CIO Chicago Summit | October 30, 2019 | Convene - 16 West Adams Street - Chicago, IL, USA

↓ Agenda Key

Keynote Presentation

Visionary speaker presents to entire audience on key issues, challenges and business opportunities

Keynote Presentations give attending delegates the opportunity to hear from leading voices in the industry. These presentations feature relevant topics and issues aligned with the speaker's experience and expertise, selected by the speaker in concert with the summit's Content Committee." title="Keynote Presentations give attending delegates the opportunity to hear from leading voices in the industry. These presentations feature relevant topics and issues aligned with the speaker's experience and expertise, selected by the speaker in concert with the summit's Content Committee.

Executive Visions

Panel moderated by Master of Ceremonies and headed by four executives discussing critical business topics

Executive Visions sessions are panel discussions that enable in-depth exchanges on critical business topics. Led by a moderator, these sessions encourage attending executives to address industry challenges and gain insight through interaction with expert panel members." title="Executive Visions sessions are panel discussions that enable in-depth exchanges on critical business topics. Led by a moderator, these sessions encourage attending executives to address industry challenges and gain insight through interaction with expert panel members.

Thought Leadership

Solution provider-led session giving high-level overview of opportunities

Led by an executive from the vendor community, Thought Leadership sessions provide comprehensive overviews of current business concerns, offering strategies and solutions for success. This is a unique opportunity to access the perspective of a leading member of the vendor community." title="Led by an executive from the vendor community, Thought Leadership sessions provide comprehensive overviews of current business concerns, offering strategies and solutions for success. This is a unique opportunity to access the perspective of a leading member of the vendor community.

Think Tank

End user-led session in boardroom style, focusing on best practices

Think Tanks are interactive sessions that place delegates in lively discussion and debate. Sessions admit only 15-20 participants at a time to ensure an intimate environment in which delegates can engage each other and have their voices heard." title="Think Tanks are interactive sessions that place delegates in lively discussion and debate. Sessions admit only 15-20 participants at a time to ensure an intimate environment in which delegates can engage each other and have their voices heard.

Roundtable

Interactive session led by a moderator, focused on industry issue

Led by an industry analyst, expert or a member of the vendor community, Roundtables are open-forum sessions with strategic guidance. Attending delegates gather to collaborate on common issues and challenges within a format that allows them to get things done." title="Led by an industry analyst, expert or a member of the vendor community, Roundtables are open-forum sessions with strategic guidance. Attending delegates gather to collaborate on common issues and challenges within a format that allows them to get things done.

Case Study

Overview of recent project successes and failures

Case Studies allow attending executives to hear compelling stories about implementations and projects, emphasizing best practices and lessons learned. Presentations are immediately followed by Q&A sessions." title="Case Studies allow attending executives to hear compelling stories about implementations and projects, emphasizing best practices and lessons learned. Presentations are immediately followed by Q&A sessions.

Focus Group

Discussion of business drivers within a particular industry area

Focus Groups allow executives to discuss business drivers within particular industry areas. These sessions allow attendees to isolate specific issues and work through them. Presentations last 15-20 minutes and are followed by Q&A sessions." title="Focus Groups allow executives to discuss business drivers within particular industry areas. These sessions allow attendees to isolate specific issues and work through them. Presentations last 15-20 minutes and are followed by Q&A sessions.

Analyst Q&A Session

Moderator-led coverage of the latest industry research

Q&A sessions cover the latest industry research, allowing attendees to gain insight on topics of interest through questions directed to a leading industry analyst." title="Q&A sessions cover the latest industry research, allowing attendees to gain insight on topics of interest through questions directed to a leading industry analyst.

Vendor Showcase

Several brief, pointed overviews of the newest solutions and services

Taking the form of three 10-minute elevator pitches by attending vendors, these sessions provide a concise and pointed overview of the latest solutions and services aligned with attendee needs and preferences." title="Taking the form of three 10-minute elevator pitches by attending vendors, these sessions provide a concise and pointed overview of the latest solutions and services aligned with attendee needs and preferences.

Executive Exchange

Pre-determined, one-on-one interaction revolving around solutions of interest

Executive Exchanges offer one-on-one interaction between executives and vendors. This is an opportunity for both parties to make key business contacts, ask direct questions and get the answers they need. Session content is prearranged and based on mutual interest." title="Executive Exchanges offer one-on-one interaction between executives and vendors. This is an opportunity for both parties to make key business contacts, ask direct questions and get the answers they need. Session content is prearranged and based on mutual interest.

Open Forum Luncheon

Informal discussions on pre-determined topics

Led by a moderator, Open Forum Luncheons offer attendees informal, yet focused discussions on current industry topics and trends over lunch." title="Led by a moderator, Open Forum Luncheons offer attendees informal, yet focused discussions on current industry topics and trends over lunch.

Networking Session

Unique activities at once relaxing, enjoyable and productive

Networking opportunities take various unique forms, merging enjoyable and relaxing activities with an environment conducive to in-depth conversation. These gatherings allow attendees to wind down between sessions and one-on-one meetings, while still furthering discussions and being productive." title="Networking opportunities take various unique forms, merging enjoyable and relaxing activities with an environment conducive to in-depth conversation. These gatherings allow attendees to wind down between sessions and one-on-one meetings, while still furthering discussions and being productive.

 

Wednesday, October 30, 2019 - CIO Chicago Summit

8:00 am - 8:45 am

Registration & Networking Breakfast

 

8:45 am - 8:55 am

Welcome Address & Opening Remarks

Presented by:

Steve Weber, Former Senior Director, Global Information Security, OptumRX

 
 

8:55 am - 9:25 am

Share:

Keynote Presentation

So you want to be a technology-driven company?

There are two types of companies: those who already are or are becoming technology-driven companies; and those who are being disrupted by technology-driven companies. So how do "traditional" companies infuse technology into their businesses? In this session, we'll get beyond the hype of digital transformations, the changing role of the CIO, the introduction of new roles such as Chief Digital/Data Officers, and explore what actually needs to change. 

Takeaways:
  1. Technology is a major factor in developing successful business strategies. For example, the emergence of technology-driven platforms and the associated ecosystems is changing the landscape in many industries.
  2. Don't think of technology "supporting the business", instead think about technology fundamentally changing the way the business operates and how technology changes the nature of customer interactions and experience.
  3. Delivering value is not just about technology. Traditional company culture needs to change to embrace human-center design, agile work practices, integrated cross-functional teams, and empowerment of all employees to bring new ideas and challenge the status quo.

Presented by:

Steve Betts, Former CIO, Health Care Service Corp View details

 
 
 

9:30 am - 10:00 am

Share:

Keynote Presentation

Mobile-centric Zero Trust Security Framework

Passwords are no longer sufficient protection against breaches because users are accessing information from a variety of untrusted devices, apps, networks, locations and services. So, in the reality of today's security world how does an organization protect itself? One answer is with a Zero Trust approach and framework to security. But with numerous theories about Zero Trust, how do you ensure that you've taken the right approach? in this session, discover how to: 

Takeaways: 

  • Drive business innovation with mobile productivity by giving employees the ability to use mobile, cloud and endpoints 
  • Enforce corporate security without impacting the user experience 
  • Redefine enterprise security strategies to address a perimeter-less environment

Sponsored by:

MobileIron View details

 
 

Presented by:

Alex Mosher, Global VP Solutions, MobileIron View details

 
 
 

10:05 am - 10:30 am

Executive Exchange

 

Share:

Think Tank

Cyber, Fraud, and AML Fusion: "Bringing the Pieces Together"

Fraudsters and other cyber threat actors attack across the people/process/technology stack in a cross-channel manner, and don't differentiate between cyber, fraud, and AML. As targets of these actors, we can't afford to maintain artificial separation between these functions. In response, Cyber, Fraud, AML, and Physical Security increasingly being either being joined in fusion centers or fully integrated into a whole that is more than the sum of its parts. In fact, Gartner estimates that by 2022, 70% of organizations will have combined budget or leadership for their fraud and cyber functions.  

Takeaways: 
  1. What are the advantages (and costs/risks) posed by the creation of a JSOC or cyber fusion team  
  2. How can these areas be fused in organizations of various sizes 
  3. What other groups or functions should, or could, participate 
  4. Selling the concept of the Cyber-Fusion/ the JSOC in the face of internal politics and regulatory scrutiny

Presented by:

Jonathan Golder, Director, Information Security and Fraud Governance, Discover Financial Company

 

Share:

Think Tank

Digital Transformation: "Disruption from Within"

Companies need to position themselves to benefit from technological advances that have occurred during recent years. Opportunities exist for a digitally transformed company, but they require a collaborative approach between the business and IT leadership. The complexity of "disrupting from within" to create this transformation has been the downfall of many great companies as over 50% of the Fortune 500 have gone bankrupt, been acquired, or ceased to exist as a result of digital disruption per Harvard Business Review. 

Takeaways:
  1. What are the four pillars of a digital transformation?
  2. Will your company be able to stay relevant and viable in the changing business environment?
  3. Who needs to be engaged in this process?

Presented by:

Ryan Collier, Chief Digital Officer, Risk Placement Services (Arthur J Gallagher & Co.)

 
 

10:30 am - 10:40 am

Morning Networking Coffee Break

 

10:45 am - 11:10 am

Executive Exchange

 

Share:

Thought Leadership

Enabling a Business-First Network

In this session, we will focus on helping companies sort through the massive number of current SDWAN product offerings, how to properly vet and evaluate an SDWAN provider, and the SDWAN features/technologies that make a difference in a manufacturing environment. Q&A to follow.

Presented by:

, ,

 

Kevin Russell, Manager, Systems Engineering, Silver Peak Systems

 
 

11:15 am - 11:40 am

Executive Exchange

 

Share:

Think Tank

Hitchhikers Guide to the Future with Artificial Intelligence

Artificial Intelligence is the creation of intelligent machines that work and react like humans. AI needs to be focused around machines we can trust, data we can trust, results we can trust. During this session we will look at What is AI and what AI is NOT. We will examine the "Law of 42", where the questions are more important than the answers. We examine the history of AI and how this old but new technology has progressed over the years. We look at "Augmented Learning" and how it applies to cybersecurity. 

Takeaways:
  1. What current AI is very good at and what AI cannot do today, (disadvantages and problems).
  2. How Machine Learning fits into the AI models (examining the different type of AI models).
  3. What are the different types of Machine Learning Models.

Presented by:

Richard Rushing, CISO, Lenovo View details

 
 

Think Tank

How Augmented Analytics Will Help Your Organization

Augmented Analytics focus on specific areas of augmented intelligence, using machine learning to enhance how data and analytics are presented and shared. As the capabilities of this technology advance rapidly, it is pivotal to understand these advancements. 

Takeaways:

  1. Learn more about Augmented Analytics' role as a key feature of data preparation and management, process management, process mining and data science platforms
  2. How to optimize the decisions and actions of all entire team, not just those of analysts and data scientists
  3. Using Augmented Analytics to automate the process of data preparation, insight generation and insight visualization

Presented by:

Robert Miller, Chief of Staff to the CIO, Citi View details

 
 
 

11:45 am - 12:10 pm

Executive Exchange

 

Executive Boardroom

Fireside Chat: Gaining an Aerial View of all Interactions on your Network

Network security has seen a resurgence in activity attempting to solve challenges detecting and responding to threats in the network. Some are focused on security analytics as a core business while others are pivoting from the network performance monitoring space into network detection and response. 

Increased complexity and frequency of attacks along with overreliance on prevention controls means the need for detection and response has never been greater. Join us as we discuss how network detection and response deliver an aerial view in your infrastructure.

Sponsored by:

Vectra AI, Inc View details

 
 

Presented by:

Rohan Chitradurga, Sr. Director of Product Management, Vectra AI, Inc

 

Executive Boardroom

Do You Really Know What's Possible?

Digital Transformation is a catch all, over used, but maybe undervalued, term that can make it difficult for companies to take meaningful action toward transforming their businesses. Understanding what current technologies really can, and can't do, can lead to new business models and strategies that might otherwise go untapped, leaving your organization flat footed at a time when they can quickly become irrelevant.

Take Away

  1. The Chicken or the Egg - Internal vs. External transformation 
  2. Yes, Facebook does affect your strategy
  3. How does technology ease change management?

Sponsored by:

MarkLogic View details

 
 

Presented by:

Bill Fox, VP Vertical Strategy Group, CSO Healthcare and Life Sciences, MarkLogic View details

 
 
 

12:15 pm - 12:40 pm

Executive Exchange

 

Share:

Executive Boardroom

The Collaboration Security Blindspot

Organizations don't just communicate via email anymore.  Slack, OneDrive, Salesforce, Yammer....there are many new channels internally and externally where employees exchange content, that are ripe for cyber attacks. Join us to learn more about this new security challenge and how to close the gap.

Sponsored by:

Perception Point View details

 
 

Presented by:

Zack St. George, Director of Sales, NA, Perception Point View details

 
 

Share:

Executive Boardroom

Digital Darwinism (Evolution of Legacy Systems to Fuel Digital Transformatspoion)

Are your legacy applications ready for digital transformation? It's important to embrace the opportunities afforded by a digital strategy and at the same time avoid being digitally disrupted right out of your industry. So how do organizations fuel transformation when they are grounded in legacy systems? They need to innovate without destroying their differentiation - often referred to as "secret sauce"? 

In this seminar, you'll learn how to plot a digital transformation approach that protects both your IT investments and enables business growth. Join Chris Koppe, Fresche's SVP of Transformation and Modernization Services, to learn about: 

  • Identifying greatest value potential in legacy portfolio 
  • How legacy can be transformed to fuel growth 
  • Skills required for digital transformation / bridging the skills gap  
  • Roadmap strategies: define initiatives that tackle systems of record and enable strategic innovation

Sponsored by:

Fresche Solutions View details

 
 

Presented by:

Chris Koppe, VP, Consulting and Portfolio Management, Fresche Solutions View details

 
 

Share:

Executive Boardroom

Next-Gen Cloud Security Architectures for the Cloud-First Future

As businesses rely more on cloud apps, they must refocus security from defending perimeters to following users regardless of location. This session will discuss the advantages of cloud security solutions based on a Cloud 2.0 architecture built on containers and micro services and how they can more seamlessly transition security from appliances.

Key Takeaways: 

  1. How vendor cloud architectures differ and how those differences can impact your organization
  2. Difference between monolithic cloud architectures and clouds built on containerization and micro services
  3. Best practices when migrating from security appliances to cloud security 

Sponsored by:

iboss View details

 
 

Presented by:

Peter Martini, President, iboss View details

 
 
 

12:40 pm - 1:20 pm

Networking Lunch


 

1:25 pm - 1:50 pm

Executive Exchange

 

Share:

Thought Leadership

Digital Transformation Needs Digital Identity

Most organizations struggle with competing priorities of risk management, compliance, cost, and user experience; all while working to manage the long tail of legacy systems, including legacy identity & access management solutions. 

What if there was a comprehensive digital identity solution that could drive a successful digital transformation program? What if a single platform could help you balance security and user experience for all identities, while coexisting with your existing legacy and supporting a non-disruptive migration? 

A strategic approach to modern digital identity will simultaneously improve numerous aspects of your business. Join this talk from ForgeRock to learn how.

Sponsored by:

ForgeRock View details

 
 

Presented by:

Ashley Stevenson, VP Product Solution Marketing, ForgeRock View details

 
 
 

1:55 pm - 2:20 pm

Executive Exchange

 

Share:

Thought Leadership

3 Best Practices for Application Security (and Bonus Tip)

Applications are the lifeblood of the enterprise, but as the threats multiply, as applications move to the cloud, as legacy applications need to be maintained, and as organizations seek competitive advantage with new technologies and faster release cycles, it's easy to see that application security can be a thankless, endless and challenging job. 

Imperva has distilled three best practices (and a bonus tip) that help enterprises of any size vastly improve and simplify application security, accelerate threat detection and operationalize application security in a dynamic world where change is the only constant.

Sponsored by:

Imperva View details

 
 

Presented by:

Greg Wolford, Solutions Architect, Imperva View details

 
 
 

2:25 pm - 2:50 pm

Executive Exchange

 

Think Tank

Establishing Trust & Ethical Data Usage through Scoring

As organizations mature their data management, governance and quality approach, how can data professionals keep their finger on the pulse and ensure data is trusted and is being utilized ethically?  It's a tough job to ensure the organization trusts the data in use and even tougher to deploy the right mechanisms to ensure there is a way to monitor for unethical usage.  We need to change how we think about data.  Business teams need to be active owners of critical data. Critical data needs to have a trust and ethical usage scoring framework.

Takeaways:

  1. Simple way do you gauge data trust in your organization
  2. Cover the broader topic of digital ethics and the trust of your employees and customers
  3. What steps your organization can take to establish trust and ethical usage monitoring

Presented by:

Sherri Adame, Chief Customer/Reference Data Officer, Cigna View details

 
 
 

2:55 pm - 3:20 pm

Executive Exchange

 

Share:

Thought Leadership

Is AI the future of Email Security?

Email continues to be the dominant attack vector for threat actors in today's landscape. Email security gateways have been focused and effective on widespread attacks and campaigns, but have been porous to sophisticated, highly targeted attacks. Despite significant investments into email security, Business Email Compromise (BEC) losses have nearly doubled year over year over year - from $360M in 2016 to $1.3B in 2018. This represents roughly 48% of all cybercrime losses. Combatting BEC and other socially-engineered, payload-less attacks requires a shift in mindset and approach. AI and Machine Learning have hyped technologies in security over the past several years. So the question is - Is AI the future of email security?

Sponsored by:

Abnormal Security View details

 
 

Presented by:

Ken Liao, VP of Cybersecurity Strategy, Abnormal Security View details

 
 
 

3:20 pm - 3:30 pm

Afternoon Networking Coffee Break

 

3:35 pm - 4:00 pm

Executive Exchange

 

Share:

Think Tank

The Power of Big Data: Energizing the Customer Experience

Customer intimacy is an imperative for companies who are struggling with increasing commoditization of goods and services and an explosive growth in the channels of engagement. Digital organizations have a head start and have disrupted traditional customer interfaces to gain competitive advantage. As a result, organizations across industries are now exploring ways to energize the customer experience and fill the digital gap. This session will present practical ways in which leaders in digital customer experience are leveraging big data to harvest customer insights, create new business applications and enable digital transformation within sales and marketing. 

Takeaways:

  1. Discuss how CIOs and CMOs need to interact to enable effective operating models to monetize on big data. 
  2. Discover how new data ingestion techniques and Big Data Lake are used to drive customer intimacy

Presented by:

Noura Panaritis, Sr. Director Enterprise Business Applications, JD Power and Assoicates View details

 
 
 

4:05 pm - 4:35 pm

Executive Exchange

 

Innovation Partner Showcase

A brief, but compelling review of three new innovative technologies supporting digital transformation.

Sponsored by:

Expel View details

 
 

Siemplify View details

 
 

Presented by:

Gregg Kalman, Account Executive, Expel View details

 
 

Rob Nahorski, Director of Sales, Siemplify View details

 
 
 

4:35 pm - 5:15 pm

End of Day Panel & Closing Remarks

The Revitalizing Change in the Role of the CISO/Security Leader and Digital IT.

A CISO's and Security leader's role, goals and objectives have drastically changed over the years as most Security supervise teams and units beyond their IT's security. Because of these changes in responsibilities, a CISO's success is measured in greater business metrics. As a result, the role of a CXO has become both more attractive and more demanding. 

Takeaways:
  1. What are the significant changes regarding the role of the CISO/Security Leader
  2. How to keep up with the changing requirements
  3. How to properly measure a CXO's success

Moderated by:

Steve Weber, Former Senior Director, Global Information Security, OptumRX

 

Panelists:

Ryan Collier, Chief Digital Officer, Risk Placement Services (Arthur J Gallagher & Co.)

 

Kenneth Townsend, CISO, R1 RCM

 

Kyle Bellin, BISO, CNA Insurance

 

Tim Luallen, CISO, Tate & Lyle

 
 

5:15 pm - 6:30 pm

Summit Happy Hour