Westin Chicago North Shore, IL
October 8-10th, 2017

This event is co-located with

Westin Chicago North Shore, IL
October 8-10th

2017 Speakers & Session Topics

The CIO Visions Fall Educational Program will include:


• 2 Keynote Addresses
• 12 Peer Led Plenary Presentations
• 10 Customer Led Case Studies
• 1 Meet the Analysts Round Table


PLUS
• Targeted one on one Research Meetings with Carefully Selected Leading Solution Providers


AND
• Unparalleled Peer Networking Opportunities with other high profile Executives over onsite Breakfasts, Lunches and Receptions.
 

Keynote Presentations

Fielding Your Vendor Dream Team - Moneyball for Software

SPEAKERS

Matthew Mandich
Director, Commercial Strategy, Info-Tech Research Group Inc.

Details

Fielding Your Vendor Dream Team - Moneyball for Software

Each year, organizations cumulatively spend nearly 1 trillion dollars on enterprise software & services, and that number is rapidly increasing. The challenge Info-Tech has found is that over 50% of software purchasing decisions are ineffective. Worse, organizations are extremely likely to renew their software regardless of whether they are satisfied with it.

In this session we will share analytical insights from over 5000 in-depth enterprise software reviews we’ve collected from IT and business leaders to help you understand how you can more effectively select and manage enterprise software, and save money while doing it. Learn what processes are most and least effective, and where the risks are.

 

Hint: it’s not where you think.

Breakout Presentations

A Team for All Times

SPEAKERS

Liz Reich
Vice President, IT Asset Management, Mastercard

Details

A Team for All Times

Team building is not a party…but it doesn’t have to be a circus! When we recognize we can leverage seemingly unpredictable human nature, we can collectively effect positive change. Learn how expecting the unexpected can create a collaborative and effective team.

 
Key Takeaways:
  • You cannot always know all the variable – sometimes "good enough" is all you get
  • It is always about the numbers – know your costs to defend your value
  • Managers hire you for what they need not for what you want to do – learn the difference to make a difference
  • Changing perception is hard: Say what you mean, mean what you say and don’t say it mean
Data: Will we ever have enough?

SPEAKERS

Gerald T. Hope
Vice President, Global Head of Technology, Milestone AV Technologies

Details

Data: Will we ever have enough?

It seems like today's businesses require more and more data to be competitive.  What should we be concerned with the proliferation of data?  How to do we manage it?  What value can we derive from it?

Key Takeaways: 
  • 90% of all the data in the world has been created in the past 2 years
  • The National Nuclear Security Administration records 10,000,000 hacks a day
  • IDC Digital Universe predicts that by 2020 emerging markets will have over 25 Zettabytes of space used with over 40 Zettabytes in the entire universe 
  • Hybrid Clouds and the next generation Data Lake
  • Data awareness and data aware players like Data Gravity and Qumulo run real-time data analytics at the storage dice level
The Power of Artificial Intelligence (AI)

SPEAKERS

Aaron Gette
CIO, The Bay Club Company

Details

The Power of Artificial Intelligence (AI)

There is a growing concern within IT leadership and business operators that not knowing how to engage with AI will put them in the rear-view mirror, but in many ways, it's still early. 

Key Takeaways:

  • IT one of the larges adopters of AI; in computer-to-computer transactions
  • AI making IT Security Professionals more valuable to employer 
  • IT is using AI to resolve tech support issues
  • Opportunities or applications of AI won't replace people but it produces great results.
The Scary Marriage of Disruptive Innovation and Dark Data

SPEAKERS

John C. Martin
Chief Information Officer, Georgia Department of Natural Resources

Details

The Scary Marriage of Disruptive Innovation and Dark Data

Come hear about the “Scary Marriage” of Mr. Christensen’s theories of “Disruptive Innovation” and the concept of “Dark Data” was executed at the Georgia Department of Natural Resources, and how that combination brought new revenue streams to the State of Georgia.

Key Takeaways:
  • What is Dark Data & Disruptive Innovation
  • A simple 4 step framework for implementing Disruptive Innovation in your organization
  • How can you leverage Dark Data to enhance revenue at your organization
  • What is a single strategy an organization can use to successfully combine the two
  • Case study of how it worked at Georgia DNR
 

 

What Could and Should Organizations be doing to decrease their average time to detect Mega-Breaches

SPEAKERS

Joseph Greene
CISO, American Chemical Society

Details

What Could and Should Organizations be doing to decrease their average time to detect Mega-Breaches

In an era of mega-breaches where the average compromise goes undetected for more than 200 days, what could and should organizations be doing to decrease their average time to detect.

During this session, Joe Greene will host a collaborative panel group discussion focused on shared lessons learned, challenges, best practices, and Q&A with the audience

Technical Staffing - Recruitment and Retention Challenges and Solutions

SPEAKERS

Karen M. Davis
Vice President Research Computing Division, RTI International

Details

Technical Staffing - Recruitment and Retention Challenges and Solutions

The Research Triangle Park area in NC is known as a hub of technology companies. As a result, competition is fierce for technology staff. This session will discuss the challenges inherent in technology staffing in a highly competitive environment, and some of the solutions we have employed.

Key Takeaways:
  • Challenges in recruiting and retaining high quality technology staff, including mobile developers
  • Solutions tried -- the successes and the failures
  • Opportunities to retain staff, rather than having to recruit constantly to replace those who have left the organization.
On the Right Side of a Merger

SPEAKERS

Mary Buckley
CIO, Penn Medicine Chester County Hospital

Details

On the Right Side of a Merger

In 2013 The Chester County Hospital reached out to a much larger University of Pennsylvania Health System. Healthcare economists were forecasting Accountable Care Networks that could only be satisfied by organizations with more than $5Billion in revenues. With only $300Million in revenues, our marketplace sustainability was at risk. The culture at CCH called for high quality, low cost delivery of patient care. We were willing to bring our culture to an organization as we traded off our autonomy.

 
Key Takeaways:
  • IT leads the way. New systems, new work-flows. Be prepared to take the leadership role across all organizational disciplines to introduce change.
  • Get out in front. Don't wait for the Merger to dictate change. Be ready to use your skills to your advantage.
  • Don't pass judgment. People come to work every day to do a good job. Let them express themselves.
  • You need your legacy staff to plow through the Merger activity. Show them you care.
  • Be part of the teams - yes, both teams - legacy team and new larger team.
How to Recover from an IT Crisis?

SPEAKERS

Esteban Velez
VP of IT & Cyber Security, Classic Hotels & Resorts

Details

How to Recover from an IT Crisis?

Steps on what to do during a technology crisis. Wrong and right ways and how others handle similar situations. Necessary to have audience involvement as there is no right way.

 
Key Takeaways:
  • Its going to happen?
  • What to do when it happens?
  • Multiple levels to what a crisis is, virus, system failure, power outage, INTERNET outage, data breach.
  • How to utilize your resources and recover?
  • How to translate IT speak to the masses in your business? This is key as communication and recovery steps are most likely overlapping as you and your teams try to recover from the IT Crisis.
Analytics, Machine Learning & Artificial Intelligence - The What & How?

SPEAKERS

Dr. Michael Valivullah
Chief Technology Officer, National Agricultural Statistics Service (NASS) United States Department of Agriculture (USDA)

Details

Analytics, Machine Learning & Artificial Intelligence - The What & How?

This presentation will explain big data analytics, internet of things (IoT), machine learning, neural networks, deep learning artificial intelligence (AI) and data science. It will also cover how these technologies are being leveraged to increase efficiencies in enterprise's daily operations, to identify new business opportunities and to enhance customer service.

Key Takeaways:
  • Distinction between and understanding of: Analytics, Machine Learning, Artificial Intelligence (AI), Neural Nets, etc.
  • Examples of how these technologies are being used to create new business models and enhance customer service
  • How to integrate data from various sensors (IoT) - Challenges and opportunities
  • How sensors are being used in Precision Agriculture to increase profit
  • How to initiate digital transformation in a legacy organization
When You're Climbing Into the Clouds, It Helps to Have a Sherpa!

SPEAKERS

Dave Dyson
CEO & Chief Communication Strategist, Eclipse

Details

When You're Climbing Into the Clouds, It Helps to Have a Sherpa!

You know that in IT, what got you here won't get you there. You also know that technology change is happening faster than ever. You're at the base of the mountain called digital transformation and cloud. You wouldn't climb Everest without a guide, don't scale this mountain without one either!

Key Takeaways:

  • In a multi-cloud world, the network is not a commodity. Getting it right is more important than ever.
  • Technology is moving fast. Where do UCaaS, SD-WAN, uCPE, NFW, and 5G fit into your roadmap?
  • Am I in trouble if I don't know what any of those acronyms mean?
  • Turn your IT team from the fire brigade into the Innovation Team driving business value.
  • You can transform your business with the staff and budget you have today, you just need the right plan.
A Mid-Sized Company's Two Year Journey to the Cloud

SPEAKERS

Bill Packer
Chief Information Officer, American Financial Resources, Inc

Details

A Mid-Sized Company's Two Year Journey to the Cloud

American Financial faced a choice between continued investment in on-premise and co-location facilities or to proceed into the cloud.  Once determining that the cloud was the right choice, it had to choose between the public cloud, a private cloud or a hybrid.  Once determining that the public cloud was the right solution, which public cloud?

Key Takeaways:
  • Start with the problem statement - what and why are you trying to achieve
  • Analyze your investment choices - both from an economic standpoint and a tax standpoint
  • Reinvent your staff earlier (and often)!
  • Be open to changing direction - this space is evolving fast
  • Be open to opportunities somewhat related to your primary business model
Building a Transformational IT team: create the future and make it sustainable

SPEAKERS

David Threm
EVP/ CIO, Ash Brokerage

Details

Building a Transformational IT team: create the future and make it sustainable

Talent acquisition, development and retention are critical to all IT projects, and especially to digital transformation. Building transformational and high performance teams requires a general framework, a vision towards the future and a means to sustain progress in the event of team, talent and market disruptions. In this session we'll discuss how you can acquire, create and retain highly perfroming IT teams despite adversity and change.

 
Key Takeaways:
  • Surround yourself with exceptional senior leadership, 3 to 5 key members
  • Tie into the local universities in a big way – advisory committees, adjuncts, etc.
  • Build your intern bench as large as your organization will allow
  • Create a social contract – everyone must develop their replacement
  • Develop future technical, managerial and executive leaders
  • For complete employee buy-in, make your framework organizationally agnostic
  • Pay employees at or slightly above area market
The Cyber Cold War is Getting Hotter

SPEAKERS

Dr. Kenneth Geers
Senior Research Scientist, Comodo

Details

The Cyber Cold War is Getting Hotter

Coming Soon...

A New Approach to Email Security

SPEAKERS

Adrien Gendre
Chief Solution Architect, Vade Secure

Details

A New Approach to Email Security

Antipam solutions powered by reputation and fingerprint technologies aren't built to defend against advanced threats such as ranomware, spear phishing and even mass phishing. Because malware is sent through phishing emails, it is very important for any organization to secure their email environment. Join us to discover hackers' techniques for breaking into your company using social engineering and learn how a behavioral approach based on content, combined with artificial intelligence, can filter email threats accurately.

Key Takeaways:
  • Email Security
  • Ransomware Protection
  • Artificial Intelligence Email Filter 
What's New in Video Communications and Life Beyond Interoperability?

SPEAKERS

Robb Woods
Director of Business Value and Solution Strategy, BlueJeans

Details

What's New in Video Communications and Life Beyond Interoperability?

Everyone wants interoperability, especially when it comes to things like cloud-based, video conferencing software platforms. In 2005, interoperability was non-existent, in 2010 it was a driving force opening possibilities, but in 2017, it’s essentially a given. The question is: where do we go from here? As organizations continue to search for simpler ways to work, new workflow automation and productivity tools are popping up everywhere, across every device. However, there’s still a ton of frustration with how poorly productivity solutions often work with one another. How a product integrates into different environments is a primary focus for both consumers and developers. Successfully bridging this gap is key to maximizing the effectiveness of your new technology and growing new users. By providing comprehensive video meeting APIs and SDKs for developers while making sure that video conferencing works within popular tools like Slack and Facebook Workplace, the world of video meetings have evolved beyond standard interoperability.

Technology Development at Scale, a LeSS Overview

SPEAKERS

Doug Spencer
Chief Information Officer, Goldline LLC

Details

Technology Development at Scale, a LeSS Overview

Traditional sequential-lifecycle application development doesn’t work well.  Since 2001, Agile development and Scrum in particular have revolutionized software development.  LeSS is a scaling framework that finds the sweet spot between defined concrete elements and empirical process control.  LeSS as a framework is more than a set of principles and experiments. It also provides a framework with rules. The LeSS Rules define what is LeSS (and what isn’t) and they provide a concrete framework for applying LeSS

 
Key Takeaways:
  • LeSS Principles

  • A Framework that Focuses on Customer Value and Rapid Innovation

  • Organizational Impact of Agile at Scale
Managing Change Before Technology -- A Case Study

SPEAKERS

Nick Roethel
CIO, Director of Technology Services, Metropolitan Transportation Commission

Details

Managing Change Before Technology -- A Case Study

The Metropolitan Transportation Commission has been embarking on a strategy to improve customer service, build trust and credibility all while migrating to an enterprise technology program including strategic centralization. The key component to these efforts is change, and as everyone knows: change is hard. This presentation will focus on MTC’s journey through change management, its customer service turn-around and the migration to a true enterprise technology program. The secret sauce in the effort is in the people. To jumpstart the “people aspect”, Technology management contracted with a firm specializing in strategy, process and the associated changes. Technology staff was trained to develop “Future Stories” to vision an end result. Furthermore, staff was trained to conduct a “Change Impact Analysis” for all major projects. This analysis allowed staff to understand the people and organizational impact technology has. Staff is continuously trained and exercises around these concepts to ensure continuity. The results of this effort have been staggering with customer service ratings dramatically increasing from 31% of significant satisfaction to over 80%. In addition, the role of IT has expanded to a true enterprise partner. The IT budget has increased and the agency’s business owners have embraced Technology as a friend, not foe.

Key Takeaways:

  • People and relationships come first
  • Change is hard but necessary
  • Focus on the basics to achieve credibility
Cybersecurity War Stories: Tales from the Trenches

SPEAKERS

Brian NeSmith
Co-Founder and CEO, Arctic Wolf Networks

Details

Cybersecurity War Stories: Tales from the Trenches

In today’s world, it’s imperative for organizations of all sizes to have an online presence to succeed in business. But there’s a risk to always being connected—organizations are prime targets for cyber attacks. Recent ransomware strains like Petya and WannaCry demonstrate how business can be brought to a grinding halt by encrypting your business critical data. Join CEO and Founder of Arctic Wolf Networks (AWN), Brian NeSmith, as he highlights some of the most interesting attacks that Arctic Wolf Networks has seenin 2017. You’ll also hear why a robust SOC-as-a-service with human augmented machine learning is critical to bolster your defenses against the most advanced of threats.

Zero Trust: A New, More Agile, Effective Approach to Security

SPEAKERS

Joe Kuster
Security Solutions Director, Catapult Systems

Details

Zero Trust: A New, More Agile, Effective Approach to Security

Perimeter-centric security models simply don't work in today's digital workplace. Users and data are no longer bound to the company firewall, which requires a new approach to IT Security. CIOs must instead adapt data and identity centric security to successfully protect their company.

Key Takeaways:

  • Current approaches to security can’t mitigate the consequences of a breach.
  • A zero trust approach to security doesn’t distinguish between internal and external networks.
  • You're able to leverage existing investments in technology and skills through the Zero Trust Security method.
  • The zero trust model allows companies to transform digitally.
Crafting a Mobile Strategy

SPEAKERS

George Petasis
CIO, Georgetown University Law Center

Details

Crafting a Mobile Strategy

Mobile devices are becoming a focal point for many business sectors and business models. These devices represent a unique opportunity to engage consumers, employees, or many other end users. According to industry organization CTIA, wireless subscriptions in the U.S. now outnumber the total population. How should IT departments approach mobile devices? A number of key decisions and strategic decisions are involved in creating a “mobile strategy” and will be reviewed during this presentation.

Key Takeaways:

  • What goes into creating a mobile app?
  • What’s the difference between “native apps” and “mobile optimized”? 
  • What are the business reasons for embracing a mobile app and what’s the role of Digital Marketing in that decision?