CISO Denver Summit | May 24, 2017 | The Westin Denver Downtown - Denver, CO, USA

↓ Agenda Key

Keynote Presentation

Visionary speaker presents to entire audience on key issues, challenges and business opportunities

Keynote Presentations give attending delegates the opportunity to hear from leading voices in the industry. These presentations feature relevant topics and issues aligned with the speaker's experience and expertise, selected by the speaker in concert with the summit's Content Committee." title="Keynote Presentations give attending delegates the opportunity to hear from leading voices in the industry. These presentations feature relevant topics and issues aligned with the speaker's experience and expertise, selected by the speaker in concert with the summit's Content Committee.

Executive Visions

Panel moderated by Master of Ceremonies and headed by four executives discussing critical business topics

Executive Visions sessions are panel discussions that enable in-depth exchanges on critical business topics. Led by a moderator, these sessions encourage attending executives to address industry challenges and gain insight through interaction with expert panel members." title="Executive Visions sessions are panel discussions that enable in-depth exchanges on critical business topics. Led by a moderator, these sessions encourage attending executives to address industry challenges and gain insight through interaction with expert panel members.

Thought Leadership

Solution provider-led session giving high-level overview of opportunities

Led by an executive from the vendor community, Thought Leadership sessions provide comprehensive overviews of current business concerns, offering strategies and solutions for success. This is a unique opportunity to access the perspective of a leading member of the vendor community." title="Led by an executive from the vendor community, Thought Leadership sessions provide comprehensive overviews of current business concerns, offering strategies and solutions for success. This is a unique opportunity to access the perspective of a leading member of the vendor community.

Think Tank

End user-led session in boardroom style, focusing on best practices

Think Tanks are interactive sessions that place delegates in lively discussion and debate. Sessions admit only 15-20 participants at a time to ensure an intimate environment in which delegates can engage each other and have their voices heard." title="Think Tanks are interactive sessions that place delegates in lively discussion and debate. Sessions admit only 15-20 participants at a time to ensure an intimate environment in which delegates can engage each other and have their voices heard.

Roundtable

Interactive session led by a moderator, focused on industry issue

Led by an industry analyst, expert or a member of the vendor community, Roundtables are open-forum sessions with strategic guidance. Attending delegates gather to collaborate on common issues and challenges within a format that allows them to get things done." title="Led by an industry analyst, expert or a member of the vendor community, Roundtables are open-forum sessions with strategic guidance. Attending delegates gather to collaborate on common issues and challenges within a format that allows them to get things done.

Case Study

Overview of recent project successes and failures

Case Studies allow attending executives to hear compelling stories about implementations and projects, emphasizing best practices and lessons learned. Presentations are immediately followed by Q&A sessions." title="Case Studies allow attending executives to hear compelling stories about implementations and projects, emphasizing best practices and lessons learned. Presentations are immediately followed by Q&A sessions.

Focus Group

Discussion of business drivers within a particular industry area

Focus Groups allow executives to discuss business drivers within particular industry areas. These sessions allow attendees to isolate specific issues and work through them. Presentations last 15-20 minutes and are followed by Q&A sessions." title="Focus Groups allow executives to discuss business drivers within particular industry areas. These sessions allow attendees to isolate specific issues and work through them. Presentations last 15-20 minutes and are followed by Q&A sessions.

Analyst Q&A Session

Moderator-led coverage of the latest industry research

Q&A sessions cover the latest industry research, allowing attendees to gain insight on topics of interest through questions directed to a leading industry analyst." title="Q&A sessions cover the latest industry research, allowing attendees to gain insight on topics of interest through questions directed to a leading industry analyst.

Vendor Showcase

Several brief, pointed overviews of the newest solutions and services

Taking the form of three 10-minute elevator pitches by attending vendors, these sessions provide a concise and pointed overview of the latest solutions and services aligned with attendee needs and preferences." title="Taking the form of three 10-minute elevator pitches by attending vendors, these sessions provide a concise and pointed overview of the latest solutions and services aligned with attendee needs and preferences.

Executive Exchange

Pre-determined, one-on-one interaction revolving around solutions of interest

Executive Exchanges offer one-on-one interaction between executives and vendors. This is an opportunity for both parties to make key business contacts, ask direct questions and get the answers they need. Session content is prearranged and based on mutual interest." title="Executive Exchanges offer one-on-one interaction between executives and vendors. This is an opportunity for both parties to make key business contacts, ask direct questions and get the answers they need. Session content is prearranged and based on mutual interest.

Open Forum Luncheon

Informal discussions on pre-determined topics

Led by a moderator, Open Forum Luncheons offer attendees informal, yet focused discussions on current industry topics and trends over lunch." title="Led by a moderator, Open Forum Luncheons offer attendees informal, yet focused discussions on current industry topics and trends over lunch.

Networking Session

Unique activities at once relaxing, enjoyable and productive

Networking opportunities take various unique forms, merging enjoyable and relaxing activities with an environment conducive to in-depth conversation. These gatherings allow attendees to wind down between sessions and one-on-one meetings, while still furthering discussions and being productive." title="Networking opportunities take various unique forms, merging enjoyable and relaxing activities with an environment conducive to in-depth conversation. These gatherings allow attendees to wind down between sessions and one-on-one meetings, while still furthering discussions and being productive.

 

Wednesday, May 24, 2017 - CISO Denver Summit

7:00 am - 7:55 am

Registration and Networking Breakfast

 

8:00 am - 8:10 am

Welcome Address and Opening Remarks

 

8:10 am - 8:40 am

Keynote Presentation

The Future of the CIO in the Coming Digital Economy

As more businesses undergo a digital transformation, and as those digital transformations become more ingrained into organizational culture, "Digital" becomes not something unique and different from the business, but a core component of every aspect of the business. As this shift occurs, IT itself faces the very real possibility of no longer being something unique from the business, but instead a component of every aspect of the business. In this world, what role then exists for the CIO? Two clear paths are presenting themselves - one leads to a focus on infrastructure and integration, to keeping the lights on for the digital innovators, while the other leads to information and innovation itself. Knowing which path to choose, how to choose it, and how to see it through will be one of the greatest challenges CIOs of this era will face.

Takeaways:

  • Change is, if not already here, certainly coming and CIOs who don't prepare for the change may not like the results when it arrives
  • Digital transformation is all about connecting enterprise systems to information technology to drive productivity and performance improvements
  • Be prepared to tackle the tasks that no-one wants to do, but everyone needs done; establish relevance to cultivate importance
 

8:45 am - 9:15 am

Share:

Keynote Presentation

Analytics & Cloud Together: Accelerating Innovation in the New Cognitive Era

Leading companies are disrupting the status quo by using data to inform business strategy and create new business models that fuel growth. CIOs have the power to uncover the insight that drives disruption and speeds transformation. Learn how leading IT organizations are maximizing the use of open source and cloud technologies alongside on-premises investments to accelerate innovation. And understand how CIOs are embracing new cloud-enabled consumption models while helping ensure data privacy, security and sovereignty. 

Takeaways:

  • Integrating analytics into key applications and systems can enable people throughout an organization to access and act on insights when and where it matters most.
  • Take advantage of more sources to enable better decisions. IT must create an environment with easy access to all types of data - structured and unstructured - from internal sources and those outside the organization.
  • Data science teams are answering the toughest questions by leveraging open source development platforms and tools to build models more quickly and easily.

Sponsored by:

IBM View details

 
 
 

9:20 am - 9:45 am

Executive Exchange

 

Thought Leadership

Identity and the New Age of Enterprise Security

From a technology standpoint, as a society the world of business has gone through two distinct stages in the evolution of its information security focus. The first addressed network based protection and preventative controls such as firewalls and anti-malware. The second looked at data-centric and detective controls such as encryption and intrusion/extrusion monitoring. Since breaches continue to occur at a record pace, what is need new is clearly a new evolution, one that pushes towards individual focused security through granular user monitoring and management as provided by solutions such as Identity and Access Management. While IAM isn't a new technology field, it is one whose time has come and CISO need to begin investing in modern-day, light-weight, easy to implement IAM solutions now to stay ahead of the curve, and reduce enterprise threats.

Takeaways:

  • The breach onslaught demonstrates that existing security solutions are incapable of defending current threats
  • Enterprises need to begin looking at security from an activity perspective rather than an artifact perspective
  • IAM provides activity insight, and therefore threat awareness, no other platform can equal

Sponsored by:

Gemalto View details

 
 
 

9:50 am - 10:15 am

Executive Exchange

 

Executive Boardroom

Capacity Planning as Competitive Differentiator

Capacity planning has in many ways become a lost art; common during the era of the mainframe when resources were expensive and time-consuming to procure, the advent of the inexpensive pizza box Windows Server has relegated planning, replacing it with a just buy more mentality. But just buy more creates more problems than it solves as server sprawl, server management, and rampant overprovisioning issues quickly erode any aspect of the value that IT tries to deliver. The lost art need to be rediscovered, to allow IT to get back to offering truly efficient and effective service and service levels. This new era of capacity planning requires new tools that go beyond simplistic benchmarking and trending analysis and instead provides dynamic, flexible, and predictive modeling that allows IT department to truly deploy optimized IT services.

Takeaways:

  • Capacity management may have fallen out of favor but its abandonment has created a wealth of problems for IT and business users the world over
  • In an era of intense innovation pressure, enterprises can no longer afford the inefficiencies of a just buy more approach to capacity provisioning
  • Traditional capacity planning techniques certainly have value but dynamic modeling based on predictive analytics takes things to a whole new level

Executive Boardroom

Increase Your Security Intelligence and Enterprise Compliance

The breadth and depth of security threats that are targeting the modern enterprise are bordering on overwhelming, but they're not alone as the breadth and depth of security solutions are also bordering on overwhelming. When security managers have to respond to alerts and warnings from dozens of security systems, and CISOs have to make strategic decisions based on fragmented data, it's hard to argue that security is improving. Security Information and Event Management (SIEM) platforms that aggregate the vast quantities of data, correlate diverse events, and filter the signal from the noise are allowing enterprises to get back ahead of the curve and make appropriate tactical and strategic decisions.

Takeaways:

  • The life of enterprise security staff is being complicated not just by the threats they face, but the tools they use
  • Abandoning tools isn't an option and CISOs need to help themselves and their staff get ahead of the curve
  • SIEM offers significant benefits in separating the wheat from the chaff and letting the business actually become secure
 

10:20 am - 10:30 am

Morning Networking Coffee Break

 

10:35 am - 11:00 am

Executive Exchange

 

Think Tank

Bridging the Talent Gap: Building the Team of Tomorrow

There is no escaping the fact that the demands on the IT department are changing. Those changes are necessitating changes in the IT department itself and nowhere is this being felt more than in the roles and responsibilities of the IT staff themselves. Complicating this transition is the fact that every IT department is undergoing to change at roughly the same time making the personnel with the requisite skillsets extremely hard to find, and perhaps even harder to retain. Savvy CIOs need to quickly identify which are the hot skills they most urgently require and then build a strategy that allows them to build (train), borrow (outsource), or buy (hire) the right people with the right capability at the right time.

Takeaways:

  • Commit to a talent-first organization which recognizes and rewards the most important asset you have " your people
  • Identify the skills most urgently in need and prioritize their acquisition
  • Determine which acquisition methods needs to be used for which skill to maximize impact and return on investment

Presented by:

Michael Archuleta, CIO and CISO, Mount San Rafael Hospital View details

 
 

Think Tank

Avoiding ERM for the Sake of ERM

In many ways ERM, or Enterprise Risk Management, has become just another buzz word that is bandied around without any clear understanding of it's meaning, any clear understanding of it's value, or any clear understanding of how it can be achieved. ERM is not a project or a task on a list to be checked off. Instead it is a fundamental change in how an enterprise approaches the way it conducts it's business to ensure that all possible impacts to it's capital and earnings are identified, quantified, and mitigated. Such a sweeping paradigmatic shift isn't something that can be taken on lightly and enterprises seeking to just place a check mark next to a to do list line item will be sorely disappointed in their results.

Takeaways:

  • ERM is a way of life, not a one-time effort and the only way to value is to come to that realization early
  • To be successful, an ERM deployment must be sponsored from the top and have the involvement of every level and every department
  • Even though ERM initiatives are all-encompassing it's best to start small; trying to boil the ocean is the surest way to failure and loss of good will and buy-in
 

11:05 am - 11:30 am

Executive Exchange

 

Share:

Thought Leadership

Become a Change Agent for Business Transformation

Today's modern CIO is embarking on a digital transformation journey exploring radical hybrid IT strategies and leveraging new technologies like Cloud, Social, Mobile and Big Data. However with 'keeping the lights on' legacy IT components costing nearly 90% of a typical IT budget, how can IT make powerful advancements and lead business change?

Join this interactive session to learn how award-winning CIOs are successfully tipping the balance by liberating people, time and money from costly ongoing maintenance of their ERP systems including SAP and Oracle, to invest in strategic initiatives that create real-world competitive advantage.

Sponsored by:

Rimini Street View details

 
 
 

11:35 am - 12:00 pm

Executive Exchange

 

Executive Boardroom

Disaster Recovery and Preparing for the Inevitable

Like death and taxes, IT outages are an inevitability whether as the result of power loss, telecommunications outage, or any one of a myriad other potential technical and non-technical issues. In this environment, the savvy CIO knows that what matters most is preparation " being ready for that next outage with an IT infrastructure that is both resilient and flexible and Disaster Recovery procedures that allow for efficient and effective recovery, balancing Recovery Time and Recovery Point objectives with appropriate cost. Disasters happen but with proper planning they don't have to be disastrous to your business.

Takeaways:

  • In the event of a severe outage, businesses without a Disaster Recovery plan are at a significant disadvantage when it comes to recoverability and viability
  • DR planning cannot be an at all costs proposition and appropriate planning must take into account reasonable Recovery Time and Recovery Point objectives
  • Catastrophic outages get the press but are the thin end of the wedge " minor service interruptions are far more common and must be planned for as well

Executive Boardroom

Securing Divergent Endpoints

Over the last few years, as cloud and mobile technologies have taken hold within the enterprise, the concept of the network perimeter has dissolved, and with it the concepts around traditional network security. The broad scale adoption of IoT technologies however will make this first phase of network disaggregation seem trivial in comparison as enterprises begin to connect to not just thousands but millions of disparate and divergent endpoints. To ensure appropriate security in such a dispersed networking world and entirely new paradigm to security will be required that encompasses not just wildly diverse types of devices in wildly diverse locations, but the threat of low-powered, low complexity endpoints that have no internal capacity for monitored and managed security capabilities.

Takeaways:

  • The number and type of enterprise endpoints is about to go through explosive growth and each of these endpoints will represent security threat
  • These new endpoints will not have the capacity for internal security and so central security solutions will be required to ensure appropriate protection
  • The volume and variety of new security data feeds and security threat info will overwhelm traditional security platforms and capabilities

Sponsored by:

PhishMe View details

 
 
 

12:05 pm - 12:30 pm

Executive Exchange

 

Think Tank

NFV and SDN - Building the Network of the Future

Cloud has changed the way we build back-end systems, mobility has changed the way we build the front end too, and now the combination of Network Functions Virtualization (NFV) and Software Defined Networking (SDN) is going to change the way we build networks. By allowing for the separation of control plane and data plane while simultaneously migrating both of those pieces to inexpensive commodity hardware we allow for the creation of more redundant, more dynamic, more efficient, and far less costly networks, eliminating a major bottle-neck to IT and service innovation. CIOs must begin investigating and implementing these technologies now to ensure they are on the leading edge of service delivery.

Takeaways:

  • The traditional way of building networks is archaic and its lifespan limited " NFV and SDN promise far greater flexibility of cost effectiveness
  • These technologies are admittedly early phase, but so were cloud and mobility when they began radically changing the technology landscape
  • Now is the time to begin to invest in pilot projects, to develop the knowledge and skills necessary to leverage the technologies as they mature

Think Tank

Shadow IT - To Embrace or Eliminate?

Best practice in most enterprises, at least as far as the CIO and CISO goes, is to squash Shadow IT wherever it is encountered. Shadow IT, the argument goes, leads to a world of data and integration problems for the IT department, and significant amounts of unknown and unquantifiable risk for the information security group. A small but vocal minority however is beginning to advocate for Shadow IT as a catalyst of innovation, citing the increases in productivity and creativity by allowing enterprise staff to find their own out of the box solutions to organizational problems. CISOs can allow their organizations to have their cake (Shadow IT) and eat it too (still be secure) by following a few simple steps that allow them to build in security regardless of user activity.

Takeaways:

  • Shadow IT is not malicious activity; it is simply the Line of Business user community looking to be efficient and effective
  • A well-developed security program can take Shadow IT into account and incorporate protection mechanisms that allow end user flexibility
  • Embracing Shadow IT does not mean no holds barred and end users need to understand the limit of the boundaries and the reason for their existence
 

12:35 pm - 1:20 pm

Networking Luncheon

 

1:25 pm - 1:50 pm

Executive Exchange

 

Think Tank

Moving from Operations to Transformations

The accepted number for the amount of the IT budget that is tied up in operational spend, in paying to maintain technology that has already been purchased, is 80% leaving only 20% for the IT department to use to drive new projects. Because this level of funding is so low, as much as 70% of IT sponsored projects fail. Yet IT departments are being constantly pushed to be innovative, to find a way to embrace new technologies and leverage them to drive business change. How can you do that when your time, money, and effort goes to just keeping the lights on? Join us as we collectively explore this issue and examine some of the successful strategies that are being leveraged by top IT leaders.

Takeaways:

  • The pressure on CIO's to drive change has never been higher, but fortunately neither has the opportunity to do so
  • Disruptive technologies don't just have the power to disrupt IT for the worse, they have the power to disrupt the business for the better
  • Fortune favors the bold; now is the time to take a leap into new modes of business to break the operational spend stranglehold

Think Tank

Speaking the Language of the Business

For many years the CIO, has struggled with the concept of IT-Business alignment and finding ways to ensure that the IT department and the Lines of Business with which it integrates have a common understanding and ability to communicate. Now, as the CISO and the information security department grow out of the IT shadow, they increasingly find themselves in the same position. Their challenge however is greater in that the concepts of IT security are in many ways more abstract than those of generalist IT, and their activities often run counter to the goals of the rest of the organization. CISOs must learn for the trials and tribulations of the CIO and the IT department, and find common ground with the business, to ensure they can hear what their partners are saying, while communicating their own points in understandable terms.

Takeaways:

  • IT-Business communications have long been strained and only now are improving across most organizations through concerted effort
  • IT has had to find ways to speak the language of the business " it was not the business that learned to speak IT
  • The CISO must adopt and emulate the successful communications practices and strategies of the IT department or risk serious relationship issues
 

1:55 pm - 2:20 pm

Executive Exchange

 

Fireside Chat

Planning for a MultiCloud Future

The promise of the cloud is almost beyond compare; infinite computing resources, unmatched reliability and uptime, instantaneous service availability, simplistic self-service and provisioning, and the low-low prices of a buy by the drink model. These are the reasons behind the rush to the cloud that we are currently experiencing, but the wholesale adoption does bring a downside " as more and more capability is moved to the cloud, more and more cloud providers are utilized since, for the most part, each provider offers only a limited suite of services. The MultiCloud environment that creates a new set of challenges that IT leaders need to overcome, notably resiliency, interoperability/integration, and security and compliance through careful planning and the lessons learned from building complex on premise distributed systems.

Takeaways:

  • As enterprises move to the cloud, MultiCloud environments will increasingly become the norm, not the exception
  • Consistent planning and thoughtful architecture will be essential to efficient and effective cloud deployments
  • IT leaders do not need to be alarmed, they've been down the complex environment path before, but they do need to be careful
 

2:25 pm - 2:50 pm

Executive Exchange

 

Executive Boardroom

Sourcing Enabled Business Transformation

Innovation is more than just a buzzword; it's fast becoming the mantra by which successful companies live. As enterprises strive to become ever more agile, offloading mundane responsibilities to sourcing partners can free the resources to become innovative. While beneficial, this really only scratches the surface as it still requires and relies on your resources to undertake that innovation journey. Partners that can bring innovation wherewithal to the table however, that can bake it directly into the service offering provide a greater opportunity to innovate. Understanding how such services can be integrated into your day to day operations, how they can spring board your innovation efforts, and how they can allow you to become truly transformational is essential to innovation success.

Takeaways:

  • Transformational innovation often requires knowledge, insight, and data that you simply don't have the access to yourself
  • A strong partner not only provides the opportunity to innovate, it also provides the resources to help make it happen
  • By leveraging a single for both operational and transformational initiatives, significant economies of scale can be leveraged making innovation easier

Executive Boardroom

Applying Big Data Principles to Security Paradigms

Volume, variety, velocity, veracity; all four of the hallmarks of Big Data have a clear fit in the world of security as the number of threats grows, their natures diverge, the speed with they are encountered (and subsequently have to be dealt with) accelerates, and the need to be ever more accurate enhances. As enterprises have made significant investments in Big Data programs and analytics platforms, they are beginning to reap real benefits in terms of business efficiency and innovation. The time then has come to begin applying those same principles and platforms to the security challenges facing enterprises to allow for faster, more effective overall security.

Takeaways:

  • The nature of the enterprise security challenge closely mimics many of the Big Data challenges business are beginning to learn how to solve
  • Just as Big Data challenges required different tools to address for Line of Business and general IT issues, so they will for information security challengeSecurity must become the next focus for analytics capabilities, and analytics the next focus for security professionals
 

2:55 pm - 3:20 pm

Executive Exchange

 

Think Tank

The Evolution of the Private Cloud

Once upon a time applications ran directly on physical hardware. Then the boxes got bigger and more capable and multiple applications were run on the same hardware. There were some resource constraints, but things in general became more efficient. Time passed, things evolved and virtualization was introduced, allowing enterprises to run even more applications even more efficiently on the same hardware. And then the cloud came on the scene, extending the virtualization model to the point that it looked like something completely different, to the point that it became true utility computing. Cloud computing is not just virtualization on a bigger scale and as CIOs prepare their organizations to dive into private clouds at an increasing rate, it is very important to understand what they are and are not, and how they differ from their forbear computer models with which we are all familiar.

Takeaways:

  • Private clouds are big and becoming bigger, but calling something a private cloud and having it actually be one are different things
  • While virtualization may be a core enabling technology of a private cloud, virtualizing an environment doesn't make it a cloud
  • True private clouds have both pros and cons in relation to other compute models; they are not the be-all and end-all and careful consideration needs to be given before pushing ahead with private cloud deployment

Think Tank

Best-of-Breed or Consolidated: Principles in Security Architecture Design

When it comes to implementing network security infrastructure there are two schools of thought: use best-of-breed point solutions, or go with all round consolidated platforms. Pros and cons abound for either approach revolving around varying levels of protection, integration, and administrative overhead but the increasing complexity of current security infrastructure is showing a winning approach. Even though consolidated solutions may offer greater benefits in the long run, no one exists in a green-field situation when it comes to network and infrastructure security so careful planning is required to ensure the necessary protection.

Takeaways:

  • The management burden of best-of-breed outweighs performance benefits
  • Consolidated platforms can lead to feature overlap and unnecessary cost
  • Planning is required to maximize coverage but minimize effort and spend
 

3:25 pm - 3:35 pm

Afternoon Networking Coffee Break

 

3:40 pm - 4:05 pm

Executive Exchange

 

Innovation Showcase

An exclusive opportunity to be exposed to the hottest new solutions providers in a quick-hit format designed to whet the appetite and spark immediate interest.
 

4:10 pm - 4:35 pm

Executive Exchange

 

Think Tank

Disrupting Markets with Disruptive Technologies

While the combination of Social, Mobile, Analytics, and Cloud have been present and disrupting IT departments and enterprises as a whole for over two years now, in many ways organizations have still not fully embraced them, have still not fully leveraged them. These new platforms allow organizations radically new ways to go to market, allowing for broad scale deployment of systems of engagement that create dynamic relationships with clients and prospects. Finding the resources, wherewithal, and ability to fully commit to these technologies and the capabilities they create has proven to be a struggle for many, but a struggle that can be overcome by leveraging the right partners that bring the right skills and experiences to bear.

Takeaways:

  • Social, Mobile, Analytics, and Cloud are all here to stay; each one adds value to enterprises but collectively that value increases exponentially
  • The manner in which these technologies are implemented, operated, and utilized is different than the foregoing systems of record we are used to
  • Unique skills and capabilities are required to leverage the power and value of these platforms, skills and capabilities that can be in short supply

Think Tank

How to be Socially Secure (or Securely Social)

Social media is the least hyped and potentially least adopted of the so-called disruptive technologies, at least by enterprises in general. This doesn't mean that employees are embracing these tools personally however, nor does it mean that enterprises should continue to avoid them. The fact of the matter is social platforms allow for incredible levels of interaction that when harnessed can lead to significant creativity and productivity gains allowing enterprises that adopt and encourage the use of social collaboration platforms to be more successful than their non-social peers. But every newly adopted technology brings with it unique problems and so it is the CISOs job to provide the secure landscape within which this social collaboration, both internal and external, sanctioned and not, can occur.

Takeaways:

  • Your employees are already social whether you realize it or not, facilitate it or not so ignoring the issue only leads to greater security problems
  • Social collaboration presents a real security threat as information is more freely shared, and interactions occur outside the boundaries of enterprise control
  • Social security programs must be built in layers, addressing first unsanctioned use, then sanctioned all while differentiating between internal and external social activity
 

4:40 pm - 5:20 pm

Executive Visions

Facilitating Technology-Enabled Business Transformation

The role of the modern IT Executive is more complex than it has ever been before, not just because the technology landscape has become more complex, but also because increasingly IT execs have had to become a business-focused executive, not just a technologist. Long have we talked about the CIO and CISO getting a seat at the table but modern businesses are now demanding that their technology impresario join them and leverage his deep and rich technical acumen to allow the organization as a whole to better position itself for market-place success. To be successful, CxOs need to invest in themselves, in their personnel, and in the right technologies to allow them to position the IT department to proactively address business needs as an innovator and driver, rather than order-taker and enabler.

Takeaways:

  • IT leadership can no longer be simply technology focused, but must instead take their visibility into business process and become business focused
  • A broader business-focus does not preclude maintaining technology excellence however and indeed may demand more of it than ever before
  • Success for CxOs will be measured not in how they can enable enterprise decisions, but in how they can drive growth
 

5:20 pm - 5:30 pm

Thank You Address and Closing Remarks

 

5:30 pm - 7:00 pm

Cocktail Reception