CIO New Jersey Summit | October 10, 2017 | Hilton Meadowlands - East Rutherford, NJ, USA

↓ Agenda Key

Keynote Presentation

Visionary speaker presents to entire audience on key issues, challenges and business opportunities

Keynote Presentations give attending delegates the opportunity to hear from leading voices in the industry. These presentations feature relevant topics and issues aligned with the speaker's experience and expertise, selected by the speaker in concert with the summit's Content Committee." title="Keynote Presentations give attending delegates the opportunity to hear from leading voices in the industry. These presentations feature relevant topics and issues aligned with the speaker's experience and expertise, selected by the speaker in concert with the summit's Content Committee.

Executive Visions

Panel moderated by Master of Ceremonies and headed by four executives discussing critical business topics

Executive Visions sessions are panel discussions that enable in-depth exchanges on critical business topics. Led by a moderator, these sessions encourage attending executives to address industry challenges and gain insight through interaction with expert panel members." title="Executive Visions sessions are panel discussions that enable in-depth exchanges on critical business topics. Led by a moderator, these sessions encourage attending executives to address industry challenges and gain insight through interaction with expert panel members.

Thought Leadership

Solution provider-led session giving high-level overview of opportunities

Led by an executive from the vendor community, Thought Leadership sessions provide comprehensive overviews of current business concerns, offering strategies and solutions for success. This is a unique opportunity to access the perspective of a leading member of the vendor community." title="Led by an executive from the vendor community, Thought Leadership sessions provide comprehensive overviews of current business concerns, offering strategies and solutions for success. This is a unique opportunity to access the perspective of a leading member of the vendor community.

Think Tank

End user-led session in boardroom style, focusing on best practices

Think Tanks are interactive sessions that place delegates in lively discussion and debate. Sessions admit only 15-20 participants at a time to ensure an intimate environment in which delegates can engage each other and have their voices heard." title="Think Tanks are interactive sessions that place delegates in lively discussion and debate. Sessions admit only 15-20 participants at a time to ensure an intimate environment in which delegates can engage each other and have their voices heard.

Roundtable

Interactive session led by a moderator, focused on industry issue

Led by an industry analyst, expert or a member of the vendor community, Roundtables are open-forum sessions with strategic guidance. Attending delegates gather to collaborate on common issues and challenges within a format that allows them to get things done." title="Led by an industry analyst, expert or a member of the vendor community, Roundtables are open-forum sessions with strategic guidance. Attending delegates gather to collaborate on common issues and challenges within a format that allows them to get things done.

Case Study

Overview of recent project successes and failures

Case Studies allow attending executives to hear compelling stories about implementations and projects, emphasizing best practices and lessons learned. Presentations are immediately followed by Q&A sessions." title="Case Studies allow attending executives to hear compelling stories about implementations and projects, emphasizing best practices and lessons learned. Presentations are immediately followed by Q&A sessions.

Focus Group

Discussion of business drivers within a particular industry area

Focus Groups allow executives to discuss business drivers within particular industry areas. These sessions allow attendees to isolate specific issues and work through them. Presentations last 15-20 minutes and are followed by Q&A sessions." title="Focus Groups allow executives to discuss business drivers within particular industry areas. These sessions allow attendees to isolate specific issues and work through them. Presentations last 15-20 minutes and are followed by Q&A sessions.

Analyst Q&A Session

Moderator-led coverage of the latest industry research

Q&A sessions cover the latest industry research, allowing attendees to gain insight on topics of interest through questions directed to a leading industry analyst." title="Q&A sessions cover the latest industry research, allowing attendees to gain insight on topics of interest through questions directed to a leading industry analyst.

Vendor Showcase

Several brief, pointed overviews of the newest solutions and services

Taking the form of three 10-minute elevator pitches by attending vendors, these sessions provide a concise and pointed overview of the latest solutions and services aligned with attendee needs and preferences." title="Taking the form of three 10-minute elevator pitches by attending vendors, these sessions provide a concise and pointed overview of the latest solutions and services aligned with attendee needs and preferences.

Executive Exchange

Pre-determined, one-on-one interaction revolving around solutions of interest

Executive Exchanges offer one-on-one interaction between executives and vendors. This is an opportunity for both parties to make key business contacts, ask direct questions and get the answers they need. Session content is prearranged and based on mutual interest." title="Executive Exchanges offer one-on-one interaction between executives and vendors. This is an opportunity for both parties to make key business contacts, ask direct questions and get the answers they need. Session content is prearranged and based on mutual interest.

Open Forum Luncheon

Informal discussions on pre-determined topics

Led by a moderator, Open Forum Luncheons offer attendees informal, yet focused discussions on current industry topics and trends over lunch." title="Led by a moderator, Open Forum Luncheons offer attendees informal, yet focused discussions on current industry topics and trends over lunch.

Networking Session

Unique activities at once relaxing, enjoyable and productive

Networking opportunities take various unique forms, merging enjoyable and relaxing activities with an environment conducive to in-depth conversation. These gatherings allow attendees to wind down between sessions and one-on-one meetings, while still furthering discussions and being productive." title="Networking opportunities take various unique forms, merging enjoyable and relaxing activities with an environment conducive to in-depth conversation. These gatherings allow attendees to wind down between sessions and one-on-one meetings, while still furthering discussions and being productive.

 

Tuesday, October 10, 2017 - CIO New Jersey Summit

7:30 am - 8:25 am

Registration and Networking Breakfast

 

8:30 am - 8:40 am

Welcome Address and Opening Remarks

Presented by:

Eric Craig, Former SVP & CTO, NBCUniversal View details

 
 
 

8:40 am - 9:10 am

Keynote Presentation

Digital Innovation and Risk: Striking the Right Balance

Enabling your business to innovate whilst understanding and managing risk exposure requires a delicate balance. In this presentation Dave Martin, Vice President of Threat and Incident Management for ADP, will share operational programs, technological ecosystems, and management frameworks necessary for unlocking your organizations access to key innovations, technologies and business transformations, while ensuring that security controls and risk management don't get lost in the process.

Presented by:

Dave Martin, VP, Global Threat & Incident Management, ADP View details

 
 
 

9:15 am - 9:45 am

Keynote Presentation

Data Risk Management: Executive Visibility to Critical Business Assets

An organization's sensitive business information assets consist of customer information, intellectual property, employee information, merger & acquisition plans, financial information, sales strategy, and much more. These information assets are used by business processes across the organization that rely on their availability and integrity in order to complete their operations. In some cases, these information assets are the basis for competitive differentiation and provide a market advantage. Gaining an understanding of the types of sensitive assets, their value to the organization, how they are protected, and what compliance requirements apply to the information are fundamental in order to make strategic decisions and apply appropriate controls. 

Critical data protection is no longer just an IT security issueĆ¢?"it has quickly become a board issue! Are your line of business owners and executives aware of the risk related to their critical data? Can they answer questions such as: which LOBs carry the greatest risk, what sensitive data is at risk, how valuable is the at-risk data, who are the data owners, which users are putting data at risk, and more?

Sponsored by:

IBM View details

 
 
 

9:50 am - 10:15 am

Executive Exchange

 

Share:

Thought Leadership

Become a Change Agent for Business Transformation

Today's modern CIO is embarking on a digital transformation journey exploring radical hybrid IT strategies and leveraging new technologies like Cloud, Social, Mobile and Big Data. However, with 'keeping the lights on' legacy IT components costing nearly 90% of a typical IT budget, how can IT make powerful advancements and lead business change? 

Join this interactive session to learn how award-winning CIOs are successfully tipping the balance by liberating people, time and money from costly ongoing maintenance of their ERP systems including SAP and Oracle, to invest in strategic initiatives that create real-world competitive advantage.

Sponsored by:

Rimini Street View details

 
 
 

10:20 am - 10:45 am

Executive Exchange

 

Share:

Thought Leadership

Malware Management - Past, Present and Future

Malware dates back to the earliest days of connected computing. To date, our approach to dealing with malware has remained relatively static. Currently we rely on being able to determine patterns within unpacked, decrypted files. This provides a single pattern-based signature to defend against a wide range of malware attacks, but is insufficient due to several management aspects. Artificial intelligence is the next step, but how can we leverage it to meet malware management needs? 

In this session you will learn: 

  • The history of AI
  • How a deep learning system functions 
  • How this type of system is being used to combat the ever-increasing onslaught of malware

Sponsored by:

Fortinet View details

 
 
 

10:50 am - 11:00 am

Morning Networking Coffee Break

 

11:05 am - 11:30 am

Executive Exchange

 

Think Tank

Building Dynamic Security Teams

There's no other way to say it than bluntly; Information Security is a white-hot field within Information Technology as a whole " over the last dozen years it has gone from after-thought, to scapegoat, to critical enterprise success factor. As a result, the need for capable and qualified Information Security specialists, whether front-line Analysts, mid-level Managers, or top level CISOs is at an all time high, but personnel and skills availability is sinking to an all-time (at least in terms of supply and demand ratio) low. There simply isn't enough expertise in existence to go around, or enough education occurring to create it. In this environment, senior Information Security leaders have to get creative in their pursuit of the people, performance, and passion necessary to address this capability shortfall. 

Takeaways:  

  • Learn how to build grass-roots programs that cultivate a farm full of potential security experts through internal and collaborative programs 
  • Find out how to leverage key organizational traits to generate buzz and interest where none existed before 
  • Understand the relevance of certs vs. experience and how to evaluate and validate the value of candidates

Presented by:

Ramin Safai, CTO & CISO, Jefferies Group LLC View details

 
 
 

11:35 am - 12:00 pm

Executive Exchange

 

Share:

Thought Leadership

Built to Change and Built to Last: How to Balance Culture, Skills, and Tech with Customer Expectations in the Fast-Changing Digital World

Tech has changed the way experiences and products are consumed - which means businesses have to change the way they deliver. Companies that have been around for decades are disappearing overnight, and startups with completely disruptive business models are bought and sold at the drop of a hat. The market today is made up of large, established enterprises and new challengers entering the market with nothing to lose - and they each want what the other has: a solid customer base, revenue and profit versus innovation, disruption and new talent. Companies who come out on top will be able to connect people, processes and technology with customer needs to translate experiences into real business value. This means balancing established industry experience with the new culture, skills, and insights required to compete in today's business landscape. 

Key Takeaways: 

  • Embrace digital transformation, using technology to create an environment for incremental change while balancing innovation and governance at all levels of the organization. 
  • Create an agile business model that blends an organization's legacy approach with the expectations of the market and more importantly, customers, so that you're less likely to fall back on the excuse of "this is how we've always done it" when challenged. 
  • Build the right culture with people who are focused on continuous improvement, want to deliver amazing customer experiences, and wake up every day looking for ways to break down barriers between ideas and outcomes.

Sponsored by:

CA Technologies View details

 
 
 

12:05 pm - 12:30 pm

Executive Exchange

 

Share:

Thought Leadership

Strategic and Secure Mobility

Is mobility a cost? Or is it a key part of your strategy for business success? Many businesses are leveraging mobility to generate real and measurable returns and to increase their competitiveness. How? Join CDM Media and BlackBerry as we explore ways in which companies can strategically manage their mobility investments. 

In our session we'll look at security - again from a strategic viewpoint. Security covers a wide range of issues in the modern enterprise. While protection of data is at the forefront, security involves many other aspects and issues from secure collaboration to the security and protection of employees in an increasingly tumultuous world. We'll deal not only with securing mobility, but how the strategic use of mobility can make you more secure.

Sponsored by:

BlackBerry View details

 
 
 

12:35 pm - 1:00 pm

Executive Exchange

 

Vendor Showcase

 

1:05 pm - 1:50 pm

Networking Luncheon

 

1:55 pm - 2:20 pm

Executive Exchange

 

Think Tank

Moving from Operations to Transformations

The accepted number for the amount of the IT budget that is tied up in operational spend, in paying to maintain technology that has already been purchased, is 80% leaving only 20% for the IT department to use to drive new projects. Because this level of funding is so low, as much as 70% of IT sponsored projects fail. Yet IT departments are being constantly pushed to be innovative, to find a way to embrace new technologies and leverage them to drive business change. How can you do that when your time, money, and effort goes to just keeping the lights on? Join us as we collectively explore this issue and examine some of the successful strategies that are being leveraged by top IT leaders. 

Takeaways:  

  • The pressure on CIO's to drive change has never been higher, but fortunately neither has the opportunity to do so 
  • Disruptive technologies don't just have the power to disrupt IT for the worse, they have the power to disrupt the business for the better 
  • Fortune favors the bold; now is the time to take a leap into new modes of business to break the operational spend stranglehold


Presented by:

Lookman Fazal, CIO/CISO, ATC View details

 
 
 

2:25 pm - 2:50 pm

Executive Exchange

 

Share:

Thought Leadership

Comprehensive Visibility: Is it a Technical Challenge, or a Business Challenge?

In the constantly changing landscape of cyber risk, security and risk management teams (including executives and board members) are increasingly forced to take ownership of and accountability relating to digital risks. Yet, many lack the critical knowledge to make effective risk management decisions and incorporate them into their overall business strategy. This inevitably leads to security strategies which are ineffective and reactionary. This presentation will outline RSA's Business-Driven Security strategy, and will focus on the importance of comprehensive visibility (for both security and risk management teams).

Sponsored by:

RSA View details

 
 
 

2:55 pm - 3:20 pm

Executive Exchange

 

Share:

Executive Boardroom

The Year of Ransomware: Can Technology Alone Prevent Phishing Attacks and Breaches?

As ransomware and phishing attacks continue to grow in number and sophistication, organizations need to reconsider their current security strategy. Companies continue to invest billions of dollars in technology to shore up their defenses against these threats. But is that enough? Is complete reliance on technology the answer? Or should we focus on the human and human behavior?

Sponsored by:

PhishMe View details

 
 
 

3:25 pm - 3:35 pm

Afternoon Networking Coffee Break

 

3:40 pm - 4:05 pm

Executive Exchange

 

Share:

Executive Boardroom

The Modern-Day DDoS Attack - Time to Reassess Your Risk?

DDoS attacks are dramatically increasing in size, frequency and complexity as attackers weaponize IoT-based botnets. Unfortunately, many organizations have been severely impacted by DDoS attacks simply because they had no protection in place or the protection they put in place years ago was inadequate to stop the modern-day DDoS attack. Join Arbor Networks - the industry leader in DDoS attack protection products and services, to learn the latest trends in DDoS attacks and more importantly best practices in defense.

Sponsored by:

Arbor Networks View details

 
 
 

4:10 pm - 4:35 pm

Executive Exchange

 

Think Tank

GDPR is Coming - Is Your Cyber Security Program Prepared?

The EU's General Data Protection Regulation goes into effect in May 2017 and tightens privacy protections for EU residents by outlining new provisions and compliance requirements for -personal data-. The new regulation may have serious implications to an organization's Cyber Security program. This Think Tank will discuss general themes the CISO should consider as they prepare their organization to obtain GDPR compliance. 

Takeaways: 

  • Understand key components of GDPR and how they may impact your organization's Cyber Security program 
  • Highlight core Cyber Security practices that should be established and implemented to prepare for GDPR compliance  
  • Discuss ongoing efforts that may be needed to maintain compliance

Presented by:

Nashira Layade, CISO, Realogy Holding Corp. View details

 
 
 

4:40 pm - 5:20 pm

Executive Visions

Facilitating Technology-Enabled Business Transformation

The role of the modern IT Executive is more complex than it has ever been before, not just because the technology landscape has become more complex, but also because increasingly IT execs have had to become a business-focused executive, not just a technologist. Long have we talked about the CIO and CISO getting a seat at the table but modern businesses are now demanding that their technology impresario join them and leverage his deep and rich technical acumen to allow the organization as a whole to better position itself for market-place success. To be successful, CxOs need to invest in themselves, in their personnel, and in the right technologies to allow them to position the IT department to proactively address business needs as an innovator and driver, rather than order-taker and enabler.

Takeaways:

  • IT leadership can no longer be simply technology focused, but must instead take their visibility into business process and become business focused
  • A broader business-focus does not preclude maintaining technology excellence however and indeed may demand more of it than ever before
  • Success for CxOs will be measured not in how they can enable enterprise decisions, but in how they can drive growth

Moderated by:

Eric Craig, Former SVP & CTO, NBCUniversal View details

 
 

Panelists:

Jason McKay, CIO, Napec View details

 
 

David Van Skiver, Director - Information Risk Management & Security, Merck View details

 
 
 

5:20 pm - 5:35 pm

Share:

Entrepreneur Spotlight

How AI can Transform the Customer Experience

Presented by: Ron Fisher, Co-Founder & CEO, Bowtie

 

5:35 pm - 5:45 pm

Thank You Address and Closing Remarks

 

5:45 pm - 7:00 pm

Cocktail Reception