CIO Boston Summit | April 25, 2017 | The Westin Copley Place, Boston - Boston, MA, USA

↓ Agenda Key

Keynote Presentation

Visionary speaker presents to entire audience on key issues, challenges and business opportunities

Keynote Presentations give attending delegates the opportunity to hear from leading voices in the industry. These presentations feature relevant topics and issues aligned with the speaker's experience and expertise, selected by the speaker in concert with the summit's Content Committee." title="Keynote Presentations give attending delegates the opportunity to hear from leading voices in the industry. These presentations feature relevant topics and issues aligned with the speaker's experience and expertise, selected by the speaker in concert with the summit's Content Committee.

Executive Visions

Panel moderated by Master of Ceremonies and headed by four executives discussing critical business topics

Executive Visions sessions are panel discussions that enable in-depth exchanges on critical business topics. Led by a moderator, these sessions encourage attending executives to address industry challenges and gain insight through interaction with expert panel members." title="Executive Visions sessions are panel discussions that enable in-depth exchanges on critical business topics. Led by a moderator, these sessions encourage attending executives to address industry challenges and gain insight through interaction with expert panel members.

Thought Leadership

Solution provider-led session giving high-level overview of opportunities

Led by an executive from the vendor community, Thought Leadership sessions provide comprehensive overviews of current business concerns, offering strategies and solutions for success. This is a unique opportunity to access the perspective of a leading member of the vendor community." title="Led by an executive from the vendor community, Thought Leadership sessions provide comprehensive overviews of current business concerns, offering strategies and solutions for success. This is a unique opportunity to access the perspective of a leading member of the vendor community.

Think Tank

End user-led session in boardroom style, focusing on best practices

Think Tanks are interactive sessions that place delegates in lively discussion and debate. Sessions admit only 15-20 participants at a time to ensure an intimate environment in which delegates can engage each other and have their voices heard." title="Think Tanks are interactive sessions that place delegates in lively discussion and debate. Sessions admit only 15-20 participants at a time to ensure an intimate environment in which delegates can engage each other and have their voices heard.

Roundtable

Interactive session led by a moderator, focused on industry issue

Led by an industry analyst, expert or a member of the vendor community, Roundtables are open-forum sessions with strategic guidance. Attending delegates gather to collaborate on common issues and challenges within a format that allows them to get things done." title="Led by an industry analyst, expert or a member of the vendor community, Roundtables are open-forum sessions with strategic guidance. Attending delegates gather to collaborate on common issues and challenges within a format that allows them to get things done.

Case Study

Overview of recent project successes and failures

Case Studies allow attending executives to hear compelling stories about implementations and projects, emphasizing best practices and lessons learned. Presentations are immediately followed by Q&A sessions." title="Case Studies allow attending executives to hear compelling stories about implementations and projects, emphasizing best practices and lessons learned. Presentations are immediately followed by Q&A sessions.

Focus Group

Discussion of business drivers within a particular industry area

Focus Groups allow executives to discuss business drivers within particular industry areas. These sessions allow attendees to isolate specific issues and work through them. Presentations last 15-20 minutes and are followed by Q&A sessions." title="Focus Groups allow executives to discuss business drivers within particular industry areas. These sessions allow attendees to isolate specific issues and work through them. Presentations last 15-20 minutes and are followed by Q&A sessions.

Analyst Q&A Session

Moderator-led coverage of the latest industry research

Q&A sessions cover the latest industry research, allowing attendees to gain insight on topics of interest through questions directed to a leading industry analyst." title="Q&A sessions cover the latest industry research, allowing attendees to gain insight on topics of interest through questions directed to a leading industry analyst.

Vendor Showcase

Several brief, pointed overviews of the newest solutions and services

Taking the form of three 10-minute elevator pitches by attending vendors, these sessions provide a concise and pointed overview of the latest solutions and services aligned with attendee needs and preferences." title="Taking the form of three 10-minute elevator pitches by attending vendors, these sessions provide a concise and pointed overview of the latest solutions and services aligned with attendee needs and preferences.

Executive Exchange

Pre-determined, one-on-one interaction revolving around solutions of interest

Executive Exchanges offer one-on-one interaction between executives and vendors. This is an opportunity for both parties to make key business contacts, ask direct questions and get the answers they need. Session content is prearranged and based on mutual interest." title="Executive Exchanges offer one-on-one interaction between executives and vendors. This is an opportunity for both parties to make key business contacts, ask direct questions and get the answers they need. Session content is prearranged and based on mutual interest.

Open Forum Luncheon

Informal discussions on pre-determined topics

Led by a moderator, Open Forum Luncheons offer attendees informal, yet focused discussions on current industry topics and trends over lunch." title="Led by a moderator, Open Forum Luncheons offer attendees informal, yet focused discussions on current industry topics and trends over lunch.

Networking Session

Unique activities at once relaxing, enjoyable and productive

Networking opportunities take various unique forms, merging enjoyable and relaxing activities with an environment conducive to in-depth conversation. These gatherings allow attendees to wind down between sessions and one-on-one meetings, while still furthering discussions and being productive." title="Networking opportunities take various unique forms, merging enjoyable and relaxing activities with an environment conducive to in-depth conversation. These gatherings allow attendees to wind down between sessions and one-on-one meetings, while still furthering discussions and being productive.

 

Tuesday, April 25, 2017 - CIO Boston Summit

7:00 am - 7:55 am

Registration and Networking Breakfast

 

8:00 am - 8:10 am

Welcome Address and Opening Remarks

Presented by:

Madge Meyer, Former EVP, Chief Innovation Officer, State Street, View details

 
 
 

8:10 am - 8:40 am

Keynote Presentation

The Future of the CIO in the Coming Digital Economy

As more businesses undergo a digital transformation, and as those digital transformations become more ingrained into organizational culture, "Digital" becomes not something unique and different from the business, but a core component of every aspect of the business. As this shift occurs, IT itself faces the very real possibility of no longer being something unique from the business, but instead a component of every aspect of the business. In this world, what role then exists for the CIO? Two clear paths are presenting themselves - one leads to a focus on infrastructure and integration, to keeping the lights on for the digital innovators, while the other leads to information and innovation itself. Knowing which path to choose, how to choose it, and how to see it through will be one of the greatest challenges CIOs of this era will face.

Takeaways:

  • Change is, if not already here, certainly coming and CIOs who don't prepare for the change may not like the results when it arrives
  • Digital transformation is all about connecting enterprise systems to information technology to drive productivity and performance improvements
  • Be prepared to tackle the tasks that no-one wants to do, but everyone needs done; establish relevance to cultivate importance

Presented by:

Matt Griffiths, Chief Information Officer, Stanley Black & Decker Industrial View details

 
 
 

8:45 am - 9:15 am

Keynote Presentation

Better Companies Ask Better Questions

Data can be overwhelming both on an individual level and organization-wide. Being able to glean insight from data is easier said than done. Being able to turn that insight into action is even harder. Over the past couple of years I've learned that the best companies ask the best questions. The best questions lead to the best metrics and the best metrics lead to the best decisions for your organization.

During this session we'll discuss what makes an effective questions and how to turn those questions into effective metrics.

Sponsored by:

DOMO View details

 
 
 

9:20 am - 9:45 am

Executive Exchange

 

Thought Leadership

Secure, Simplify and Transform to a Cloud-Enabled Enterprise

Progressive companies are leveraging cloud, a powerful business enabler, to transform their business and make it more competitive. But cloud and mobility significantly impacts the current IT infrastructure - security, network traffic flow, applications, user experience and cost. As CIOs and CISOs embrace this transformation, they look for opportunities to exchange ideas with their peers who have gone through this journey.  

At this session, Zscaler, will share experience of leading the massive network, security and datacenter application transformation that he managed across all business units of GE. 

Example topics will include: 

  • How to transform your hub & spoke network into a cloud-enabled network 
  • How to transform datacenter applications to a SaaS, AWS and Azure environment 
  • New security paradigm for the new world of cloud 
  • Changing role of IT execs 
  • Lessons learned

Sponsored by:

Zscaler View details

 
 
 

9:50 am - 10:15 am

Executive Exchange

 

Thought Leadership

Risky Business - Inside The Threat Actor's Studio

Cybercrime is risky business but it's also big business. Lloyd's of London estimates the cost of cybercrime to businesses at $400B annually. Why is cybercrime such a massive business? This session will take you into the Threat Actors Studio and the underground market place for the answers to that billion-dollar question. It will begin by describing some of the threat features on darknet such as the Russian Roulette and explain some interesting segments of the threat actor's market place such as crime service enablers. It concludes with a compelling threat intelligence story.

Sponsored by:

Fortinet View details

 
 
 

10:20 am - 10:30 am

Morning Networking Coffee Break

 

10:35 am - 11:00 am

Executive Exchange

 

Executive Boardroom

Digital Experience: The Power of Brand and Mitigating Risk in the Age of Digital Transformation

The current age of digital transformation means that IT organizations must adapt their toolset to cover all digital experiences, beyond just the end users'. Today's businesses can no longer focus solely on the digital interactions they manage with employees or customers; they must now contend with non-traditional factors. Whether it's the power of brand to make or break a company, the need to monitor across all locations 24/7, or the ability to proactively resolve issues, companies must adapt to the new world. We will explore some of the ways in which you can mitigate the risk of a digital transformation and how to protect your brand and grow revenue.

Sponsored by:

Catchpoint Systems View details

 
 

Executive Boardroom

Navigating Security and Risk in a Changing IT Landscape

Agile, DevOps, containers, microservices, the cloud are all seeing increased adoption across the enterprise. But, while there are valid business reasons to embrace these new models, there is potential risk in implementation. Is this change necessary? If so, how can this change be accommodated effectively, safely? 

This session will cover some common elements of the risk of change - and of not changing - and suggest approaches to minimize risk as you adopt these new technologies. 

Join us to discuss: 

  • The risks of not adopting change - and the rewards of doing it 
  • Building a technology platform that supports business innovation - seat belts included  
  • How to mitigate the risk of change - shifting the value proposition in favor of modernization

Sponsored by:

Red Hat View details

 
 
 

11:05 am - 11:30 am

Executive Exchange

 

Thought Leadership

Digital Transformation - Architecting Your Digital Platform at the Edge

The digital economy is forcing enterprises to transform how they connect customers, partners, employees and operations. Today's market leaders credit their speed and business advantages to their digital platform. Equinix will discuss how an Interconnection Oriented Architecture (IOATM) with a step-by-step playbook can redefine the edge - which is where to localize delivery of cloud-supported services to your customers, employees and partners - and architect your digital platform.

Presented by:

James Staten, Global Head of Vertical Marketing Development & Strategy, Equinix View details

 
 
 

11:35 am - 12:00 pm

Executive Exchange

 

Executive Boardroom

Digital Transformation

Digital transformation isn't new, but it is now. Enterprises are putting more focus and urgency than ever on transformational activities. The competitive business landscape encompasses both those you know and the ones that are not yet on your radar screen. Those you know are working to be more efficient, lower cost, and provide better customer experiences than you. Those you don't know are using the cloud, mobile apps, IOT and a host of other technologies to create a new business model that is not obvious to you today. The pace of innovation and the adoption of new technologies across disparate platforms will continue to stress IT organizations operational excellence and ability to accelerate value. This session will cover how CenturyLink is enabling the business of IT in a truly hybrid landscape.

Sponsored by:

CenturyLink View details

 
 

Executive Boardroom

The Year of Ransomware: Can Technology Alone Prevent Phishing Attacks and Breaches?

2016 is certainly shaping up to be the year of the ransomware attack. As ransomware and phishing attacks continue to grow in number and sophistication, organizations need to reconsider their current security strategy. Companies continue to invest billions of dollars in technology to shore up their defenses against these threats. But is that enough? Is complete reliance on technology the answer? Or should we focus on the human and human behavior?

Sponsored by:

PhishMe View details

 
 
 

12:05 pm - 12:30 pm

Executive Exchange

 

Think Tank

Cloud SLAs: Making, Measuring, and Managing

The lifeblood of any cloud relationship is the Service Level Agreement (SLA) upon which it is based " the SLA sets the expectations of both parties and acts as the roadmap for change, whether planned or unplanned. Each SLA has a complex lifecycle that includes three distinct phases " negotiation where the original terms of the agreement are established, measurement where service is actively monitored to ensure agreed upon levels are achieved, and management where deficiencies from and adjustments to initial agreements are acted upon. IT Leaders must take an active role in all phases of the SLA lifecycle to ensure optimal protection for their enterprise. 

Takeaways: 
  • Without strong SLAs, cloud service level agreements aren't worth the paper they are written on 
  • While many cloud vendors offer only a standard SLA, effort should always be invested in attempting to negotiate an appropriate set of terms 
  • SLA work does not end with the negotiation of acceptable terms, in fact that is when the real work begins of ensuring SLA compliance

Presented by:

Radha Kuchibhotla, VP IT, State Street View details

 
 
 

12:35 pm - 1:20 pm

Networking Luncheon

 

1:25 pm - 1:50 pm

Executive Exchange

 

Think Tank

The Business of Security in Smart Home - Changing Landscape

From last 20 years, we have seen internet boom, enterprises embracing cloud; and mobile phones evolving as powerful devices. Time has come where this powerful technology started transforming how people live and what they do. While CISOs are still fiercely battling traditional attacks, are we ignoring this new phenomenon? How IOT and Smart Home are changing the threat landscape? As Information Security leaders, what is our responsibility to every innocent consumer out there who is eagerly buying IoT ?Smart' devices? This talk will provide insights into the changing landscape and provides advice to IoT product companies, consumers and security leaders.

Presented by:

Ravi Thatavarthy, CISO, iRobot View details

 
 
 

1:55 pm - 2:20 pm

Executive Exchange

 

Thought Leadership

Strategic and Secure Mobility

Is mobility a cost? Or is it a key part of your strategy for business success? Many businesses are leveraging mobility to generate real and measurable returns and to increase their competitiveness. How? Join CDM Media and BlackBerry as we explore ways in which companies can strategically manage their mobility investments. 

In our session we'll look at security - again from a strategic viewpoint. Security covers a wide range of issues in the modern enterprise. While protection of data is at the forefront, security involves many other aspects and issues from secure collaboration to the security and protection of employees in an increasingly tumultuous world. We'll deal not only with securing mobility, but how the strategic use of mobility can make you more secure.

Sponsored by:

BlackBerry View details

 
 
 

2:25 pm - 2:50 pm

Executive Exchange

 

Executive Boardroom

Identity Deception - Exposing The Source of Malicious Emails!

Everywhere we look we see evil emails: at work, at home and in the news. Attempting to steal your money, your identity, your login information, sell you something or take you hostage for a hefty ransom. Internet criminals are taking advantage of two fundamental characteristics of the human brain: 1) we usually trust something when it's being sent by someone we know, and 2) our brain is designed to gloss over small inconsistencies. 

These criminals are also exploiting another weakness: traditional email filtering gateways. Traditionally designed to fight spam or check for a malicious attachment, email filtering gateways have evolved slightly to determine if a URL in any given email is bad. Unfortunately, these controls are not enough to out-pace today's sophisticated attacks and it's why we continue to see data breach after data breach. 

Agari will share a few recent phishing examples and trends based on real-world cases that were detected - some of these might even look familiar! 

What is needed is a new approach to this growing problem: the internet criminals are using identity deception to carry out their malicious acts. The only way to stop them is to understand the true identity of these emails.

Sponsored by:

Agari View details

 
 

Executive Boardroom

What Yesterday's PKI Can Teach Us About Tomorrow's Internet of Things

Connected devices provide valuable new functionality as well as new revenue opportunities. They also can introduce significant security risks, as many devices that are now being connected were not designed with security in mind. Cryptography (encryption and digital signing) is a critical technology to establish trust in the Internet of Things. In this session, we'll address: 

  • Risks associated with connected devices 
  • How 20 years of lessons learned in PKI can be applied to the emerging Internet of Things 
  • Case studies for establishing a trusted authentication for IoT devices, and data protection throughout the IoT ecosystem

Sponsored by:

Thales, e-Security View details

 
 
 

2:55 pm - 3:20 pm

Executive Exchange

 

Think Tank

A Fortune or Devil

The discussion around the convergence of physical security and information security dates back over a decade, but though much was made of the concept in the early 2000's little was actually done and the buzz faded. Flash-forward to today however and the buzz is back because of the increased focus on holistic risk management, the increased pressure of greater compliance requirements, and the increased demand for every aspect of the business to be a value generator. CISOs and CIROs need to evaluate the opportunities for both technology convergence (streamlining platforms) and organizational convergence (streamlining roles) to meet new threat protections mandates.

Takeaways:

  • As enterprise security matures and morphs or integrates into enterprise risk management, converged security becomes a must have
  • Convergence allows for far greater levels of visibility and control of threats and threat actors
  • Convergence enhances not just base security but also top-level risk management, enterprise compliance, and even operational value

Presented by:

Parveen Malik, Assistant Vice President - Global Information Security & Compliance Implementation, State Street

 
 

3:25 pm - 3:35 pm

Afternoon Networking Coffee Break

 

3:40 pm - 4:05 pm

Executive Exchange

 

Innovation Showcase

An exclusive opportunity to be exposed to the hottest new solutions providers in a quick-hit format designed to whet the appetite and spark immediate interest.

Sponsored by:

Nexthink View details

 
 

Bitdefender View details

 
 
 

4:10 pm - 4:35 pm

Executive Exchange

 

Think Tank

Stop Being a Speed Bump on the Highway of Success: Switch from an Integration to an Innovation Focus

Since almost the very beginning of the IT department, much of the focus of IT professionals has been on integrating systems, applications, and data sets; on tying together the various components of the enterprise to drive single versions of the truth, and streamlined operational capabilities. Future-proofed CIOs are deploying solutions that are inherently integrated because they are engineered to be integrated from the ground up. With integration a non-issue, these CIOs have been freed to focus time and resources on the real challenges of the enterprise: driving growth through innovation. 

Takeaways:

  • Using innovation to create a competitive advantage 
  • Learning and adopting new technology can be the key to success 
  • Develop a plan of attack that will leverage your time, your budget and technology to allow you to invest in business value growth

Presented by:

Madge Meyer, Former EVP, Chief Innovation Officer, State Street, View details

 
 
 

4:40 pm - 5:20 pm

Executive Visions

Facilitating Technology-Enabled Business Transformation

The role of the modern IT Executive is more complex than it has ever been before, not just because the technology landscape has become more complex, but also because increasingly IT execs have had to become a business-focused executive, not just a technologist. Long have we talked about the CIO and CISO getting a seat at the table but modern businesses are now demanding that their technology impresario join them and leverage his deep and rich technical acumen to allow the organization as a whole to better position itself for market-place success. To be successful, CxOs need to invest in themselves, in their personnel, and in the right technologies to allow them to position the IT department to proactively address business needs as an innovator and driver, rather than order-taker and enabler.

Takeaways:

  • IT leadership can no longer be simply technology focused, but must instead take their visibility into business process and become business focused
  • A broader business-focus does not preclude maintaining technology excellence however and indeed may demand more of it than ever before
  • Success for CxOs will be measured not in how they can enable enterprise decisions, but in how they can drive growth

Moderated by:

Michael Woodson, Senior Vice President, Cyber Security Services, TAINO Consulting Group

 

Panelists:

Radha Kuchibhotla, VP IT, State Street View details

 
 

Debra Orr, CIO, Simmons College View details

 
 

Esmond Kane, Deputy CISO, Partners Healthcare View details

 
 

Wendy Cofran, Chief Information Officer, Century Health Systems View details

 
 

Sponsored by:

SentinelOne View details

 
 
 

5:20 pm - 5:30 pm

Thank You Address and Closing Remarks

Presented by:

Madge Meyer, Former EVP, Chief Innovation Officer, State Street, View details

 
 
 

5:30 pm - 7:00 pm

Cocktail Reception