CIO St. Louis Summit | December 12, 2019 | Marriott St. Louis Grand Hotel - St. Louis, MO, USA

↓ Agenda Key

Keynote Presentation

Visionary speaker presents to entire audience on key issues, challenges and business opportunities

Keynote Presentations give attending delegates the opportunity to hear from leading voices in the industry. These presentations feature relevant topics and issues aligned with the speaker's experience and expertise, selected by the speaker in concert with the summit's Content Committee." title="Keynote Presentations give attending delegates the opportunity to hear from leading voices in the industry. These presentations feature relevant topics and issues aligned with the speaker's experience and expertise, selected by the speaker in concert with the summit's Content Committee.

Executive Visions

Panel moderated by Master of Ceremonies and headed by four executives discussing critical business topics

Executive Visions sessions are panel discussions that enable in-depth exchanges on critical business topics. Led by a moderator, these sessions encourage attending executives to address industry challenges and gain insight through interaction with expert panel members." title="Executive Visions sessions are panel discussions that enable in-depth exchanges on critical business topics. Led by a moderator, these sessions encourage attending executives to address industry challenges and gain insight through interaction with expert panel members.

Thought Leadership

Solution provider-led session giving high-level overview of opportunities

Led by an executive from the vendor community, Thought Leadership sessions provide comprehensive overviews of current business concerns, offering strategies and solutions for success. This is a unique opportunity to access the perspective of a leading member of the vendor community." title="Led by an executive from the vendor community, Thought Leadership sessions provide comprehensive overviews of current business concerns, offering strategies and solutions for success. This is a unique opportunity to access the perspective of a leading member of the vendor community.

Think Tank

End user-led session in boardroom style, focusing on best practices

Think Tanks are interactive sessions that place delegates in lively discussion and debate. Sessions admit only 15-20 participants at a time to ensure an intimate environment in which delegates can engage each other and have their voices heard." title="Think Tanks are interactive sessions that place delegates in lively discussion and debate. Sessions admit only 15-20 participants at a time to ensure an intimate environment in which delegates can engage each other and have their voices heard.

Roundtable

Interactive session led by a moderator, focused on industry issue

Led by an industry analyst, expert or a member of the vendor community, Roundtables are open-forum sessions with strategic guidance. Attending delegates gather to collaborate on common issues and challenges within a format that allows them to get things done." title="Led by an industry analyst, expert or a member of the vendor community, Roundtables are open-forum sessions with strategic guidance. Attending delegates gather to collaborate on common issues and challenges within a format that allows them to get things done.

Case Study

Overview of recent project successes and failures

Case Studies allow attending executives to hear compelling stories about implementations and projects, emphasizing best practices and lessons learned. Presentations are immediately followed by Q&A sessions." title="Case Studies allow attending executives to hear compelling stories about implementations and projects, emphasizing best practices and lessons learned. Presentations are immediately followed by Q&A sessions.

Focus Group

Discussion of business drivers within a particular industry area

Focus Groups allow executives to discuss business drivers within particular industry areas. These sessions allow attendees to isolate specific issues and work through them. Presentations last 15-20 minutes and are followed by Q&A sessions." title="Focus Groups allow executives to discuss business drivers within particular industry areas. These sessions allow attendees to isolate specific issues and work through them. Presentations last 15-20 minutes and are followed by Q&A sessions.

Analyst Q&A Session

Moderator-led coverage of the latest industry research

Q&A sessions cover the latest industry research, allowing attendees to gain insight on topics of interest through questions directed to a leading industry analyst." title="Q&A sessions cover the latest industry research, allowing attendees to gain insight on topics of interest through questions directed to a leading industry analyst.

Vendor Showcase

Several brief, pointed overviews of the newest solutions and services

Taking the form of three 10-minute elevator pitches by attending vendors, these sessions provide a concise and pointed overview of the latest solutions and services aligned with attendee needs and preferences." title="Taking the form of three 10-minute elevator pitches by attending vendors, these sessions provide a concise and pointed overview of the latest solutions and services aligned with attendee needs and preferences.

Executive Exchange

Pre-determined, one-on-one interaction revolving around solutions of interest

Executive Exchanges offer one-on-one interaction between executives and vendors. This is an opportunity for both parties to make key business contacts, ask direct questions and get the answers they need. Session content is prearranged and based on mutual interest." title="Executive Exchanges offer one-on-one interaction between executives and vendors. This is an opportunity for both parties to make key business contacts, ask direct questions and get the answers they need. Session content is prearranged and based on mutual interest.

Open Forum Luncheon

Informal discussions on pre-determined topics

Led by a moderator, Open Forum Luncheons offer attendees informal, yet focused discussions on current industry topics and trends over lunch." title="Led by a moderator, Open Forum Luncheons offer attendees informal, yet focused discussions on current industry topics and trends over lunch.

Networking Session

Unique activities at once relaxing, enjoyable and productive

Networking opportunities take various unique forms, merging enjoyable and relaxing activities with an environment conducive to in-depth conversation. These gatherings allow attendees to wind down between sessions and one-on-one meetings, while still furthering discussions and being productive." title="Networking opportunities take various unique forms, merging enjoyable and relaxing activities with an environment conducive to in-depth conversation. These gatherings allow attendees to wind down between sessions and one-on-one meetings, while still furthering discussions and being productive.

 

Thursday, December 12, 2019 - CIO St. Louis Summit

8:00 am - 8:45 am

Registration & Networking Breakfast

 

8:45 am - 8:55 am

Welcome Address & Opening Remarks

 

8:55 am - 9:25 am

Share:

Keynote Presentation

Can U Stix-Shift? The Open Cybersecurity Alliance and Securing the Cloud

IBM and Symantec joined forces with 16 other leading cyberscurity vendors to launch the Open Cybersecurity Alliance on October 8 under the OASIS umbrella. The OCA's goal is to promote an open cybersecurity ecosystem and interoperability between tools via commonly developed code and tooling, using mutually agreed-upon technologies, standards and procedures. The focus of the OCA project is data interchange within cybersecurity operations over the threat management life cycle, including threat hunting and detection, analytics, operations and response. 

To this end, IBM contributed the STIX Shifter project to federate security data from disparate sources and tools. STIX Shifter is at the heart of the new IBM Cloud Pak for Security - providing SOC teams the ability to pull insights from their disparate SIEM, EDR, Data Protection and Threat Intel tools into a single platform - while leaving the data where it resides. 

How does STIX Shifter work and how can it help you protect your company's hybrid multicloud architecture? What other innovations will come from the OCA members? Find out by attending our keynote.

Sponsored by:

IBM View details

 
 

Presented by:

Chris Bontempo, VP Security Marketing, Routes and Offerings, North America, IBM View details

 
 
 

9:30 am - 9:55 am

Think Tank

Digital Transformation: A Journey Not a Destination

There are many forces that are driving companies to continue to transform how they do business. Technological advances such as IoT, AI, machine learning, virtual reality and augmented reality are creating demanding expectations from customers, employees and boards. Adding to the complexity of CIOs and CISOs is the increasing threats to the security of the data that is at the heart of digital transformation. This keynote presentation will focus on the realities that this transformation will never end and it is critical to implement both the mindset and processes to treat digital transformation as a journey...not a destination. 

 Takeaways: 

  1. It is critical to realize that digital transformation will never end, but will always be unfolding.  
  2. CIOs and CISOs must implement processes to ensure that not only their departments are forward thinking, but that their entire company is aware of what new technologies can bring to bear for customers and employees.

Think Tank

Enhancing Your Edge

Edge computing is computing topology in which the content collection and delivery are placed closer to their endpoints. The goal of edge computing is to keep the traffic and processing local to eliminate delays and reduce traffic. Currently, edge computing is being driven by IoT and requires processing to be close to the end rather than on a centralized cloud server. However, rather than creating brand new architecture, cloud computing and edge computing will evolve into centralized service executing on centralized servers, on-premise servers and on the edge devices themselves. 

 Takeaways: 

  1. Review your organization's progress within edge computing. 
  2. How to adapt centralized service execution.  
  3. The future of edge computing and its potential capabilities

Presented by:

Montez Fitzpatrick, CISO, Navvis Healthcare View details

 
 
 

10:00 am - 10:25 am

Executive Exchange

 

Executive Boardroom

Scaling Multicloud and Hybrid Cloud Usage without Sacrificing Data Security and Compliance

Analysts claim that 50% of today's public cloud data and workloads will migrate to private clouds in the next two years. But, don't worry about the public cloud behemoths because their average CAGR continues above 20%. However, the result is that cloud data is spreading across multiclouds and increasingly migrating to private clouds that offers the Enterprise more control. This acceleration in lift and shift of workloads creates data security and compliance risks as well as management complexities. In this discussion, we'll share trends and best practices for enabling data portability without compromising security, compliance, and operational efficiencies. 

Take Aways: 

  •  Sharing trends seen by analysts and your peers on multicloud adoption and challenges 
  •  Discussion of best practices for leveraging native cloud data security services effectively to maintain compliance and control 
  •  Methodology for efficiently applying data and access security techniques that allow for secure lift and shift between public and private clouds

Sponsored by:

Thales eSecurity, Inc. View details

 
 

Presented by:

Tim Connolly, Senior Systems Engineer, Thales eSecurity, Inc.

 

Executive Boardroom

How to Increase Application Performance without Wasting Money on Hardware or Cloud CPU Solutions.

Many companies know they rely on application speed to keep clients happy, but don't have the expertise or time to identify and resolve root cause issues. Instead they throw money at the problem by purchasing faster storage solutions or overspending on cloud CPU to increase the performance.

In this discussion we will walk you through how to find the root cause of your performance issues. Proper tuning and analysis of your systems can save you hundreds of thousands or more on hardware, and even delay or negate the need for any purchase. Don't hide your problems, resolve the root cause of your performance problems (it's cheaper and more effective).

  • Don't use hardware (or cloud CPU) as a quick and easy fix to your performance issues
  • Learn how to accurately identify the root cause of performance issues (whether its code, database architecture, or Hardware/infrastructure)
  • Find out what you *actually* need in your new hardware

Sponsored by:

Soaring Eagle Database Consulting, Inc. View details

 
 

Presented by:

Jeff Garbus, CEO, Soaring Eagle Database Consulting, Inc. View details

 
 
 

10:25 am - 10:35 am

Morning Networking Coffee Break

 

10:40 am - 11:05 am

Executive Exchange

 

Thought Leadership

Machines Are Friends Not Foes: Cognitive Computing Accelerates the Journey

Popular movies, books and television shows typically position advanced technology as a threat to humanity and all we hold dear. Yet cognitive computing technologies such as Artificial Intelligence (AI), Machine Learning (ML), Natural Language Processing and Augmented Reality (AR) are helping CIOs and CISOs make better decisions faster.

Takeaways:

  1. We will discuss how cognitive computing can help us navigate the acceleration of activity and decisions that we are experiencing on our digital transformation journeys
  2. New cognitive computing technologies can be unnerving and difficult to trust
  3. Used properly, cognitive computing technologies such as AI, ML and AR can provide data to humans in such a way to enable us to better prioritize the decisions we must make and make those decisions more effectively

Sponsored by:

ForgeRock View details

 
 
 

11:10 am - 11:35 am

Executive Exchange

 

Think Tank

Analytics in the Cloud and Bring Data Science to Analysts

This session will outline the concepts and components needed to develop a cloud first analytics ecosystem. It will also explore how to develop Data Science into a business analysts skill set. 

Takeaways: 

  1. A design overview of a cloud analytic ecosystem 
  2. A blueprint with options by analytic component to help in a vetting process 
  3. A model for civilian data science as it is evolving

Presented by:

Pete Hogan, Chief Technology Officer, Post Holdings View details

 
 

Think Tank

Changing role of CIOs and CISOs

The role of the modern IT Executive is more complicated than it has ever been before, not only because the technology landscape has become more complex, but also because IT execs have increasingly had to become more business-focused. The role has moved from being merely a technologist to being a business change, process and transformation instigator. Long have we talked about and pushed for IT to be seated at the top table. Now modern businesses are demanding that their technology executives join them to leverage technology thus allowing the whole organisation to better position itself for market-place success, while at the same time ensuring they streamline processes, increase the time to market, be agile and reduce costs. To be successful, CxOs need to invest in themselves, in their staff and the right technologies thus allowing them to position the IT department to proactively address business needs as an innovator and driver, rather than order-taker and enabler. 

 Takeaways: 

  1.   IT leadership can no longer be directly technology focused, but must instead take their visibility into the business process and become business focused.  
  2. A broader business-focus does not preclude maintaining technology excellence however and indeed may demand more of it than ever before. 
  3. Success for CxOs will be measured, not in how they can enable enterprise decisions, but in how they can drive growth, seek out competitive advantage, and drive revenue.  
  4. If the CIO doesn't keep up with market trends could they find themselves replaced by CITO, CDO, CMO, CTO, etc?

Presented by:

Mike Ehlers, CISO, Clearent View details

 
 
 

11:40 am - 12:05 pm

Executive Exchange

 

Share:

Executive Boardroom

Protect Your Keys or Don't Waste Your Time Encrypting Your Data

For over 2000 years, governments, armies, businesses and lovers have been encrypting messages. For the same amount of time, the keys used to perform the encryption have been the weakest link in the chain. After 2000 years, technology has advanced such that the keys can be protected but many companies don't understand how important it really is. 

Mr. Beutlich will explain in an entertaining (and sometimes graphic) fashion why protecting the encryption key is more important than the encryption itself.

Sponsored by:

nCipher View details

 
 

Executive Boardroom

Ransomware, Risk, and Recovery: Is Your Disaster Recovery Strategy Ready for Today's Threats?

Disaster recovery strategies have traditionally focused on natural disasters, then expanded into other physical events such as terrorism. Today, cyber weaponization is everywhere, and the "extinction event" is a genuine threat with no respect for geographic boundaries.  

 

NotPetya impacted Maersk worldwide in under 10 minutes and cost the company over $300M. The 2018 Winter Olympics were hit by a targeted cyberattack, and ransomware attacks have become commonplace. 

Cyber risk directly correlates to business risk. And cyber disasters strike more frequently with broader impact than their physical counterparts. Thus, modern disaster recovery strategies must prioritize cyber scenarios.

 

Takeaways 

· Denial-of-availability malware is now the #1 risk to business operations 

· Cyber insurance policies are not the magic bullet they position themselves to be 

·  New "cyber-first" DR technologies automate recovery of complex systems, facilitate recovery to the cloud, and eliminate the risk of reinfection from system state and bare-metal backups 

Sponsored by:

Semperis View details

 
 

Presented by:

Sean Deuby, Director of Services at Semperis, Semperis View details

 
 
 

12:10 pm - 12:35 pm

Executive Exchange

 

Thought Leadership

Can Technology Alone Prevent Phishing Attacks & Breaches?

In a world where we are talking about trusting self-driving cars, will we totally trust self "threat assessing and action taking" cybersecurity systems? Is technology enough? What is the human role in both preventing and responding to attacks?

Takeaways:

  1. Employees continue to be one of the leading, if not the leading, entry point for security breaches
  2. Training about cyber-attack approaches such as Phishing is important but using technology can help employees more consistently identify outside forces attempting to harm your company

Sponsored by:

Silver Peak Systems View details

 
 
 

12:40 pm - 1:20 pm

Working Lunch

 

1:25 pm - 1:50 pm

Executive Exchange

 

Share:

Thought Leadership

Is AI the future of Email Security?

Email continues to be the dominant attack vector for threat actors in today's landscape. Email security gateways have been focused and effective on widespread attacks and campaigns, but have been porous to sophisticated, highly targeted attacks. Despite significant investments into email security, Business Email Compromise (BEC) losses have nearly doubled year over year over year - from $360M in 2016 to $1.3B in 2018. This represents roughly 48% of all cybercrime losses. Combatting BEC and other socially-engineered, payload-less attacks requires a shift in mindset and approach. AI and Machine Learning have hyped technologies in security over the past several years. So the question is - Is AI the future of email security?

Sponsored by:

Abnormal Security View details

 
 

Presented by:

Ken Liao, VP of Cybersecurity Strategy, Abnormal Security View details

 
 
 

1:55 pm - 2:20 pm

Executive Exchange

 

Think Tank

How Augmented Analytics Will Help Your Organization

Augmented Analytics focus on specific areas of augmented intelligence, using machine learning to enhance how data and analytics are presented and shared. As the capabilities of this technology advance rapidly, it is pivotal to understand these advancements. 

 Takeaways:  

  1. Learn more about Augmented Analytics' role as a key feature of data preparation and management, process management, process mining and data science platforms  
  2. How to optimize the decisions and actions of all entire team, not just those of analysts and data scientists  
  3. Using Augmented Analytics to automate the process of data preparation, insight generation and insight visualization

Think Tank

AI-Driven Development

Due to market shifts, the need for collaboration between professional data scientists and application developers is no longer necessary. Today, professional developers can operate alone using predefined models to deliver the top, AI-enhanced solutions. These models allow for developers to utilize tools tailored to integrating AI capabilities into your organization's solution. 

Takeaways: 

  • Learn more about how to utilize predefined AI integration models 
  • Learn how to apply AI to various data sciences, application development and testing functions 
  • Understand the potential benefit of self-governing programs over large data sets

 

2:25 pm - 2:50 pm

Executive Exchange

 

Thought Leadership

Sponsored by:

Imperva View details

 
 
 

2:55 pm - 3:20 pm

Executive Exchange

 

Think Tank

The Birth of Digital Twins

In the near future, it is predicted that digital twins or the digital representation of a real-world system will exist for billions of different things. The implication of digital twins will be base-line and simple at first, but as developments take place, digital twins will improve their ability to collect and present the right data and apply the right analytics in order to respond effectively and efficiently. 

Takeaways: 

  1. Understanding the opportunity for digital twins in your organization and how to implement them 
  2. How digital twins create more dynamic processes for an organization's business model 
  3. Covering the business implications of digital twins for your organization

Presented by:

Robert Gaskill-Clemons, Chief Technology Officer, City of St. Louis View details

 
 

Think Tank

The Future of Autonomous Things

Today, we are seeing more Autonomous Things technology than ever before. As a result, functions formerly performed by humans are being replaced with AI. This technology's automation goes beyond the automation by using AI to deliver innovative behaviors that interact more efficiently and effectively with their surroundings and with their end-users. 

 Takeaways: 

  1.  Cover the latest innovations in autonomous and networked entities for 2019  
  2. Learn how these innovations will shape the different industries and business landscapes  
  3. Discuss the potential compromises to privacy and safety in the future of AI

 

3:25 pm - 3:50 pm

Executive Exchange

 

Share:

Thought Leadership

Top Trends in Information Security Risk Management

Organizations around the world are pursuing digital initiatives to deliver more attractive products and services; to gain efficiencies; and save time and money. While digital transformation can significantly benefit an organization, it can also introduce new and changing risk. This session will discuss some of the risks that may emerge from digital transformation and risk management trends being employed by companies to address the challenges.

Sponsored by:

RSA View details

 
 

Presented by:

Marshall Toburen, Risk Management Strategist, RSA View details

 
 
 

3:50 pm - 4:00 pm

Afternoon Networking Coffee Break

 

4:05 pm - 4:30 pm

Executive Exchange

 

Think Tank

Regulations Mean Change

More complex regulations, such as the General Data Protection Regulation (GDPR), have came into play due to the rise of data breaches forces. As data today is viewed as a such an asset, it is also a tremendous liability. Understanding that, organizations has to consider both while they implement technologies that will both innovative their business, but also be cost effective.

Takeaways:

  1. Understand the latest regulations, such as GDPR
  2. How to tell business stakeholders that data protection can be a key differentiator for your organization
  3. The steps needed to take to be regulatory compliant

Presented by:

Matt Saulmon, CISO, UniGroup, Inc. View details

 
 

Think Tank

Immersive Experiences

Virtual reality (VR), augmented reality (AR) and mixed reality (MR) are changing the way in which people perceive the digital world. This perception change and interaction experience presents unique opportunities for the immersive user experience. 

Takeaways: 

  • Discuss the shift from individual devices that have separated user interface technologies to a multichannel experience 
  • Discuss how immersive technologies provide benefits such as use, scalability, and new types experiences your organization, customers and employees.
  •  Learn more about the challenges facing the immersive technologies implications

 

4:35 pm - 5:00 pm

Executive Exchange

 

Thought Leadership

Keeping ALL Endpoints Continuously Patched and Compliant - Quickly and Cost Effectively

IT security and operations teams struggle to keep Unix, Linux, Mac and Windows servers and end user devices continuously patched and compliant with security and regulatory mandates. They also strive for faster time-to-remediation during incidents. Using HCL BigFix, IT operations and security teams can instantly report to executives, board members and high-value supply chain partners that all systems are continuously patched and compliant, resulting in increased productivity and cost savings.

Sponsored by:

HCL BigFix View details

 
 

Presented by:

Don Moss, BigFix Technical Adviser, HCL BigFix View details

 
 
 

5:00 pm - 5:40 pm

Keynote Panel

The Revitalizing Change in the Role of the CXO

A CXO's role, goals and objectives have drastically changed over the years as most CXOs supervise teams and units beyond their IT's security. Because of these changes in responsibilities, a CXO's success is measured in greater business metrics. As a result, the role of a CXO has become both more attractive and more demanding. 

 Takeaways: 

  1. What are the significant changes regarding the role of the CXO 
  2. How to keep up with the changing requirements 
  3. How to properly measure a CXO's success

Panelists:

Pete Hogan, Chief Technology Officer, Post Holdings View details

 
 

Sharon Gietl, VP & CIO, The Doe Run Company View details

 
 

Raynold Vincent, Squadron Commander/Chief Operating Officer, United States Air Force

 
 

5:40 pm - 6:30 pm

Summit Happy Hour