CIO Southern California Summit | March 28, 2017 | The Westin Pasadena - Los Angeles, CA, USA

↓ Agenda Key

Keynote Presentation

Visionary speaker presents to entire audience on key issues, challenges and business opportunities

Keynote Presentations give attending delegates the opportunity to hear from leading voices in the industry. These presentations feature relevant topics and issues aligned with the speaker's experience and expertise, selected by the speaker in concert with the summit's Content Committee." title="Keynote Presentations give attending delegates the opportunity to hear from leading voices in the industry. These presentations feature relevant topics and issues aligned with the speaker's experience and expertise, selected by the speaker in concert with the summit's Content Committee.

Executive Visions

Panel moderated by Master of Ceremonies and headed by four executives discussing critical business topics

Executive Visions sessions are panel discussions that enable in-depth exchanges on critical business topics. Led by a moderator, these sessions encourage attending executives to address industry challenges and gain insight through interaction with expert panel members." title="Executive Visions sessions are panel discussions that enable in-depth exchanges on critical business topics. Led by a moderator, these sessions encourage attending executives to address industry challenges and gain insight through interaction with expert panel members.

Thought Leadership

Solution provider-led session giving high-level overview of opportunities

Led by an executive from the vendor community, Thought Leadership sessions provide comprehensive overviews of current business concerns, offering strategies and solutions for success. This is a unique opportunity to access the perspective of a leading member of the vendor community." title="Led by an executive from the vendor community, Thought Leadership sessions provide comprehensive overviews of current business concerns, offering strategies and solutions for success. This is a unique opportunity to access the perspective of a leading member of the vendor community.

Think Tank

End user-led session in boardroom style, focusing on best practices

Think Tanks are interactive sessions that place delegates in lively discussion and debate. Sessions admit only 15-20 participants at a time to ensure an intimate environment in which delegates can engage each other and have their voices heard." title="Think Tanks are interactive sessions that place delegates in lively discussion and debate. Sessions admit only 15-20 participants at a time to ensure an intimate environment in which delegates can engage each other and have their voices heard.

Roundtable

Interactive session led by a moderator, focused on industry issue

Led by an industry analyst, expert or a member of the vendor community, Roundtables are open-forum sessions with strategic guidance. Attending delegates gather to collaborate on common issues and challenges within a format that allows them to get things done." title="Led by an industry analyst, expert or a member of the vendor community, Roundtables are open-forum sessions with strategic guidance. Attending delegates gather to collaborate on common issues and challenges within a format that allows them to get things done.

Case Study

Overview of recent project successes and failures

Case Studies allow attending executives to hear compelling stories about implementations and projects, emphasizing best practices and lessons learned. Presentations are immediately followed by Q&A sessions." title="Case Studies allow attending executives to hear compelling stories about implementations and projects, emphasizing best practices and lessons learned. Presentations are immediately followed by Q&A sessions.

Focus Group

Discussion of business drivers within a particular industry area

Focus Groups allow executives to discuss business drivers within particular industry areas. These sessions allow attendees to isolate specific issues and work through them. Presentations last 15-20 minutes and are followed by Q&A sessions." title="Focus Groups allow executives to discuss business drivers within particular industry areas. These sessions allow attendees to isolate specific issues and work through them. Presentations last 15-20 minutes and are followed by Q&A sessions.

Analyst Q&A Session

Moderator-led coverage of the latest industry research

Q&A sessions cover the latest industry research, allowing attendees to gain insight on topics of interest through questions directed to a leading industry analyst." title="Q&A sessions cover the latest industry research, allowing attendees to gain insight on topics of interest through questions directed to a leading industry analyst.

Vendor Showcase

Several brief, pointed overviews of the newest solutions and services

Taking the form of three 10-minute elevator pitches by attending vendors, these sessions provide a concise and pointed overview of the latest solutions and services aligned with attendee needs and preferences." title="Taking the form of three 10-minute elevator pitches by attending vendors, these sessions provide a concise and pointed overview of the latest solutions and services aligned with attendee needs and preferences.

Executive Exchange

Pre-determined, one-on-one interaction revolving around solutions of interest

Executive Exchanges offer one-on-one interaction between executives and vendors. This is an opportunity for both parties to make key business contacts, ask direct questions and get the answers they need. Session content is prearranged and based on mutual interest." title="Executive Exchanges offer one-on-one interaction between executives and vendors. This is an opportunity for both parties to make key business contacts, ask direct questions and get the answers they need. Session content is prearranged and based on mutual interest.

Open Forum Luncheon

Informal discussions on pre-determined topics

Led by a moderator, Open Forum Luncheons offer attendees informal, yet focused discussions on current industry topics and trends over lunch." title="Led by a moderator, Open Forum Luncheons offer attendees informal, yet focused discussions on current industry topics and trends over lunch.

Networking Session

Unique activities at once relaxing, enjoyable and productive

Networking opportunities take various unique forms, merging enjoyable and relaxing activities with an environment conducive to in-depth conversation. These gatherings allow attendees to wind down between sessions and one-on-one meetings, while still furthering discussions and being productive." title="Networking opportunities take various unique forms, merging enjoyable and relaxing activities with an environment conducive to in-depth conversation. These gatherings allow attendees to wind down between sessions and one-on-one meetings, while still furthering discussions and being productive.

 

Tuesday, March 28, 2017 - CIO Southern California Summit

7:00 am - 7:55 am

Registration and Networking Breakfast

 

8:00 am - 8:10 am

Welcome Address and Opening Remarks

Presented by:

Frank Palase, Master of Ceremonies and Former Senior Vice President Strategy and Innovation, DIRECTV View details

 
 
 

8:10 am - 8:40 am

Keynote Presentation

The Future of the CIO in the Coming Digital Economy

As more businesses undergo a digital transformation, and as those digital transformations become more ingrained into organizational culture, "Digital" becomes not something unique and different from the business, but a core component of every aspect of the business. As this shift occurs, IT itself faces the very real possibility of no longer being something unique from the business, but instead a component of every aspect of the business. In this world, what role then exists for the CIO? Two clear paths are presenting themselves - one leads to a focus on infrastructure and integration, to keeping the lights on for the digital innovators, while the other leads to information and innovation itself. Knowing which path to choose, how to choose it, and how to see it through will be one of the greatest challenges CIOs of this era will face.

Takeaways:

  • Change is, if not already here, certainly coming and CIOs who don't prepare for the change may not like the results when it arrives
  • Digital transformation is all about connecting enterprise systems to information technology to drive productivity and performance improvements
  • Be prepared to tackle the tasks that no-one wants to do, but everyone needs done; establish relevance to cultivate importance

Presented by:

Sajid Ahmed, Chief Information & Innovation Officer, Martin Luther King Jr. Healthcare Corporation View details

 
 
 

8:45 am - 9:15 am

Keynote Presentation

Achieving Cybersecurity at IoT and Cloud Scale

With the growth of IoT and Cloud, the attack surface that enterprises must protect is expanding dramatically. Unique regulatory requirements by industry vertical are also placing extra pressure on Security Officers and their teams. How can CISOs effectively respond? First and foremost, taking an architectural approach, one that includes network segmentation, will create the best chance of solving Enterprise security holistically and for the long term. Key capabilities must include visibility of all security elements and the communications these systems and devices generate and, even more importantly, automation of operations and response. With the current cybersecurity skills gap that many enterprises experience today, the ability to quickly and effectively audit, recommend and automatically fix the entire network security architecture is critical. 

Takeaways: 

  • Technology evolution and innovation is exponentially expanding the attack surface. 
  • To keep up, enterprises must take an architectural approach to network security that includes visibility and automation. 
  • With limited resources, the ability to quickly and effectively audit, recommend and repair network security is crucial.

Sponsored by:

Fortinet View details

 
 
 

9:20 am - 9:45 am

Executive Exchange

 

Thought Leadership

Secure, Simplify and Transform to a Cloud-Enabled Enterprise

Progressive companies are leveraging cloud, a powerful business enabler, to transform their business and make it more competitive. But cloud and mobility significantly impacts the current IT infrastructure - security, network traffic flow, applications, user experience and cost. As CIOs and CISOs embrace this transformation, they look for opportunities to exchange ideas with their peers who have gone through this journey.  

At this session, Zscaler will share experience of leading the massive network, security and datacenter application transformation that he managed across all business units of GE. 

Example topics will include: 

  • How to transform your hub & spoke network into a cloud-enabled network 
  • How to transform datacenter applications to a SaaS, AWS and Azure environment 
  • New security paradigm for the new world of cloud 
  • Changing role of IT execs 
  • Lessons learned

Sponsored by:

Zscaler View details

 
 
 

9:50 am - 10:15 am

Executive Exchange

 

Thought Leadership

Usable and effective security for empowered users, cloud, mobile and BYOD

IT platforms today are more secure than they were 10 years ago but the risk of data breaches is higher today. It's because your IT has changed (cloud, BYOD, etc.) but your security hasn't evolved. In the meanwhile, attackers are targeting end users directly through phishing. 95% of all breaches involve compromised end user credentials. 75% of all breaches involve compromised end user devices. How can you take a modern approach to reducing the risk of data breaches? Attend this session to learn: 

  • How usable security is the most effective security in practice ? How to win the hearts of your users and business with multi-factor authentication 
  • Why a single platform can replace several mobile, cloud and authentication products 
  • How companies such as Facebook are securing BYOD, users and cloud apps using Duo

Sponsored by:

Duo Security View details

 
 
 

10:20 am - 10:30 am

Morning Networking Coffee Break

 

10:35 am - 11:00 am

Executive Exchange

 

Think Tank

Building Modern Enterprise Analytics Platform

The field of data analytics is rapidly changing. This change is driven by the need to make sense of increasingly complex and large data sets, which is challenging our ability to glean and act on data-driven insights. These issues are compounded by the lack of agreement on best practices with regard to building enterprise analytical capabilities (infrastructure, data architecture and service model). While there is no blueprint for building enterprise analytical capabilities, there are certainly some guiding principles that will reduce the likelihood of making costly mistakes.

Takeaways:

  • Make sure your analytics strategy addresses three capabilities รข?" traditional BI, self-service analytics and Big Data
  • Avoid big-bang approaches by adopting a use case-driven implementation
  • Start thinking of a future where analytics is algorithm-driven, in-workflow, on-demand, prescriptive and real-time

Presented by:

Mohammed Mahbouba, Chief Data Officer, UCLA Health System View details

 
 
 

11:05 am - 11:30 am

Executive Exchange

 

Thought Leadership

Become a Change Agent for Business Transformation

Today's modern CIO is embarking on a digital transformation journey exploring radical hybrid IT strategies and leveraging new technologies like Cloud, Social, Mobile and Big Data. However with 'keeping the lights on' legacy IT components costing nearly 90% of a typical IT budget, how can IT make powerful advancements and lead business change?

Join this interactive session to learn how award-winning CIOs are successfully tipping the balance by liberating people, time and money from costly ongoing maintenance of their ERP systems including SAP and Oracle, to invest in strategic initiatives that create real-world competitive advantage.

Sponsored by:

Rimini Street View details

 
 
 

11:35 am - 12:00 pm

Executive Exchange

 

Executive Boardroom

Can Technology Alone Prevent Phishing Attacks and Breaches?

2016 was undoubtedly the year of ransomware. And while we saw improvements in the number of days to detect a breach, 146 days is still 146 too many. As targeted phishing attacks continue to grow in number and evolve in sophistication, organizations need to reconsider their current approach to these threats. Companies continue to invest billions of dollars in technology to shore up their defenses but it's obviously not enough. Join us to learn how the PhishMe solution combines both technology and human-driven phishing defense to help eliminate phishing breaches through greater employee resilience and better incident response.

Sponsored by:

PhishMe View details

 
 
 

12:05 pm - 12:30 pm

Executive Exchange

 

Think Tank

Addressing the Challenges as IoT Takes Big Data to New Heights

From M2M to IoT, development in connections is creating an unparalleled amount of data. This networked ecosystem of people, process, and data, connecting people in more relevant ways is delivering the right information to the right person or machines at the right time, requires organizations to investigate the effect of this paradigm shift. 

However, even over today's high speed network connections, moving enormous amount of data is difficult. In the time of the data-centric cloud, organizations will have to discover approaches to naturally choose and ingest parts of large amount of multi-sourced data. For instance, a property and casualty insurance company subscribing to real-time weather data would specify only local or regional weather data from data provider.

Takeaways:

  • Real life approaches to leverage IoT and Big Data
  • How to tailor them for maximum effectiveness

Presented by:

Feroz Merchhiya, MC and Partner Former CTO, California Insurance Guarantee Association View details

 
 
 

12:35 pm - 1:20 pm

Networking Luncheon

 

1:25 pm - 1:50 pm

Executive Exchange

 

Think Tank

Speaking the Language of the Business

For many years the CIO, has struggled with the concept of IT-Business alignment and finding ways to ensure that the IT department and the Lines of Business with which it integrates have a common understanding and ability to communicate. Now, as the CISO and the information security department grow out of the IT shadow, they increasingly find themselves in the same position. Their challenge however is greater in that the concepts of IT security are in many ways more abstract than those of generalist IT, and their activities often run counter to the goals of the rest of the organization. CISOs must learn for the trials and tribulations of the CIO and the IT department, and find common ground with the business, to ensure they can hear what their partners are saying, while communicating their own points in understandable terms.

Takeaways:

  • IT-Business communications have long been strained and only now are improving across most organizations through concerted effort
  • IT has had to find ways to speak the language of the business " it was not the business that learned to speak IT
  • The CISO must adopt and emulate the successful communications practices and strategies of the IT department or risk serious relationship issues

Presented by:

John Barrus, Director of Infrastructure, CISO, Pacific Compensation Insurance Company

 
 

1:55 pm - 2:20 pm

Executive Exchange

 

Executive Boardroom

To Deliver Real IT Business Value, You Must Start by Improving the End-User Experience.

Situation: According to a recent Forrester Study, 90% of IT executives say their end users suffer from technology issues their IT teams can't detect, including PC health, cloud availability and performance, and user behavioral issues. This problem impacts security, revenue, and customer retention, and bleeds unseen cash through operational inefficiencies. 

Complication: Only 50% of typical enterprise users actually call the Help(less) Desk, and standard IT tools don't help to identify the operational problems. 

Resolution: Managing and improving the end-user experience with advanced client-side analytics will drastically help you identify issues plaguing your business without relying on your users to tell you. 

Takeaways:  

  • How to identify and quantify the full scope of problems and outages across your hybrid enterprise 
  • How taking proactive actions can improve IT stability and reliability, independent of your end-users 
  • Learn how actively managing and improving end-users' experience will drive a reduction in IT operational costs combined with improved business productivity and security

Sponsored by:

Nexthink View details

 
 
 

2:25 pm - 2:50 pm

Executive Exchange

 

Executive Boardroom

The Weaponization of IoT Botnets - Taking a Risk Based Approach to DDoS Attack Protection

In this session you'll learn about the latest DDoS attack trends (including the use of IoT-based botnets such as Mirai), best practices in DDoS attack defense and how to take a risk based approach to DDoS attack protection.

Sponsored by:

Arbor Networks View details

 
 
 

2:55 pm - 3:20 pm

Executive Exchange

 

Think Tank

Shadow IT - To Embrace or Eliminate?

Best practice in most enterprises, at least as far as the CIO and CISO goes, is to squash Shadow IT wherever it is encountered. Shadow IT, the argument goes, leads to a world of data and integration problems for the IT department, and significant amounts of unknown and unquantifiable risk for the information security group. A small but vocal minority however is beginning to advocate for Shadow IT as a catalyst of innovation, citing the increases in productivity and creativity by allowing enterprise staff to find their own out of the box solutions to organizational problems. CISOs can allow their organizations to have their cake (Shadow IT) and eat it too (still be secure) by following a few simple steps that allow them to build in security regardless of user activity. 

Takeaways: 
  • Shadow IT is not malicious activity; it is simply the Line of Business user community looking to be efficient and effective 
  • A well-developed security program can take Shadow IT into account and incorporate protection mechanisms that allow end user flexibility 
  • Embracing Shadow IT does not mean no holds barred and end users need to understand the limit of the boundaries and the reason for their existence

Presented by:

Gary Zorko, VP, Information Technology & CIO, Z Gallerie View details

 
 
 

3:25 pm - 3:35 pm

Afternoon Networking Coffee Break

 

3:40 pm - 4:05 pm

Executive Exchange

 

Executive Boardroom

Data-Centric Security: Bring Order Into Data Security Chaos

Big data has changed the database landscape forever. The complex infrastructure behind today's new data initiatives leads to security fragmentation and blind spots that hackers are taking advantage of. 

BlueTalon Data-Centric Security brings order to data security chaos. Our platform provides full visibility at the data layer and enforces consistent user access controls to data across repositories. With security closer to the data, you can monitor and protect all access paths to the data, minimize the risk of data breaches, and achieve regulatory compliance at a lower cost. 

Takeaways:  

  • Why data-driven organizations should consider data-centric security 
  • Benefits of visibility and control at the data layer  
  • Proposed framework to get started with data-centric security

Sponsored by:

BlueTalon View details

 
 
 

4:10 pm - 4:35 pm

Executive Exchange

 

Think Tank

Enterprise Architecture Bridges Strategy and Execution

While execution without strategy is aimless, strategy without execution is useless. Many companies are brilliant at developing strategic vision and objectives, but fail to deliver due to siloed approaches. The root cause is the lack of a holistic view of the business capabilities, and most importantly the lack of understanding of the interrelationships among the business capabilities from people, process, and technology aspects. Enterprise Architecture is a discipline that can be leveraged to address this challenge. 

Takeaways: 
  • Enterprise Architecture bridges strategy and execution by translating business strategic vision into enterprise architecture blueprints. 
  • Enterprise architecture blueprints provide not only holistic future-state capability views from business, information, application, technology, and security perspectives, but also an intergraded multi-year integrated execution roadmap. 
  • The multi-year integrated roadmap guides the development of annual strategic and operating plans A mature EA program needs an effective operating model defining what decision-making principles to govern, the end-to-end processes to follow, and the architecture frameworks to use.

Presented by:

Karen Xie, VP Enterprise Architecture, Blue Shield of California View details

 
 
 

4:40 pm - 5:20 pm

Executive Visions

Facilitating Technology-Enabled Business Transformation

The role of the modern IT Executive is more complex than it has ever been before, not just because the technology landscape has become more complex, but also because increasingly IT execs have had to become a business-focused executive, not just a technologist. Long have we talked about the CIO and CISO getting a seat at the table but modern businesses are now demanding that their technology impresario join them and leverage his deep and rich technical acumen to allow the organization as a whole to better position itself for market-place success. To be successful, CxOs need to invest in themselves, in their personnel, and in the right technologies to allow them to position the IT department to proactively address business needs as an innovator and driver, rather than order-taker and enabler.

Takeaways:

  • IT leadership can no longer be simply technology focused, but must instead take their visibility into business process and become business focused
  • A broader business-focus does not preclude maintaining technology excellence however and indeed may demand more of it than ever before
  • Success for CxOs will be measured not in how they can enable enterprise decisions, but in how they can drive growth

Moderated by:

Frank Palase, Master of Ceremonies and Former Senior Vice President Strategy and Innovation, DIRECTV View details

 
 

Panelists:

Mark Van Holsbeck, CISO/CTO (Director of IT and IS), Avery Dennison View details

 
 
 

5:20 pm - 5:30 pm

Thank You Address and Closing Remarks

Presented by:

Frank Palase, Master of Ceremonies and Former Senior Vice President Strategy and Innovation, DIRECTV View details

 
 
 

5:30 pm - 7:00 pm

Cocktail Reception