CIO Dallas Summit | October 12, 2017 | Dallas Marriott Las Colinas - Dallas, TX, USA

↓ Agenda Key

Keynote Presentation

Visionary speaker presents to entire audience on key issues, challenges and business opportunities

Keynote Presentations give attending delegates the opportunity to hear from leading voices in the industry. These presentations feature relevant topics and issues aligned with the speaker's experience and expertise, selected by the speaker in concert with the summit's Content Committee." title="Keynote Presentations give attending delegates the opportunity to hear from leading voices in the industry. These presentations feature relevant topics and issues aligned with the speaker's experience and expertise, selected by the speaker in concert with the summit's Content Committee.

Executive Visions

Panel moderated by Master of Ceremonies and headed by four executives discussing critical business topics

Executive Visions sessions are panel discussions that enable in-depth exchanges on critical business topics. Led by a moderator, these sessions encourage attending executives to address industry challenges and gain insight through interaction with expert panel members." title="Executive Visions sessions are panel discussions that enable in-depth exchanges on critical business topics. Led by a moderator, these sessions encourage attending executives to address industry challenges and gain insight through interaction with expert panel members.

Thought Leadership

Solution provider-led session giving high-level overview of opportunities

Led by an executive from the vendor community, Thought Leadership sessions provide comprehensive overviews of current business concerns, offering strategies and solutions for success. This is a unique opportunity to access the perspective of a leading member of the vendor community." title="Led by an executive from the vendor community, Thought Leadership sessions provide comprehensive overviews of current business concerns, offering strategies and solutions for success. This is a unique opportunity to access the perspective of a leading member of the vendor community.

Think Tank

End user-led session in boardroom style, focusing on best practices

Think Tanks are interactive sessions that place delegates in lively discussion and debate. Sessions admit only 15-20 participants at a time to ensure an intimate environment in which delegates can engage each other and have their voices heard." title="Think Tanks are interactive sessions that place delegates in lively discussion and debate. Sessions admit only 15-20 participants at a time to ensure an intimate environment in which delegates can engage each other and have their voices heard.

Roundtable

Interactive session led by a moderator, focused on industry issue

Led by an industry analyst, expert or a member of the vendor community, Roundtables are open-forum sessions with strategic guidance. Attending delegates gather to collaborate on common issues and challenges within a format that allows them to get things done." title="Led by an industry analyst, expert or a member of the vendor community, Roundtables are open-forum sessions with strategic guidance. Attending delegates gather to collaborate on common issues and challenges within a format that allows them to get things done.

Case Study

Overview of recent project successes and failures

Case Studies allow attending executives to hear compelling stories about implementations and projects, emphasizing best practices and lessons learned. Presentations are immediately followed by Q&A sessions." title="Case Studies allow attending executives to hear compelling stories about implementations and projects, emphasizing best practices and lessons learned. Presentations are immediately followed by Q&A sessions.

Focus Group

Discussion of business drivers within a particular industry area

Focus Groups allow executives to discuss business drivers within particular industry areas. These sessions allow attendees to isolate specific issues and work through them. Presentations last 15-20 minutes and are followed by Q&A sessions." title="Focus Groups allow executives to discuss business drivers within particular industry areas. These sessions allow attendees to isolate specific issues and work through them. Presentations last 15-20 minutes and are followed by Q&A sessions.

Analyst Q&A Session

Moderator-led coverage of the latest industry research

Q&A sessions cover the latest industry research, allowing attendees to gain insight on topics of interest through questions directed to a leading industry analyst." title="Q&A sessions cover the latest industry research, allowing attendees to gain insight on topics of interest through questions directed to a leading industry analyst.

Vendor Showcase

Several brief, pointed overviews of the newest solutions and services

Taking the form of three 10-minute elevator pitches by attending vendors, these sessions provide a concise and pointed overview of the latest solutions and services aligned with attendee needs and preferences." title="Taking the form of three 10-minute elevator pitches by attending vendors, these sessions provide a concise and pointed overview of the latest solutions and services aligned with attendee needs and preferences.

Executive Exchange

Pre-determined, one-on-one interaction revolving around solutions of interest

Executive Exchanges offer one-on-one interaction between executives and vendors. This is an opportunity for both parties to make key business contacts, ask direct questions and get the answers they need. Session content is prearranged and based on mutual interest." title="Executive Exchanges offer one-on-one interaction between executives and vendors. This is an opportunity for both parties to make key business contacts, ask direct questions and get the answers they need. Session content is prearranged and based on mutual interest.

Open Forum Luncheon

Informal discussions on pre-determined topics

Led by a moderator, Open Forum Luncheons offer attendees informal, yet focused discussions on current industry topics and trends over lunch." title="Led by a moderator, Open Forum Luncheons offer attendees informal, yet focused discussions on current industry topics and trends over lunch.

Networking Session

Unique activities at once relaxing, enjoyable and productive

Networking opportunities take various unique forms, merging enjoyable and relaxing activities with an environment conducive to in-depth conversation. These gatherings allow attendees to wind down between sessions and one-on-one meetings, while still furthering discussions and being productive." title="Networking opportunities take various unique forms, merging enjoyable and relaxing activities with an environment conducive to in-depth conversation. These gatherings allow attendees to wind down between sessions and one-on-one meetings, while still furthering discussions and being productive.

 

Thursday, October 12, 2017 - CIO Dallas Summit

7:30 am - 8:25 am

Registration and Networking Breakfast

 

8:30 am - 8:40 am

Welcome Address and Opening Remarks

Presented by:

Ken Wilkinson, Former CTO/CISO, Sunset Logistics View details

 
 
 

8:45 am - 9:15 am

Share:

Keynote Presentation

Built to Change and Built to Last: How to Balance Culture, Skills, and Tech with Customer Expectations in the Fast-Changing Digital World

Tech has changed the way experiences and products are consumed - which means businesses have to change the way they deliver. Companies that have been around for decades are disappearing overnight, and startups with completely disruptive business models are bought and sold at the drop of a hat. The market today is made up of large, established enterprises and new challengers entering the market with nothing to lose - and they each want what the other has: a solid customer base, revenue and profit versus innovation, disruption and new talent. Companies who come out on top will be able to connect people, processes and technology with customer needs to translate experiences into real business value. This means balancing established industry experience with the new culture, skills, and insights required to compete in today's business landscape. 

Key Takeaways:

  • Embrace digital transformation, using technology to create an environment for incremental change while balancing innovation and governance at all levels of the organization. 
  • Create an agile business model that blends an organization's legacy approach with the expectations of the market and more importantly, customers, so that you're less likely to fall back on the excuse of "this is how we've always done it" when challenged. 
  • Build the right culture with people who are focused on continuous improvement, want to deliver amazing customer experiences, and wake up every day looking for ways to break down barriers between ideas and outcomes.

Sponsored by:

CA Technologies View details

 
 
 

9:20 am - 9:45 am

Executive Exchange

 

Share:

Thought Leadership

Secure, Simplify and Transform to a Cloud-Enabled Enterprise

Progressive companies are leveraging cloud, a powerful business enabler, to transform their business and make it more competitive. But cloud and mobility significantly impacts the current IT infrastructure - security, network traffic flow, applications, user experience and cost. As CIOs and CISOs embrace this transformation, they look for opportunities to exchange ideas with their peers who have gone through this journey. 

At this session, Zscaler, will share experience of leading the massive network, security and datacenter application transformation that he managed across all business units of GE. 

Example topics will include: 

  • How to transform your hub & spoke network into a cloud-enabled network 
  • How to transform datacenter applications to a SaaS, AWS and Azure environment 
  • New security paradigm for the new world of cloud 
  • Changing role of IT execs 
  • Lessons learned

Sponsored by:

Zscaler View details

 
 
 

9:50 am - 10:15 am

Executive Exchange

 

Share:

Thought Leadership

Infrastructure Based Security

As the enterprise continues to be bombarded with advanced and increasingly more sophisticated attacks, the CISO must shift to accomplish three critical objectives: 

  • Gain Superior Visibility and Control over their environment 
  • Automate tasks that enhance security posture 
  • Utilize integrated systems that identify breaches and facilitate rapid remediation 

This can only be done by partnering with vendors that have strong threat research, broad capabilities, powerful tools and integrations with existing tools. Fortinet offers it's Fabric as a foundational component to this vision.

Sponsored by:

Fortinet View details

 
 
 

10:20 am - 10:30 am

Morning Networking Coffee Break

 

10:35 am - 11:00 am

Executive Exchange

 

Think Tank

Building Dynamic Security Teams

There's no other way to say it than bluntly; Information Security is a white-hot field within Information Technology as a whole - over the last dozen years it has gone from after-thought, to scapegoat, to critical enterprise success factor. As a result, the need for capable and qualified Information Security specialists, whether front-line Analysts, mid-level Managers, or top level CISOs is at an all time high, but personnel and skills availability is sinking to an all-time (at least in terms of supply and demand ratio) low. There simply isn't enough expertise in existence to go around, or enough education occurring to create it. In this environment, senior Information Security leaders have to get creative in their pursuit of the people, performance, and passion necessary to address this capability shortfall. 

Takeaways:  

  • Learn how to build grass-roots programs that cultivate a farm full of potential security experts through internal and collaborative programs 
  • Find out how to leverage key organizational traits to generate buzz and interest where none existed before 
  • Understand the relevance of certs vs. experience and how to evaluate and validate the value of candidates

Presented by:

Louis Martinez, SVP Digital Data Services, Citi View details

 
 
 

11:05 am - 11:30 am

Executive Exchange

 

Share:

Thought Leadership

Boat Anchor to Business Enabler: A Metric-Driven Journey to DevOps Transformation

Meet Sarah. Sarah leads a 3000-person IT shop servicing a large financial institution that is deeply concerned about operational performance and market disruption. She has two years to reduce costs, accelerate innovation, and improve IT productivity -- but where to start and how to get there? In this session we will illustrate a metric-driven approach to transforming IT based on DevOps. Specifically, we will look at performance metrics that intersect with DevOps practices and principles like continuous delivery (CD), test driven development (TDD), lean, and software engineering. Integrating these concepts, we will share a scalable model for this transformation and real results from successful pilots.

Sponsored by:

DELL EMC View details

 
 
 

11:35 am - 12:00 pm

Executive Exchange

 

Executive Boardroom

IBM Cloud Video Brings the Cognitive Power of Watson to Video

IBM Cloud Video brings the cognitive power of Watson to video around the world. Our advanced products and solutions are infused with artificial intelligence capabilities that can reason, understand and learn what's inside a video. 

IBM Cloud Video enables leading brands to increase the value of their video by enhancing viewer engagement, managing workflows, and ensuring distribution of video across corporate networks is seamless. Regardless of industry or business model, our technology empowers customers to solve current challenges while anticipating the intelligent future of video. IBM Cloud Video recently launched a new offering called Watson Video Enrichment, which is part of a developing toolset for customers to drive cognitive-enhanced video solutions to improve both corporate and media oriented video offerings. 

Find out more about IBM's video offerings is this session where we'll explore many of the new capabilities, including:

  • enhanced video delivery via simultaneous multicast and unicast networks
  • automatic closed captioning and speech to text with smart editing
  • unlocking deep metadata within existing content
  • automatic detection of employee generated out-of-policy content

Sponsored by:

IBM Cloud Video View details

 
 

Executive Boardroom

Unsupervised Machine Learning: A New Approach to Cyber Defense

From insiders to sophisticated external attackers, the reality of cyber security today is that the threat is already inside. Legacy approaches to cyber security, which rely on knowledge of past attacks, are simply not sufficient to combat new, evolving attacks, and no human cyber analyst can watch so much or react quickly enough. A fundamentally new approach to cyber defense is needed to detect and investigate these threats that are already inside the network - before they turn into a full-blown crisis. 

Self-learning systems represent a fundamental step-change in automated cyber defense, are relied upon by organizations around the world, and can cover up to millions of devices. Based on unsupervised machine learning and probabilistic mathematics, these new approaches to security can establish a highly accurate understanding of normal behavior by learning an organization's 'pattern of life,'. They can therefore spot abnormal activity as it emerges and even take precise, measured actions to automatically curb the threat. 

Discover why unsupervised machine learning is the future of defense and how the 'immune system' approach to cyber security provides complete network visibility and the ability to prioritize threats in order to better allocate time and resources. 

In this session, learn: 

  • How new machine learning and mathematics are automating advanced cyber defense 
  •  Why full network visibility allows you to detect threats as or before they emerge How smart prioritization and visualization of threats allows for better resource allocation and lower risk 
  •  Real-world examples of unknown threats detected by 'immune system' technology

Sponsored by:

Darktrace View details

 
 
 

12:05 pm - 12:30 pm

Executive Exchange

 

Think Tank

Artificial Intelligence and the Rise of Advanced Machine Learning

Often times the terms "Artificial Intelligence" and "Advanced Machine Learning" are thought of interchangeably and while there is a relationship between AI and AML, to say they are the same thing is an oversimplification and misclassification. Rather the one begets the other with AI being the basic principle upon which AML is developed. As AI begins to mature and migrate away from purely advanced mathematical operations into decision making paradigms, AML steps forward as the predictive ability of machines to process vast quantities of data for the purposes of making decisions in ways that first mimic, but ultimately surpass (in terms of speed at the very least) those of humans. As data and analytics becomes foundational to the way every business operates, AI and AML will become foundational capabilities.

Takeaways:

  • While initial focus of AML decision making will be focused on binary decision making (i.e. Yes/No) ongoing advancements will move things to the next level
  • AI and AML are foundationally based on data and analytics -if these capabilities are not strong for you yet, investment is required
  • The possibilities with AML are potentially boundless, with autonomous cars the most publicly visible at this point, from which every industry can benefit

Presented by:

Ian O'Casey, Divisional VP Global ERP and Systems Integration, GameStop View details

 
 
 

12:35 pm - 1:20 pm

Networking Luncheon

 

1:25 pm - 1:50 pm

Executive Exchange

 

Think Tank

The Blockchain & Enhanced Security

There is a definite need to rethink the future of identity management on the web. The ability to verify your identity is the lynchpin of financial transactions that happen online. In today's digital age, an individual's identity is not defined by a single attribute such as a name, address or user ID. Rather, it is a collection of attributes including, but not limited to, name, age, financial history, work history, address history and social history. However, remedies for the security risks that come with web commerce are imperfect at best. IF Blockchain is the answer? how are you going to take it from being seen by senior management, as a futuristic solution to the way your organization may survive competition in the next five years. 

Takeaways:  

  • Growth of trusted Blockchain providers is growing exponentially 
  • It's not just the financial industry this will affect - Retail, Health Care?are going to be in for the pound as well as in for the bitcoin. 
  • Uses for Blockchain from ecommerce to supply chain management

Presented by:

Joe Lacik, CTO, University of Texas at Arlington

 

Think Tank

The Unbearable Lightness of Digital Transformation

Building a Disruptive Technology Digital team. To become fully digital enterprises, you need to shift the focus inward and innovate the employee experience. Is this defined as how employees feel about their organizations with regard to both opportunities for growth/skills development, and employees' willingness to continue to work for their current firms? Use digital DNA behaviors. 

Takeaways: 

Look after -Capability Planning, Innovation, Strategic Intelligence, Predictive Analytics, Disruptive Technology, Enterprise Architecture, Strategic Roadmap, M&A, Patents and Communication.

Presented by:

Chandra Gundlapalli, Global IT Director, Thomson Reuters View details

 
 
 

1:55 pm - 2:20 pm

Executive Exchange

 

Share:

Thought Leadership

Become a Change Agent for Business Transformation

Today's modern CIO is embarking on a digital transformation journey exploring radical hybrid IT strategies and leveraging new technologies like Cloud, Social, Mobile and Big Data. However, with 'keeping the lights on' legacy IT components costing nearly 90% of a typical IT budget, how can IT make powerful advancements and lead business change? 

Join this interactive session to learn how award-winning CIOs are successfully tipping the balance by liberating people, time and money from costly ongoing maintenance of their ERP systems including SAP and Oracle, to invest in strategic initiatives that create real-world competitive advantage.

Sponsored by:

Rimini Street View details

 
 
 

2:25 pm - 2:50 pm

Executive Exchange

 

Executive Boardroom

Cloudy with a Chance of Security Breach

Cloud encryption is not a new topic however, there are many approaches, architectures, and compromises based on what your provider offers and the tools available to your organization. In the last few years 'bring your own key' has emerged a top requirement of organizations that wish to embrace cloud services, yet have governance, corporate policy, or risk profiles that do not allow data and especially encryption keys to be managed by the cloud provider. In this talk, Chris Olive, will share different BYOK approaches across all cloud types (IaaS, PaaS, SaaS), compare BYOK to BYOE (bring your own encryption), some simple strategies to become successful, and arm you with a simple set of 'smart questions' to ask yourself and your providers.

Sponsored by:

Thales, e-Security View details

 
 

Executive Boardroom

Best Practices to Establish and Maintain Robust Security in Public Cloud Environments

Even as the leading public cloud service providers have beefed up their security, customer concerns around securing their cloud environments remain high. According to a recent survey of security practitioners, security is the top barrier to cloud adoption. Organizations deploying workloads on public clouds such as Amazon Web Services (AWS) at scale are faced with new challenges because traditional tools and controls that worked well for security and compliance in the datacenter fail in public cloud environments. In this presentation, we will showcase a new breed of cloud-native security tools that simplify security operations and enable faster time to compliance.

Sponsored by:

Dome9 View details

 
 
 

2:55 pm - 3:20 pm

Executive Exchange

 

Think Tank

Leverage the cloud to accelerate infrastructure at the speed of software

Ambit Energy has leveraged DevOps, continuous integration/continuous development (CI/CD), and microservices strategies to accelerate software development and deployment. This acceleration in software practices was critical to keep pace with the demands of the hypercompetitive retail energy business where Ambit Energy operates in more than 80 markets.  

One of the consequences of accelerating development and deployment to such an extent was that infrastructure became the new bottleneck in solutions delivery. Even after moving to converged infrastructure, virtualizing all hardware, and greatly expanding their datacenters, software delivery far outpaced infrastructure delivery. 

Ambit Energy has turned to the cloud to accelerate infrastructure delivery. They have successfully deployed hybrid-cloud and cloud only environments. And most critically, infrastructure is no longer a bottleneck for solution delivery. 

Takeaways: 

  • How moving infrastructure into Microsoft Azure provides redundancy\uptime, instant and cost-effective performance scalability, and immediate infrastructure deployment. 
  • How to assess your readiness to move to Azure evaluating your automation and architecture. 
  • How the cloud allows your technical resources to focus on core business delivery.

Presented by:

Tom Phillips, VP, Data and Infrastructure, Ambit Energy View details

 
 

Robert Rudduck, Director, Architecture and DevOps, Ambit Energy View details

 
 
 

3:25 pm - 3:35 pm

Afternoon Networking Coffee Break

 

3:40 pm - 4:05 pm

Executive Exchange

 

Share:

Thought Leadership

Identity and the New Age of Enterprise Security

From a technology standpoint, as a society the world of business has gone through two distinct stages in the evolution of its information security focus. The first addressed network based protection and preventative controls such as firewalls and anti-malware. The second looked at data-centric and detective controls such as encryption and intrusion/extrusion monitoring. Since breaches continue to occur at a record pace, what is need new is clearly a new evolution, one that pushes towards individual focused security through granular user monitoring and management as provided by solutions such as Identity and Access Management. While IAM isn't a new technology field, it is one whose time has come and CISO need to begin investing in modern-day, light-weight, easy to implement IAM solutions now to stay ahead of the curve, and reduce enterprise threats. 

Takeaways: 

  • The breach onslaught demonstrates that existing security solutions are incapable of defending current threats
  • Enterprises need to begin looking at security from an activity perspective rather than an artifact perspective 
  • IAM provides activity insight, and therefore threat awareness, no other platform can equal

Sponsored by:

RSA View details

 
 
 

4:10 pm - 4:35 pm

Executive Exchange

 

Think Tank

Is Security Obscuring the Benefit of the Cloud?

Cloud delivered computing services, whether Software, Platform, or Infrastructure as a Service offer the potential of significant business advantages such as reduced cost and increased flexibility. These advantages however come with very real risks, chief among them security concerns and the risk of data and compliance breaches- how do you secure what you can't see, touch, and control? Join the conversation as we explore both the security and compliance issues inherent in Cloud deployments, look at the hidden issues that first time Cloud adopters may simply not be aware of, and discuss through solutions that can be used to address these challenges and allow enterprises to fully and firmly embrace the Cloud. 

Takeaways:  

  • Be exposed to the true security and compliance cloud threat landscape 
  • Learn how successful cloud adopters have mitigated these risks 
  • Discover how to build cloud protection capabilities keyed to your needs

Presented by:

Randy Stroud, Information Security Officer, Hunt Companies View details

 
 
 

4:40 pm - 5:20 pm

Executive Visions

Facilitating Technology-Enabled Business Transformation

The role of the modern IT Executive is more complex than it has ever been before, not just because the technology landscape has become more complex, but also because increasingly IT execs have had to become a business-focused executive, not just a technologist. Long have we talked about the CIO and CISO getting a seat at the table but modern businesses are now demanding that their technology impresario join them and leverage his deep and rich technical acumen to allow the organization as a whole to better position itself for market-place success. To be successful, CxOs need to invest in themselves, in their personnel, and in the right technologies to allow them to position the IT department to proactively address business needs as an innovator and driver, rather than order-taker and enabler.

Takeaways:

  • IT leadership can no longer be simply technology focused, but must instead take their visibility into business process and become business focused
  • A broader business-focus does not preclude maintaining technology excellence however and indeed may demand more of it than ever before
  • Success for CxOs will be measured not in how they can enable enterprise decisions, but in how they can drive growth

Moderated by:

Ken Wilkinson, Former CTO/CISO, Sunset Logistics View details

 
 

Panelists:

Michael Delzer, Chief Infrastructure Architect, American Airlines View details

 
 

Scot Miller, Security Analyst, HMS View details

 
 

Rick Doucette, CIO, The National Math and Science Initiative View details

 
 

David Walsh, CIO, Farmer Brothers View details

 
 
 

5:20 pm - 5:30 pm

Thank You Address and Closing Remarks

Presented by:

Ken Wilkinson, Former CTO/CISO, Sunset Logistics View details

 
 
 

5:30 pm - 7:00 pm

Cocktail Reception