it.
  • Strategic Data Centric Approaches to Business Intelligence
  • Best way to get value out of your data

IV. Security Risk Compliance

  • Disaster Recovery (DR) / business continuity planning (BCP) / incident management strategies
  • Identity & Access Management (IAM) strategies and best practices
  • Human side of managing security
  • Security vs. Ease of Access
  • Integration of Security into strategic planning process and Operations.
  • Cloud Security/FedRAMP

V. Internet of Things & ‘Mobile First’

  • How IoT impacts IT operations
  • Designing and Implementing IoT Deployments
  • Mobile integration with back-end
  • Strategies on Managing Mobile Device Sprawl
  • How to create/configure/manage Mobile Workspaces as part of a cloud or virtualization (vdi) initiative
  • What blockchain means for the Internet of Things

VI. Modernizing Infrastructure

  • Integration / APIs between systems
  • Achieving an Agile Infrastructure
  • Enabling the digital business through a software-defined infrastructure
  • The impact of algorithmic IT operations (AIOps) on monitoring approaches
  • Hardware Asset Management: Best practices
  • Negotiation of contracts for hardware, software and services.
  • BYOD-wireless protection, common user experience, adequate bandwidth

 

Keynote Presentations

Journey of IBM Cloud

SPEAKERS

Dr. Ben Amaba, PE, CPIM®, LEED®AP BD+C
Worldwide Executive, IBM

Details

Journey of IBM Cloud

Join Dr. Ben Amaba, Worldwide Executive, as he takes you through the journey of IBM Cloud through the lens of the theory of relativity and the universe. This unique presentation, will help you better understand the value of IBM Cloud to your business and how embracing cloud today can help you realize your organizations potential tomorrow. With IBM Cloud, the "art of the possible" becomes reality. So, take a journey with us, as we explore why the cosmos is complex but your IBM Cloud doesn't have to be.

The Moneyball CIO: Decision-Making for the Modern IT Department

SPEAKERS

Matthew Mandich
Director, Innovation & Strategy, Info-Tech Research Group

Details

The Moneyball CIO: Decision-Making for the Modern IT Department

IT can often feel like an unwinnable game with limited resources, changing priorities, and increased demands.  Leaders are having to make decisions without knowing the true effect on the business.  Info-Tech's framework removes the guesswork from what makes the business happy and predicts the impact of key decisions before they happen.

 
Key Takeaways:
  • Only 28% of Business Leaders are satisfied with the performance of IT
  • 67% of CIOs are not aligned with executives on the role of IT
  • IT satisfaction has stayed flat, while dependency on IT has increased
  • Organizations that focus on Business Satisfaction dramatically outperform their peers 

 

Breakout Presentations

Harnessing Internet of Things to accelerate digital transformation at Pitney Bowes

SPEAKERS

Olga Lagunova
Chief Data and Analytics Officer, Pitney Bowes

Details

Harnessing Internet of Things to accelerate digital transformation at Pitney Bowes

Learn how 96-year old company has transformed its traditional mailing business by harnessing IoT.  We’ll examine the architecture used to build connected devices that adapt to emerging technology pressures with upgrade-able functionality, new interaction models and location-aware business analytics. But it is not all about technologies: IoT is a catalyst to organizational transformation.

 
Key Takeaways:
  • Start the IoT journey early and architect for continuous learning, experimentation and change.
  • Design your products around User Experience
  • Look for brownfield and greenfield IoT opportunities
  • Utilize Cloud  to accelerate implementation and build flexible and scalable IoT architecture
  • Build organization competencies in data analytics. Iot generated data will deliver value to the customers, enable business to make better decisions and improve operational efficiencies.
 
Overcoming the Challenges of Bringing IT Security to a Global Company

SPEAKERS

Mark Ramsey
CISO, ASSA ABLOY–Americas

Details

Overcoming the Challenges of Bringing IT Security to a Global Company

In navigating the challenges of implementing security at a global company, CISO Mark Ramsey worked hand-in-hand with his CIO in executing programs that forge a strong bridge between IT, HR, IT security and business. Mark Ramsey will share examples of ASSA ABLOY’s programs, whose global scope requires them to consider the intricacies of information and products-based security, but also the human element of such far-reaching security initiatives. In this compelling presentation, Mark will provide insight into the strategic thinking of the CIO/CISO and both the technical and non-technical challenges they overcame to launch successful global programs.

Key Takeaways:

  • Learn the common security concerns shared by most Global Manufacturing Companies.
  • Learn the Challenges in rolling out Key Security Initiatives to a decentralized Global Manufacturing Company.
  • Learn how the CIO and CISO have to work together to get buy-in for any Global Security Initiatives.
  • Learn the challenges in managing risks to a global company where acquisitions are an important growth mechanism.
Dealing with Technical Debt

SPEAKERS

Thomas Valva
Chief Technology Architect, ADP Global Internal Systems & Technology

Details

Dealing with Technical Debt

Technical debt has been defined as the backlog of unaddressed requirements in software projects. The fact is that software backlogs are only one component of what we call technical debt. The other components are platform (hardware, network, OS, and application servers), and human elements, such programming skills that become harder to find as platforms age. Firms carrying excessive technical debt find their capacity for innovation is hampered by supporting old software in old environments. This ties up funds and resources that could otherwise be spent on competitive technical innovations.

 
Key Takeaways:
  • Firms need a strategy to deal with their technical debt
  • Components of a technical debt strategy can leverage cloud and certain key architectural design principles
  • Organizational imperitives can also help by incentivizing application portfolio reduction
  • A heuristic for measuring technical debt
Visualization of Business Intelligence

SPEAKERS

Mark Crandall
Chief Information Officer, Consulate Health Care

Details

Visualization of Business Intelligence

In healthcare, we are able to collect significantly more data today on our patients and residents than just five years ago.  What is the use of collecting the data if we can’t turn it into actionable information for our business partners and Executive Teams?  As Chief Information Officer, it is my duty to work closely with the C-Suite to understand and visualize key business drivers for excellence in Quality, People, Growth, and Financial results.  Mark Crandall will walk the audience through the journey of facilitating the right conversations with the right stakeholders to turn the business of data into true Decision Support.

Key Takeaways:

  • How to set your team up for success and facilitate the “right” conversation with the business
  • Apply agile methods within your team to continually “close the feedback loop”
  • Choose the right tools to represent data as actionable information
5 Secrets of

SPEAKERS

Jimmy Thai, DTM
Vice President for Technology, Scientific Applications International Corporation

Details

5 Secrets of "Cloud vs. In-house Storage" Trade Study

As IT boss, you lose sleep over data security breach and consequences that your company may face, and your job. Add the burdens of cost, resources, training, speed, backup, accessibility... you wonder to keep your data on a cloud or in-house. This trade study reveals 5 secrets that will keep you sleep like a baby.  

 
Key Takeaways:
  • Know the short-term vs. long term cost 
  • Whether speed is important or not
  • Burden on your network bandwith
  • Human vs. machine cost multiples
  • "What-If" data breach 

 

Delivering Actionable Data Supporting Clinical Trial Excellence

SPEAKERS

Jim Mulholland
Vice President, Analytics and Collaboration, INC Research

Details

Delivering Actionable Data Supporting Clinical Trial Excellence

In 2015, teams at INC Research started a project whose goal was to identify the key business questions that needed consistent assessment to ensure clinical trial success.  In essence, the aim was to codify “how is the study performing?” by identifying data points captured throughout trial conduct that provided the most accurate insight into that question.  These structured and semi-structured data points, captured as business events, are prepared in a canonical approach so as to ensure consistent results across different source systems and variation in study design.  The events are then processed in near real-time through a big data platform to eventually live within our corporate data lake, and eventually become metrics and KPIs that are rendered within SAS Visual Analytics.   This presentation will demonstrate the process INC Research took to go from "barren to bounty" in less than one year.

 
Key Takeaways:
  • Big Data analytics for improved business decisions
  • Making the transition from traditional EDW to the data lake
  • Lessons learned while moving the organization to the big data paradigm
 
 
Quantifying IT Risk

SPEAKERS

Willis Marti
CISO, Texas A&M University

Details

Quantifying IT Risk

Methodologies for determining IT Risk are often presented as qualitative -- high, medium, low -- or expressed in dollars. Needed are repeatable quantitative measures. Here we explore objective metrics that are relevant to the business

 
Key Takeaways: 
  • Impact of resource types 
  • Impact of quantity
  • Comparing alternatives and historic trends
  • High value, low likelihood events.

 

A Field Guide to Technology Transformation

SPEAKERS

Nanji Chandrasekhar
Vice President Information Technology Productions Services, Catalina Marketing Corporation

Details

A Field Guide to Technology Transformation

Once upon a time, in a land far far away, technology was a simple support function and businesses usually had a semblance of tolerance for when failures happened and paper based processes to keep moving the occasional failure persisted. 

 
Most of us don't live in that world anymore. 
 
We live in a world of constant cost pressures where there is a need to get more and more done with less and less. We are asked to simultaneously increase productivity of our tech staff and assets while reducing downtime and costs.  Then, just as we start gaining a toehold, there is the threat of the next big disruptor that renders our well laid plans moot. 
 
In a scenario such as this, unless technology departments accomplish these dual (and often competing goals of being operationally excellent and yet, capable of enormous flexibility, we run the risk of slowing down or business at best, and becoming irrelevant at worst. 
 
There is hope though.  Through the right kind of transformation actions it is possible to achieve this interesting dichotomy between flexibility and operational excellence.  The trick lies in proper understanding of business mandates and what drives them, an accurate diagnosis of the problems and gaps between existing and desired capabilities and crafting a workable plan to address them while remaining cognizant of the organizational change management that this entails. 
 
This presentation will be an interactive discussion of some of these hard won lessons and the repeatable methods that I've developed over the years to accomplish this.  
Dealing with the Noise of Cloud Computing

SPEAKERS

Grant Shih
VP, Technology Services, Carter’s | OshKosh B’gos

Details

Dealing with the Noise of Cloud Computing

Cloud computing is an important concept but organizations have to deal with so much hype and noise around this topic it can become a burden for IT organizations to effectively service their customers. What are the realistic factors to consider when pulling together and executing on a cloud strategy? This session will focus on cutting to the core questions with regards to making the cloud a realistic pattern to adopt for the enterprise.

 
Key Takeaways:
  • Cloud Computing has many benefits for organizations but true costs/limitations need to be understood
  • Identify your IT organization's "menu of services" and get those right
  • Adopt your strategy for flexibility and capability
  • Legacy applications will often be an organizations' limiting factor to cloud adoption
MOD Pizza’s Cloud First Strategy

SPEAKERS

Carole McCluskey
Chief Information & Technology Officer, MOD Pizza

Details

MOD Pizza’s Cloud First Strategy

MOD Pizza, with more than 200 stores and 4000 employees, has 100% cloud infrastructure. Learn how MOD continues to depend on a cloud first/cloud only strategy for supporting and scaling MOD’s aggressive business growth.

Leading in a Time of Crisis

SPEAKERS

Bill Balint
Chief Information Officer, Indiana University of Pennsylvania

Details

Leading in a Time of Crisis

Higher education IT publications are greatly increasing their focus in the areas of leadership, management and strategy. IT is changing more dramatically and more quickly than at any point in the history of higher education. IT leaders must either be able to drive the change or be forced to react to the change simply thrust upon them. How can higher education IT create and sustain great leaders in a time of crisis and opportunity and how could these tactics work for IT organizations in other industries?

 

Key Takeaways:
  • Traditional Higher Education IT is in crisis and is in jeopardy of being shattered by various market forces
  • But we must get our own house in order to prepare
  • IT leaders can actually capitalize on this fact by embracing the role of IT facilitator instead of provider
  • Putting people first is too often overlooked as a key step
  • Good IT leadership is critically important as a result

 

Journey towards Successful Agile Scrum

SPEAKERS

Nader Nemati
Chief Information Officer, QTC Management - A Leidos Company

Details

Journey towards Successful Agile Scrum

The challenges and opportunities in providing innovation and aligning information technology solutions aligned to a company's business objectives have never been more critical than in the current ever-changing global market.  The IT teams are tasked to deliver business value to position the company to continuously enhance quality, timeliness to market and deliver world-class customer-service.  This requires an ongoing process improvement journey utilizing practical Agile Scrum methodologies to deliver ongoing value while maintaining a repeatable process to measure and deploy technology enablers for the company.

 
Key Takeaways:
  • Overview of the journey
  • Selling and validating the value with senior management
  • Creating a new culture of the Scrum teams
  • Analysis of new roles and responsibilities including IT management team
  • Metrics and Continuous Improvement Model
 
CYBERSECURITY INCIDENT MANAGEMENT LIKE A FIRE CHIEF

SPEAKERS

Jeffrey Potter
SVP, Chief Technology Officer, Davenport & Company LLC

Details

CYBERSECURITY INCIDENT MANAGEMENT LIKE A FIRE CHIEF

Firefighters and other emergency service workers use the Incident Command System (a foundation of NIMS) to manage their incidents. Get familiar with the proven framework as an industry veteran in both IT and the fire service walks you through the framework.

Key Takeaways:

  • Be introduced to the Incident Command system
  • Understand the concept of “span of control” of resources
  • Be able to manage a simple incident
  • See a large incident buildout in action, demonstrated by the speaker
The Peter Parker CIO

SPEAKERS

Arya Choudhury
Chief Information Officer, SGF (Shady Grove Fertility)

Details

The Peter Parker CIO

Digital transformations and technology driven growth opportunities are increasingly providing more visibilities to CIOs. They are also getting greater direct access to CEOs and to executive boards. What should the CIO do to become an effective advisor to the board and a true business partner to the C-suite?

 

Key Takeaways:

  • Understand why CIOs are getting the opportunity
  • Recognize the common failure points
  • Identify some approaches to success

 

THE EVOLVING ROLE OF A CIO AND WHAT YOU NEED TO BE READY FOR IT

SPEAKERS

Bhargav Shah
CIO and Head of Ecommerce, IntegraCore

Details

THE EVOLVING ROLE OF A CIO AND WHAT YOU NEED TO BE READY FOR IT

In the past, CIO's primary responsibility was keeping systems up and running. Tech companies had CTO to drive the technology product roadmap and innovation. CIO's are asked to do more of these at non-Tech companies. Now every company wants to call itself a tech company (regardless of the industry) and role of CIO is becoming more of technology leaders that drives product roadmap and technology innovation for the company. In 2016 and beyond, CIOs will have increasing responsibilities to be more business leaders, have a seat at the strategy table, and many cases even a seat on the board. Are you ready for this transition?

Key Takeaways:
  • Change in companies and technology landscape 
  • Change in CIO role
  • Key changes in skill sets required
  • What you, the CIO, can do to be prepared for it?

 

CREATING A DATA ANALYTICS SERVICE CENTER

SPEAKERS

Jon McKeeby
Chief Information Officer, NIH Clinical Center

Details

CREATING A DATA ANALYTICS SERVICE CENTER

We are a federal clinical research organization. Everyone in the organization wants data to measure their departments but have a difficult time providing requirements. The word Data Analytics are pushed them all to ask for dashboards. We are working towards creating a data analytics service center. This presentation will review the initial steps

Key Takeaways:

  • Importance of Data Analytics
  • Importance of Data and Information Management Governance
  • Stakeholders of Data Analytics/Types of Data Analytics Measures/Types of Presentations
  • Steps in Creating a Data Analytics Service Center
The Cloud- Make it More Than Just a

SPEAKERS

Jeff Fudge
CTO, Digital Media Solutions

Details

The Cloud- Make it More Than Just a "Lift and Shift"

The cloud can be much more than just remote servers.  And yes, architecting it deserves more than 5 minutes of thought.  You may start small, but you should earn how to leverage the cloud more fully, including services such monitoring, scalability, deployment, and fault tolerance. 

 
Key Takeaways:
  • Analyzing cloud providers
  • Provisioning is easy, but architecture still takes time
  • Automating operations
  • Approaches to cloud security
  • Future cloud- where is this headed?
 
Transforming and modernizing Silicon Valley’s Fire Department to manage Super Bowl 50

SPEAKERS

Eric Prosser
Informational Technology Officer, Santa Clara County Fire Department

Details

Transforming and modernizing Silicon Valley’s Fire Department to manage Super Bowl 50

When Santa Clara County Fire Department (FD of the Silicon Valley) was awarded the duty to oversee first-responder efforts for Super Bowl 50, Eric Prosser, the informational technology officer, brought in highly customized software that transformed how first responders took control to flawless execution. In this presentation, Eric will share how his team created an award-winning enterprise GEOspatial INTelligence (GEOINT) system to successfully manage all fire and medical service operations throughout Super Bowl 50

  • Key Challenges:
    • Multiple data sources
    • Multiple agencies
    • Uncommon platforms
  • Our Strategy:
    • Communication and getting the right people in the room
    • Building the platform
    • What’s next - new unified communications as a service

 

The iMap Team was able to integrate 911/Computer-Aided Dispatch information, map special events throughout the region, monitor resource availability, view GIS layers including near real-time imagery, and analyze data trends. This system provided the Santa Clara County Multi-Agency Coordination Center with a true GEOINT decision and situational awareness platform, allowing decision makers to keep informed on current activity and make decisions faster than ever before.

MPLS is Dying: A Business Case for Pulling the Plug

SPEAKERS

David Nuti
Vice President of Business Development, Aryaka

Details

MPLS is Dying: A Business Case for Pulling the Plug

Legacy networks, such as MPLS, do not work for application delivery in today’s global environment. The biggest challenge facing global enterprises today is the ability to deliver fast and reliable performance of mission-critical applications to worldwide users. 

 

Join Dave Nuti, Vice President of Business Development at Aryaka, for an informative presentation on the best practices for delivering fast and reliable application performance by replacing MPLS.

Global Traffic Analysis

SPEAKERS

Dr. Kenneth Geers
Senior Research Scientist, Comodo

Details

Global Traffic Analysis

Despite myriad information security practices including encryption, traffic analysis can be used to circumvent innumerable security schemes, simply by leveraging metadata and hard-to-conceal network flow data related to the source, destination, size, frequency, and direction of communications, from which eavesdroppers can often deduce a comprehensive intelligence analysis.

 

Key Takeaways: 

  • What is Traffic Analysis?
  • History and practice
  • Strategies and tactics
  • Case study: digital dataset
  • Counter-traffic analysis
How to Prepare for the Journey to Your Data-Inspired Future

SPEAKERS

Bob Renner
CEO, Liaison Technologies

Details

How to Prepare for the Journey to Your Data-Inspired Future

In today's connected world, data is bombarding your enterprise from every direction: social media feeds, wearables, machine sensors, mobile devices, and cloud applications—not to mention the myriad of traditional applications still used in typical organizations. All these disparate sources churn out an estimated staggering 2.5 quintillion bytes of data a day.
 
As the availability of data exponentially increases, unprecedented opportunities exist to revolutionize your business—and the world. But so do unprecedented integration and data management challenges.
 
This presentation will ask and answer questions to prepare your organization for its exciting—yet complex—journey to a data-inspired future.
 
Key Takeaways:
  • How are other enterprises leveraging data to disrupt their market spaces?
  • What is changing in today's data landscape that represents not only significant challenges, but also tremendous opportunities?
  • Why is it important to move to a data-centric IT approach (vs. today's prevalent application-centric approach)?
  • What would it mean to be able to free siloed data for new business insights?
  • What could Data Platform as a Service (dPaaS) do for your company?
Achieving Cybersecurity at IoT and Cloud Scale

SPEAKERS

Jason Graun
Manager, Systems Engineering – Rockies Commercial, Fortinet

Details

Achieving Cybersecurity at IoT and Cloud Scale

With the growth of IoT and Cloud, the attack surface that enterprises must protect is expanding dramatically. Unique regulatory requirements by industry vertical are also placing extra pressure on Security Officers and their teams. How can CIOs/CISOs effectively respond? First and foremost, taking an architectural approach, one that includes network segmentation, will create the best chance of solving Enterprise security holistically and for the long term. Key capabilities must include visibility of all security elements and the communications these systems and devices generate and, even more importantly, automation of operations and response. With the current cybersecurity skills gap that many enterprises experience today, the ability to quickly and effectively audit, recommend and automatically fix the entire network security architecture is critical.

 
Key Takeaways:
  • Technology evolution and innovation is exponentially expanding the attack surface.
  • To keep up, businesses must take an architectural approach to network security that includes visibility and automation.
  • With limited resources, the ability to quickly and effectively audit, recommend and repair network security is crucial.
What is Application Modernization and How it Helps Organizations

SPEAKERS

Karl Haggart
Application Architect, Mission Produce

Details

What is Application Modernization and How it Helps Organizations

Key Takeaways:
  • Common challenges organizations face when modernizing applications
  • Into to Karl, how OSSCube and Mission Produce decided to do business (Why did Mission Produce undertake this project? What did they need to accomplish?)
  • Mission Produce's challenges, overall solution, results
  • Mission Produce's plans for future growth
Eliminate Malware Vulnerability: LIVE Ransomware Hack featuring Threat Detection & Response

SPEAKERS

Johan Bloomhart
Virtual CTO / Sales Engineer, Northwest, WatchGuard Technologies, Inc.

Details

Eliminate Malware Vulnerability: LIVE Ransomware Hack featuring Threat Detection & Response

A reported 30 percent of malware is considered new or zero-day. What is the best defense to eliminate vulnerability? Attend this session to witness a live ransomware attack and see the compelling difference layered security adds to your defense strategy.
Key Takeaways:
  • Best practices for optimal defense -trending vulnerabilities and hacker exploits
  • Correlation and end-point protection
  • Sandbox analysis and actionable visibility
 
 
3 Critical Reasons to get Software Selection Advice

SPEAKERS

Michael Thaw
Senior Director, Selection Services, Technology Evaluation Centers

Details

3 Critical Reasons to get Software Selection Advice

 

Significant Risk, Time and Money are at stake especially with your mission critical systems. TEC is a trusted advisor and advocate with your best interests as the top priority. We'll share our insight and resources to show you an easy to follow structured roadmap to successful best fit selection. Guided Self Service (DIY) or Full Service Approach.

Key Takeaways: 
  • Use TEC's structured easy to follow proven approach to Software Selection
  • Get hands on expert advise to lead, coach and support your evaluation
  • Use TEC databases of product and vendor capabilities to compare vendors
  • Find out how to score everything (all decision factors) in your evaluation
  • Build consensus and an audit trail, leveraging the information for your selection and negotiation
Pimcore – a Unified digital transformation platform

SPEAKERS

Rakesh Kumar
VP, Technology, OSSCube

Details

Pimcore – a Unified digital transformation platform

Pimcore is disrupting how business organizations manage their data and address the multi-channel publishing challenges. The session will focus on unique value proposition of Pimcore and what separates it from the competition. Will also talk about some real world case studies where Pimcore helped organizations address their unique data management challenges.

 

Key Takeaways:

  • A consolidated platform for MDM/PIM, CMS, DAM and eCommerce
  • Only open source PIM/MDM platform recommended by Gartner
  • How it can help address the multi-source data management, consolidation and distribution challenges
  • Brief demo of master data management use case