CIO Philadelphia Summit | April 24, 2018 | Le Meridien Philadelphia - Philadelphia, PA, USA

↓ Agenda Key

Keynote Presentation

Visionary speaker presents to entire audience on key issues, challenges and business opportunities

Keynote Presentations give attending delegates the opportunity to hear from leading voices in the industry. These presentations feature relevant topics and issues aligned with the speaker's experience and expertise, selected by the speaker in concert with the summit's Content Committee." title="Keynote Presentations give attending delegates the opportunity to hear from leading voices in the industry. These presentations feature relevant topics and issues aligned with the speaker's experience and expertise, selected by the speaker in concert with the summit's Content Committee.

Executive Visions

Panel moderated by Master of Ceremonies and headed by four executives discussing critical business topics

Executive Visions sessions are panel discussions that enable in-depth exchanges on critical business topics. Led by a moderator, these sessions encourage attending executives to address industry challenges and gain insight through interaction with expert panel members." title="Executive Visions sessions are panel discussions that enable in-depth exchanges on critical business topics. Led by a moderator, these sessions encourage attending executives to address industry challenges and gain insight through interaction with expert panel members.

Thought Leadership

Solution provider-led session giving high-level overview of opportunities

Led by an executive from the vendor community, Thought Leadership sessions provide comprehensive overviews of current business concerns, offering strategies and solutions for success. This is a unique opportunity to access the perspective of a leading member of the vendor community." title="Led by an executive from the vendor community, Thought Leadership sessions provide comprehensive overviews of current business concerns, offering strategies and solutions for success. This is a unique opportunity to access the perspective of a leading member of the vendor community.

Think Tank

End user-led session in boardroom style, focusing on best practices

Think Tanks are interactive sessions that place delegates in lively discussion and debate. Sessions admit only 15-20 participants at a time to ensure an intimate environment in which delegates can engage each other and have their voices heard." title="Think Tanks are interactive sessions that place delegates in lively discussion and debate. Sessions admit only 15-20 participants at a time to ensure an intimate environment in which delegates can engage each other and have their voices heard.

Roundtable

Interactive session led by a moderator, focused on industry issue

Led by an industry analyst, expert or a member of the vendor community, Roundtables are open-forum sessions with strategic guidance. Attending delegates gather to collaborate on common issues and challenges within a format that allows them to get things done." title="Led by an industry analyst, expert or a member of the vendor community, Roundtables are open-forum sessions with strategic guidance. Attending delegates gather to collaborate on common issues and challenges within a format that allows them to get things done.

Case Study

Overview of recent project successes and failures

Case Studies allow attending executives to hear compelling stories about implementations and projects, emphasizing best practices and lessons learned. Presentations are immediately followed by Q&A sessions." title="Case Studies allow attending executives to hear compelling stories about implementations and projects, emphasizing best practices and lessons learned. Presentations are immediately followed by Q&A sessions.

Focus Group

Discussion of business drivers within a particular industry area

Focus Groups allow executives to discuss business drivers within particular industry areas. These sessions allow attendees to isolate specific issues and work through them. Presentations last 15-20 minutes and are followed by Q&A sessions." title="Focus Groups allow executives to discuss business drivers within particular industry areas. These sessions allow attendees to isolate specific issues and work through them. Presentations last 15-20 minutes and are followed by Q&A sessions.

Analyst Q&A Session

Moderator-led coverage of the latest industry research

Q&A sessions cover the latest industry research, allowing attendees to gain insight on topics of interest through questions directed to a leading industry analyst." title="Q&A sessions cover the latest industry research, allowing attendees to gain insight on topics of interest through questions directed to a leading industry analyst.

Vendor Showcase

Several brief, pointed overviews of the newest solutions and services

Taking the form of three 10-minute elevator pitches by attending vendors, these sessions provide a concise and pointed overview of the latest solutions and services aligned with attendee needs and preferences." title="Taking the form of three 10-minute elevator pitches by attending vendors, these sessions provide a concise and pointed overview of the latest solutions and services aligned with attendee needs and preferences.

Executive Exchange

Pre-determined, one-on-one interaction revolving around solutions of interest

Executive Exchanges offer one-on-one interaction between executives and vendors. This is an opportunity for both parties to make key business contacts, ask direct questions and get the answers they need. Session content is prearranged and based on mutual interest." title="Executive Exchanges offer one-on-one interaction between executives and vendors. This is an opportunity for both parties to make key business contacts, ask direct questions and get the answers they need. Session content is prearranged and based on mutual interest.

Open Forum Luncheon

Informal discussions on pre-determined topics

Led by a moderator, Open Forum Luncheons offer attendees informal, yet focused discussions on current industry topics and trends over lunch." title="Led by a moderator, Open Forum Luncheons offer attendees informal, yet focused discussions on current industry topics and trends over lunch.

Networking Session

Unique activities at once relaxing, enjoyable and productive

Networking opportunities take various unique forms, merging enjoyable and relaxing activities with an environment conducive to in-depth conversation. These gatherings allow attendees to wind down between sessions and one-on-one meetings, while still furthering discussions and being productive." title="Networking opportunities take various unique forms, merging enjoyable and relaxing activities with an environment conducive to in-depth conversation. These gatherings allow attendees to wind down between sessions and one-on-one meetings, while still furthering discussions and being productive.

 

Tuesday, April 24, 2018 - CIO Philadelphia Summit

7:30 am - 8:10 am

Registration and Networking Breakfast

 

8:15 am - 8:25 am

Welcome Address and Opening Remarks

 

8:25 am - 8:55 am

Keynote Presentation

Digital Transformation: A Journey Not a Destination

There are many forces that are driving companies to continue to transform how they do business. Technological advances such as IoT, AI, machine learning, virtual reality and augmented reality are creating demanding expectations from customers, employees and boards. Adding to the complexity of CIOs and CISOs is the increasing threats to the security of the data that is at the heart of digital transformation. This keynote presentation will focus on the realities that this transformation will never end and it is critical to implement both the mindset and processes to treat digital transformation as a journey...not a destination.

Takeaways: 

  1. It is critical to realize that digital transformation will never end, but will always be unfolding.
  2. CIOs and CISOs must implement processes to ensure that not only their departments are forward thinking, but that their entire company is aware of what new technologies can bring to bear for customers and employees.

Presented by:

Neil Gomes, Chief Digital Officer and SVP for Technology Innovation and Consumer Experience, Thomas Jefferson University and Jefferson Health

 
 

9:00 am - 9:30 am

Share:

Keynote Presentation

Hybrid Data Management: How Unleashing the Power of Your Data Can Help You Transform the Business

Hybrid Data Management is the foundation for data that will be used in analytics and data science to drive insights for businesses of all sizes and across all industries. It incorporates transactional databases, data warehousing and data lakes with options for on-premises, private and public cloud deployments. Data is the life blood of any organization and it can be a critical asset for the organizations that understand the importance of an uninterrupted flow of information throughout the enterprise.  

Thought leaders across the spectrum of enterprise data management want to ensure that critical applications can run anywhere in an enterprise -- no matter where the data resides. In this session, you will learn what Hybrid Data Management is, how it can benefit your organization, what the challenges to deployment are and how some business are already experiencing benefits from the solution with the help of IBM.

Sponsored by:

IBM View details

 
 

Tom Hronis, WW Leader, Digital Technical Engagement, Hybrid Data Management, IBM View details

 
 
 

9:35 am - 10:00 am

Executive Exchange

 

Share:

Thought Leadership

Charting AI's Rise as Cybersecurity's Force Multiplier

It has never been easier for bad actors to build and deliver malicious software. Today's world of coders-for-hire and software-as-a-service has made malware an exponentially growing issue, and CISOs are racing to keep up. Against these challenges, Artificial Intelligence has emerged as a tool that could turn the tide for resource-constrained security programs. This session will trace the history of AI and machine learning, and explore how artificial neural networks can operate as part of security operations.

Sponsored by:

Fortinet View details

 
 

Keith Rayle, Senior Security Strategist, Fortinet View details

 
 
 

10:05 am - 10:30 am

Executive Exchange

 

Share:

Think Tank

The Cloud Journey: Before, During, & After

It is the dream scenario for many companies (especially after many hurdles, endless internal stakeholder meetings, and long hours with your project team) to finally complete the first large cloud migration and transition into the Happily Ever After stage of cloud migration. What happens now?

Takeaways:

  1. What happens before, during, and after cloud migration?  
  2. What are the ways you can leverage the cloud to successfully stay ahead of the curve?

Presented by:

Sean Ebeling, Platform Architect, Penn Medicine

 

Chris Freas, Sr. Systems Architect Director, Penn Medicine

 
 

10:30 am - 10:40 am

Morning Networking Coffee Break

 

10:45 am - 11:10 am

Executive Exchange

 

Share:

Thought Leadership

Digital Transformation - Architecting Your Digital Platform at the Edge

The digital economy is forcing enterprises to transform how they connect customers, partners, employees and operations. Today's market leaders credit their speed and business advantages to their digital platform. Equinix will discuss how an Interconnection Oriented Architecture (IOATM) with a step-by-step playbook can redefine the edge - which is where to localize delivery of cloud-supported services to your customers, employees and partners - and architect your digital platform.

Sponsored by:

Equinix View details

 
 
 

11:15 am - 11:40 am

Executive Exchange

 

Share:

Thought Leadership

Say Goodbye to Vulnerability Backlogs: Using RASP to Reclaim Control and Reduce Risk

Knowing is half the battle when it comes to protecting applications and their sensitive data. 

 Application security testing tools scan your code to reveal the long lists of known vulnerabilities, but not all are remediated before the next release-even with mature secure software development practices. Enterprises resort to using theoretical levels of criticality - not actual risks-to prioritize which accumulated vulnerabilities to fix and in what order. Many vulnerabilities often undergo an exception process and make it into protocol. 

A real-time, embedded solution like Prevoty's runtime application self-protection RASP changes the game completely. Prevoty places an automated security mechanism at the front of the line - directly in the application's operating environment - to immediately lower risk and act as a compensating control at runtime. 

As such, Prevoty-enabled enterprises see 98%+ of their known vulnerabilities mitigated instantly, reducing backlogs and expediting an otherwise cumbersome release process. Prevoty RASP detects live production attacks and generates real-time security event longs and reports. Security teams can then correlate pre-production vulnerability scan results with Prevoty's runtime attack logs to go back, remediate based on actual risk - not just hypothetical threats. The result? Improved forensics.

Sponsored by:

Prevoty, Inc. View details

 
 

Hugh Cushing, Solution Engineer, Prevoty, Inc. View details

 
 
 

11:45 am - 12:10 pm

Executive Exchange

 

Share:

Executive Boardroom

Finding the Right Security Partner: The Difference Between MSSP and MDR

In today's world of increasing cyber threats, selecting the best security partner for your organization can be challenging. With innovative services such as Managed Detection and Response changing the way organizations respond to threats, it's important to understand the difference between traditional MSSPs and MDR providers. This presentation will focus on the realities of using MSSP technologies versus MDR and provide selection recommendation guidelines for CISOs. 

Takeaways:

  • Vendors can respond to incidents proactively or reactively 
  • Not all MDR vendors are the same 
  • Use a proof of concept to authenticate vendor claims 
  • Validate the vendors regulatory experience

Sponsored by:

eSentire View details

 
 

Steve Fuller, Senior Solutions Engineer, eSentire View details

 
 

Share:

Executive Boardroom

Transforming Networks for Greater Security

The enterprise network today spans the globe - to wherever you are and to wherever your data flows. As a result, it is becoming increasingly difficult for IT leaders to know who is on their network and what they are doing. Attend this session to learn about modern network security challenges faced by IT leaders, how to leverage the network as a platform for security, and new and expanded capabilities around network and security solutions.

Sponsored by:

Datalink, a division of Insight View details

 
 

Rob Parsons, Practice Leader - Network and Integrated Security, Datalink, a division of Insight View details

 
 
 

12:15 pm - 1:25 pm

Working Lunch & Panel

CIOs/CISOs as the Consummate Communicator

Digital transformation is changing how you equip your employees and how your company interacts with customers. It is also changing the role of the CIO and CISO to be a business leader and internal sales leader for transformation. CIOs are now responsible for communicating strategies and recommendations to CxOs, boards and key stakeholders within a company. Join us, during lunch, for a passionate panel discussion with your peers as they share how they are successfully communicating internally to accomplish the company's goals.

Takeaways:

  1. CIOs must be great communicators, not only with their teams, but the rest of the organization.
  2. CIOs must learn the best ways to communicate clarity and urgency with boards and CXOs.

Moderated by:

Chiranjoy Das, CIO, Simple Tire View details

 
 

Panelists:

Mark Eggleston, VP, Chief Information Security and Privacy Officer, Health Partners Plans View details

 
 

Steve Hendrie, CISO, The Hershey Company View details

 
 

William Bailey, VP Information Security, Police & Fire FCU View details

 
 
 

1:30 pm - 1:55 pm

Solutions Spotlight

Deep dives into the latest and greatest technology solutions to today's business problems.

 

2:00 pm - 2:25 pm

Executive Exchange

 

Think Tank

Disrupt or Be Disrupted: The Digital Transformation Journey Has No Parking Lots

The seemingly ever expanding cadre of technological tools available to incumbent industry leaders are also available to myriad start-ups. Start-ups are using these new technologies to disrupt industries of all types, changing how customers think about tried and true industries. Disruption is found on every corner and it is critical for CIOs to lead their organizations in a way that make them as nimble as their competitors.

Takeaways:

  1. Technology enables companies, especially start-ups with no legacy infrastructure, to disrupt industries overnight.
  2. CIOs need to lead their companies in ways that disrupt before they are disrupted by others.

Presented by:

Chiranjoy Das, CIO, Simple Tire View details

 
 
 

2:30 pm - 2:55 pm

Executive Exchange

 

Share:

Thought Leadership

The Simple Truth: Stuff Works Better When it Works Together

As Albert Einstein once said, "The definition of insanity is doing the same thing over and over again and expecting different results." Sage advice, but this is exactly what many CISOs are doing when it comes to network security. It's time that business, IT, and security leaders realize that they are fighting a losing battle. Cybercriminals are using new types of offensive weapons and tactics, so enterprises must counter this offensive with new types of defenses that can help them improve protection, detection, and response. These enhancements won't come from incremental tactical changes to legacy network security defenses but rather, enterprises need to move forward with a more strategic change: an end-to-end integrated network security architecture. In this session we will explore the possibilities and learn how the application of analytics, both behavioral and predictive at the higher level can be deployed to support both threat prevention and compliance industrialization.

Sponsored by:

Cisco Systems View details

 
 

Anthony Davis, Security Principal Director of Global Cybersecurity Solutions, Cisco Systems View details

 
 
 

3:00 pm - 3:25 pm

Executive Exchange

 

Share:

Executive Boardroom

Deception-Based Threat Detection: Myths and Realities

In today's world where advanced threats and insiders demonstrate that they can evade security prevention systems, in-network threat visibility and detection are considered critical security infrastructure. That said, there are myths and realities about the effectiveness of deception for detecting advanced threats - and there are specific strategies for operational management efficiency and key use cases that are driving adoption. Join us for this session where you'll hear about real-world deployment experiences, the value customers are realizing, and what pen test Red Teams are saying about deception-based threat detection.

Sponsored by:

Attivo Networks View details

 
 

Tom Atkins, AVP, Attivo Networks View details

 
 
 

3:25 pm - 3:35 pm

Afternoon Networking Coffee Break

 

3:40 pm - 4:05 pm

Executive Exchange

 

Share:

Executive Boardroom

Building Your Digital Transformation Journey

According to 451 Research, over half of all businesses today are on a journey of transformation. 

Do you know where your Digital Transformation journey is taking you? Join Bhu Virdi, Director Technical Solutions Engineering, Flexential as he discusses the process to beginning your digital transformation strategy. 

Takeaways: 

  • Current State Review- to get to where you are going, you have to know where you are 
  • Workload/Application Review- key factors that can impact your business  
  • Transformation Concerns- how to overcome security and compliance roadblocks  
  • Future State Planning- aligning people, processes and technology for desired business outcomes 
  • Best Practices - key strategies from real transformation stories

Sponsored by:

Flexential View details

 
 

Bhu Virdi, Director, Technical Solutions, Flexential View details

 
 
 

4:10 pm - 4:35 pm

Executive Exchange

 

Think Tank

Going Mobile: Mobility as a Driver of Enterprise Transformation

Mobility has changed everything. Customers expect to engage and consume where and how they want. This power shift from company to customer has put increased pressure on on businesses to change. However, mobility can also be the beacon that drives a company's digital transformation due to its universality in experience and understanding.  

Takeaways:

  1. Mobility is changing both how employees and customers think about and interact with a company. 
  2. Mobility can also be the overarching driver that enables a CIO to rally an organization to the next step on the digital transformation journey.

Presented by:

Mike Baca, Director, Digital Transformation & Mobility, AmerisourceBergen View details

 
 
 

4:40 pm - 5:00 pm

What's the Next Stop On the Transformation Journey?

Our Governing Board will summarize the learnings from the day and discuss the path forward for building an ongoing community of CISOs where common issues can be addressed and success stories can be shared.

Takeaways:

  1. Building an ongoing community with your peers can be an invaluable resource for tackling the digital transformation projects ahead of you.
  2. Sharing stories of success (and failures) is not reserved to a one-day CISO Summit, but should be shared on a regular basis with your peers.

 

5:00 pm - 6:30 pm

Summit Happy Hour