CIO Finance Summit | March 25 - 28, 2018 | JW Marriott Hotel Miami - Miami, FL, USA
↓ Agenda Key
Keynote Presentation
Visionary speaker presents to entire audience on key issues, challenges and business opportunities
Keynote Presentations give attending delegates the opportunity to hear from leading voices in the industry. These presentations feature relevant topics and issues aligned with the speaker's experience and expertise, selected by the speaker in concert with the summit's Content Committee." title="Keynote Presentations give attending delegates the opportunity to hear from leading voices in the industry. These presentations feature relevant topics and issues aligned with the speaker's experience and expertise, selected by the speaker in concert with the summit's Content Committee.
Executive Visions
Panel moderated by Master of Ceremonies and headed by four executives discussing critical business topics
Executive Visions sessions are panel discussions that enable in-depth exchanges on critical business topics. Led by a moderator, these sessions encourage attending executives to address industry challenges and gain insight through interaction with expert panel members." title="Executive Visions sessions are panel discussions that enable in-depth exchanges on critical business topics. Led by a moderator, these sessions encourage attending executives to address industry challenges and gain insight through interaction with expert panel members.
Thought Leadership
Solution provider-led session giving high-level overview of opportunities
Led by an executive from the vendor community, Thought Leadership sessions provide comprehensive overviews of current business concerns, offering strategies and solutions for success. This is a unique opportunity to access the perspective of a leading member of the vendor community." title="Led by an executive from the vendor community, Thought Leadership sessions provide comprehensive overviews of current business concerns, offering strategies and solutions for success. This is a unique opportunity to access the perspective of a leading member of the vendor community.
Think Tank
End user-led session in boardroom style, focusing on best practices
Think Tanks are interactive sessions that place delegates in lively discussion and debate. Sessions admit only 15-20 participants at a time to ensure an intimate environment in which delegates can engage each other and have their voices heard." title="Think Tanks are interactive sessions that place delegates in lively discussion and debate. Sessions admit only 15-20 participants at a time to ensure an intimate environment in which delegates can engage each other and have their voices heard.
Roundtable
Interactive session led by a moderator, focused on industry issue
Led by an industry analyst, expert or a member of the vendor community, Roundtables are open-forum sessions with strategic guidance. Attending delegates gather to collaborate on common issues and challenges within a format that allows them to get things done." title="Led by an industry analyst, expert or a member of the vendor community, Roundtables are open-forum sessions with strategic guidance. Attending delegates gather to collaborate on common issues and challenges within a format that allows them to get things done.
Case Study
Overview of recent project successes and failures
Case Studies allow attending executives to hear compelling stories about implementations and projects, emphasizing best practices and lessons learned. Presentations are immediately followed by Q&A sessions." title="Case Studies allow attending executives to hear compelling stories about implementations and projects, emphasizing best practices and lessons learned. Presentations are immediately followed by Q&A sessions.
Focus Group
Discussion of business drivers within a particular industry area
Focus Groups allow executives to discuss business drivers within particular industry areas. These sessions allow attendees to isolate specific issues and work through them. Presentations last 15-20 minutes and are followed by Q&A sessions." title="Focus Groups allow executives to discuss business drivers within particular industry areas. These sessions allow attendees to isolate specific issues and work through them. Presentations last 15-20 minutes and are followed by Q&A sessions.
Analyst Q&A Session
Moderator-led coverage of the latest industry research
Q&A sessions cover the latest industry research, allowing attendees to gain insight on topics of interest through questions directed to a leading industry analyst." title="Q&A sessions cover the latest industry research, allowing attendees to gain insight on topics of interest through questions directed to a leading industry analyst.
Vendor Showcase
Several brief, pointed overviews of the newest solutions and services
Taking the form of three 10-minute elevator pitches by attending vendors, these sessions provide a concise and pointed overview of the latest solutions and services aligned with attendee needs and preferences." title="Taking the form of three 10-minute elevator pitches by attending vendors, these sessions provide a concise and pointed overview of the latest solutions and services aligned with attendee needs and preferences.
Executive Exchange
Pre-determined, one-on-one interaction revolving around solutions of interest
Executive Exchanges offer one-on-one interaction between executives and vendors. This is an opportunity for both parties to make key business contacts, ask direct questions and get the answers they need. Session content is prearranged and based on mutual interest." title="Executive Exchanges offer one-on-one interaction between executives and vendors. This is an opportunity for both parties to make key business contacts, ask direct questions and get the answers they need. Session content is prearranged and based on mutual interest.
Open Forum Luncheon
Informal discussions on pre-determined topics
Led by a moderator, Open Forum Luncheons offer attendees informal, yet focused discussions on current industry topics and trends over lunch." title="Led by a moderator, Open Forum Luncheons offer attendees informal, yet focused discussions on current industry topics and trends over lunch.
Networking Session
Unique activities at once relaxing, enjoyable and productive
Networking opportunities take various unique forms, merging enjoyable and relaxing activities with an environment conducive to in-depth conversation. These gatherings allow attendees to wind down between sessions and one-on-one meetings, while still furthering discussions and being productive." title="Networking opportunities take various unique forms, merging enjoyable and relaxing activities with an environment conducive to in-depth conversation. These gatherings allow attendees to wind down between sessions and one-on-one meetings, while still furthering discussions and being productive.
3:00 pm - 7:00 pm
6:00 pm - 8:00 pm
6:30 pm - 9:00 pm
7:30 am - 8:30 am
8:35 am - 8:45 am
Presented by:
Vivian Schneck-Last, Former Managing Director, Goldman Sachs
Steve Dimmitt, Vice President, Marketing and Customer Success, CDM Media
8:45 am - 9:25 am
Making the transition from legacy systems to next generation implementations is a major decision point for virtually any organization trying to take advantage of the new era in end user enablement through personal devices, connectivity and apps. Indeed, while Digital Transformation is one of those key buzzwords that many toss around, what does it really mean and how will it affect your business? Further, with so many options on the horizon, what are some of the key components you need to be most aware of and in some cases, concerned by? And how can you avoid many of the failures currently prevalent among companies trying to make Digital Transformation work for their business with limited success?
This presentation will focus on key strategies and implementation techniques that will ultimately make it far easier to migrate to next generation business solutions.
Takeaways:
Sponsored by:
Samsung
Keith Fuentes, Vice President, Knox Services, Samsung
9:30 am - 10:10 am
Hybrid Data Management is the foundation for data that will be used in analytics and data science to drive insights for businesses of all sizes and across all industries. It incorporates transactional databases, data warehousing and data lakes with options for on-premises, private and public cloud deployments. Data is the life blood of any organization and it can be a critical asset for the organizations that understand the importance of an uninterrupted flow of information throughout the enterprise.
Thought leaders across the spectrum of enterprise data management want to ensure that critical applications can run anywhere in an enterprise -- no matter where the data resides. In this session, you will learn what Hybrid Data Management is, how it can benefit your organization, what the challenges to deployment are and how some business are already experiencing benefits from the solution with the help of IBM.
Sponsored by:
IBM
Chris Reuter, North America Data Warehouse Sales Leader, IBM
10:15 am - 10:40 am
Kaplan believes "if it can be tracked it can be measured and thus optimized. Kaplan is finding ways to leverage data to transform the student experience support their drive for success. Avinash will share both the current data strategy as well as a look ahead at how to use data to improve the Return on Education Investment (ROEI).
Presented by:
Avinash Tripathi, Strategic Business Partner, Kaplan Inc.
While new technology and solutions can help CISOs make more, faster and better decisions for an organization, nothing will take the place of a highly talented workforce. CISOs need to be great recruiters of talent but even more importantly growing the skills and capabilities of their team providing engaging and challenging opportunities for people. Competitive compensation is important for retaining great talent but so is a work environment where individual growth and development are front of mind and not an after thought.
Takeaways:
Presented by:
Devon Bryan, Executive Vice President and CISO, The Federal Reserve System
What have we learned from a decade of cloud computing? What are the best practices that we should be taking into account as we take the next step on the digital transformation journey? We will discuss the full range of data center to cloud to hybrid cloud to fog and everything in between.
Takeaways:
Presented by:
Gram Ludlow, VP Global Information Security, Marriott Vacations Worldwide Corporation
10:45 am - 11:10 am
Knowing is half the battle when it comes to protecting applications and their sensitive data.
Application security testing tools scan your code to reveal the long lists of known vulnerabilities, but not all are remediated before the next release-even with mature secure software development practices. Enterprises resort to using theoretical levels of criticality â?" not actual risks-to prioritize which accumulated vulnerabilities to fix and in what order. Many vulnerabilities often undergo an exception process and make it into protocol.
A real-time, embedded solution like Prevoty's runtime application self-protection (RASP0 changes the game completely. Prevoty places an automated security mechanism at the front of the lineâ?"directly in the application's operating environmentâ?"to immediately lower risk and act as a compensating control at runtime.
As such, Prevoty-enabled enterprises see 98%+ of their known vulnerabilities mitigated instantly, reducing backlogs and expediting an otherwise cumbersome release process. Prevoty RASP detects live production attacks and generates real-time security event longs and reports. Security teams can then correlate pre-production vulnerability scan results with Prevoty's runtime attack logs to go back, remediate based on actual riskâ?"not just hypothetical threats. The result? Improved forensics.
Sponsored by:
Prevoty, Inc.
Kunal Anand, CTO, Prevoty, Inc.
11:15 am - 11:40 am
Digital transformation delivers a sustainable competitive edge if done right. The multi-million dollar boardroom question that CIOs are often left to address: "how are we going to pay for this?" with ongoing operations consuming 80%-90% of a typical IT budget.
Join this interactive discussion to hear how technology leaders are adopting three specific strategies to reallocate capital & resources to digital growth. That reality requires significant rethinking of cost components and budget tradeoffs, and exploring radical options across the entire IT landscape.
Sponsored by:
Rimini Street
Hari Candadai, GVP, Global Product Strategy, Rimini Street
11:45 am - 12:10 pm
Deep dives into the latest and greatest technology solutions to today's business problems.
12:15 pm - 12:40 pm
The role of mid-market CIO's is rapidly changing requiring the need to not only support the day-to-day technology concerns of a business but also align new technology plans with the organizations top strategic objectives; in addition all of this must be done while continuing to drive down costs due to tighter IT budgets.
The core of many mid-market organization objectives is how to stay competitive through a better understanding of what customers want. Such an understanding is not the responsibility of a single individual or department but a cohesive approach to enabling all employees to access and interpret customer information as it relates to their specific job functions in their respective departments.
This experience also needs to tie the organization together in a common, flexible and secure platform to not only meet the CIO's needs but also help drive the organization's strategic objectives forward.
Learn how 8x8 can help you create an optimal customer experience by enabling a superior employee experience.
Sponsored by:
8x8
Reza Kamran, Director of Product Marketing, 8x8
Today, Infosec and DevOps operate in silos with different and sometimes competing mandates. DevOps teams focus on velocity with continuous iterations while Infosec teams focus on managing risk and control. With the meteoric rise of microservices architectures enabled by application containers, the disconnect between DevOps and Infosec puts the organization at significant risk. Traditional vulnerability and remediation processes are ineffective in securing containers. Instead, security must be integrated into the CI/CD toolchain as a critical test to discover vulnerabilities and enforce enterprise policies before production. This session will discuss these challenges and suggest techniques, organizational changes and tools that can help DevOps and Infosec adjust to these new realities.
Sponsored by:
Tenable Network Security
12:45 pm - 1:35 pm
1:40 pm - 2:05 pm
Deep dives into the latest and greatest technology solutions to today's business problems.
2:10 pm - 2:35 pm
Successful companies are constantly evolving and identifying new and innovative ways to grow their business and drive customer demand. Highly skilled employees are all tools companies have leveraged to stay ahead of the competition. Data is all around us, and whether we are aware of it or not, virtually everything we do now results in the generation of new data. Every electronic message we send and receive, every internet site we visit - all of this contributes to the vast amount of data that corporations currently hold on us. Data is a commodity in today's world and one whose value is endless. So, what do we do with all this data? The average person remains largely unaware of exactly how much power businesses have through data analytics.
Takeaways
Presented by: David Solganik, Managing Director- Global Head of Business Intelligence and Metrics, Morgan Stanley
It is not a matter of if, but a matter of when. Organizations, more and more, and are outsourcing business activities to third parties because of cost-savings, revenue opportunities, expertise, etc. Thus, collaborating with our business partners early to select the right third-party vendor(s) with the appropriate security posture is essential, especially for vendors hosting, processing and/or transmitting sensitive/regulatory information, or having access to our IT assets.
Takeaways:
Presented by:
Jonathan Hale, Senior Director & CISO, Veolia North America
David can discuss the unique challenges, risks and opportunities involved with effectively guiding a SIFMU through a digital transformation, including:
Presented by:
David Hoag, Group CIO, The OCC
2:40 pm - 3:05 pm
Adaptation is everything. Today's customer knows more about our brand and out competitors than we do - they constantly research competitors, interact with us on their own terms, flow across channels, and take unpredictable routes to a fluid destination. They give us a narrow window of opportunity to capture their attention - and if we miss it's, it's gone forever.
Despite that, only 10% of organizations can adapt an individual's experience in real-time, and optimize their path-to-purchase. The other 90% just can't move fast enough to stay relevant.
In this session, we'll explore how truly disruptive companies are raising the bar for customer experience, right now - leveraging data from across channels to optimize every aspect of the journey - bringing customers closer, and earning the right to expand those relationships.
Key Takeaways:
Sponsored by:
Pegasystems
Cardinal Health successfully entered a new market segment and has become one of today's Specialty Drug distribution market share leaders in only three years! Former Executive Director, Dom Garda, will discuss the digital transformation tactics used to differentiate themselves and enable this success.
Takeaways:
Sponsored by:
Infodat
Enterprises around the globe are creating and storing vast amounts of data as part of their daily business. Without classification of that data, enterprises are at risk for internal or external breaches of data and failing to comply with regulations. What's worse, enterprise security and risk managers are working far harder than they need to without even knowing it. In this session we will discuss data protection challenges and how the increasingly complex regulatory compliance landscape is necessitating organizations to leverage data classification across the enterprise for better risk management. If you are a CISO who has been told to do data classification, this session is for you.
Takeaways:
Sponsored by:
Boldon James
3:10 pm - 3:20 pm
3:25 pm - 3:50 pm
Deep dives into the latest and greatest technology solutions to today's business problems.
3:55 pm - 4:20 pm
Hadoop and related technologies for Big Data analytics can deliver tremendous business value, and at a lower cost than traditional data management approaches. But early adopters have encountered challenges and learned lessons over the past few years. In this presentation, we'll discuss:
Sponsored by:
Dell EMC
As today's attacks become more sophisticated, the pressure to protect access to enterprise systems and applications has grown considerably. Unlike the traditional security perimeter model, a Zero Trust approach dispels the notion of traditional models and moves toward a ?Never trust, Always verify? model for protecting access to data. Zero Trust recognizes that any network, device, user, or application could be compromised, and the credentials associated with them. As such, in order to better protect sensitive company resources, IT departments need to adjust their mindset and adopt a new way of thinking: that bad actors are already in their environment. Join us to hear how identity has become the hub of any Zero Trust framework, and discover several guiding principles and paradigms that help define a Zero Trust model.
We'll examine: The current (broken) state of security and the role identity plays in cyber attacks, the massive rethink underway that redefines security to follow identity, and how Centrify is adopting a Zero Trust model approach with identity at the core, thus uniquely helping reduce risk through the power of identity services.
Sponsored by:
Centrify
4:30 pm - 4:55 pm
Deep dives into the latest and greatest technology solutions to today's business problems.
5:00 pm - 5:45 pm
Digital transformation is changing how you equip your employees and how your company interacts with customers. It is also changing the role of the CIO and CISO to be a business leader and internal sales leader for transformation. CIOs are now responsible for communicating strategies and recommendations to CxOs, boards and key stakeholders within a company. Join us, during lunch, for a passionate panel discussion with your peers as they share how they are successfully communicating internally to accomplish the company's goals.
Takeaways:
Moderated by:
Vivian Schneck-Last, Former Managing Director, Goldman Sachs
Panelists:
Shawna Cartwright, Group Director Head of Transformation, Ryder Systems Inc.
Donna Kladis, CIO, Techtronics Industries
Myrna Soto, Partner, Trident Capital Cybersecurity
Emily Larkin, CISO, Sageworks
5:45 pm - 6:45 pm
6:45 pm - 8:00 pm
6:45 pm - 6:55 pm
7:15 pm - 7:30 pm
Presented by:
Jedidiah Yueh, Founder and Executive Chairman, Delphix
8:00 pm - 10:00 pm
7:30 am - 8:15 am
8:15 am - 8:55 am
It's almost paradoxical that enterprises possessing incredible stores of unique data are often not prepared to take advantage of those valuable assets â?" resulting in negative or reduced ROI from the data, incorrect or biased decision making, risk of potential compliance or security violations, and lost opportunities to gain competitive advantage. Join us to learn the best approach to data that services the needs of the entire enterprise, enabling a truly data-driven culture that will ensure you can know your data, trust your data, and use your data effectively.
Sponsored by:
IBM
Scott Buckles, Business Unit Executive - North America Business Analytics and Unified Governance Solutions Sales, IBM
9:00 am - 9:25 am
With massive volumes of data growing at double-digit rates, regulations getting stricter, escalating security demands and mounting storage costs, many organizations in the digital economy feel caught between a rock and a hard place. Having to choose between security, compliance and storage ROI is no choice at all. This session looks at how to develop a data storage strategy that can address your compliance requirements, provide military-grade security and be cost effective all at the same time.
Takeaways:
Sponsored by:
Leonovus
Whether customers buy your products in-store or online, the path to purchase is no longer linear. It's no longer ?news? that the internet and mobile have changed the customer journey and how prospective customers engage and learn with products or services Today's journey is a roundabout, with consumers jumping in and out of platforms, devices, while speaking to friends and family simultaneously. Today's consumers don't make distinctions between being online and shopping offline - they want the experience to be seamless. Successful marketing programs today must be omnipresent and omnichannel. During this session we will discuss best practices and use cases of successful omnichannel marketing efforts that drive not only in-store purchases, but consumer loyalty to keep them coming back.
Takeaways:
Sponsored by:
SweetIQ
9:30 am - 9:55 am
Next generation digital services such as Internet of Things, Big Data Analytics, Machine Learning, Hybrid Cloud, and Software-Defined Everything are increasingly reliant on proximal, high-speed, low-latency interconnectivity and adjacency to massive compute, storage, and Software as a Service.
Enterprises, service providers, and governmental communities of interest can reduce costs and time to market by moving to a regionally-distributed Interconnection Oriented Architecture where geo-strategic alignment of applications, data and consumers is achieved at the network edge.
Sponsored by:
Equinix
Cybercrime has impacted virtually everything and everyone, at some level. Whether it's a big bank or hospital, a hotel chain or transit system, cyber-attacks affect organizations and individuals alike. Industry experts and analysts agree: cybercrime rates will continue to increase in 2018. In this session we'll discuss common attack types and threat vectors, war stories from the SOC at eSentire and how your firm can approach cybersecurity to prepare for inevitable attacks.
Sponsored by:
eSentire
10:00 am - 10:25 am
Microsoft, Google, Dropbox, and others have proven the value and increased efficiency of collaborative online document development. These tools bring individuals together in a common environment to develop, review, and edit documents together; no matter where they are. What if you could experience the same interaction during all stages of the software development cycle? What if you could test your application, make changes, and continue testing without having to restart your application, or even lose your place in the application workflow? Now you can...
Takeaways:
Sponsored by:
Coactive
Steve Sherman, Chief Commercial Officer, Coactive
As the digital transformation takes many forms, the network becomes the common entity and a great place to enforce security if we can get the necessary control. In this session we will discuss the challenges of managing network access in a hybrid environment and how, if done correctly, the network access can enable transformation instead of being a roadblock.
Takeaways:
Sponsored by:
FireMon
10:30 am - 10:40 am
10:45 am - 11:10 am
Cybersecurity dominated the news cycle in 2017. There were headlines about viral ransomware, global destructive wipers posing as ransomware, leaks of spy tools from U.S. intelligence agencies, and breaches at major companies.
What does 2018 hold in store for the defenders? Come discuss the largest security trends Cybereason researchers have identified for 2018.
Sponsored by:
Cybereason
11:15 am - 11:40 am
The old world of corporate video is low-quality, hard-to-find and difficult to watch. Learn how leading companies are leveraging AI and cognitive insights as well as IBM Cloud Video's tracking and administration features to deliver effective video that excites and engages teams across offices, continents and time zones. With cognitive enhancements such as automated captions and keywords, the right content is now easier than ever to find. Whether it is a live stream of a c-level address, or team knowledge sharing, video can be created and leveraged across the organization as a learning, communication, and training tool that helps build stronger bonds between team members and communicates powerfully the key messages.
Sponsored by:
IBM
In today's world where advanced threats and insiders demonstrate that they can evade security prevention systems, in-network threat visibility and detection are considered critical security infrastructure. That said, there are myths and realities about the effectiveness of deception for detecting advanced threats - and there are specific strategies for operational management efficiency and key use cases that are driving adoption. Join us for this session where you'll hear about real-world deployment experiences, the value customers are realizing, and what pen test Red Teams are saying about deception-based threat detection.
Sponsored by:
Attivo Networks
11:45 am - 12:10 pm
How fast are we going? Are we going in the right direction? How much fuel do we have in the tank? These are common questions for those on the move. Companies on a digital transformation journey need effective dashboards to help them understand the myriad data sources screaming for attention. We will discuss best practices for the various types of dashboards that can be used to make the most important decisions for your company.
Takeaways:
Sponsored by:
Celonis
12:15 pm - 12:40 pm
Organizations are struggling with firm-wide efforts to maximize value, identify risk themes, and dramatically reduce costs due to the underlying quantity and complexity of their committees, governance bodies, and corresponding programs. Join us to explore how leading practices are being employed to significantly simplify governance, develop more principles-based strategies, accelerate innovation, and embed sound risk management practices.
Presented by:
Richard Kessler, Global Director, Cyber Security Services Strategy and Governance, KPMG
Preparing for cyber-attacks: how testing your people, processes and technology improves your operational readiness. Review of the cybersecurity threat landscape, popular attack vectors and what you can do about it. Practice attacks to maximize preparedness
Presented by:
Tom Kartanowicz, Head of Information Security, Natixis
One of the promised benefits of Digital Transformtion is the ability to capture, process and analyze more data that can then be used to transform a company's operations. More data, however, may mean nothing if it can't be analyzed and interpreted. AI and Machine Learning are promising tools to help CIOs, CDOs , CFOs and CMOs turn data into actionable next steps.
Takeaways:
Presented by:
Maria V. Gonzalez, Director of Web Technologies and Application Embedded Analytics, Ryder Systems Inc.
12:45 pm - 1:45 pm
1:50 pm - 2:15 pm
Deep dives into the latest and greatest technology solutions to today's business problems.
2:20 pm - 2:45 pm
Ponemon Institute estimates an average breach cost of $3.5 million in 2017, with a 27% probability that a U.S. company will experience a breach in the next 24 months. Just in one recent example, shipping company Maersk lost over $300 million when ransomware infected its systems. Malware is winning with a never ending supply of new attack vectors, previously unseen methods and malware variants. Why, after companies have invested billions of dollars in endpoint security, are they still so vulnerable?
This interactive presentation will discuss the reasons behind the vulnerable state of endpoint security, along with the evolution of traditional Antivirus (AV), and the rise of Next-Generation Antivirus (NGAV) products powered by Machine Learning and Endpoint Detection and Response (EDR) solutions. It will then look into the latest endpoint security trends that promise to increase efficacy, lower TCO and deliver a more robust feature set without requiring organizations to rip and replace their existing security stack.
This presentation will include a demo of the infamous Rubber Ducky that remains practically unstoppable by today's endpoint security products.
Sponsored by:
Nyotron
2:50 pm - 3:15 pm
Presented by:
Abraham Naguib, SVP IT Strategy (CTO), Citi
Presented by:
Thien La, CISO, Wellmark Blue Cross Blue Shield
It is not a matter of if, but a matter of when. Organizations, more and more, and are outsourcing business activities to 3rd-parties because of cost-savings, revenue opportunities, expertise, etc. Thus, collaborating with our business partners early to select the right third-party vendor(s) with the appropriate security posture is essential, especially for vendors hosting, processing and/or transmitting sensitive/regulatory information, or having access to our IT assets.
Takeaways:
Presented by:
Adolph Barclift, Divisional - CISO - Americas, NCR Corporation
3:20 pm - 3:55 pm
Digital transformation is causing Digital Disruption. Companies are faced with new competitors using new technologies to change how industries work. The CIO is in the best position to understand the limitations of legacy systems and processes and the opportunities that come with new technologies and capabilities. We will discuss in this panel the best practices for CIOs to be the drivers of Digital Disruption for their company.
Takeaways:
Moderated by:
Steve Dimmitt, Vice President, Marketing and Customer Success, CDM Media
Panelists:
Pradeep Wahi, Chairman, ARA Inc.
Ralph Groce III, Global CIO, Everest Reinsurance Company
4:00 pm - 4:10 pm
Our Governing Board will summarize the learnings from the day and discuss the path forward for building an ongoing community of CIOs where common issues can be addressed and success stories can be shared.
Takeaways:
4:10 pm - 4:15 pm
4:15 pm - 6:00 pm
Join the entire audience for networking, food and drink to wrap up the summit!
Sponsored by:
Equinix