CIO Digital Transformation Summit | May 6-8, 2019 | Chateau Elan - Atlanta, GA, USA

↓ Agenda Key

Keynote Presentation

Visionary speaker presents to entire audience on key issues, challenges and business opportunities

Keynote Presentations give attending delegates the opportunity to hear from leading voices in the industry. These presentations feature relevant topics and issues aligned with the speaker's experience and expertise, selected by the speaker in concert with the summit's Content Committee." title="Keynote Presentations give attending delegates the opportunity to hear from leading voices in the industry. These presentations feature relevant topics and issues aligned with the speaker's experience and expertise, selected by the speaker in concert with the summit's Content Committee.

Executive Visions

Panel moderated by Master of Ceremonies and headed by four executives discussing critical business topics

Executive Visions sessions are panel discussions that enable in-depth exchanges on critical business topics. Led by a moderator, these sessions encourage attending executives to address industry challenges and gain insight through interaction with expert panel members." title="Executive Visions sessions are panel discussions that enable in-depth exchanges on critical business topics. Led by a moderator, these sessions encourage attending executives to address industry challenges and gain insight through interaction with expert panel members.

Thought Leadership

Solution provider-led session giving high-level overview of opportunities

Led by an executive from the vendor community, Thought Leadership sessions provide comprehensive overviews of current business concerns, offering strategies and solutions for success. This is a unique opportunity to access the perspective of a leading member of the vendor community." title="Led by an executive from the vendor community, Thought Leadership sessions provide comprehensive overviews of current business concerns, offering strategies and solutions for success. This is a unique opportunity to access the perspective of a leading member of the vendor community.

Think Tank

End user-led session in boardroom style, focusing on best practices

Think Tanks are interactive sessions that place delegates in lively discussion and debate. Sessions admit only 15-20 participants at a time to ensure an intimate environment in which delegates can engage each other and have their voices heard." title="Think Tanks are interactive sessions that place delegates in lively discussion and debate. Sessions admit only 15-20 participants at a time to ensure an intimate environment in which delegates can engage each other and have their voices heard.

Roundtable

Interactive session led by a moderator, focused on industry issue

Led by an industry analyst, expert or a member of the vendor community, Roundtables are open-forum sessions with strategic guidance. Attending delegates gather to collaborate on common issues and challenges within a format that allows them to get things done." title="Led by an industry analyst, expert or a member of the vendor community, Roundtables are open-forum sessions with strategic guidance. Attending delegates gather to collaborate on common issues and challenges within a format that allows them to get things done.

Case Study

Overview of recent project successes and failures

Case Studies allow attending executives to hear compelling stories about implementations and projects, emphasizing best practices and lessons learned. Presentations are immediately followed by Q&A sessions." title="Case Studies allow attending executives to hear compelling stories about implementations and projects, emphasizing best practices and lessons learned. Presentations are immediately followed by Q&A sessions.

Focus Group

Discussion of business drivers within a particular industry area

Focus Groups allow executives to discuss business drivers within particular industry areas. These sessions allow attendees to isolate specific issues and work through them. Presentations last 15-20 minutes and are followed by Q&A sessions." title="Focus Groups allow executives to discuss business drivers within particular industry areas. These sessions allow attendees to isolate specific issues and work through them. Presentations last 15-20 minutes and are followed by Q&A sessions.

Analyst Q&A Session

Moderator-led coverage of the latest industry research

Q&A sessions cover the latest industry research, allowing attendees to gain insight on topics of interest through questions directed to a leading industry analyst." title="Q&A sessions cover the latest industry research, allowing attendees to gain insight on topics of interest through questions directed to a leading industry analyst.

Vendor Showcase

Several brief, pointed overviews of the newest solutions and services

Taking the form of three 10-minute elevator pitches by attending vendors, these sessions provide a concise and pointed overview of the latest solutions and services aligned with attendee needs and preferences." title="Taking the form of three 10-minute elevator pitches by attending vendors, these sessions provide a concise and pointed overview of the latest solutions and services aligned with attendee needs and preferences.

Executive Exchange

Pre-determined, one-on-one interaction revolving around solutions of interest

Executive Exchanges offer one-on-one interaction between executives and vendors. This is an opportunity for both parties to make key business contacts, ask direct questions and get the answers they need. Session content is prearranged and based on mutual interest." title="Executive Exchanges offer one-on-one interaction between executives and vendors. This is an opportunity for both parties to make key business contacts, ask direct questions and get the answers they need. Session content is prearranged and based on mutual interest.

Open Forum Luncheon

Informal discussions on pre-determined topics

Led by a moderator, Open Forum Luncheons offer attendees informal, yet focused discussions on current industry topics and trends over lunch." title="Led by a moderator, Open Forum Luncheons offer attendees informal, yet focused discussions on current industry topics and trends over lunch.

Networking Session

Unique activities at once relaxing, enjoyable and productive

Networking opportunities take various unique forms, merging enjoyable and relaxing activities with an environment conducive to in-depth conversation. These gatherings allow attendees to wind down between sessions and one-on-one meetings, while still furthering discussions and being productive." title="Networking opportunities take various unique forms, merging enjoyable and relaxing activities with an environment conducive to in-depth conversation. These gatherings allow attendees to wind down between sessions and one-on-one meetings, while still furthering discussions and being productive.

 

Monday, May 6, 2019 - CIO Digital Transformation Summit

12:00 pm - 2:00 pm

Registration & Greeting

 

1:40 pm - 1:50 pm

Welcome & Opening Remarks

Presented by:

Alizabeth Calder, SVP CIO, HomeEquity Bank View details

 
 
 

1:50 pm - 2:25 pm

Share:

Keynote Presentation

Stacking the Deck With Compliance

Organizations are under two complimentary but frequently misaligned business goals: running a profitable business while reducing risk in conforming to laws and regulations that are evolving monthly. Finding the path to strategic advantage as you embrace compliance obligations and think about the strategy ahead to generate more value from your data can be accelerated by AI. 

This discussion will enable you to: 

  • Hear firsthand from organizations and learn best practices in Data Governance and Information Quality using AI techniques and tools 
  • Utilize regulations such as CCPA and GDPR as value generators beyond compliance to create a win for your business. 
  • Determine key steps in the journey to reduced risk with maximized data value through AI

Sponsored by:

IBM View details

 
 

Presented by:

Miguel Llopiz, IBM North America Governance Practice, IBM View details

 
 
 

2:30 pm - 3:05 pm

Share:

Keynote Presentation

Key IT Leadership Considerations Surrounding a Digital Transformation

When embarking on the digital transformation journey, there are many key considerations an enterprise needs to tackle. Digital is not an 'add-on' - it is a fundamental and comprehensive paradigm shift to transform IT and the business. Considerations to solve in conjunction with your business partners include common digital vocabulary, cultural models, prioritization of business needs, change management and governance concerns. 

In this keynote in addition to strategy and business partnerships, we will discuss the technical platform considerations required to embark upon your digital journey. These include:  

  1. Cloud Infrastructure & Services 
  2. Digital Channels 
  3. API Economy 
  4. Employee Experience 
  5. Innovative Technologies

Presented by:

David Baldwin, VP, Head of Data and Enterprise Architecture, Fannie Mae

 
 

3:10 pm - 3:35 pm

Executive Exchange

 

Think Tank

Core, Digital, and Banking Transformation - From Planning to Transformational Outcomes

Managing a single transformation is hard enough, but running polymorphic transformation initiatives requires exceptional focus and execution. While most organizations know they need to transform, the what and how can vary. Foundational activities, such as building out a modern application platform, may seem minor but ignoring this key step is a top reason most projects stall or fail. Improving business process to meet the demands of digital era is a vital imperative. In this session, we will share best practices for a smooth journey into digital transformation to help you imagine what's possible today, and beyond to forward-thinking initiatives.


Presented by:

Vasu Sambasivam, EVP Enterprise Architecture, Zions Bancorporation

 

Think Tank

Regulations Mean Change

More complex regulations, such as the General Data Protection Regulation (GDPR), have come into play due to the rise of data breaches forces. As data today is viewed as a such an asset, it is also a tremendous liability. Understanding that, organizations must consider both while they implement technologies that will be both innovative their business, but also cost effective. 

Takeaways: 

  1. Understand the latest regulations, such as GDPR 
  2. How to tell your CEO and other business stakeholders that data protection can be a key differentiator for your organization 
  3. The steps needed to take to be regulatory compliant

Presented by:

Anthony Gonzalez, Divisional Chief Information Security Officer, QBE Insurance View details

 
 
 

3:35 pm - 3:45 pm

Networking Break

 

3:50 pm - 4:15 pm

Executive Exchange

 

Share:

Thought Leadership

From the Front Lines: 5 Best Practices for Application Defense in Depth

Everyone knows applications are the lifeblood of the enterprise, but as the threats multiply and come at an ever-faster rate, protecting those applications becomes a massive challenge. Layer in the issues associated with moving applications to the cloud, using open source code, implementing rapid release cycles, and being forced to use legacy apps when the development team is long gone, and it's easy to see that application security can be a thankless, endless job. 

Layered security, or defense-in-depth, is an admirable goal. The problem is, how do you achieve it? We've been on the front lines for years, finding what works and what doesn't. In the process we have distilled five best practices that will help enterprises of any size tackle the thorny problem of application security in a dynamic world where change is the only constant. 

A combination of defenses at the edge, in the network and inside the applications themselves forms the core of the best practices. Layered on top are two additional practices that make all the difference: full real-time visibility with analytics, to help beleaguered security analysts quickly distinguish real threats from noise and take action based on full context; and a consumption model that allow the enterprise to quickly, easily and cost-effectively move protections to where they will do the most good. The result? Vastly improved application security, effective remediation, and a DevSecOps model that works.

Sponsored by:

Imperva View details

 
 

Allan Martin, Senior Security Engineer, Imperva View details

 
 
 

4:20 pm - 4:45 pm

Executive Exchange

 

Think Tank

The Solution for Your Legacy System's Security: The Cloud

Over lifespan of an organization, CIOs/CISOs have developed and implemented technologies that has been key to the organization's success. However, CISOs and their security teams today find themselves stuck ensuring that legacy systems are secure. The solution is cloud-delivered security products that are more agile with the ability to implement new detection methods and services faster than on-site solutions. While cloud security is an ideal solution, it is important to know that using the cloud is more than moving legacy management servers to the cloud. 

Takeaways: 

  1. Review the status of legacy system security 
  2. What cloud solutions are the best fit for their business 
  3. What are the main needs in regards to system's scale, data telemetry, staff growth, machine learning, API-based access, and more

Presented by:

Adolph Barclift, CISO, NCR Corporation View details

 
 

Think Tank

Transforming the Empire: Embracing Digital Dexterity

The conversation about whether or not technology is the new foundation for business capabilities is over. The question facing leaders in every space is what does the individual journey look like for every organization as it seeks to digitize, and what does their business look like once they arrive at their destination? In this talk, we discuss Caesars Entertainment's transformational journey and what organizations need to be thinking about as they set out on their own.

Takeaways: 

  1. How to lay the foundations for successful digital transformation 
  2. The challenges of transformation 
  3. The difference between little 't' and big 'T' change

Presented by:

Salil Kulkarni, SVP & CTO, Caesars Entertainment View details

 
 
 

4:50 pm - 5:15 pm

Executive Exchange

 

Share:

Thought Leadership

Is your IT Roadmap Business Driven or Vendor Dictated?

Today, the #1 CEO priority is GROWTH and most see technology as a key enabler. But vendor policies pose major roadblocks to innovation, growth and even security by forcing CIOs and CISOs to spend limited budget, resources and time on projects that may not drive your business. 

Learn how you can take control of your IT roadmap including security by choosing a Business-Driven Roadmap designed around your business and compliance objectives and not the vendor's. Leverage vendor software, but do it on your terms, on your timetable and with the flexibility, funding and freedom to focus on initiatives that support growth and protect the enterprise.

Sponsored by:

Rimini Street View details

 
 

Presented by:

Sebastian Grady, President & COO, Rimini Street View details

 
 
 

5:20 pm - 6:20 pm

Executive Visions Panel

CIO: The Cultural Information Officer

A CIO's role, goals and objectives have drastically changed over the years as most CIOs supervise teams and units beyond their IT department. Because of these changes in responsibilities, a CIO's success is measured in greater business metrics. As a result, the role of a CIO has become both more attractive and more demanding.

Takeaways:

  1. What are the significant changes regarding the role of the CIO
  2. How to keep up with the changing requirements
  3. How to properly measure a CIO's success

Moderated by:

Alizabeth Calder, SVP CIO, HomeEquity Bank View details

 
 

Panelists:

Grant Sewell, Head of information security, Safelite AutoGlass

 

Ralph Groce III, Global CIO, Everest Reinsurance Company View details

 
 

Julie Elmore, CTO, Dollar General

 
 

6:20 pm - 6:30 pm

Closing Remarks

 

6:30 pm - 7:30 pm

Summit Networking Happy Hour

 

7:30 pm - 8:30 pm

Welcome Dinner

 

8:30 pm - 9:30 pm

After Dinner Networking Reception

 

Tuesday, May 7, 2019 - CIO Digital Transformation Summit

7:45 am - 8:30 am

Registration & Networking Breakfast

 

8:30 am - 8:40 am

Welcome & Opening Remarks

Moderated by:

Mark Gelhardt, VP Technology Governance, Elavon View details

 
 
 

8:40 am - 9:15 am

Share:

Keynote Presentation

Bringing Down the Barriers

With the role of the CIO expanding, CIOs are being pushed to increase digital business by using IT in ways that deliver cost saving methods and increased levels of productivity, as well as new opportunities. However, many believe that current methods for these opportunities have reached their end. As a result, it is time to reconfigure these methods in new, unique ways. 

Takeaways: 

  1. Latest strategies or methods to increase digital business 
  2. How to confront resiliency or resistance to new digital initiatives 
  3. The different types of behavioral patterns or mindsets to confront

Presented by:

Scott Dillon, Strategic Advisor & Former CTO Wells Fargo, Wells Fargo & Company View details

 
 
 

9:20 am - 9:55 am

Keynote Presentation

AI: a CISO's Best Friend

It does not take an expert to know that information security threats will only continue to increase. That said, AI is proving to be a worthy defense against these threats. Leading enterprise organizations are investing and relying on AI-based security systems and analytics. As this trend continues, AI-defense will only continue to grow and improve.

Takeaways: 

  1. The future of AI-based security and how it will impact your organization 
  2. The latest threats and how AI-based security can help 
  3. Create awareness for your stakeholders to gain support behind AI-based security systems

Presented by:

Shamla Naidoo, Former Chief Information Security Officer, IBM

 
 

10:00 am - 10:35 am

Share:

Keynote Presentation

Humanizing Digital Transformation

Digital transformation isn't easy. Too often, companies invest heavily in new technology or hire outside consultants without addressing internal, human barriers that stand in the way of effective change. In fact, 60 percent of pilots fail - even with technology in place - victims of this shortsightedness when it comes to considering the human elements required for change. This session will present lessons about managing the human side of digital transformation - because it's the people who make change possible.

Takeaways:

  1. Identify some of the common culprits behind human barriers to digital transformation
  2. Reframe problems to "humanize" digital transformation from the outset
  3. Garner hard-earned insights from extensive experience helping organizations change


Presented by:

Mario Montag, VP Chief Data & Analytics Officer, United Technologies View details

 
 
 

10:40 am - 10:50 am

Morning Networking Coffee Break

 

10:55 am - 11:20 am

Executive Exchange

 

Share:

Thought Leadership

How to Accelerate & Simplify Approvals, & Why It Matters

Approvals today are a complicated and time-consuming experience for managers and executives. Logging into multiple applications, searching through emails, establishing VPN access, and forgetting log-in credentials cause unnecessary frustration and negative financial impacts. Capriza's ApproveSimple consolidates all your approvals into a single, unified worklist delivered to any device, anywhere. Customers reduce approval cycles by an average of 70% and enjoy a consumer-like user experience in the enterprise. Find out how you can boost productivity, accelerate your business, and increase employee satisfaction.

Sponsored by:

Capriza View details

 
 

Presented by:

Kyle Bersch, Regional Sales Manager, Capriza View details

 
 
 

11:25 am - 11:50 am

Executive Exchange

 

Share:

Executive Boardroom

Minimizing the detection to recovery timeframe

While recent trends have shown attackers are more frequently using simple tools and tactics to make a big impact to the overall global cost of data breaches, sophisticated threat actors utilizing advanced techniques to avoid detection could potentially have the greatest impact to an organization's bottom line. While commodity threats continue to make the case for investment in preventative technologies, stricter regulations around breach notifications all but mandates increased investment in advanced detection and response capabilities. Now more than ever is minimizing the detection to response timeframe of utmost importance to ensure an organization is able to not only detect threats but contain and respond in a timeframe that minimizes the potential risk of impacting their clients and suffering the business altering implications of compliance violations.  

As organizations begin to address this transition, knowing where to start is a challenge. We invite you to join us, as they cover the best path going forward and real-life examples of how advanced detection and response capabilities were able to thwart attackers and satisfy even the most stringent emerging regulatory requirements.

Sponsored by:

eSentire View details

 
 

Presented by:

Michael Sci, Senior Solutions Engineer, eSentire View details

 
 
 

11:55 am - 12:20 pm

Executive Exchange

 

Share:

Think Tank

New Data Infrastructure Solution

Edge cloud, blockchain, and other innovations are changing the way data is handled, tracked, and stored. All come with advantages as well as limitations compared to the centralized data infrastructure solution. Firms who embrace technological innovation too early might be hindered by the technical difficulties associated with new technology.

Takeaways: 

  1. Advantages of data virtualization 
  2. Current challenges of blockchain technology 
  3. On-premise vs off-premise solutions

Presented by:

Greg Ericson, CIO, Essilor View details

 
 
 

12:25 pm - 12:50 pm

Executive Exchange

 

Share:

Think Tank

The Future of Autonomous Things

Today, we are seeing more Autonomous Things technology than ever before. As a result, functions formerly performed by humans are being replaced with AI. This technology's automation goes beyond the automation by using AI to deliver innovative behaviors that interact more efficiently and effectively with their surroundings and with their end-users.

Takeaways:

  1. Cover the latest innovations in autonomous and networked entities for 2019
  2. Learn how these innovations will shape the different industries and business landscapes
  3. Discuss the potential compromises to privacy and safety in the future of AI

Presented by:

Rick Nietubicz, Director of Data Governance - Data Privacy, CBRE

 
 

12:55 pm - 2:05 pm

Share:

Working Luncheon & Panel

Leveraging AI to Fuel the Future

Artificial intelligence is continuing to be one of the hottest topics no matter what industry you're in. However, there is still discussion on the future of AI and its effect on our everyday lives. One side feels that it is a threat to the more routine jobs as it changes entire industries while the other side feels that AI's capabilities pale in comparison to the human mind. The fact remains that AI is trending into aspects of our lives and our work. This panel will gather industry leaders to put AI's emerging trends into perspective. 

Takeaways: 

  1. Learn more about how to implement AI into your or organization  
  2. Rethink the way humans and machines interact 
  3. Discuss how AI can drive new offerings and business models

Moderated by:

Shamla Naidoo, Former Chief Information Security Officer, IBM

 

Panelists:

Naya Resnick, Vice President, Technology, 21st Century Fox

 

Ivneet Kaur, SVP, Product Architecture, Equifax

 

Noura Panaritis, Sr. Director Enterprise Business Applications, JD Power and Assoicates View details

 
 
 

2:10 pm - 2:35 pm

Executive Exchange

 

Share:

Think Tank

Cloud Security Architecture (CSA) Capability Framework to Create Built-in Security for a CloudHybrid Data Center

Cloud enables a financial organization to achieve better business agility, speed to the market, long-term cost saving, and great security and compliance at a scale and speed that cannot be matched by a traditional on-premise data center. To achieve the most benefits, the organization may want to use services from multiple clouds with different service models (e.g., SaaS - O365, PaaS - Azure, and IaaS - AWS) and deployment models. The security risks must be addressed systemically and comprehensively to maintain confidence in the cloud systems and trust in the financial institution. The defense needs to be built-in from the beginning rather than bolted-on later. Once built-in, the security controls can be inherited or leveraged by business applications and data deployed in the cloud-hybrid data center, increasing speed to the market and better system security and compliance.  
This session introduces a Cloud Security Architecture (CSA) Capability framework that enables an organization to build the state-of-art defenses into a cloud-hybrid data center. It allows the organization to safely deploy high-risk workloads and process regulated and sensitive data in multiple clouds with built-in compliance to multiple regulatory mandates and industry standards, such as FFIEC, GLBA, SOX, FISMA, PCI, and NIST 800-53. The framework also allows the organization to rationalize its security technologies, providing portfolio clarity and simplification, identifying saving potential, improving cost efficiency, and reducing security risks.  

Takeaways

  1. The CSA Capability framework can help an organization to achieve better business agility, long-term cost saving, and great security by building security into a cloud-hybrid data center  
  2. The framework can handle top cloud security risks and security requirements from multiple regulatory mandates and an organization's control objectives & controls   
  3. It can clarify & simplify your organization's security technologies portfolio, identify saving potential, improve cost efficiency, and reduce security risks. 


Presented by:

Lian Jin, Chief Security Architect, MUFG Union Bank, N.A. View details

 
 

Think Tank

Bring on The Cloud

Research shows over the next few years, there will be an explosion of new cloud services and solutions as subscription-based software-as-a-service (SaaS), platform-as-a-service (PaaS), infrastructure-as-a-service (IaaS) are anticipated to grow drastically. This session will cover the future of cloud developments and share how organizations take advantage of the cloud. 

Takeaways: 

  1. How to take advantage of the ease and high-performance of the cloud
  2. How to keep your data secure when implementing cloud computing technology 
  3. What to look for when working with cloud partners

Presented by:

Ivneet Kaur, SVP, Product Architecture, Equifax

 
 

2:40 pm - 3:05 pm

Executive Exchange

 

Share:

Executive Boardroom

Mobile and Web App Security: How Do You Know You Got It Right?

Increasingly, organizations across all industries are using mobile and web applications to attract new customers and conduct business. But bad actors are also aware of these lucrative channels and are continually looking for ways to exploit them. So, how do you know if app and network security is sufficient to protect against data breaches? Can your apps detect the latest reverse engineering attacks and defend against them? Do you know if existing defenses are working? 

Arxan Senior Security Engineer Paul Dant will help answer these questions and share best practices for web and mobile app protection.

Sponsored by:

Arxan, Inc View details

 
 

Presented by:

Paul Dant, Senior Security Engineer, Arxan, Inc View details

 
 
 

3:10 pm - 3:35 pm

Executive Exchange

 

Share:

Executive Boardroom

How To Establish a Security and Governance Framework Without Getting in the Way of Innovation

Getting the public cloud architecture ?right? is a critical step in your digital transformation. The challenge some organizations face is the architecture development process overshadows or minimizes the security best practices conversation. Join Cloud Technology Partners, a Hewlett Packard Enterprise company to explore how all industries can securely and successfully adopt and utilize the cloud without slowing down the pace of innovation.

Sponsored by:

Cloud Technology Partners, a Hewlett Packard Enterprise company View details

 
 

Presented by:

Stuart Stent, Director, Cloud Professional Services, Cloud Technology Partners, a Hewlett Packard Enterprise company View details

 
 
 

3:35 pm - 3:45 pm

Afternoon Networking Coffee Break

 

3:50 pm - 4:15 pm

Executive Exchange

 

Share:

Think Tank

Making Your Way Through the Fog of Cloud Computing in a Secure Path

What have we learned from a decade of cloud computing? What are the best practices that we should be taking into account as we take the next step on the digital transformation journey? We will discuss the full range of data center to cloud to hybrid cloud to fog and everything in between. 

Takeaways: 

  1. Cloud computing has effectively been with us for a decade. There are clear learnings in the last 10 years that we should leverage as we implement new solutions 
  2. One size does not fit all. Effective solutions can range from a state of the art data center to a hybrid cloud to a fully implemented cloud solution. 
  3. Security requirements must be considered on the various cloud implementation options
  4. Multi-cloud considerations from a security standpoint and operationalization aspect

Presented by:

Paul Hamman, SVP, Head of Cloud Security, SunTrust Bank View details

 
 
 

4:20 pm - 4:45 pm

Executive Exchange

 

Share:

Think Tank

Managing Your Own Career

Are you managing your career or are you just letting life decide what will happen to you next? Do you have a plan for the future? Are you ready for change or are you to busy managing today that you're not looking to your future? Colonel Mark Gelhardt, Former CIO to The White House and author of "My Time at the Clinton White House", will talk about how he managed his own career and made it to The White House to stand next to the President Clinton providing all the classified automation to the Commander-in-Chief. How you too can take hold of your life in the same fashion and make it to where you want to go. If he can do it so can you!

Presented by:

Mark Gelhardt, VP Technology Governance, Elavon View details

 
 
 

4:50 pm - 5:50 pm

Executive Visions

Job Number 1: Top Talent -Finding, Acquiring, Developing, Promoting, and Retaining Great Technologists

While new technology and solutions can help CIOs & CISOs make more, faster and better decisions for an organization, nothing will take the place of a highly talented workforce. Building a great company starts with hiring great employees, and hiring great software engineers can be a particularly challenging task in this competitive marketplace. In this session we'll discuss practical solutions for better technology recruiting and strategies for avoiding costly hiring mistakes. 

Moderated by: Christine Rook, VP IT Talent Acquisition, GTN

Panelists:

Kevin Morrison, CISO, Pulte Group View details

 
 

David Levine, VP, CISO, Ricoh Americas Corporation View details

 
 

Scott Dillon, Strategic Advisor & Former CTO Wells Fargo, Wells Fargo & Company View details

 
 
 

5:50 pm - 6:00 pm

Closing Remarks

Presented by:

Nelson Soares, VP Relationship Management & C-Level Communities, CDM

 
 

6:30 pm - 7:15 pm

Summit Happy Hour

 

7:15 pm - 8:30 pm

Networking Dinner in the Winery

 

8:30 pm - 10:00 pm

After Dinner Networking

 

Wednesday, May 8, 2019 - CIO Digital Transformation Summit

8:00 am - 12:00 pm

Optional Activities

Optional - Sign-up and Pricing available upon request