Digital Marketing Summit US | Mar 25 - 28, 2018 | JW Marriott Hotel Miami - Miami, FL, USA
↓ Agenda Key
Keynote Presentation
Visionary speaker presents to entire audience on key issues, challenges and business opportunities
Keynote Presentations give attending delegates the opportunity to hear from leading voices in the industry. These presentations feature relevant topics and issues aligned with the speaker's experience and expertise, selected by the speaker in concert with the summit's Content Committee." title="Keynote Presentations give attending delegates the opportunity to hear from leading voices in the industry. These presentations feature relevant topics and issues aligned with the speaker's experience and expertise, selected by the speaker in concert with the summit's Content Committee.
Executive Visions
Panel moderated by Master of Ceremonies and headed by four executives discussing critical business topics
Executive Visions sessions are panel discussions that enable in-depth exchanges on critical business topics. Led by a moderator, these sessions encourage attending executives to address industry challenges and gain insight through interaction with expert panel members." title="Executive Visions sessions are panel discussions that enable in-depth exchanges on critical business topics. Led by a moderator, these sessions encourage attending executives to address industry challenges and gain insight through interaction with expert panel members.
Thought Leadership
Solution provider-led session giving high-level overview of opportunities
Led by an executive from the vendor community, Thought Leadership sessions provide comprehensive overviews of current business concerns, offering strategies and solutions for success. This is a unique opportunity to access the perspective of a leading member of the vendor community." title="Led by an executive from the vendor community, Thought Leadership sessions provide comprehensive overviews of current business concerns, offering strategies and solutions for success. This is a unique opportunity to access the perspective of a leading member of the vendor community.
Think Tank
End user-led session in boardroom style, focusing on best practices
Think Tanks are interactive sessions that place delegates in lively discussion and debate. Sessions admit only 15-20 participants at a time to ensure an intimate environment in which delegates can engage each other and have their voices heard." title="Think Tanks are interactive sessions that place delegates in lively discussion and debate. Sessions admit only 15-20 participants at a time to ensure an intimate environment in which delegates can engage each other and have their voices heard.
Roundtable
Interactive session led by a moderator, focused on industry issue
Led by an industry analyst, expert or a member of the vendor community, Roundtables are open-forum sessions with strategic guidance. Attending delegates gather to collaborate on common issues and challenges within a format that allows them to get things done." title="Led by an industry analyst, expert or a member of the vendor community, Roundtables are open-forum sessions with strategic guidance. Attending delegates gather to collaborate on common issues and challenges within a format that allows them to get things done.
Case Study
Overview of recent project successes and failures
Case Studies allow attending executives to hear compelling stories about implementations and projects, emphasizing best practices and lessons learned. Presentations are immediately followed by Q&A sessions." title="Case Studies allow attending executives to hear compelling stories about implementations and projects, emphasizing best practices and lessons learned. Presentations are immediately followed by Q&A sessions.
Focus Group
Discussion of business drivers within a particular industry area
Focus Groups allow executives to discuss business drivers within particular industry areas. These sessions allow attendees to isolate specific issues and work through them. Presentations last 15-20 minutes and are followed by Q&A sessions." title="Focus Groups allow executives to discuss business drivers within particular industry areas. These sessions allow attendees to isolate specific issues and work through them. Presentations last 15-20 minutes and are followed by Q&A sessions.
Analyst Q&A Session
Moderator-led coverage of the latest industry research
Q&A sessions cover the latest industry research, allowing attendees to gain insight on topics of interest through questions directed to a leading industry analyst." title="Q&A sessions cover the latest industry research, allowing attendees to gain insight on topics of interest through questions directed to a leading industry analyst.
Vendor Showcase
Several brief, pointed overviews of the newest solutions and services
Taking the form of three 10-minute elevator pitches by attending vendors, these sessions provide a concise and pointed overview of the latest solutions and services aligned with attendee needs and preferences." title="Taking the form of three 10-minute elevator pitches by attending vendors, these sessions provide a concise and pointed overview of the latest solutions and services aligned with attendee needs and preferences.
Executive Exchange
Pre-determined, one-on-one interaction revolving around solutions of interest
Executive Exchanges offer one-on-one interaction between executives and vendors. This is an opportunity for both parties to make key business contacts, ask direct questions and get the answers they need. Session content is prearranged and based on mutual interest." title="Executive Exchanges offer one-on-one interaction between executives and vendors. This is an opportunity for both parties to make key business contacts, ask direct questions and get the answers they need. Session content is prearranged and based on mutual interest.
Open Forum Luncheon
Informal discussions on pre-determined topics
Led by a moderator, Open Forum Luncheons offer attendees informal, yet focused discussions on current industry topics and trends over lunch." title="Led by a moderator, Open Forum Luncheons offer attendees informal, yet focused discussions on current industry topics and trends over lunch.
Networking Session
Unique activities at once relaxing, enjoyable and productive
Networking opportunities take various unique forms, merging enjoyable and relaxing activities with an environment conducive to in-depth conversation. These gatherings allow attendees to wind down between sessions and one-on-one meetings, while still furthering discussions and being productive." title="Networking opportunities take various unique forms, merging enjoyable and relaxing activities with an environment conducive to in-depth conversation. These gatherings allow attendees to wind down between sessions and one-on-one meetings, while still furthering discussions and being productive.
3:00 pm - 7:00 pm
6:00 pm - 8:00 pm
6:30 pm - 9:00 pm
7:30 am - 8:30 am
8:35 am - 8:45 am
Presented by:
Vivian Schneck-Last, Former Managing Director, Goldman Sachs
Steve Dimmitt, Vice President, Marketing and Customer Success, CDM Media
8:45 am - 9:25 am
Making the transition from legacy systems to next generation implementations is a major decision point for virtually any organization trying to take advantage of the new era in end user enablement through personal devices, connectivity and apps. Indeed, while Digital Transformation is one of those key buzzwords that many toss around, what does it really mean and how will it affect your business? Further, with so many options on the horizon, what are some of the key components you need to be most aware of and in some cases, concerned by? And how can you avoid many of the failures currently prevalent among companies trying to make Digital Transformation work for their business with limited success?
This presentation will focus on key strategies and implementation techniques that will ultimately make it far easier to migrate to next generation business solutions.
Takeaways:
Sponsored by:
Samsung
Presented by:
Keith Fuentes, Vice President, Knox Services, Samsung
9:30 am - 10:10 am
Hybrid Data Management is the foundation for data that will be used in analytics and data science to drive insights for businesses of all sizes and across all industries. It incorporates transactional databases, data warehousing and data lakes with options for on-premises, private and public cloud deployments. Data is the life blood of any organization and it can be a critical asset for the organizations that understand the importance of an uninterrupted flow of information throughout the enterprise.
Thought leaders across the spectrum of enterprise data management want to ensure that critical applications can run anywhere in an enterprise -- no matter where the data resides. In this session, you will learn what Hybrid Data Management is, how it can benefit your organization, what the challenges to deployment are and how some business are already experiencing benefits from the solution with the help of IBM.
Sponsored by:
IBM
Presented by:
Chris Reuter, North America Data Warehouse Sales Leader, IBM
10:15 am - 10:40 am
Kaplan believes "if it can be tracked it can be measured and thus optimized. Kaplan is finding ways to leverage data to transform the student experience support their drive for success. Avinash will share both the current data strategy as well as a look ahead at how to use data to improve the Return on Education Investment (ROEI).
Presented by:
Avinash Tripathi, Strategic Business Partner, Kaplan Inc.
While new technology and solutions can help CISOs make more, faster and better decisions for an organization, nothing will take the place of a highly talented workforce. CISOs need to be great recruiters of talent but even more importantly growing the skills and capabilities of their team providing engaging and challenging opportunities for people. Competitive compensation is important for retaining great talent but so is a work environment where individual growth and development are front of mind and not an after thought.
Takeaways:
Presented by:
Devon Bryan, VP and CISO, Federal Reserve Bank of New York
What have we learned from a decade of cloud computing? What are the best practices that we should be taking into account as we take the next step on the digital transformation journey? We will discuss the full range of data center to cloud to hybrid cloud to fog and everything in between.
Takeaways:
Presented by:
Gram Ludlow, Vice President of Information Security, Marriott Vacations Worldwide Corporation
10:45 am - 11:10 am
Knowing is half the battle when it comes to protecting applications and their sensitive data.
Application security testing tools scan your code to reveal the long lists of known vulnerabilities, but not all are remediated before the next release-even with mature secure software development practices. Enterprises resort to using theoretical levels of criticality รข?" not actual risks-to prioritize which accumulated vulnerabilities to fix and in what order. Many vulnerabilities often undergo an exception process and make it into protocol.
A real-time, embedded solution like Prevoty's runtime application self-protection (RASP0 changes the game completely. Prevoty places an automated security mechanism at the front of the lineรข?"directly in the application's operating environmentรข?"to immediately lower risk and act as a compensating control at runtime.
As such, Prevoty-enabled enterprises see 98%+ of their known vulnerabilities mitigated instantly, reducing backlogs and expediting an otherwise cumbersome release process. Prevoty RASP detects live production attacks and generates real-time security event longs and reports. Security teams can then correlate pre-production vulnerability scan results with Prevoty's runtime attack logs to go back, remediate based on actual riskรข?"not just hypothetical threats. The result? Improved forensics.
Sponsored by:
Imperva
Presented by:
Kunal Anand, CTO, Imperva
11:15 am - 11:40 am
Digital transformation delivers a sustainable competitive edge if done right. The multi-million dollar boardroom question that CIOs are often left to address: "how are we going to pay for this?" with ongoing operations consuming 80%-90% of a typical IT budget.
Join this interactive discussion to hear how technology leaders are adopting three specific strategies to reallocate capital & resources to digital growth. That reality requires significant rethinking of cost components and budget tradeoffs, and exploring radical options across the entire IT landscape.
Sponsored by:
Rimini Street
Presented by:
Hari Candadai, GVP, Global Product Strategy, Rimini Street
11:45 am - 12:10 pm
Deep dives into the latest and greatest technology solutions to today's business problems.
12:15 pm - 12:40 pm
The role of mid-market CIO's is rapidly changing requiring the need to not only support the day-to-day technology concerns of a business but also align new technology plans with the organizations top strategic objectives; in addition all of this must be done while continuing to drive down costs due to tighter IT budgets.
The core of many mid-market organization objectives is how to stay competitive through a better understanding of what customers want. Such an understanding is not the responsibility of a single individual or department but a cohesive approach to enabling all employees to access and interpret customer information as it relates to their specific job functions in their respective departments.
This experience also needs to tie the organization together in a common, flexible and secure platform to not only meet the CIO's needs but also help drive the organization's strategic objectives forward.
Learn how 8x8 can help you create an optimal customer experience by enabling a superior employee experience.
Sponsored by:
8x8
Presented by:
Reza Kamran, Director of Product Marketing, 8x8
Today, Infosec and DevOps operate in silos with different and sometimes competing mandates. DevOps teams focus on velocity with continuous iterations while Infosec teams focus on managing risk and control. With the meteoric rise of microservices architectures enabled by application containers, the disconnect between DevOps and Infosec puts the organization at significant risk. Traditional vulnerability and remediation processes are ineffective in securing containers. Instead, security must be integrated into the CI/CD toolchain as a critical test to discover vulnerabilities and enforce enterprise policies before production. This session will discuss these challenges and suggest techniques, organizational changes and tools that can help DevOps and Infosec adjust to these new realities.
Sponsored by:
Tenable Network Security
12:45 pm - 1:35 pm
1:40 pm - 2:05 pm
Deep dives into the latest and greatest technology solutions to today's business problems.
2:10 pm - 2:35 pm
Successful companies are constantly evolving and identifying new and innovative ways to grow their business and drive customer demand. Highly skilled employees are all tools companies have leveraged to stay ahead of the competition. Data is all around us, and whether we are aware of it or not, virtually everything we do now results in the generation of new data. Every electronic message we send and receive, every internet site we visit - all of this contributes to the vast amount of data that corporations currently hold on us. Data is a commodity in today's world and one whose value is endless. So, what do we do with all this data? The average person remains largely unaware of exactly how much power businesses have through data analytics.
Takeaways
Presented by: David Solganik, Managing Director- Global Head of Business Intelligence and Metrics, Morgan Stanley
It is not a matter of if, but a matter of when. Organizations, more and more, and are outsourcing business activities to third parties because of cost-savings, revenue opportunities, expertise, etc. Thus, collaborating with our business partners early to select the right third-party vendor(s) with the appropriate security posture is essential, especially for vendors hosting, processing and/or transmitting sensitive/regulatory information, or having access to our IT assets.
Takeaways:
Presented by:
Jonathan Hale, CISO, Veolia North America
David can discuss the unique challenges, risks and opportunities involved with effectively guiding a SIFMU through a digital transformation, including:
Presented by:
David Hoag, Group CIO, The OCC
2:40 pm - 3:05 pm
Adaptation is everything. Today's customer knows more about our brand and out competitors than we do - they constantly research competitors, interact with us on their own terms, flow across channels, and take unpredictable routes to a fluid destination. They give us a narrow window of opportunity to capture their attention - and if we miss it's, it's gone forever.
Despite that, only 10% of organizations can adapt an individual's experience in real-time, and optimize their path-to-purchase. The other 90% just can't move fast enough to stay relevant.
In this session, we'll explore how truly disruptive companies are raising the bar for customer experience, right now - leveraging data from across channels to optimize every aspect of the journey - bringing customers closer, and earning the right to expand those relationships.
Key Takeaways:
Sponsored by:
Pegasystems
Cardinal Health successfully entered a new market segment and has become one of today's Specialty Drug distribution market share leaders in only three years! Former Executive Director, Dom Garda, will discuss the digital transformation tactics used to differentiate themselves and enable this success.
Takeaways:
Sponsored by:
Infodat
Enterprises around the globe are creating and storing vast amounts of data as part of their daily business. Without classification of that data, enterprises are at risk for internal or external breaches of data and failing to comply with regulations. What's worse, enterprise security and risk managers are working far harder than they need to without even knowing it. In this session we will discuss data protection challenges and how the increasingly complex regulatory compliance landscape is necessitating organizations to leverage data classification across the enterprise for better risk management. If you are a CISO who has been told to do data classification, this session is for you.
Takeaways:
Sponsored by:
Boldon James
3:10 pm - 3:20 pm
3:25 pm - 3:50 pm
Deep dives into the latest and greatest technology solutions to today's business problems.
3:55 pm - 4:20 pm
Hadoop and related technologies for Big Data analytics can deliver tremendous business value, and at a lower cost than traditional data management approaches. But early adopters have encountered challenges and learned lessons over the past few years. In this presentation, we'll discuss:
Sponsored by:
Dell EMC
As today's attacks become more sophisticated, the pressure to protect access to enterprise systems and applications has grown considerably. Unlike the traditional security perimeter model, a Zero Trust approach dispels the notion of traditional models and moves toward a ?Never trust, Always verify? model for protecting access to data. Zero Trust recognizes that any network, device, user, or application could be compromised, and the credentials associated with them. As such, in order to better protect sensitive company resources, IT departments need to adjust their mindset and adopt a new way of thinking: that bad actors are already in their environment. Join us to hear how identity has become the hub of any Zero Trust framework, and discover several guiding principles and paradigms that help define a Zero Trust model.
We'll examine: The current (broken) state of security and the role identity plays in cyber attacks, the massive rethink underway that redefines security to follow identity, and how Centrify is adopting a Zero Trust model approach with identity at the core, thus uniquely helping reduce risk through the power of identity services.
Sponsored by:
Centrify
4:30 pm - 4:55 pm
Deep dives into the latest and greatest technology solutions to today's business problems.
5:00 pm - 5:45 pm
Digital transformation is changing how you equip your employees and how your company interacts with customers. It is also changing the role of the CIO and CISO to be a business leader and internal sales leader for transformation. CIOs are now responsible for communicating strategies and recommendations to CxOs, boards and key stakeholders within a company. Join us, during lunch, for a passionate panel discussion with your peers as they share how they are successfully communicating internally to accomplish the company's goals.
Takeaways:
Moderated by:
Vivian Schneck-Last, Former Managing Director, Goldman Sachs
Panelists:
Myrna Soto, Partner, Trident Capital Cybersecurity
Emily Larkin, CISO, Sageworks
Shawna Cartwright, Group Director Head of Transformation, Ryder Systems Inc.
Donna Kladis, CIO, Techtronics Industries
5:45 pm - 6:45 pm
6:45 pm - 6:55 pm
6:45 pm - 8:00 pm
7:15 pm - 7:30 pm
Presented by:
Jedidiah Yueh, Founder and Executive Chairman, Delphix
8:00 pm - 10:00 pm
7:30 am - 8:15 am
8:15 am - 8:55 am
It's almost paradoxical that enterprises possessing incredible stores of unique data are often not prepared to take advantage of those valuable assets รข?" resulting in negative or reduced ROI from the data, incorrect or biased decision making, risk of potential compliance or security violations, and lost opportunities to gain competitive advantage. Join us to learn the best approach to data that services the needs of the entire enterprise, enabling a truly data-driven culture that will ensure you can know your data, trust your data, and use your data effectively.
Sponsored by:
IBM
Presented by:
Scott Buckles, Business Unit Executive - North America Business Analytics and Unified Governance Solutions Sales, IBM
9:00 am - 9:25 am
With massive volumes of data growing at double-digit rates, regulations getting stricter, escalating security demands and mounting storage costs, many organizations in the digital economy feel caught between a rock and a hard place. Having to choose between security, compliance and storage ROI is no choice at all. This session looks at how to develop a data storage strategy that can address your compliance requirements, provide military-grade security and be cost effective all at the same time.
Takeaways:
Sponsored by:
Leonovus
Whether customers buy your products in-store or online, the path to purchase is no longer linear. It's no longer ?news? that the internet and mobile have changed the customer journey and how prospective customers engage and learn with products or services Today's journey is a roundabout, with consumers jumping in and out of platforms, devices, while speaking to friends and family simultaneously. Today's consumers don't make distinctions between being online and shopping offline - they want the experience to be seamless. Successful marketing programs today must be omnipresent and omnichannel. During this session we will discuss best practices and use cases of successful omnichannel marketing efforts that drive not only in-store purchases, but consumer loyalty to keep them coming back.
Takeaways:
Sponsored by:
SweetIQ
9:30 am - 9:55 am
Next generation digital services such as Internet of Things, Big Data Analytics, Machine Learning, Hybrid Cloud, and Software-Defined Everything are increasingly reliant on proximal, high-speed, low-latency interconnectivity and adjacency to massive compute, storage, and Software as a Service.
Enterprises, service providers, and governmental communities of interest can reduce costs and time to market by moving to a regionally-distributed Interconnection Oriented Architecture where geo-strategic alignment of applications, data and consumers is achieved at the network edge.
Sponsored by:
Equinix
Cybercrime has impacted virtually everything and everyone, at some level. Whether it's a big bank or hospital, a hotel chain or transit system, cyber-attacks affect organizations and individuals alike. Industry experts and analysts agree: cybercrime rates will continue to increase in 2018. In this session we'll discuss common attack types and threat vectors, war stories from the SOC at eSentire and how your firm can approach cybersecurity to prepare for inevitable attacks.
Sponsored by:
eSentire
10:00 am - 10:25 am
Microsoft, Google, Dropbox, and others have proven the value and increased efficiency of collaborative online document development. These tools bring individuals together in a common environment to develop, review, and edit documents together; no matter where they are. What if you could experience the same interaction during all stages of the software development cycle? What if you could test your application, make changes, and continue testing without having to restart your application, or even lose your place in the application workflow? Now you can...
Takeaways:
Sponsored by:
Coactive
Presented by:
Steve Sherman, Chief Commercial Officer, Coactive
As the digital transformation takes many forms, the network becomes the common entity and a great place to enforce security if we can get the necessary control. In this session we will discuss the challenges of managing network access in a hybrid environment and how, if done correctly, the network access can enable transformation instead of being a roadblock.
Takeaways:
Sponsored by:
FireMon
10:30 am - 10:40 am
10:45 am - 11:10 am
Cybersecurity dominated the news cycle in 2017. There were headlines about viral ransomware, global destructive wipers posing as ransomware, leaks of spy tools from U.S. intelligence agencies, and breaches at major companies.
What does 2018 hold in store for the defenders? Come discuss the largest security trends Cybereason researchers have identified for 2018.
Sponsored by:
Cybereason
11:15 am - 11:40 am
The old world of corporate video is low-quality, hard-to-find and difficult to watch. Learn how leading companies are leveraging AI and cognitive insights as well as IBM Cloud Video's tracking and administration features to deliver effective video that excites and engages teams across offices, continents and time zones. With cognitive enhancements such as automated captions and keywords, the right content is now easier than ever to find. Whether it is a live stream of a c-level address, or team knowledge sharing, video can be created and leveraged across the organization as a learning, communication, and training tool that helps build stronger bonds between team members and communicates powerfully the key messages.
Sponsored by:
IBM
In today's world where advanced threats and insiders demonstrate that they can evade security prevention systems, in-network threat visibility and detection are considered critical security infrastructure. That said, there are myths and realities about the effectiveness of deception for detecting advanced threats - and there are specific strategies for operational management efficiency and key use cases that are driving adoption. Join us for this session where you'll hear about real-world deployment experiences, the value customers are realizing, and what pen test Red Teams are saying about deception-based threat detection.
Sponsored by:
Attivo Networks
11:45 am - 12:10 pm
How fast are we going? Are we going in the right direction? How much fuel do we have in the tank? These are common questions for those on the move. Companies on a digital transformation journey need effective dashboards to help them understand the myriad data sources screaming for attention. We will discuss best practices for the various types of dashboards that can be used to make the most important decisions for your company.
Takeaways:
Sponsored by:
Celonis
12:15 pm - 12:40 pm
Organizations are struggling with firm-wide efforts to maximize value, identify risk themes, and dramatically reduce costs due to the underlying quantity and complexity of their committees, governance bodies, and corresponding programs. Join us to explore how leading practices are being employed to significantly simplify governance, develop more principles-based strategies, accelerate innovation, and embed sound risk management practices.
Presented by:
Richard Kessler, Executive Director, Cyber Security Strategy & Governance, KPMG
Preparing for cyber-attacks: how testing your people, processes and technology improves your operational readiness. Review of the cybersecurity threat landscape, popular attack vectors and what you can do about it. Practice attacks to maximize preparedness
Presented by:
Tom Kartanowicz, Regional Chief Information Security Officer, Commerzbank
One of the promised benefits of Digital Transformtion is the ability to capture, process and analyze more data that can then be used to transform a company's operations. More data, however, may mean nothing if it can't be analyzed and interpreted. AI and Machine Learning are promising tools to help CIOs, CDOs , CFOs and CMOs turn data into actionable next steps.
Takeaways:
Presented by:
Maria V. Gonzalez, Director of Web Technologies and Application Embedded Analytics, Ryder Systems Inc.
12:45 pm - 1:45 pm
1:50 pm - 2:15 pm
Deep dives into the latest and greatest technology solutions to today's business problems.
2:20 pm - 2:45 pm
Ponemon Institute estimates an average breach cost of $3.5 million in 2017, with a 27% probability that a U.S. company will experience a breach in the next 24 months. Just in one recent example, shipping company Maersk lost over $300 million when ransomware infected its systems. Malware is winning with a never ending supply of new attack vectors, previously unseen methods and malware variants. Why, after companies have invested billions of dollars in endpoint security, are they still so vulnerable?
This interactive presentation will discuss the reasons behind the vulnerable state of endpoint security, along with the evolution of traditional Antivirus (AV), and the rise of Next-Generation Antivirus (NGAV) products powered by Machine Learning and Endpoint Detection and Response (EDR) solutions. It will then look into the latest endpoint security trends that promise to increase efficacy, lower TCO and deliver a more robust feature set without requiring organizations to rip and replace their existing security stack.
This presentation will include a demo of the infamous Rubber Ducky that remains practically unstoppable by today's endpoint security products.
Sponsored by:
Nyotron
2:50 pm - 3:15 pm
Presented by:
Abraham Naguib, SVP IT Strategy, Citi
Presented by:
Thien La, CISO, Wellmark Blue Cross Blue Shield
It is not a matter of if, but a matter of when. Organizations, more and more, and are outsourcing business activities to 3rd-parties because of cost-savings, revenue opportunities, expertise, etc. Thus, collaborating with our business partners early to select the right third-party vendor(s) with the appropriate security posture is essential, especially for vendors hosting, processing and/or transmitting sensitive/regulatory information, or having access to our IT assets.
Takeaways:
Presented by:
Adolph Barclift, CISO, NCR Corporation
3:20 pm - 3:55 pm
Digital transformation is causing Digital Disruption. Companies are faced with new competitors using new technologies to change how industries work. The CIO is in the best position to understand the limitations of legacy systems and processes and the opportunities that come with new technologies and capabilities. We will discuss in this panel the best practices for CIOs to be the drivers of Digital Disruption for their company.
Takeaways:
Moderated by:
Steve Dimmitt, Vice President, Marketing and Customer Success, CDM Media
Panelists:
Pradeep Wahi, Chairman, ARA Inc.
Ralph Groce III, Global CIO, BNY Mellon
4:00 pm - 4:10 pm
Our Governing Board will summarize the learnings from the day and discuss the path forward for building an ongoing community of CIOs where common issues can be addressed and success stories can be shared.
Takeaways:
4:10 pm - 4:15 pm
4:15 pm - 6:00 pm
Join the entire audience for networking, food and drink to wrap up the summit!
Sponsored by:
Equinix
12:00 pm - 6:00 pm
12:00 pm - 5:00 pm
5:30 pm - 6:30 pm
6:30 pm - 8:30 pm
Today's digital technologies quickly become commodities, and adoption of emerging technologies provides only temporary edge and differentiation. To stay ahead, you must think bigger and take bigger risks. Do not make the technologies themselves the focal point, but the profound business transformations they make feasible.
Moderated by:
Becky Wanta, COO & CIO, One Degree World
Panelists:
Julia Anderson, Global CIO, Smithfield Foods
Dave Hudson, Chief Information Officer, Insight Global
Paige Adams, CISO Group, Zurich Insurance Group
Paul Moulton, EVP & CIO, Costco Wholesale
8:30 pm - 9:30 pm
7:15 am - 8:00 am
8:00 am - 8:10 am
Presented by:
Daphne Jones, Former CIO for GE and Hospira, Individual
8:10 am - 8:45 am
There are many forces that are driving companies to continue to transform how they do business. Technological advances such as IoT, AI, machine learning, virtual reality and augmented reality are creating demanding expectations from customers, employees and boards. Adding to the complexity of CIOs and CISOs is the increasing threats to the security of the data that is at the heart of digital transformation. This keynote presentation will focus on the realities that this transformation will never end and it is critical to implement both the mindset and processes to treat digital transformation as a journey...not a destination.
Presented by:
Paul Moulton, EVP & CIO, Costco Wholesale
8:50 am - 9:25 am
How can you accelerate your digital transformation journey? With Cloud! Listen and learn what it means when a Cloud is:
Then, walk away with practical knowledge on how far and fast you can go and grow with an open, flexible Cloud architecture. This includes why and how you will want to migrate, modernize and innovate on Cloud using the latest AI technology and data -- and that's from any data source.
You won't be locked in. Your options are limitless. You'll be on a clear path to digital transformation complete with rethinking client value and creating new business models.
Sponsored by:
IBM
9:30 am - 10:05 am
Yes, we all know about Digital Transformation. You already know what you need to do. But how confident are you that your executive and IT teams are going to execute on the vision? Do they know how? For some businesses ?transformation? means creating immersive, interacting customer experiences. For others, it's incorporating AI and machine learning into operations. Whatever your goal, we all know we need to digitally transform. You know where you want to go, but what's your success of getting there รข?" faster than your competitors? Executing change is about doing things differently. The winners in the Digital Age are the companies who have changed their point of view and transformed from the ground up.
Learn what you can do in the next six months to change the course of your organization to make sure you're not only in the race, but leading it.
Sponsored by:
10:15 am - 10:40 am
Discover Financial has built a successful business around a customer focus and award winning customer service. As customers evolve away from phone interactions to digital and social channels how can a company maintain that winning formula of customer service? The discussion will focus on the intersection of emerging technologies like AI and new customer demands and how Discover will maintain its leadership position.
Presented by:
Rich McGhee, SVP, Technology, Discover Financial Services
10:45 am - 11:10 am
Digital transformation delivers a sustainable competitive edge if done right. The multi-million dollar boardroom question that CIOs are often left to address: "how are we going to pay for this?" with ongoing operations consuming 80%-90% of a typical IT budget.
Join this interactive discussion to hear how technology leaders are adopting three specific strategies to reallocate capital & resources to digital growth. That reality requires significant rethinking of cost components and budget trade-offs, and exploring radical options across the entire IT landscape.
Sponsored by:
Rimini Street
Presented by:
, ,
11:15 am - 11:40 am
How fast are we going? Are we going in the right direction? How much fuel do we have in the tank? These are common questions for those on the move. Companies on a digital transformation journey need effective dashboards to help them understand the myriad data sources screaming for attention. We will discuss best practices for the various types of dashboards that can be used to make the most important decisions for your company.
Takeaways:
Sponsored by:
Celonis
11:45 am - 12:10 pm
Security is a major concern for enterprises, and the new cloud-first model requires a different, application-driven approach to securing the branch. Enterprise WAN architectures are at an inflection point, either ride the wave of WAN transformation or remain rudderless and adrift in a sea of WAN complacency. Shift to a business-first networking model and liberate your applications from the compromises of existing WAN approaches to accelerate your business.
Sponsored by:
12:15 pm - 1:30 pm
Disruption alters, destroys, but also creates value. You realize the need to act once revenue starts to shift, which is happening at a faster pace than most would think. Disruption can be a great thing if you act upon it, but it's a threat if you watch idly. We will discuss how CIOs and CISOs can be proactive and act on disruption by figuring out how to identify, prioritize and respond.
Moderated by:
Becky Wanta, COO & CIO, One Degree World
Panelists:
Donna Kladis, CIO, Techtronics Industries
Michael Golz, CIO, SAP
Larry Quinlan, Global Chief Information Officer, Deloitte
Kathy McElligott, EVP & Chief Information Officer, McKesson Corporation
1:35 pm - 2:00 pm
Hadoop and related technologies for Big Data analytics can deliver tremendous business value, and at a lower cost than traditional data management approaches. But early adopters have encountered challenges and learned lessons over the past few years. In this presentation, we'll discuss: The five worst practices in early Hadoop deployments and how to avoid them Best practices for the right architecture to meet the needs of the business How to ensure highly scalable and elastic Big Data infrastructure.
Sponsored by:
Dell EMC
Presented by:
Matt Maccaux, Global Big Data Practice Lead, Dell EMC
2:05 pm - 2:30 pm
Moving to the cloud changes the game, but managing the sprawl of private, public, hybrid, and multi-cloud with a diversity of vendors, services, and standards can weigh business down. Digital Transformation requires aggregating, orchestrating, and securing all cloud services.
Attend this session to explore how a secure digital workspace can help your teams simplify and manage complex multi- and hybrid-cloud infrastructure technology from a single console - allowing connection, collaboration, and innovation from anywhere - on any application, any device, any cloud, at any time. You'll gain insights on:
Sponsored by:
Citrix
Presented by:
Joseph Baker, Senior Director of Sales Engineering, Enterprise รข?, Citrix
2:35 pm - 3:00 pm
Digitization is changing the world we live in and creating a revolutionary opportunity to transform the most critical industries. Join to hear Sathish Muthukrishnan, Chief Digital & Information Officer for Honeywell Aerospace, discuss how the aerospace industry has been ahead of the innovation curve since we first started flying.?
Presented by:
Sathish Muthukrishnan, CDIO, Honeywell
3:05 pm - 3:30 pm
The Modern Software Factory is a blueprint for combining agility, automation, insights, and security to transform your digital business - so you can compete to win in the application economy. CA Technologies provides best practices, guidance, and compelling products to help your organization deliver the trust, value, speed and reliability your customers demand.
Sponsored by:
3:35 pm - 4:00 pm
As traditional network perimeters dissolve, organizations must discard the old model of "trust but verify" which relied on well-defined boundaries. Zero Trust mandates a "never trust, always verify, enforce least privilege" approach to privileged access, from inside or outside the network. Zero Trust Privilege helps organizations grant least privilege access based on verifying who is requesting access, the context of the request, and the risk of the access environment. By implementing least privilege access, organizations minimize the attack surface, improve audit and compliance visibility, and reduce risk, complexity and costs for the modern, hybrid enterprise.
Sponsored by:
Centrify
Presented by:
, ,
4:05 pm - 4:30 pm
If digital transformation is a journey, then data is the fuel that will transport your company from here to there. Comprehending and creating insight from data is transformational. Being able to gather and analyze data to generate a competitive edge, creates new opportunities, and promotes innovation. However, to support a pipeline of up-to-date and competitive modern data and analytics, a sound foundation and architecture must be constructed in order to deliver it.
Presented by:
Vinod Bidarkoppa, SVP and CIO , OptumServe, UnitedHealth Group
4:35 pm - 5:00 pm
Is your IBM organization ready for digital transformation? It is important to welcome the opportunities afforded by digital transformation and at the same time avoid being digitally disrupted right out of your industry. But where do you start? What exactly is digital transformation? What are the strategies for implementing it?
In this session, you will learn how to plot a digital transformation strategy that protects and grows your organization. Join Fresche's Robert Savoie, a former CIO, to learn about:
Sponsored by:
5:05 pm - 5:35 pm
Building up digital business hinges on being able to add in information and technology assets and capabilities much earlier into leaders' strategic plans. We will discuss how CIOs are aiming to revamp the dynamics of the provider/consumer relationship in order to have a strategic impact and influence across all levels of the business.
Moderated by:
Becky Wanta, COO & CIO, One Degree World
Panelists:
Sukhvinder Singh, CIO, Host Hotels & Resorts Inc.
Michael Guggemos, CIO, Insight Enterprises
Rajesh Nagarajan, Vice President & Chief Information Officer, Celanese
Vish Narendra, VP & CIO, Graphic Packaging International
6:00 pm - 7:00 pm
7:00 pm - 8:30 pm
Digital transformation is changing how you equip your employees and how your company interacts with customers. It is also changing the role of the CIO and CISO to be a business leader and internal sales leader for transformation. CIOs are now responsible for communicating strategies and recommendations to CxOs, boards and key stakeholders within a company. Join us, during dinner, for a passionate panel discussion with your peers as they share how they are successfully communicating internally to accomplish the company's goals.
Moderated by:
Becky Wanta, COO & CIO, One Degree World
Panelists:
Kevin Summers, Chief Information Officer, Avnet
Mark Mincin, SVP & CIO, McAfee
8:30 pm - 10:00 pm
7:45 am - 8:35 am
8:40 am - 8:45 am
Moderated by:
Becky Wanta, COO & CIO, One Degree World
8:45 am - 9:20 am
CIOs are facing increasing pressure to guide their companies to rapidly adopt new technologies and solutions to keep their companies competitive in their industry. CISOs are facing increasing pressure to keep their company and its data safe and secure from all threats. Without great vision and cooperation these goals can appear to be at cross purposes.
Takeaways:
Presented by:
Scott Dillon, Former EVP, CTO Head of Technology, Wells Fargo
9:25 am - 10:00 am
At the heart of a digitally transformed organization is data. Data that can be trusted and securely accessed by everyone in the organization to enable new product creation, superior customer experiences or deeper marketplace insights. To reach this level of maturity, organizations are starting to leverage governance to foster and deliver trusted data to their line of business data consumers.
Sponsored by:
IBM
Presented by:
Scott Buckles, Business Unit Executive - North America Business Analytics and Unified Governance Solutions Sales, IBM
10:10 am - 10:35 am
More companies regard emerging technologies as a key element to their growth strategies. Digital Transformation is driving rapid adoption of public clouds to accommodate dynamic business development and operations. The evolution of cloud computing and digital transformation has laid the groundwork for an accelerated wave of emerging technology adoption. Hear how Red Hat can help you grow your business and create a hybrid cloud based on open standards, and best practices to adopt which are critical and necessary to be prepared for future growth.
Key takeaways: Red Hat can help CIO's get prepared for future growth and help solve IT challenges since digital transformation is driving rapid adoption of public clouds to accommodate dynamic business development and operations. Open source software has made way for many technological advances, including hybrid cloud computing, network automation, big data, social, mobile and containers. As the global leader in enterprise-class open source software solutions, Red Hat and its partners are well-positioned to help customers achieve operational excellence and continue to innovate so they can effectively compete as a digital enterprise.
Sponsored by:
10:40 am - 11:05 am
The promise of the cloud is almost beyond compare; infinite computing resources, unmatched reliability and uptime, instantaneous service availability, simplistic self-service and provisioning, and the low-low prices of a buy by the drink model. These are the reasons behind the rush to the cloud that we are currently experiencing, but the wholesale adoption does bring a downside " as more and more capability is moved to the cloud, more and more cloud providers are utilized since, for the most part, each provider offers only a limited suite of services. The MultiCloud environment that creates a new set of challenges that IT leaders need to overcome, notably resiliency, interoperability/integration, and security and compliance through careful planning and the lessons learned from building complex on premise distributed systems.
Takeaways:
11:10 am - 11:35 am
In today's world of increasing cyber threats, selecting the best security partner for your organization can be challenging. With innovative services such as Managed Detection and Response changing the way organizations respond to threats, it's important to understand the difference between traditional MSSPs and MDR providers. This presentation will focus on the realities of using MSSP technologies versus MDR and provide selection recommendation guidelines for CISOs.
Takeaways:
11:40 am - 12:05 pm
Artificial Intelligence (AI) is driving unlimited possibilities for companies looking to modernize their business. With digital transformation high on everyone's priority list, AI needs to be an integral part of that strategy and developed in a trusted fashion. In this panel, AI thought leaders will help you to separate the hype from reality and offer suggestions on where you might begin your AI journey.
12:10 pm - 12:35 pm
Data is at the center of the digital business platform, but in reality, data is everywhere! Things, IT systems, customers, ecosystems, all have data. Organizations need to access, understand, manage and trust data in a flexible and agile manner. Taking an approach of collecting all possible data is becoming clearly impossible, balancing collecting data and connecting to data is the path to modernizing data management.
Presented by:
Jackie Wallace, VP, Data and Analytics, Baker Hughes
12:40 pm - 1:05 pm
If all InfoSec-related tasks in Information Technology were performed by a member of the Information Security team, we would not need an IT team at all. So should we be asking if we even need an IT team?
Mark will discuss what IT does in organizations using a hybrid cloud strategy, for Public and Private cloud. What is the practical and good-practice boundary between InfoSec and IT? What are the most important cloud security priorities and who covers what tasks for which?
Presented by:
Mark Mincin, SVP & CIO, McAfee
1:05 pm - 1:10 pm
Presented by:
Becky Wanta, COO & CIO, One Degree World
1:10 pm - 1:45 pm