CIO Denver Summit | May 24, 2017 | The Westin Denver Downtown - Denver, CO, USA

↓ Agenda Key

Keynote Presentation

Visionary speaker presents to entire audience on key issues, challenges and business opportunities

Keynote Presentations give attending delegates the opportunity to hear from leading voices in the industry. These presentations feature relevant topics and issues aligned with the speaker's experience and expertise, selected by the speaker in concert with the summit's Content Committee." title="Keynote Presentations give attending delegates the opportunity to hear from leading voices in the industry. These presentations feature relevant topics and issues aligned with the speaker's experience and expertise, selected by the speaker in concert with the summit's Content Committee.

Executive Visions

Panel moderated by Master of Ceremonies and headed by four executives discussing critical business topics

Executive Visions sessions are panel discussions that enable in-depth exchanges on critical business topics. Led by a moderator, these sessions encourage attending executives to address industry challenges and gain insight through interaction with expert panel members." title="Executive Visions sessions are panel discussions that enable in-depth exchanges on critical business topics. Led by a moderator, these sessions encourage attending executives to address industry challenges and gain insight through interaction with expert panel members.

Thought Leadership

Solution provider-led session giving high-level overview of opportunities

Led by an executive from the vendor community, Thought Leadership sessions provide comprehensive overviews of current business concerns, offering strategies and solutions for success. This is a unique opportunity to access the perspective of a leading member of the vendor community." title="Led by an executive from the vendor community, Thought Leadership sessions provide comprehensive overviews of current business concerns, offering strategies and solutions for success. This is a unique opportunity to access the perspective of a leading member of the vendor community.

Think Tank

End user-led session in boardroom style, focusing on best practices

Think Tanks are interactive sessions that place delegates in lively discussion and debate. Sessions admit only 15-20 participants at a time to ensure an intimate environment in which delegates can engage each other and have their voices heard." title="Think Tanks are interactive sessions that place delegates in lively discussion and debate. Sessions admit only 15-20 participants at a time to ensure an intimate environment in which delegates can engage each other and have their voices heard.

Roundtable

Interactive session led by a moderator, focused on industry issue

Led by an industry analyst, expert or a member of the vendor community, Roundtables are open-forum sessions with strategic guidance. Attending delegates gather to collaborate on common issues and challenges within a format that allows them to get things done." title="Led by an industry analyst, expert or a member of the vendor community, Roundtables are open-forum sessions with strategic guidance. Attending delegates gather to collaborate on common issues and challenges within a format that allows them to get things done.

Case Study

Overview of recent project successes and failures

Case Studies allow attending executives to hear compelling stories about implementations and projects, emphasizing best practices and lessons learned. Presentations are immediately followed by Q&A sessions." title="Case Studies allow attending executives to hear compelling stories about implementations and projects, emphasizing best practices and lessons learned. Presentations are immediately followed by Q&A sessions.

Focus Group

Discussion of business drivers within a particular industry area

Focus Groups allow executives to discuss business drivers within particular industry areas. These sessions allow attendees to isolate specific issues and work through them. Presentations last 15-20 minutes and are followed by Q&A sessions." title="Focus Groups allow executives to discuss business drivers within particular industry areas. These sessions allow attendees to isolate specific issues and work through them. Presentations last 15-20 minutes and are followed by Q&A sessions.

Analyst Q&A Session

Moderator-led coverage of the latest industry research

Q&A sessions cover the latest industry research, allowing attendees to gain insight on topics of interest through questions directed to a leading industry analyst." title="Q&A sessions cover the latest industry research, allowing attendees to gain insight on topics of interest through questions directed to a leading industry analyst.

Vendor Showcase

Several brief, pointed overviews of the newest solutions and services

Taking the form of three 10-minute elevator pitches by attending vendors, these sessions provide a concise and pointed overview of the latest solutions and services aligned with attendee needs and preferences." title="Taking the form of three 10-minute elevator pitches by attending vendors, these sessions provide a concise and pointed overview of the latest solutions and services aligned with attendee needs and preferences.

Executive Exchange

Pre-determined, one-on-one interaction revolving around solutions of interest

Executive Exchanges offer one-on-one interaction between executives and vendors. This is an opportunity for both parties to make key business contacts, ask direct questions and get the answers they need. Session content is prearranged and based on mutual interest." title="Executive Exchanges offer one-on-one interaction between executives and vendors. This is an opportunity for both parties to make key business contacts, ask direct questions and get the answers they need. Session content is prearranged and based on mutual interest.

Open Forum Luncheon

Informal discussions on pre-determined topics

Led by a moderator, Open Forum Luncheons offer attendees informal, yet focused discussions on current industry topics and trends over lunch." title="Led by a moderator, Open Forum Luncheons offer attendees informal, yet focused discussions on current industry topics and trends over lunch.

Networking Session

Unique activities at once relaxing, enjoyable and productive

Networking opportunities take various unique forms, merging enjoyable and relaxing activities with an environment conducive to in-depth conversation. These gatherings allow attendees to wind down between sessions and one-on-one meetings, while still furthering discussions and being productive." title="Networking opportunities take various unique forms, merging enjoyable and relaxing activities with an environment conducive to in-depth conversation. These gatherings allow attendees to wind down between sessions and one-on-one meetings, while still furthering discussions and being productive.

 

Wednesday, May 24, 2017 - CIO Denver Summit

7:30 am - 9:00 am

Registration and Networking Breakfast

 

9:00 am - 9:10 am

Welcome Address and Opening Remarks

Presented by:

Fred Kesinger, Partner and MC, Kesinger Group View details

 
 
 

9:15 am - 9:45 am

Share:

Keynote Presentation

Analytics & Cloud Together: Accelerating Innovation in the New Cognitive Era

Leading companies are disrupting the status quo by using data to inform business strategy and create new business models that fuel growth. CIOs have the power to uncover the insight that drives disruption and speeds transformation. Learn how leading IT organizations are maximizing the use of open source and cloud technologies alongside on-premises investments to accelerate innovation. And understand how CIOs are embracing new cloud-enabled consumption models while helping ensure data privacy, security and sovereignty.

Takeaways:

  • Integrating analytics into key applications and systems can enable people throughout an organization to access and act on insights when and where it matters most.
  • Take advantage of more sources to enable better decisions. IT must create an environment with easy access to all types of data - structured and unstructured - from internal sources and those outside the organization.
  • Data science teams are answering the toughest questions by leveraging open source development platforms and tools to build models more quickly and easily.

Sponsored by:

IBM View details

 
 
 

9:50 am - 10:15 am

Executive Exchange

 

Vendor Showcase


 

10:20 am - 10:45 am

Executive Exchange

 

Executive Boardroom

Next Generation Email Defense - How Machine Learning and Big Data is Improving Email Security

While data breaches and the millions of dollars lost with each attack continue to make headlines, it is often overlooked that most of these attacks started with a malicious email and a user that was tricked into either clicking on a link or opening an attachment. Email continues to be one of the top targets for cyber criminals. Attackers continue to send cunning and deceptive messages and users continue to fall for them. Most organizations have multiple levels of protection already in place but malicious emails still find a way through to the user's inbox. Learn how criminal's tools and tactics have evolved which is driving an evolution in email security technologies. Learn from industry experts about today's newest email threats, understand the danger it poses to your organization, and discover how to protect your business in this ever-changing landscape. Hear how big data and machine learning are being leveraged by next generation solutions to stop this ongoing battle.  

Takeaways: 

  • Discuss current email security threat landscape and why malicious emails continue to evade detection 
  • Understanding the potential for a single email to result in a complete business shut down 
  • Discover many best practices for protecting users from email borne threats 
  • Learn how big data and machine learning is being leveraged in new technologies to protect against the latest targeted and social engineering attacks

Sponsored by:

BAE Systems Applied Intelligence View details

 
 
 

10:45 am - 10:55 am

Morning Networking Coffee Break

 

11:00 am - 11:25 am

Executive Exchange

 

Think Tank

IoT and IT/OT

One of the key areas for early IoT projects is in the area of industrial automation, as an extension of existing, older M2M type technologies. In many cases these older industrial automation initiatives used proprietary communications protocols and dedicated sensors that interfaced with controllers that could manage communications between IT and OT platforms. Fast forward to an IoT world however and these sensors and controllers will need to natively speak IP, natively integrate to back-end enterprise systems beyond just simple controllers, systems such as ERP, BI and other core platforms. Navigating the complexity of process, data, security, and functionality implications has the potential to be a minefield for the unwitting IT executive that goes in without eyes wide open. 

Takeaways: 
  • IT/OT integration is a low-hanging fruit area for IoT adoption
  • Existing investments into older M2M IT/OT integrations however can erode any potential value 
  • Before investing in IoT enabled IT/OT integration careful consideration must be made of the implications and whether value can be realized รข?" does the investment justify the returns over what is already in place?

Presented by:

Adam Bricker, VP Innovation, Steak n Shake View details

 
 
 

11:30 am - 11:55 am

Executive Exchange

 

Share:

Thought Leadership

Become a Change Agent for Business Transformation

Today's modern CIO is embarking on a digital transformation journey exploring radical hybrid IT strategies and leveraging new technologies like Cloud, Social, Mobile and Big Data. However with 'keeping the lights on' legacy IT components costing nearly 90% of a typical IT budget, how can IT make powerful advancements and lead business change?

Join this interactive session to learn how award-winning CIOs are successfully tipping the balance by liberating people, time and money from costly ongoing maintenance of their ERP systems including SAP and Oracle, to invest in strategic initiatives that create real-world competitive advantage.

Sponsored by:

Rimini Street View details

 
 
 

12:00 pm - 12:25 pm

Executive Exchange

 

Executive Boardroom

Securing Divergent Endpoints

Over the last few years, as cloud and mobile technologies have taken hold within the enterprise, the concept of the network perimeter has dissolved, and with it the concepts around traditional network security. The broad scale adoption of IoT technologies however will make this first phase of network disaggregation seem trivial in comparison as enterprises begin to connect to not just thousands but millions of disparate and divergent endpoints. To ensure appropriate security in such a dispersed networking world and entirely new paradigm to security will be required that encompasses not just wildly diverse types of devices in wildly diverse locations, but the threat of low-powered, low complexity endpoints that have no internal capacity for monitored and managed security capabilities.

Takeaways:

  • The number and type of enterprise endpoints is about to go through explosive growth and each of these endpoints will represent security threat
  • These new endpoints will not have the capacity for internal security and so central security solutions will be required to ensure appropriate protection
  • The volume and variety of new security data feeds and security threat info will overwhelm traditional security platforms and capabilities

Sponsored by:

PhishMe View details

 
 
 

12:25 pm - 1:25 pm

Networking Luncheon

 

1:30 pm - 1:55 pm

Executive Exchange

 

Vendor Showcase


 

2:00 pm - 2:25 pm

Executive Exchange

 

Think Tank

Being a Real (I mean really real) Leader

Being a True Leader is not just about acting like a great person and being the best boss to your staff; it is about being real. Real you say, well that is easy. No, it is about being real to yourself, not the advertising version of yourself, not the image you think the world needs to see, not the forced version of you so that every person says what a great person you are, everyone's favorite, No the real you. Really Real, when you sit alone, looking out over the landscape, truly alone with no pretending, that real. How do you act as a leader when you are challenged, things go wrong or you have great pressure on you to survive. How do you lead when your life and those that are entrusted to you are in danger. It is your decision, your action, their lives. 

Takeaways: 

  • Being a L.E.A.D.E.R is a package of things. How to act, how to learn, how to teach and how to have fun doing it. 
  • A well-rounded leader is someone that do not ask people to do things for him/her; people offer to do things for you, as you have done things for them. 
  • Leadership is more than being the boss, but sometimes it requires being a boss. 
  • Embracing Leadership is a lifestyle, a billboard and it is a mirror reflection of your team.

Presented by:

Kobus Meyer, Senior Director, Visa View details

 
 
 

2:30 pm - 2:55 pm

Executive Exchange

 

Think Tank

Getting Ahead of the Threat: Increase Your Security Intelligence

Organizations spend their time reacting to cyber-attacks and never become, or even know how to become, proactive. Threat intelligence is how you become proactive, information on the threats, their tactics, techniques and procedures and how you put that knowledge into proactive defense. 

Threat Intelligence is: Information that can aid decisions, with the aim of preventing an attack or decreasing the time taken to discover an attack. Intelligence can also be information that, instead of aiding specific decisions, helps to illuminate the risk landscape.  

Takeaways: This will be a discussion on:

  • What TI is. 
  • How it can be utilized. 
  • How to build a functional TI capability.

Presented by:

Debbie Janeczek, Director, Cyber Threat Intelligence, American Express View details

 
 
 

3:00 pm - 3:25 pm

Executive Exchange

 

Executive Boardroom

Deception - Exposing the Source of Malicious Emails!

Everywhere we look we see evil emails: at work, at home and in the news. Attempting to steal your money, your identity, your login information, sell you something or take you hostage for a hefty ransom.  

Internet criminals are taking advantage of two fundamental characteristics of the human brain: 1) we usually trust something when it's being sent by someone we know, and 2) our brain is designed to gloss over small inconsistencies.  

These criminals are also exploiting another weakness: traditional email filtering gateways. Traditionally designed to to fight spam or check for a malicious attachment, email filtering gateways have evolved slightly to determine if a URL in a given email is bad. Unfortunately, these controls are not enough to out-pace today's sophisticated attacks and it's why we continue to see data breach after data breach. 

Agari will share a few recent phishing examples and trends based on real-world cases that were detected - some of these might even look familiar! What is needed is a new approach to this growing problem: the internet criminals are using identity deception to carry out their malicious acts. The only way to stop them is to understand the true identity of these emails.

Sponsored by:

Agari View details

 
 
 

3:25 pm - 3:40 pm

Afternoon Networking Coffee Break

 

3:45 pm - 4:10 pm

Executive Exchange

 

Think Tank

It's ten o'clock, it's dark, do you know where your data is?

Cloud engagements of all different flavors, (whether Software, Platform, or Infrastructure as a Service) bring the promise of significant cost reductions, speed to deployment and increased flexibility. However, these benefits whether perceived or realized bring significant risk if not executed correctly. Old school technology paradigms are literally being fractured when our organizations willfully tear down the traditional boundaries around data and blow up the perimeter around systems. Join our discussion as we explore both the security and compliance issues inherent in Cloud deployments, look at the hidden issues Cloud adopters may not have considered, and discuss ideas and solutions that can be used to address these challenges - and allow enterprises to realize the business benefits of the cloud. 

Takeaways: 
  • Discover how other security leaders are dealing with these dramatic paradigm changes 
  • Learn how successful cloud adopters have mitigated information risks 
  • Real world action items security leaders can and should do now

Presented by:

Brett Mueller, Vice President Global Information Risk Governance, First Data Corporation

 
 

4:20 pm - 5:05 pm

Executive Visions

Facilitating Technology-Enabled Business Transformation

The role of the modern IT Executive is more complex than it has ever been before, not just because the technology landscape has become more complex, but also because increasingly IT execs have had to become a business-focused executive, not just a technologist. Long have we talked about the CIO and CISO getting a seat at the table but modern businesses are now demanding that their technology impresario join them and leverage his deep and rich technical acumen to allow the organization as a whole to better position itself for market-place success. To be successful, CxOs need to invest in themselves, in their personnel, and in the right technologies to allow them to position the IT department to proactively address business needs as an innovator and driver, rather than order-taker and enabler.

Takeaways:

  • IT leadership can no longer be simply technology focused, but must instead take their visibility into business process and become business focused
  • A broader business-focus does not preclude maintaining technology excellence however and indeed may demand more of it than ever before
  • Success for CxOs will be measured not in how they can enable enterprise decisions, but in how they can drive growth

Moderated by:

Fred Kesinger, Partner and MC, Kesinger Group View details

 
 

Panelists:

Scott Cardenas, CIO, City and County of Denver

 

Jeff Pelot, CIO, Denver Health View details

 
 

Presented by:

Adam Bricker, VP Innovation, Steak n Shake View details

 
 
 

5:05 pm - 5:15 pm

Thank You Address and Closing Remarks

Presented by:

Fred Kesinger, Partner and MC, Kesinger Group View details

 
 
 

5:15 pm - 6:30 pm

Cocktail Reception