CIO New York Summit | February 6, 2018 | New York, NY, USA

↓ Agenda Key

Keynote Presentation

Visionary speaker presents to entire audience on key issues, challenges and business opportunities

Keynote Presentations give attending delegates the opportunity to hear from leading voices in the industry. These presentations feature relevant topics and issues aligned with the speaker's experience and expertise, selected by the speaker in concert with the summit's Content Committee." title="Keynote Presentations give attending delegates the opportunity to hear from leading voices in the industry. These presentations feature relevant topics and issues aligned with the speaker's experience and expertise, selected by the speaker in concert with the summit's Content Committee.

Executive Visions

Panel moderated by Master of Ceremonies and headed by four executives discussing critical business topics

Executive Visions sessions are panel discussions that enable in-depth exchanges on critical business topics. Led by a moderator, these sessions encourage attending executives to address industry challenges and gain insight through interaction with expert panel members." title="Executive Visions sessions are panel discussions that enable in-depth exchanges on critical business topics. Led by a moderator, these sessions encourage attending executives to address industry challenges and gain insight through interaction with expert panel members.

Thought Leadership

Solution provider-led session giving high-level overview of opportunities

Led by an executive from the vendor community, Thought Leadership sessions provide comprehensive overviews of current business concerns, offering strategies and solutions for success. This is a unique opportunity to access the perspective of a leading member of the vendor community." title="Led by an executive from the vendor community, Thought Leadership sessions provide comprehensive overviews of current business concerns, offering strategies and solutions for success. This is a unique opportunity to access the perspective of a leading member of the vendor community.

Think Tank

End user-led session in boardroom style, focusing on best practices

Think Tanks are interactive sessions that place delegates in lively discussion and debate. Sessions admit only 15-20 participants at a time to ensure an intimate environment in which delegates can engage each other and have their voices heard." title="Think Tanks are interactive sessions that place delegates in lively discussion and debate. Sessions admit only 15-20 participants at a time to ensure an intimate environment in which delegates can engage each other and have their voices heard.

Roundtable

Interactive session led by a moderator, focused on industry issue

Led by an industry analyst, expert or a member of the vendor community, Roundtables are open-forum sessions with strategic guidance. Attending delegates gather to collaborate on common issues and challenges within a format that allows them to get things done." title="Led by an industry analyst, expert or a member of the vendor community, Roundtables are open-forum sessions with strategic guidance. Attending delegates gather to collaborate on common issues and challenges within a format that allows them to get things done.

Case Study

Overview of recent project successes and failures

Case Studies allow attending executives to hear compelling stories about implementations and projects, emphasizing best practices and lessons learned. Presentations are immediately followed by Q&A sessions." title="Case Studies allow attending executives to hear compelling stories about implementations and projects, emphasizing best practices and lessons learned. Presentations are immediately followed by Q&A sessions.

Focus Group

Discussion of business drivers within a particular industry area

Focus Groups allow executives to discuss business drivers within particular industry areas. These sessions allow attendees to isolate specific issues and work through them. Presentations last 15-20 minutes and are followed by Q&A sessions." title="Focus Groups allow executives to discuss business drivers within particular industry areas. These sessions allow attendees to isolate specific issues and work through them. Presentations last 15-20 minutes and are followed by Q&A sessions.

Analyst Q&A Session

Moderator-led coverage of the latest industry research

Q&A sessions cover the latest industry research, allowing attendees to gain insight on topics of interest through questions directed to a leading industry analyst." title="Q&A sessions cover the latest industry research, allowing attendees to gain insight on topics of interest through questions directed to a leading industry analyst.

Vendor Showcase

Several brief, pointed overviews of the newest solutions and services

Taking the form of three 10-minute elevator pitches by attending vendors, these sessions provide a concise and pointed overview of the latest solutions and services aligned with attendee needs and preferences." title="Taking the form of three 10-minute elevator pitches by attending vendors, these sessions provide a concise and pointed overview of the latest solutions and services aligned with attendee needs and preferences.

Executive Exchange

Pre-determined, one-on-one interaction revolving around solutions of interest

Executive Exchanges offer one-on-one interaction between executives and vendors. This is an opportunity for both parties to make key business contacts, ask direct questions and get the answers they need. Session content is prearranged and based on mutual interest." title="Executive Exchanges offer one-on-one interaction between executives and vendors. This is an opportunity for both parties to make key business contacts, ask direct questions and get the answers they need. Session content is prearranged and based on mutual interest.

Open Forum Luncheon

Informal discussions on pre-determined topics

Led by a moderator, Open Forum Luncheons offer attendees informal, yet focused discussions on current industry topics and trends over lunch." title="Led by a moderator, Open Forum Luncheons offer attendees informal, yet focused discussions on current industry topics and trends over lunch.

Networking Session

Unique activities at once relaxing, enjoyable and productive

Networking opportunities take various unique forms, merging enjoyable and relaxing activities with an environment conducive to in-depth conversation. These gatherings allow attendees to wind down between sessions and one-on-one meetings, while still furthering discussions and being productive." title="Networking opportunities take various unique forms, merging enjoyable and relaxing activities with an environment conducive to in-depth conversation. These gatherings allow attendees to wind down between sessions and one-on-one meetings, while still furthering discussions and being productive.

 

Tuesday, February 6, 2018 - CIO New York Summit

7:00 am - 7:55 am

Registration and Networking Breakfast

 

8:00 am - 8:10 am

Welcome Address and Opening Remarks

 

8:10 am - 8:40 am

Keynote Presentation

Reimagining the Role of Global Security Teams

With the current threat and ecosystem landscape continuously evolving and becoming more sophisticated, institutions are looking to redefine their approach to securing their digital assets. Combining various previously dispersed aspects of security, institutions can achieve more organizational agility and operational effectiveness and uphold the agreement with stakeholders to keep their valuable assets safe. The approach rests on intelligence-led security, adequate cyber hygiene, physical, and cyber security controls and acting on the right 'signals' to prevent and mitigate threats.

Takeaways:

  • Eliminate inefficiencies through clearly identifying security goals aligned with the business goals, organizing various functions towards these goals, which will result in removing duplication, delivering savings, improving performance, increasing visibility, and coordinating through better management and unified/integrated security platforms for an institution
  • Integrate cyber security with physical security and, in case of financial institutions, financial crime, anti money laundering, investigations, and intelligence divisions, in order to have a holistic visibility into security. Security programs should work alongside law enforcement entities based on global acceptable standards with respect for data protection and privacy
  • Enable the ability to connect crime, trends, patterns, suspects across business units by having shared datasets with innovative and state-of-the-art technology for all business units. Establish an intelligence-led defence with the ability to detect and react to the right 'signals' and patterns.
 

8:45 am - 9:15 am

Keynote Presentation

Analytics & Cloud Together: Accelerating Innovation in the New Cognitive Era

Leading companies are disrupting the status quo by using data to inform business strategy and create new business models that fuel growth. CIOs have the power to uncover the insight that drives disruption and speeds transformation. Learn how leading IT organizations are maximizing the use of open source and cloud technologies alongside on-premises investments to accelerate innovation. And understand how CIOs are embracing new cloud-enabled consumption models while helping ensure data privacy, security and sovereignty. 

Takeaways:

  • Integrating analytics into key applications and systems can enable people throughout an organization to access and act on insights when and where it matters most. 
  • Take advantage of more sources to enable better decisions. IT must create an environment with easy access to all types of data - structured and unstructured - from internal sources and those outside the organization.
  • Data science teams are answering the toughest questions by leveraging open source development platforms and tools to build models more quickly and easily.

 

9:20 am - 9:45 am

Executive Exchange

 

Thought Leadership

Implementing Business Simplification for Success and Growth

Organizational complexity is the single most significant impediment that enterprises are dealing with today; it underlies every business problem enterprises faces and undermines every effort to address them. Organizational complexity is grounded in cumbersome processes, but those poor processes exist only because enterprise applications themselves, including those that are customer facing, as well as those that are not, are complex and unwieldy. To address cultural complexity then, enterprises must eliminate the complexity in their application suite by either building new, buying new, or more efficiently simplifying what they already have. Only by simplification can enterprises eliminate complexity in an efficient and effective way and position themselves for success.

Takeaways:

  • Enterprises live and breath by the speed with which regular transactions occur " turning these into one minute transactions is the key to success
  • Complexity must be eliminated in all applications customer-facing, core internal, and internal supporting alike
  • Building or buying new, less complex applications offers limited gains because eventually all introduce complexities of their own; only simplified applications offer long term, sustained elimination of complexity
 

9:50 am - 10:15 am

Executive Exchange

 

Executive Boardroom

ERP Agility as an Enabler in the Era of Digital Transformation

In the era of digital transformation, organizations must keep up with the pace of business while ensuring certainty and quality of ERP. While ERP systems were tuned to balance business requirements with IT capabilities, the increased rate of change, driven by digital transformation, disrupts this balance.

This session by Panaya explores methodologies and best practices to achieving IT agility for critical enterprise applications (ERP) in times of digital transformation, as well as providing a unique perspective on how to increase IT velocity while minimizing IT risk and ensuring quality in a traditional IT environment. 

Takeaways:

  • How the BiModal IT can help solve the inherent duality between IT agility and quality in the world of ERP
  • Overcoming the "Agile Fear Factor" when ERP serves as System of Differentiation
  • Operational considerations to achieving ERP Agility  

Executive Boardroom

Next Generation Email Security for the Greater Good

Email has become a weapon that can destroy individual lives, compromise enterprise security and, as we have all learned from the latest presidential election, change the course of human history. The time has come for us all recognize and accept that the North Star of email security, and more specifically phishing, has more in common with Game Theory's Nash Equilibrium vs traditional threat management paradigms. Simply put, to eliminate one of the most virulent and exploitable security gaps we have ever collectively faced, we can only protect ourselves by first protecting each other. 

As security professionals in the most targeted regions of the world, it is our responsibility to understand, embrace and proliferate the global adoption of the standards to achieve this goal. Agari possess the expertise and technology to streamline this process and make phishing email deliverability on your networks more challenging for a hacker than forging a hand written letter from Mom. Cyberterrorism in New York? Not in my city! 

 Takeaways: 

  • Learn why the adoption and deployment of authentication standards is critical for the collective business community in order to be successful as individuals. 
  • How to leverage machine learning based on the world's largest and most dynamic stream of trusted email to scale detection and prevention of threats. 
  • Protecting customers, employees, partners and your brand equity must be prioritized in the face of phishing attacks growing in sophistication and impersonation techniques.
 

10:20 am - 10:30 am

Morning Networking Coffee Break

 

10:35 am - 11:00 am

Executive Exchange

 

Thought Leadership

The Year of Ransomware: Can Technology Alone Prevent Phishing Attacks and Breaches?

2016 is certainly shaping up to be the year of the ransomware attack. As ransomware and phishing attacks continue to grow in number and sophistication, organizations need to reconsider their current security strategy. Companies continue to invest billions of dollars in technology to shore up their defenses against these threats. But is that enough? Is complete reliance on technology the answer? Or should we focus on the human and human behavior?

 

11:05 am - 11:30 am

Executive Exchange

 

Thought Leadership

Become a Change Agent for Business Transformation

Today's modern CIO is embarking on a digital transformation journey exploring radical hybrid IT strategies and leveraging new technologies like Cloud, Social, Mobile and Big Data. However with 'keeping the lights on' legacy IT components costing nearly 90% of a typical IT budget, how can IT make powerful advancements and lead business change?

Join this interactive session to learn how award-winning CIOs are successfully tipping the balance by liberating people, time and money from costly ongoing maintenance of their ERP systems including SAP and Oracle, to invest in strategic initiatives that create real-world competitive advantage.

 

11:35 am - 12:00 pm

Executive Exchange

 

Thought Leadership

Navigating Security and Risk In a Changing IT Landscape

Agile, DevOps, containers, microservices, the cloud are all seeing increased adoption across the enterprise. But, while there are valid business reasons to embrace these new models, there is potential risk in implementation. Is this change necessary? If so, how can this change be accommodated effectively, safely? 

This session will cover some common elements of the risk of change - and of not changing - and suggest approaches to minimize risk as you adopt these new technologies. 

Takeaways: 

  • The risks of not adopting change - and the rewards of doing it 
  • Building a technology platform that supports business innovation - seat belts included 
  • How to mitigate the risk of change - shifting the value proposition in favor of modernization

 

12:05 pm - 12:30 pm

Executive Exchange

 

Think Tank

Bridging the Talent Gap: Building the Team of Tomorrow

There is no escaping the fact that the demands on the IT department are changing. Those changes are necessitating changes in the IT department itself and nowhere is this being felt more than in the roles and responsibilities of the IT staff themselves. Complicating this transition is the fact that every IT department is undergoing to change at roughly the same time making the personnel with the requisite skillsets extremely hard to find, and perhaps even harder to retain. Savvy CIOs need to quickly identify which are the hot skills they most urgently require and then build a strategy that allows them to build (train), borrow (outsource), or buy (hire) the right people with the right capability at the right time.

Takeaways:

  • Commit to a talent-first organization which recognizes and rewards the most important asset you have " your people
  • Identify the skills most urgently in need and prioritize their acquisition
  • Determine which acquisition methods needs to be used for which skill to maximize impact and return on investment

Think Tank

Security's Place in Enterprise Risk Management

While Information Security has existed for decades, Enterprise Risk Management (ERM), as a formal and holistic practice, is much newer yet already has taken pre-eminence over its forebear. What is the CISO, who in many ways has toiled in invisibility, infamy, or ignominy to do when faced with the issue of being supplanted by the Chief Risk Officer, just as enterprise demand for and focus on security has reached all-time heights? Savvy CISOs will recognize this new, broader need for holistic visibility into, and management of, overall enterprise risk and will position themselves for success by looking beyond traditional information security boundaries and engaging business partners around all enterprise risk. 

Takeaways: 

  • Just because information security is an aspect of enterprise risk doesn't mean that the CISO needs to take a back seat position. 
  • Enterprise risk is defined by the business but needs to be quantified by an expert; CISOs bring risk quantification expertise to the table. 
  • The end goal is not about fiefdoms and ownership, it is about improving enterprise value and success; maintaining focus is essential.

 

12:35 pm - 1:20 pm

Networking Luncheon

 

1:25 pm - 1:50 pm

Executive Exchange

 

Think Tank

AI Meets IG: Automating Information Governance

For most corporations today, information security is inextricably intertwined with the legal and compliance functions. Threat landscapes grow larger and more complex by the day; so, too, do the legal and regulatory frameworks within which those landscapes lie. Most boards of directors today grasp the strategic and operational imperatives associated with information security, yet at most organizations, nearly 80% of IT budgets goes to operational spend"paying to maintain technology already purchased and to manage and protect information already created"leaving only 20% to drive innovation and create new value for business. Legal and compliance, as well, are expected to do more with less, including by finding ways to embrace new technologies and new models for procurement of professional services. How can you do that when most of your time, money, and effort go just to keeping the lights on? Join us as we explore this issue and examine some of the successful strategies that are being leveraged by top IT leaders. 

Takeaways: 

  • The pressure on CISOs to drive change has never been higher, but fortunately neither has the opportunity to do so
  • Disruptive technologies don't just have the power to disrupt information security for the worse, they have the power to disrupt the business for the better 
  • Fortune favors the bold; now is the time to take a leap into new modes of business to break the operational spend stranglehold

 

1:55 pm - 2:20 pm

Executive Exchange

 

Thought Leadership

Strategic and Secure Mobility

Is mobility a cost? Or is it a key part of your strategy for business success? Many businesses are leveraging mobility to generate real and measurable returns and to increase their competitiveness. How? Join CDM Media and BlackBerry as we explore ways in which companies can strategically manage their mobility investments.

In our session we'll look at security - again from a strategic viewpoint. Security covers a wide range of issues in the modern enterprise. While protection of data is at the forefront, security involves many other aspects and issues from secure collaboration to the security and protection of employees in an increasingly tumultuous world. We'll deal not only with securing mobility, but how the strategic use of mobility can make you more secure.

 

2:25 pm - 2:50 pm

Executive Exchange

 

Think Tank

NFV and SDN - Building the Network of the Future

The ever-changing healthcare landscape and how CIO's have to adapt to succeed and survive. Obama care, accountable care, the shift from a fee for service health system to a value based system and now repeal, replace and repair. How healthcare needs to focus on innovation to evolve into a system that takes care of us all. 

Takeaways: 

  • How innovation will save the healthcare system  
  • The challenges with putting together an innovation center 
  • Why overcoming culture is more difficult than allocating funding and resources 
  • How to assemble an innovation process

Think Tank

Cybersecurity - Information Sharing

The most valuable information in cyber security today is information about attacks that have already happened or are currently in progress. 

 

Yet, companies rarely have access to this critical information when they need it.

 

This is a direct result of the failure of past information security sharing efforts to adequately address the understandable concern, that sharing such data creates legal and reputational risk for companies.  

 

However, the tide is finally turning, New technologies and legal developments, notably the newly-enacted Cybersecurity act of 2015' have laid the foundation for a more modern approach to incident exchange and collaboration. 

 

This session will try to provide a framework to help senior security executives take a fresh look at incident sharing, enable them to evaluate how they can participate in and benefit from the era of collaboration.

 

2:55 pm - 3:20 pm

Executive Exchange

 

Think Tank

Practical Approaches to Cloud Security Governance

Current and future cloud security standards will be discussed and the need for thought leadership in this area. Approaches toward the identification of business drivers, functional use cases and the creation of security use cases will be introduced. The development of a Cloud Security Reference Architecture and its importance for active defense for identifying the appropriate security services and enabling cyber products. Practical security architecture approaches will be introduced that integrates both the risk assessment process, control identification and implementation. The topic of threat management will be discussed in context of data protection and the control point identification process for data flows. 

Takeaways: 

  • Leveraging and extending existing Cloud Security Governance guidance to address security risks and controls
  • Understanding the synergies between business drivers, functional use cases and security use cases for establishing a secure Cloud infrastructure 
  • Approaches for establishing an active defense within your security architecture 
  • Development of an approach in integrating the risk assessment process, control identification and implementation 
  • Understanding threat management and its relationship to security architecture, operational resiliency and data protection

Think Tank

Driving Digital: Key Practices CIO Should Lead to Enable Transformation

Transformation requires a strong execution playbook in agile practices, DevOps and data science. Agile and DevOps practices need to align with longer term transformational goals and roadmaps. Organizations need to be smarter and faster leveraging data in decision making. How can CIO lead these practices, align with digital transformation strategy, and elicit support from more people in the organization? Sharing lessons learned from executing digital transformation in three different industries and being published in an upcoming book, "Driving Digital: The Leader's Guide to Business Transformation Through Technology.

Takeaways:

  • What is digital transformation and what is the role of the CIO
  • Transformation requires engagement by a growing number of participants
  • What are some key practices in agile that enable business/IT alignment on transformational roadmaps
  • Why enabling DevOps and automation is needed to support application development
  • How to become more data driven and enable citizen data scientist programs

 

3:25 pm - 3:35 pm

Afternoon Networking Coffee Break

 

3:40 pm - 4:05 pm

Executive Exchange

 

Innovation Showcase

An exclusive opportunity to be exposed to the hottest new solutions providers in a quick-hit format designed to whet the appetite and spark immediate interest.
 

4:10 pm - 4:35 pm

Executive Exchange

 

Think Tank

Third Party Risk " Not a matter of IF, but When

It is not a matter of if, but a matter of when. Organizations, more and more, and are outsourcing business activities to 3rd-parties because of cost-savings, revenue opportunities, expertise, etc. Thus collaborating with our business partners early to select the right 3rd-party vendor(s) with the appropriate security posture is essential, especially for vendors hosting, processing and/or transmitting sensitive/regulatory information, or having access to our IT assets.

Think Tank

Building a Risk and Security Program in any Organization

Through a case study of a Cyber Defense of a high-profile national event, the 2012 Republican National Convention, explore how you can dupli¬cate, build and scale a corporate risk and security program for your environment. Using a risk-based approach and following security frameworks and best practices designed into an re¬al-time, working program, that will provide the required cyber protection and privacy enforcement that obtains and maintains a high degree of situational awareness of your environments. Additionally, you will be able to validate HIPAA, NERC, PCI, SOX, FIS¬MA, FDA and other compliance requirements in your organization. More important¬ly, obtain the risk managed levels of security expected by cus¬tomers, regulators and the board. This session will be a fast paced demonstration of the benefits of:  

  • Effective team dynamics and communication with multi-agency groups  
  • Building the security requirements, processes, systems and tools to manage actionable-intelligence on a daily basis
  • Improve operational capabilities through real-time security
  • React quickly to evolving events and situations 
  • Forecasting security events, incidents and problems before they happen  
  • Protecting customer and corporate data through cybersecurity diligence and tools 
  • Following established risk and security models to achieve regulatory compliance 
  • Review of the results from a working program

 

4:40 pm - 5:20 pm

Executive Visions

Cybersecurity - Information Sharing

The most valuable information in cyber security today is information about attacks that have already happened or are currently in progress. 

Yet, companies rarely have access to this critical information when they need it.

This is a direct result of the failure of past information security sharing efforts to adequately address the understandable concern, that sharing such data creates legal and reputational risk for companies.  

However, the tide is finally turning, New technologies and legal developments, notably the newly-enacted Cybersecurity act of 2015' have laid the foundation for a more modern approach to incident exchange and collaboration. 

This session will try to provide a framework to help senior security executives take a fresh look at incident sharing, enable them to evaluate how they can participate in and benefit from the era of collaboration.

 

5:20 pm - 5:30 pm

Thank You Address and Closing Remarks

 

5:30 pm - 7:00 pm

Cocktail Reception