CIO Chicago Summit | March 9, 2017 | The Westin Michigan Avenue - Chicago, IL, USA

↓ Agenda Key

Keynote Presentation

Visionary speaker presents to entire audience on key issues, challenges and business opportunities

Keynote Presentations give attending delegates the opportunity to hear from leading voices in the industry. These presentations feature relevant topics and issues aligned with the speaker's experience and expertise, selected by the speaker in concert with the summit's Content Committee." title="Keynote Presentations give attending delegates the opportunity to hear from leading voices in the industry. These presentations feature relevant topics and issues aligned with the speaker's experience and expertise, selected by the speaker in concert with the summit's Content Committee.

Executive Visions

Panel moderated by Master of Ceremonies and headed by four executives discussing critical business topics

Executive Visions sessions are panel discussions that enable in-depth exchanges on critical business topics. Led by a moderator, these sessions encourage attending executives to address industry challenges and gain insight through interaction with expert panel members." title="Executive Visions sessions are panel discussions that enable in-depth exchanges on critical business topics. Led by a moderator, these sessions encourage attending executives to address industry challenges and gain insight through interaction with expert panel members.

Thought Leadership

Solution provider-led session giving high-level overview of opportunities

Led by an executive from the vendor community, Thought Leadership sessions provide comprehensive overviews of current business concerns, offering strategies and solutions for success. This is a unique opportunity to access the perspective of a leading member of the vendor community." title="Led by an executive from the vendor community, Thought Leadership sessions provide comprehensive overviews of current business concerns, offering strategies and solutions for success. This is a unique opportunity to access the perspective of a leading member of the vendor community.

Think Tank

End user-led session in boardroom style, focusing on best practices

Think Tanks are interactive sessions that place delegates in lively discussion and debate. Sessions admit only 15-20 participants at a time to ensure an intimate environment in which delegates can engage each other and have their voices heard." title="Think Tanks are interactive sessions that place delegates in lively discussion and debate. Sessions admit only 15-20 participants at a time to ensure an intimate environment in which delegates can engage each other and have their voices heard.

Roundtable

Interactive session led by a moderator, focused on industry issue

Led by an industry analyst, expert or a member of the vendor community, Roundtables are open-forum sessions with strategic guidance. Attending delegates gather to collaborate on common issues and challenges within a format that allows them to get things done." title="Led by an industry analyst, expert or a member of the vendor community, Roundtables are open-forum sessions with strategic guidance. Attending delegates gather to collaborate on common issues and challenges within a format that allows them to get things done.

Case Study

Overview of recent project successes and failures

Case Studies allow attending executives to hear compelling stories about implementations and projects, emphasizing best practices and lessons learned. Presentations are immediately followed by Q&A sessions." title="Case Studies allow attending executives to hear compelling stories about implementations and projects, emphasizing best practices and lessons learned. Presentations are immediately followed by Q&A sessions.

Focus Group

Discussion of business drivers within a particular industry area

Focus Groups allow executives to discuss business drivers within particular industry areas. These sessions allow attendees to isolate specific issues and work through them. Presentations last 15-20 minutes and are followed by Q&A sessions." title="Focus Groups allow executives to discuss business drivers within particular industry areas. These sessions allow attendees to isolate specific issues and work through them. Presentations last 15-20 minutes and are followed by Q&A sessions.

Analyst Q&A Session

Moderator-led coverage of the latest industry research

Q&A sessions cover the latest industry research, allowing attendees to gain insight on topics of interest through questions directed to a leading industry analyst." title="Q&A sessions cover the latest industry research, allowing attendees to gain insight on topics of interest through questions directed to a leading industry analyst.

Vendor Showcase

Several brief, pointed overviews of the newest solutions and services

Taking the form of three 10-minute elevator pitches by attending vendors, these sessions provide a concise and pointed overview of the latest solutions and services aligned with attendee needs and preferences." title="Taking the form of three 10-minute elevator pitches by attending vendors, these sessions provide a concise and pointed overview of the latest solutions and services aligned with attendee needs and preferences.

Executive Exchange

Pre-determined, one-on-one interaction revolving around solutions of interest

Executive Exchanges offer one-on-one interaction between executives and vendors. This is an opportunity for both parties to make key business contacts, ask direct questions and get the answers they need. Session content is prearranged and based on mutual interest." title="Executive Exchanges offer one-on-one interaction between executives and vendors. This is an opportunity for both parties to make key business contacts, ask direct questions and get the answers they need. Session content is prearranged and based on mutual interest.

Open Forum Luncheon

Informal discussions on pre-determined topics

Led by a moderator, Open Forum Luncheons offer attendees informal, yet focused discussions on current industry topics and trends over lunch." title="Led by a moderator, Open Forum Luncheons offer attendees informal, yet focused discussions on current industry topics and trends over lunch.

Networking Session

Unique activities at once relaxing, enjoyable and productive

Networking opportunities take various unique forms, merging enjoyable and relaxing activities with an environment conducive to in-depth conversation. These gatherings allow attendees to wind down between sessions and one-on-one meetings, while still furthering discussions and being productive." title="Networking opportunities take various unique forms, merging enjoyable and relaxing activities with an environment conducive to in-depth conversation. These gatherings allow attendees to wind down between sessions and one-on-one meetings, while still furthering discussions and being productive.

 

Thursday, March 9, 2017 - CIO Chicago Summit

7:30 am - 8:40 am

Registration and Networking Breakfast

 

8:45 am - 8:55 am

Welcome Address and Opening Remarks

 

9:00 am - 9:30 am

Share:

Keynote Presentation

Analytics & Cloud Together: Accelerating Innovation in the New Cognitive Era

Leading companies are disrupting the status quo by using data to inform business strategy and create new business models that fuel growth. CIOs have the power to uncover the insight that drives disruption and speeds transformation. Learn how leading IT organizations are maximizing the use of open source and cloud technologies alongside on-premises investments to accelerate innovation. And understand how CIOs are embracing new cloud-enabled consumption models while helping ensure data privacy, security and sovereignty. 

Takeaways:

  • Integrating analytics into key applications and systems can enable people throughout an organization to access and act on insights when and where it matters most.
  • Take advantage of more sources to enable better decisions. IT must create an environment with easy access to all types of data - structured and unstructured - from internal sources and those outside the organization.
  • Data science teams are answering the toughest questions by leveraging open source development platforms and tools to build models more quickly and easily.

Sponsored by:

IBM View details

 
 
 

9:35 am - 10:00 am

Vendor Showcase

 

10:05 am - 10:30 am

Vendor Showcase

 

10:35 am - 11:00 am

Executive Exchange

 

Thought Leadership

Identity and the New Age of Enterprise Security

From a technology standpoint, as a society the world of business has gone through two distinct stages in the evolution of its information security focus. The first addressed network based protection and preventative controls such as firewalls and anti-malware. The second looked at data-centric and detective controls such as encryption and intrusion/extrusion monitoring. Since breaches continue to occur at a record pace, what is need new is clearly a new evolution, one that pushes towards individual focused security through granular user monitoring and management as provided by solutions such as Identity and Access Management. While IAM isn't a new technology field, it is one whose time has come and CISO need to begin investing in modern-day, light-weight, easy to implement IAM solutions now to stay ahead of the curve, and reduce enterprise threats.

Takeaways:

  • The breach onslaught demonstrates that existing security solutions are incapable of defending current threats
  • Enterprises need to begin looking at security from an activity perspective rather than an artifact perspective
  • IAM provides activity insight, and therefore threat awareness, no other platform can equal

Sponsored by:

RSA View details

 
 
 

11:05 am - 11:30 am

Executive Exchange

 

Executive Boardroom

Accelerating Digital Business with Service Management

Every business is, or will become, a Digital Business. This requires much more than technology - it requires planning and preparing across the enterprise. The risks are high, but so are the rewards. This session will outline the challenges and opportunities of digital business, and how effective IT service management can enable successful outcomes.

Sponsored by:

Cherwell Software View details

 
 
 

11:35 am - 12:00 pm

Executive Exchange

 

Thought Leadership

Become a Change Agent for Business Transformation

Today's modern CIO is embarking on a digital transformation journey exploring radical hybrid IT strategies and leveraging new technologies like Cloud, Social, Mobile and Big Data. However with 'keeping the lights on' legacy IT components costing nearly 90% of a typical IT budget, how can IT make powerful advancements and lead business change?

Join this interactive session to learn how award-winning CIOs are successfully tipping the balance by liberating people, time and money from costly ongoing maintenance of their ERP systems including SAP and Oracle, to invest in strategic initiatives that create real-world competitive advantage.

Sponsored by:

Rimini Street View details

 
 
 

12:05 pm - 12:30 pm

Executive Exchange

 

Think Tank

Building Dynamic Security Teams

There's no other way to say it than bluntly; Information Security is a white-hot field within Information Technology as a whole " over the last dozen years it has gone from after-thought, to scapegoat, to critical enterprise success factor. As a result, the need for capable and qualified Information Security specialists, whether front-line Analysts, mid-level Managers, or top level CISOs is at an all time high, but personnel and skills availability is sinking to an all-time (at least in terms of supply and demand ratio) low. There simply isn't enough expertise in existence to go around, or enough education occurring to create it. In this environment, senior Information Security leaders have to get creative in their pursuit of the people, performance, and passion necessary to address this capability shortfall.

Takeaways:

  • Learn how to build grass-roots programs that cultivate a farm full of potential security experts through internal and collaborative programs
  • Find out how to leverage key organizational traits to generate buzz and interest where none existed before
  • Understand the relevance of certs vs. experience and how to evaluate and validate the value of candidates

Presented by:

Waqas Akkawi, CISO, SIRVA View details

 
 
 

12:35 pm - 1:20 pm

Networking Luncheon

 

1:25 pm - 1:50 pm

Executive Exchange

 

Executive Boardroom

Can Technology Alone Prevent Phishing Attacks and Breaches?

2016 was undoubtedly the year of ransomware. And while we saw improvements in the number of days to detect a breach, 146 days is still 146 too many. As targeted phishing attacks continue to grow in number and evolve in sophistication, organizations need to reconsider their current approach to these threats. Companies continue to invest billions of dollars in technology to shore up their defenses but it's obviously not enough. Join us to learn how the PhishMe solution combines both technology and human-driven phishing defense to help eliminate phishing breaches through greater employee resilience and better incident response.

Sponsored by:

PhishMe View details

 
 
 

1:55 pm - 2:20 pm

Executive Exchange

 

Thought Leadership

Good UX is good for business

Companies have spent millions of dollars rolling out new systems that seek to incorporate the data, workflows, and business functionality needed to run their business. In reality, these complex software solutions result in siloed data systems users are only able to access through unique interfaces. These intricate, fragmented solutions increase training time and costs and present usability challenges for employees, a leading cause of organizational inefficiencies. Software intended to advance businesses slows them down because of bad user experience (UX). And worse, IT departments become flooded with time- and cost-intensive development backlogs that leave no time for meaningful innovation. 


Enterprises are finding new, fast and easy ways to leverage data and software investments to solve the UX problem. Learn more about how a no-code cloud UX platform can reduce code debt, drive productivity, and significantly shorten app development cycle times. 


Takeaways:  

  • We need solutions that are developed, scaled, and iterated upon rapidly. Tailoring our systems with custom coding is outdated and slow. Speedy, iterative delivery of software is critical if we are to stay competitive. 
  •  Employees are demanding more of their business applications. Business apps should be as easy to use as consumer appsâ?"more human and less machine. Applications that don't offer such a UX will fail. 
  • As we increase functionality in our enterprise software, we need to avoid adding complexity for the end user. This simplification includes defragging our enterprise technology and creating a single, unified user experience that pulls together data from multiple sources.

Sponsored by:

Skuid View details

 
 
 

2:25 pm - 2:50 pm

Executive Exchange

 

Thought Leadership

Bringing Trust to the Internet of Things

The Internet of Things (IoT) embodies the interconnection of uniquely identifiable embedded computing devices on the Internet. The increase in connected devices brings a number of advantages - increased operational efficiency, customized user experiences and improved communication - but also brings a number of new challenges. IoT devices are rapidly becoming ubiquitous and the number of threats and attacks against IoT devices are on the rise. Cyber-attacks are not new to IoT, but as IoT will be deeply interwoven in our lives and societies, it is becoming necessary to step up and take cyber security seriously. Learn how IoT will play a role in your future and why all organizations in any industry leveraging IoT must plan for these challenges by enhancing their data security strategies.

Sponsored by:

 

Gemalto View details

 
 
 

2:55 pm - 3:20 pm

Executive Exchange

 

Think Tank

Security Made Simple, The Nuclear Flyswatter.

IT Security is hard; IT security is complex and this complexity puts people off. Hence, they prefer to stick their head in the sand and hope nothing happens. That tactic can go well for a time. YET it is also simple! 

Takeaway: 

  • We will look at how simple tools, ideas, services, process, and procedures can become force multipliers for your organization.

Presented by:

Richard Rushing, CISO, Motorola Mobility View details

 
 
 

3:25 pm - 3:35 pm

Afternoon Networking Coffee Break

 

3:40 pm - 4:05 pm

Executive Exchange

 

Thought Leadership

Usable and effective security for empowered users, cloud, mobile and BYOD

IT platforms today are more secure than they were 10 years ago but the risk of data breaches is higher today. It's because your IT has changed (cloud, BYOD, etc.) but your security hasn't evolved. In the meanwhile, attackers are targeting end users directly through phishing. 95% of all breaches involve compromised end user credentials. 75% of all breaches involve compromised end user devices. How can you take a modern approach to reducing the risk of data breaches? Attend this session to learn: 

  • How usable security is the most effective security in practice ? How to win the hearts of your users and business with multi-factor authentication 
  • Why a single platform can replace several mobile, cloud and authentication products 
  • How companies such as Facebook are securing BYOD, users and cloud apps using Duo

Sponsored by:

Duo Security View details

 
 
 

4:10 pm - 4:35 pm

Executive Exchange

 

Think Tank

Utilizing Situational Awareness to Combat Ransomware!

Security situational awareness is an essential building block in order to estimate security level of systems and to decide how to protect networked systems from cyber-attacks. Thus it could be a great tool to use against ransomware attacks. Paying the ransom to regain access to data carries unacceptable risks. The attacker could refuse to unencrypt the data, or the payment could encourage additional malicious activity. Organizations of all sizes can take several actions to mitigate the threat of ransomware. We will look at situational awareness as one proactive tool.

Presented by:

Ricardo Lafosse, CISO, Cook County View details

 
 
 

4:40 pm - 5:20 pm

Executive Visions

Facilitating Technology-Enabled Business Transformation

The role of the modern IT Executive is more complex than it has ever been before, not just because the technology landscape has become more complex, but also because increasingly IT execs have had to become a business-focused executive, not just a technologist. Long have we talked about the CIO and CISO getting a seat at the table but modern businesses are now demanding that their technology impresario join them and leverage his deep and rich technical acumen to allow the organization as a whole to better position itself for market-place success. To be successful, CxOs need to invest in themselves, in their personnel, and in the right technologies to allow them to position the IT department to proactively address business needs as an innovator and driver, rather than order-taker and enabler.

Takeaways:

  • IT leadership can no longer be simply technology focused, but must instead take their visibility into business process and become business focused
  • A broader business-focus does not preclude maintaining technology excellence however and indeed may demand more of it than ever before
  • Success for CxOs will be measured not in how they can enable enterprise decisions, but in how they can drive growth

Presented by:

Praveen Moturu, CTO, GE Transportation

 

Tellis Williams, Chief Security Officer, AXA Assistance-USA

 
 

5:20 pm - 5:30 pm

Thank You Address and Closing Remarks

 

5:30 pm - 7:00 pm

Cocktail Reception