↓ Agenda Key
Visionary speaker presents to entire audience on key issues, challenges and business opportunities
Keynote Presentations give attending delegates the opportunity to hear from leading voices in the industry. These presentations feature relevant topics and issues aligned with the speaker's experience and expertise, selected by the speaker in concert with the summit's Content Committee." title="Keynote Presentations give attending delegates the opportunity to hear from leading voices in the industry. These presentations feature relevant topics and issues aligned with the speaker's experience and expertise, selected by the speaker in concert with the summit's Content Committee.
Panel moderated by Master of Ceremonies and headed by four executives discussing critical business topics
Executive Visions sessions are panel discussions that enable in-depth exchanges on critical business topics. Led by a moderator, these sessions encourage attending executives to address industry challenges and gain insight through interaction with expert panel members." title="Executive Visions sessions are panel discussions that enable in-depth exchanges on critical business topics. Led by a moderator, these sessions encourage attending executives to address industry challenges and gain insight through interaction with expert panel members.
Solution provider-led session giving high-level overview of opportunities
Led by an executive from the vendor community, Thought Leadership sessions provide comprehensive overviews of current business concerns, offering strategies and solutions for success. This is a unique opportunity to access the perspective of a leading member of the vendor community." title="Led by an executive from the vendor community, Thought Leadership sessions provide comprehensive overviews of current business concerns, offering strategies and solutions for success. This is a unique opportunity to access the perspective of a leading member of the vendor community.
End user-led session in boardroom style, focusing on best practices
Think Tanks are interactive sessions that place delegates in lively discussion and debate. Sessions admit only 15-20 participants at a time to ensure an intimate environment in which delegates can engage each other and have their voices heard." title="Think Tanks are interactive sessions that place delegates in lively discussion and debate. Sessions admit only 15-20 participants at a time to ensure an intimate environment in which delegates can engage each other and have their voices heard.
Interactive session led by a moderator, focused on industry issue
Led by an industry analyst, expert or a member of the vendor community, Roundtables are open-forum sessions with strategic guidance. Attending delegates gather to collaborate on common issues and challenges within a format that allows them to get things done." title="Led by an industry analyst, expert or a member of the vendor community, Roundtables are open-forum sessions with strategic guidance. Attending delegates gather to collaborate on common issues and challenges within a format that allows them to get things done.
Overview of recent project successes and failures
Case Studies allow attending executives to hear compelling stories about implementations and projects, emphasizing best practices and lessons learned. Presentations are immediately followed by Q&A sessions." title="Case Studies allow attending executives to hear compelling stories about implementations and projects, emphasizing best practices and lessons learned. Presentations are immediately followed by Q&A sessions.
Discussion of business drivers within a particular industry area
Focus Groups allow executives to discuss business drivers within particular industry areas. These sessions allow attendees to isolate specific issues and work through them. Presentations last 15-20 minutes and are followed by Q&A sessions." title="Focus Groups allow executives to discuss business drivers within particular industry areas. These sessions allow attendees to isolate specific issues and work through them. Presentations last 15-20 minutes and are followed by Q&A sessions.
Analyst Q&A Session
Moderator-led coverage of the latest industry research
Q&A sessions cover the latest industry research, allowing attendees to gain insight on topics of interest through questions directed to a leading industry analyst." title="Q&A sessions cover the latest industry research, allowing attendees to gain insight on topics of interest through questions directed to a leading industry analyst.
Several brief, pointed overviews of the newest solutions and services
Taking the form of three 10-minute elevator pitches by attending vendors, these sessions provide a concise and pointed overview of the latest solutions and services aligned with attendee needs and preferences." title="Taking the form of three 10-minute elevator pitches by attending vendors, these sessions provide a concise and pointed overview of the latest solutions and services aligned with attendee needs and preferences.
Pre-determined, one-on-one interaction revolving around solutions of interest
Executive Exchanges offer one-on-one interaction between executives and vendors. This is an opportunity for both parties to make key business contacts, ask direct questions and get the answers they need. Session content is prearranged and based on mutual interest." title="Executive Exchanges offer one-on-one interaction between executives and vendors. This is an opportunity for both parties to make key business contacts, ask direct questions and get the answers they need. Session content is prearranged and based on mutual interest.
Open Forum Luncheon
Informal discussions on pre-determined topics
Led by a moderator, Open Forum Luncheons offer attendees informal, yet focused discussions on current industry topics and trends over lunch." title="Led by a moderator, Open Forum Luncheons offer attendees informal, yet focused discussions on current industry topics and trends over lunch.
Unique activities at once relaxing, enjoyable and productive
Networking opportunities take various unique forms, merging enjoyable and relaxing activities with an environment conducive to in-depth conversation. These gatherings allow attendees to wind down between sessions and one-on-one meetings, while still furthering discussions and being productive." title="Networking opportunities take various unique forms, merging enjoyable and relaxing activities with an environment conducive to in-depth conversation. These gatherings allow attendees to wind down between sessions and one-on-one meetings, while still furthering discussions and being productive.
12:00 pm - 1:00 pm
1:00 pm - 1:10 pm
Scott Dillon, Former EVP, CTO Head of Technology, Wells Fargo
1:10 pm - 1:45 pm
Security breaches are the most intimidating threats for CISOs and security executives. Because of that, upper level management, shareholders and even consumers are focusing now more than ever on the security department. With that, CISOs need to see this as an opportunity to work closely with business stakeholders to incorporate cybersecurity strategy with their organization's business initiatives. This is an ideal opportunity to address skill shortages and increase professional development of the internal security workforce.
Kurt Lieber, Group CISO North America, AETNA
1:50 pm - 2:25 pm
For over 2000 years, governments, armies, businesses and lovers have been encrypting messages. For the same amount of time, the keys used to perform the encryption have been the weakest link in the chain. After 2000 years, technology has advanced such that the keys can be protected but many companies don't understand how important it really is.
Mr. Beutlich will explain in an entertaining (and sometimes graphic) fashion why protecting the encryption key is more important than the encryption itself.
Brad Beutlich, Vice President of Sales Western Region and LATAM, nCipher
2:30 pm - 2:55 pm
Applications are the lifeblood of the enterprise, but as the threats multiply, as applications move to the cloud, as legacy applications need to be maintained, and as organizations seek competitive advantage with new technologies and faster release cycles, it's easy to see that application security can be a thankless, endless and challenging job.
Imperva has distilled three best practices (and a bonus tip) that help enterprises of any size vastly improve and simplify application security, accelerate threat detection and operationalize application security in a dynamic world where change is the only constant.
Jose Gomez, Sr. Sales Engineer of Strategic Accounts, Imperva
Today, the #1 CEO priority is GROWTH and most see technology as a key enabler. But vendor policies pose major roadblocks to innovation, growth and competitive advantage by forcing you to spend limited budget, resources and time on projects that may not drive your business. Learn how you can take control of your IT roadmap by choosing a Business-Driven Roadmap designed around your business objectives and not the vendor's. Leverage vendor software, but do it on your terms, on your timetable and with the flexibility, funding and freedom to focus on initiatives that support growth and competitive advantage.
Sebastian Grady, President, Rimini Street
3:00 pm - 3:25 pm
More complex regulations, such as the General Data Protection Regulation (GDPR), have come into play due to the rise of data breaches forces. As data today is viewed as a such an asset, it is also a tremendous liability. Understanding that, organizations must consider both while they implement technologies that will be both innovative their business, but also cost effective.
Michael Owens, Business Information Security Officer, Equifax
Wenying Jiangli, Managing Director, Business Analytics, Credit-Suisse
3:25 pm - 3:35 pm
3:40 pm - 4:05 pm
Passwords are no longer sufficient protection against breaches because users are accessing information from a variety of untrusted devices, apps, networks, locations and services. So, in the reality of today's security world how does an organization protect itself? One answer is with a Zero Trust approach and framework to security. But with numerous theories about Zero Trust, how do you ensure that you've taken the right approach? in this session, discover how to:
Jay Bhansali, Sr. Director Product Marketing, MobileIron
Silver Peak Systems
4:10 pm - 4:35 pm
Over lifespan of an organization, CIOs/CISOs have developed and implemented technologies that has been key to the organization's success. However, CISOs and their security teams today find themselves stuck ensuring that legacy systems are secure. The solution is cloud-delivered security products that are more agile with the ability to implement new detection methods and services faster than on-site solutions. While cloud security is an ideal solution, it is important to know that using the cloud is more than moving legacy management servers to the cloud.
Mindy Eihusen, Head of Information Security and Risk Management, ConAgra
The future of enterprise software looks vastly different than it does today. How can today's technologists create tomorrow's enterprise software? Digital disruption presents opportunities and threats, encouraging businesses to use enterprise software to innovate and push boundaries. The future of enterprise software will have systems that are perfectly composed and personalized for the user-similar to the customized shopping experience on Amazon. Post-digital transformation, users should have the same perfectly adaptable experiences in the office as they do with consumer applications.
AI can help create personalized experiences in enterprise software, rapidly transforming data into insights that feed process automation and innovation experiences. This can only happen if organizations have a plan in place to successfully drive AI implementations. A recent IDC report found that about two-thirds of companies have adopted AI technologies, but only a quarter of those enterprises have a strategy in place to reach that goal.
Intelligent technologies like AI and machine learning are key to a successful digital transformation, as digital businesses need data to create a more personalized user experience in enterprise software. These technologies will change how technologists deliver systems and enhance corporate innovation-eventually making an AI-powered Enterprise 2.0 a reality.
Andy Mutz, Global Head of Technology and Data Architecture, SAP
4:40 pm - 5:05 pm
5:10 pm - 6:10 pm
A CXO's role, goals and objectives have drastically changed over the years as most CXOs supervise teams and units beyond their IT/IT's security. Because of these changes in responsibilities, a CXO's success is measured in greater business metrics. As a result, the role of a CXO has become both more attractive and more demanding.
Vish Narendra, VP & CIO, Graphic Packaging International
Max Chan, CIO, Avnet
6:30 pm - 7:30 pm
7:30 pm - 8:30 pm
It does not take an expert to know that information security threats will only continue to increase. That said, AI is proving to be a worthy defense against these threats. Leading enterprise organizations are investing and relying on AI-based security systems and analytics. As this trend continues, AI-defense will only continue to grow and improve.
Shamla Naidoo, Managing Partner Global Information Security, International Business Machines Corporation
8:30 pm - 9:30 pm
7:45 am - 8:30 am
8:30 am - 8:40 am
8:40 am - 9:15 am
We will explore key learnings from various industries and verticals on the good, the bad and the ugly of digital transformation. We will have an opportunity to not only be exposed to successful use cases, but also ask the hard questions behind those successes.
9:20 am - 9:55 am
CIOs are facing increasing pressure to guide their companies to rapidly adopt new technologies and solutions to keep their companies competitive in their industry. CISOs are facing increasing pressure to keep their company and its data safe and secure from all threats. Without great vision and cooperation these goals can appear to be at cross purposes.
Scott Dillon, Former EVP, CTO Head of Technology, Wells Fargo
10:00 am - 10:25 am
What have we learned from a decade of cloud computing? What are the best practices that we should be taking into account as we take the next step on the digital transformation journey? We will discuss the full range of data center to cloud to hybrid cloud to fog and everything in between.
Jim Cordovana, Group VP, Head of Cloud Security Architecture, SunTrust Bank
Due to market shifts, the need for collaboration between professional data scientists and application developers is no longer necessary. Today, professional developers can operate alone using predefined models to deliver the top, AI-enhanced solution.
David Price, CTO, AVP Asset Management, Black & Veatch
10:30 am - 10:55 am
Organizations don't just communicate via email anymore. Slack, OneDrive, Salesforce, Yammer....there are many new channels internally and externally where employees exchange content, that are ripe for cyber attacks. Join us to learn more about this new security challenge and how to close the gap.
Boomers make up nearly a third of the workforce. More than half of them are in leadership positions, and they are retiring in droves. This massive exodus of talent is an existential problem for companies.
Most institutional knowledge about products, processes, and customers is formally documented, but is in the collective heads of the people who have done the work for years and know the intricacies of workflows. When these workers retire, they take the knowledge with them, causing a massive drain of organizational wisdom.
Capturing this tacit knowledge from an aging workforce, and putting it to use, can make the difference between companies that thrive and ones that die off.
10:55 am - 11:05 am
11:10 am - 11:35 am
Email continues to be the dominant attack vector for threat actors in today's landscape. Email security gateways have been focused and effective on widespread attacks and campaigns, but have been porous to sophisticated, highly targeted attacks. Despite significant investments into email security, Business Email Compromise (BEC) losses have nearly doubled year over year over year - from $360M in 2016 to $1.3B in 2018. This represents roughly 48% of all cybercrime losses. Combatting BEC and other socially-engineered, payload-less attacks requires a shift in mindset and approach. AI and Machine Learning have hyped technologies in security over the past several years. So the question is - Is AI the future of email security?
Innersource' describes the application of open source principles, practices, and culture inside an organization. While the benefits of innerSource seem like common sense, many enterprises face challenges adopting innersource internally. In this talk, we'll review innersource in some detail, highlight typical obstacles, and share ideas on practical approaches to implementing innersource.
11:40 am - 12:05 pm
Security is, and will continue to be, an issue within cloud technology especially with recent regulations such as the General Data Protection Regulation (GDPR). Because of the advantages and opportunities of the cloud, organizations will likely rush into cloud technologies without being fully aware of the security risks. After GDPR came into effect, there is now an even greater responsibility on organizations to manage their data compliantly as they continue transformations towards the cloud.
Gregory Ericson, CIO, Essilor
Over the next few years, machine learning (ML) will be a regular security practice and will offset skills and staffing shortfalls. Today though, ML is better at addressing smaller, more specific problems. Technology leaders have to understand that humans and machines complement each other and work better together than alone, as ML can assist humans in addressing uncertainty by presenting relevant information.
Grant Jacoby, SVP, Director - Information Security Strategy & Information Assurance, Fifth Third Bank
12:10 pm - 12:35 pm
ITSM solutions, such as ServiceNow, are essential if you want to give employees a modern workplace experience. However, digitizing your helpdesk workflow is only the first step. To achieve the full spectrum of productivity enhancements that ITSM solutions offer, they must be complemented by task automation to further reduce incident volume and improve issue resolution times.
In this session, automation experts from 1E will walk you through how to craft and present a business case for workflow and task automation based on real-world application and a business-first approach.
Cybersecurity tool sprawl is has reached unsustainable levels, and research shows 66% of businesses are striving to consolidate their security portfolio. But overconsolidating to a few platform solutions risks creating a vulnerable, innovation-stifling monoculture. If every organization uses a nearly identical set of security tools, compromising one means compromising them all. Heterogeneity of cybersecurity systems is itself a defense, so security teams need to approach consolidation differently. In this session, attendees will learn:
Extrahop Networks Inc
12:40 pm - 1:05 pm
1:05 pm - 2:05 pm
Deidre Diamond, Founder and CEO, CyberSn
Diana Camplinger, Chief Administrative Officer, Consumer Technology/ Head of Marketing Technology, SunTrust Bank
2:10 pm - 2:35 pm
IT security and operations teams struggle to keep Unix, Linux, Mac and Windows servers and end user devices continuously patched and compliant with security and regulatory mandates. They also strive for faster time-to-remediation during incidents. Using HCL BigFix, IT operations and security teams can instantly report to executives, board members and high-value supply chain partners that all systems are continuously patched and compliant, resulting in increased productivity and cost savings.
Mark Phinick, Vice President of BigFix Sales, HCL BigFix
2:40 pm - 3:05 pm
It is imperative for IT to become a business partner to each line of business for successful Digital Transformation. To do so, the correct technology must be used for the right reasons. DevOps and CI/CD are necessary practices that must be operationalized from the infrastructure layer to production software. Please join this session to understand the complexities of multi-cloud and DevOps and how to implement a strategy to be successful.
Vectra AI, Inc
3:10 pm - 3:35 pm
Edge computing is computing topology in which the content collection and delivery are placed closer to their endpoints. The goal of edge computing is to keep the traffic and processing local to eliminate delays and reduce traffic. Currently, edge computing is being driven by IoT and requires processing to be close to the end rather than on a centralized cloud server. However, rather than creating brand new architecture, cloud computing and edge computing will evolve into centralized service executing on centralized servers, on-premise servers and on the edge devices themselves.
Jamie Franklin, SVP/CIO, Community Medical Centers
Eric Saff, VP,CTO, Community Medical Centers
3:35 pm - 3:45 pm
3:50 pm - 4:15 pm
One of the major challenges for CISOs is finding top information security talent. However, look at 2019 as an opportunity to begin your search with universities and colleges that are expanding their cybersecurity programs due to the shortage of cybersecurity professionals. This session will also cover how to recruit and hire top cybersecurity talent.
Edmund Jones, Information Security Officer (ISO), Technical Fellow Cyber Security
As Peter Drucker famously said, "Culture eats strategy for breakfast". Everyone is eager to use and accept this as a reality, but most struggle with what it really means and how to go about taking it on. This can be even further compounded when a single part of the organization, such as IT takes on this challenge and the rest of the company is not on the same page. Couple this with a rapidly changing workforce that has a completely different set of ideals around culture and you are sure to have your breakfast devoured before your coffee even begins to cool. A holistic, passionate, "heart centered" approach is required and you need to manage all facets of your culture to get hiring right, develop your talent pipeline, improve productivity and ultimately lower attrition. These are the basic pillars required to sustain a true digital transformation.
Dave Hudson, Chief Information Officer, Insight Global
4:20 pm - 4:45 pm
4:50 pm - 5:30 pm
It is well-known that CXOs "wear many hats" and are responsible for more than ever before. One of those major responsibilities is driving a culture of innovation and organizational success throughout not only their team, but the entire organization.
Dave Hudson, Chief Information Officer, Insight Global
Vinod Bidarkoppa, SVP and CIO , OptumServe, UnitedHealth Group
5:30 pm - 7:00 pm
7:00 pm - 8:30 pm
8:30 pm - 10:00 pm