CIO Atlanta Summit | May 28, 2020 | Virtual Summit - Real-time Online Conversations

agenda

PDF Download Agenda (PDF)

↓ Agenda Key

Keynote Presentation

Visionary speaker presents to entire audience on key issues, challenges and business opportunities

Keynote Presentations give attending delegates the opportunity to hear from leading voices in the industry. These presentations feature relevant topics and issues aligned with the speaker's experience and expertise, selected by the speaker in concert with the summit's Content Committee." title="Keynote Presentations give attending delegates the opportunity to hear from leading voices in the industry. These presentations feature relevant topics and issues aligned with the speaker's experience and expertise, selected by the speaker in concert with the summit's Content Committee.

Executive Visions

Panel moderated by Master of Ceremonies and headed by four executives discussing critical business topics

Executive Visions sessions are panel discussions that enable in-depth exchanges on critical business topics. Led by a moderator, these sessions encourage attending executives to address industry challenges and gain insight through interaction with expert panel members." title="Executive Visions sessions are panel discussions that enable in-depth exchanges on critical business topics. Led by a moderator, these sessions encourage attending executives to address industry challenges and gain insight through interaction with expert panel members.

Thought Leadership

Solution provider-led session giving high-level overview of opportunities

Led by an executive from the vendor community, Thought Leadership sessions provide comprehensive overviews of current business concerns, offering strategies and solutions for success. This is a unique opportunity to access the perspective of a leading member of the vendor community." title="Led by an executive from the vendor community, Thought Leadership sessions provide comprehensive overviews of current business concerns, offering strategies and solutions for success. This is a unique opportunity to access the perspective of a leading member of the vendor community.

Think Tank

End user-led session in boardroom style, focusing on best practices

Think Tanks are interactive sessions that place delegates in lively discussion and debate. Sessions admit only 15-20 participants at a time to ensure an intimate environment in which delegates can engage each other and have their voices heard." title="Think Tanks are interactive sessions that place delegates in lively discussion and debate. Sessions admit only 15-20 participants at a time to ensure an intimate environment in which delegates can engage each other and have their voices heard.

Roundtable

Interactive session led by a moderator, focused on industry issue

Led by an industry analyst, expert or a member of the vendor community, Roundtables are open-forum sessions with strategic guidance. Attending delegates gather to collaborate on common issues and challenges within a format that allows them to get things done." title="Led by an industry analyst, expert or a member of the vendor community, Roundtables are open-forum sessions with strategic guidance. Attending delegates gather to collaborate on common issues and challenges within a format that allows them to get things done.

Case Study

Overview of recent project successes and failures

Case Studies allow attending executives to hear compelling stories about implementations and projects, emphasizing best practices and lessons learned. Presentations are immediately followed by Q&A sessions." title="Case Studies allow attending executives to hear compelling stories about implementations and projects, emphasizing best practices and lessons learned. Presentations are immediately followed by Q&A sessions.

Focus Group

Discussion of business drivers within a particular industry area

Focus Groups allow executives to discuss business drivers within particular industry areas. These sessions allow attendees to isolate specific issues and work through them. Presentations last 15-20 minutes and are followed by Q&A sessions." title="Focus Groups allow executives to discuss business drivers within particular industry areas. These sessions allow attendees to isolate specific issues and work through them. Presentations last 15-20 minutes and are followed by Q&A sessions.

Analyst Q&A Session

Moderator-led coverage of the latest industry research

Q&A sessions cover the latest industry research, allowing attendees to gain insight on topics of interest through questions directed to a leading industry analyst." title="Q&A sessions cover the latest industry research, allowing attendees to gain insight on topics of interest through questions directed to a leading industry analyst.

Vendor Showcase

Several brief, pointed overviews of the newest solutions and services

Taking the form of three 10-minute elevator pitches by attending vendors, these sessions provide a concise and pointed overview of the latest solutions and services aligned with attendee needs and preferences." title="Taking the form of three 10-minute elevator pitches by attending vendors, these sessions provide a concise and pointed overview of the latest solutions and services aligned with attendee needs and preferences.

Executive Exchange

Pre-determined, one-on-one interaction revolving around solutions of interest

Executive Exchanges offer one-on-one interaction between executives and vendors. This is an opportunity for both parties to make key business contacts, ask direct questions and get the answers they need. Session content is prearranged and based on mutual interest." title="Executive Exchanges offer one-on-one interaction between executives and vendors. This is an opportunity for both parties to make key business contacts, ask direct questions and get the answers they need. Session content is prearranged and based on mutual interest.

Open Forum Luncheon

Informal discussions on pre-determined topics

Led by a moderator, Open Forum Luncheons offer attendees informal, yet focused discussions on current industry topics and trends over lunch." title="Led by a moderator, Open Forum Luncheons offer attendees informal, yet focused discussions on current industry topics and trends over lunch.

Networking Session

Unique activities at once relaxing, enjoyable and productive

Networking opportunities take various unique forms, merging enjoyable and relaxing activities with an environment conducive to in-depth conversation. These gatherings allow attendees to wind down between sessions and one-on-one meetings, while still furthering discussions and being productive." title="Networking opportunities take various unique forms, merging enjoyable and relaxing activities with an environment conducive to in-depth conversation. These gatherings allow attendees to wind down between sessions and one-on-one meetings, while still furthering discussions and being productive.

 

Thursday, May 28, 2020 - CIO Atlanta Summit

9:00 am - 9:20 am

Welcome Registration & Opening Remarks

 

9:20 am - 10:00 am

Panel

Steering Cultural Change

An IT executive's role, goals and objectives have drastically changed over the years. Most leaders supervise teams and units beyond their IT department. Due to these changes in responsibilities, their success is measured in greater business metrics. As a result, these roles have become both more attractive and more demanding. 

Takeaways: 

  • What are the significant changes regarding the role of the IT Executive 
  • How to keep up with the changing requirements  
  • How to properly measure an IT executive's success

Moderated by:

Andrew (Andy) Smith, Former VP Global Technology Infrastructure & Operations CTO, Former IHG Intercontinental Hotel Group View details

 
 

Panelists:

Troy Phelps, Business Information Security Officer, The Home Depot

 

Michael Owens, Business Information Security Officer, Equifax

 

David Levine, Vice President, Corporate Information Security & Chief Security Officer, Ricoh Americas Corporation View details

 
 

Mohammad Zahid, Global Head of IT Infrastructure, Exide Technologies

 
 

10:00 am - 10:30 am

Share:

Keynote Presentation

Integrate Once, Reuse Everywhere - IBM Security and the Open Cybersecurity Alliance

In late 2019, IBM joined forces with 17 other cybersecurity vendors - including McAfee, Crowdstrike and others - to form the Open Cybersecurity Alliance (OCA) to promote open and interoperable cybersecurity. Recognizing that most companies have too many cybersecurity tools to manage, too much data in too many places, and not enough skilled security professionals, OCA members subscribe to the mantra "Integrate once, reuse everywhere" to enable security teams to focus on solving security issues rather than getting tools to work together. Now up to 27 members, the OCA is becoming a powerful force in the cybersecurity industry.  

Chris Bontempo leads Marketing and Offerings for IBM Security in North America and will discuss how the OCA members are working together and contributing foundational technologies under the open-source Apache 2.0 license, to enable security solutions to communicate with each other over a standard fabric during the entire threat management life cycle. 

He'll also demonstrate how IBM Security is implementing foundational open-source OCA technologies like STIX-Shifter, OpenDXL and OpenC2 in its new open security platform, the IBM Cloud Pak for Security, to help clients transform threat hunting and detection, security analytics, operations and response and beyond.

Sponsored by:

IBM View details

 
 

Presented by:

Chris Bontempo, IBM Security Marketing Leader, IBM View details

 
 
 

10:30 am - 10:50 am

Share:

Keynote Presentation

Emerging Tech Offering Changes to the Workforce Landscape

Clients need real time information and support. This requires real time data, content, technology and processes. These needs present new cyber challenges and a new way of operating.

Presented by:

Diana Caplinger, SVP, Head of Digital Discovery and MarTech, Truist

 
 

10:50 am - 11:10 am

Share:

Thought Leadership

An Insider's View on What It Takes to Be Digital Ready

The digital economy is forcing enterprises to transform how they connect customers, partners, employees and operations. Today's market leaders credit their speed and business advantages to their digital platform. Equinix will share insights into how global industry leaders deployed a digital edge by removing distance, leveraging cloud and edge computing, and Interconnecting ecosystems

Sponsored by:

Equinix View details

 
 

Presented by:

D.R. Carlson, Global Partner Strategy and Messaging, Equinix View details

 
 
 

11:10 am - 11:30 am

Share:

Thought Leadership

You Need to Know Who Is Accessing Your Data, But Do You Really?

Knowing who is accessing what data is at the heart of security. Today, users and attackers get to your data through a mesh of web applications, APIs, and microservices. Unfortunately, your database logs only report the querying source as an authorized intermediary application without the originating requestor's information. This blind spot causes glaring gaps during audits, slows incident response, and impede breach detection. 

Learn how to apply new ways of continuously linking originating users' information to every database access with cohesive interworking between edge WAF, server RASP, and Data Activity Monitoring tools.

Sponsored by:

Imperva View details

 
 

Executive Boardroom

TBA

TBA

Sponsored by:

Aptum Technologies View details

 
 

Presented by:

Craig Tavares, Global Head of Cloud, Aptum Technologies

 
 

11:30 am - 11:50 am

Executive Exchanges and Networking

 

11:50 am - 12:10 pm

Executive Exchanges and Networking

 

12:10 pm - 12:30 pm

Executive Exchanges and Networking

Sponsored by:

HAYS

 
 

12:30 pm - 1:00 pm

Networking Lunch


 

1:00 pm - 1:20 pm

Executive Exchanges and Networking

Sponsored by:

HAYS

 
 

1:20 pm - 1:40 pm

Executive Exchanges and Networking

 

1:40 pm - 2:00 pm

Executive Exchanges and Networking

 

2:00 pm - 2:05 pm

Transition to Afternoon Sessions


 

2:05 pm - 2:25 pm

Share:

Thought Leadership

Managing Digital Risk Amid Disruption

Digital transformation is not only changing how companies think about business. It is changing how we think about risk. We need to *act* on risk, not worry about it. We need to start and end with the basics. Join RSA as we review several key areas of digital risk management to target as you are challenged to be a key contributor in your organization's digital journey.

Sponsored by:

RSA View details

 
 

Presented by:

Ben Smith, Field Chief Technology Officer (Field CTO - US), RSA View details

 
 
 

2:25 pm - 2:45 pm

Think Tank

M&A integration Challenges and Solutions

M&A remains a relevant and interesting topic even in the new reality of Corvid-19 limitations. 

In fact, there may be an increased and rushed activity for companies with the strong financial position to acquire less fortunate or savvy competitors. 

Yet, many of these deals will not generate the returns advertised to the management team by the deal champion. 

This discussion will focus on some of the common mistakes company make during integration planning and execution, as well as some suggestions to how established best practices can be used to avoid these traps.

Presented by:

Viktoria Sazonova, Vice President, M&A Governance & Execution, Assurant

 

Think Tank

AI: Friend or Foe?

Advances in artificial intelligence (AI) are introducing new technologies to a wide array of products across every industry, especially cybersecurity. Facial recognition and natural language processing have become a reality thanks to deep learning algorithms, however, there is a dark side to these advancements. Cybercriminals have managed to weaponize AI to create extremely intricate malware and attack methods. This has forced organizations to use advanced heuristic solutions rather than counting on known vulnerability and attack signatures. 

Takeaways: 

  •  Artificial Intelligence products are already being deployed in many industries 
  • Features like facial recognition and chat bots are common examples
  • Cybercriminals can weaponize this technology without proper security measures

Presented by:

Dave Hudson, Chief Information Officer, Insight Global View details

 
 
 

2:45 pm - 3:05 pm

Share:

Thought Leadership

Safe Employees, Secure Business

Enabling a secure remote workforce is more critical than ever before. Whether you're issuing more corporate-owned devices or enabling a BYOD program for remote employees, enabling secure and seamless access to authorized apps is a business imperative. And, MobileIron is here to help. Join this session to learn how your organization can use MobileIron's UEM platform to: 

  • Provide employees with easy and secure access to business services from any location, on any OS or device.  
  • Provide simple onboarding and device lifecycle management with over-the-air provisioning and deprovisioning 
  • Gain comprehensive visibility and policy enforcement to prevent data loss and maintain user privacy

Sponsored by:

MobileIron View details

 
 

Presented by:

Jay Bhansali, Sr. Director Product Marketing, MobileIron View details

 
 
 

3:05 pm - 3:25 pm

Think Tank

Going Mobile, Securely

The average employee uses at least 3 different mobile devices to access business data. This number has risen and so has the amount of company data that is being stored on each device. Each device represents another endpoint that needs to be secured. While mobile malware threats are low, it's expected that there will be a rise in data breaches directly related to mobile devices. Providing access to company data via a secure web application infrastructure with real-time vulnerability management is one way of reducing risk with mobile devices. 

Takeaways:

  • Mobile devices are generally considered safe means to access business data 
  • Employees use an average of three mobile devices, each is its own security challenge 
  • Data breaches through mobile devices are expected to increase

Presented by:

Josh Sorenson, Senior Director, Global Security, Equifax View details

 
 

Think Tank

Combating the Rise in Cloud-based Threats

As the cloud migration continues, securing data and critical infrastructure is going to require new approaches. Organizations have struggled to maintain control of critical data and ensure real-time threat intelligence, giving cloud-based threats the ability to multiply. Data buckets being misconfigured, or inadequately secured increases the risk of a breach. Being able to manually manage security for large web application infrastructures has become a thing of the past. As such, organizations are being pushed to reevaluate their approach to web application security. 

Takeaways:

  • The rise of cloud migration means security will need to adapt  
  • Many organizations have struggled to secure data 
  • Cybersecurity threats will only increase and become more complex

Presented by:

Brian Benn, CIO, Atlanta Housing Authority

 
 

3:25 pm - 3:30 pm

Closing Remarks