BEGIN:VCALENDAR
VERSION:2.0
PRODID:icalendar-ruby
CALSCALE:GREGORIAN
BEGIN:VEVENT
DTSTAMP:20240329T105124Z
UID:d36b86ff-6ae8-45bb-9202-312ce0c80a69
DTSTART:20210914T070000
DTEND:20210915T070000
CLASS:PRIVATE
DESCRIPTION:CIO New York Summit
\n
\nAbout CDM Media Summits
\n
\nCDM Medi
a Summits bring together leading C-level executives\, analysts and solutio
n providers to network and attend interactive agenda sessions on the lates
t business topics and trends.
\n
\nThe events are organized by i
ndustry\, topic or organizational role\, and offer an opportunity for atte
ndees to have in-depth discussions\, while making new business contacts. O
ne-on-one meetings held throughout the events allow vendors to introduce p
roducts and services to attending executives.
\n
\nOther summit
highlights include:
\n
\n \; \;  \;-Agenda topics ch
osen by each event'\;s Content Committee
\n \; \;  \;-
Interactive agenda sessions that create opportunities for discussion and d
ebate
\n \; \;  \;-Analyst-led sessions that outline the
latest industry research
\n \; \;  \;-Exclusive environme
nt with 50 C-level executives in average attendance
\n \; \;
 \;-For more information about CDM Media'\;s upcoming summits\, vis
it our Summit Calendar.
\n
\n
\nThursday\, September 13\, 2020 - CIO New York Summit<
/span>
\n
\n7:00 am - 7:55 am
\nRegistration and Networking
Breakfast
\n
\n8:00 am - 8:10 am
\nWelcome Address and Ope
ning Remarks \;
\n
\n8:10 am - 8:40 am
\nKeynote Presen
tation \;
\n
\nMalware Management - Past\, Present and Futur
e
\n
\nMalware dates back to the earliest days of connected comp
uting. To date\, our approach to dealing with malware has remained relativ
ely static. Currently we rely on being able to determine patterns within u
npacked\, decrypted files. This provides a single pattern-based signature
to defend against a wide range of malware attacks\, but is insufficient du
e to several management aspects. Artificial intelligence is the next step\
, but how can we leverage it to meet malware management needs? \;
\n
\nIn this session you will learn: \;
\n
\n \;&n
bsp\;  \;-The history of AI \;
\n \; \;  \;-How a
deep learning system functions  \;
\n \; \;  \;-How
this type of system is being used to combat the ever-increasing onslaught
of malware
\n
\nSponsored by: Fortinet
\n
\n \;
\n8:45 am - 9:15 am
\nKeynote Presentation \;
\n
\nA
nalytics &\; Cloud Together: Accelerating Innovation in the New Cogniti
ve Era
\n
\nLeading companies are disrupting the status quo by u
sing data to inform business strategy and create new business models that
fuel growth. CIOs have the power to uncover the insight that drives disrup
tion and speeds transformation. Learn how leading IT organizations are max
imizing the use of open source and cloud technologies alongside on-premise
s investments to accelerate innovation. And understand how CIOs are embrac
ing new cloud-enabled consumption models while helping ensure data privacy
\, security and sovereignty.  \;
\n
\nTakeaways: \;
\n
\n \; \;  \;-Integrating analytics into key applicati
ons and systems can enable people throughout an organization to access and
act on \;  \;  \;  \;  \;  \; insights when and w
here it matters most. \;
\n \; \;  \;-Take advantage
of more sources to enable better decisions. IT must create an environment
with easy access to all types of \;  \;  \;  \;  \; &n
bsp\;data - structured and unstructured - from internal sources and those
outside the organization. \;
\n \; \;  \;-Data scienc
e teams are answering the toughest questions by leveraging open source dev
elopment platforms and tools to \;  \;  \;  \;  \; &nb
sp\;  \;build models more quickly and easily.
\n \;
\n9:
20 am - 9:45 am
\nExecutive Exchange \;
\n \;
\nTho
ught Leadership \;
\n
\nSecure\, Simplify and Transform to a
Cloud-Enabled Enterprise
\n
\nProgressive companies are leverag
ing cloud\, a powerful business enabler\, to transform their business and
make it more competitive. But cloud and mobility significantly impacts the
current IT infrastructure - security\, network traffic flow\, application
s\, user experience and cost. As CIOs and CISOs embrace this transformatio
n\, they look for opportunities to exchange ideas with their peers who hav
e gone through this journey.  \;
\n
\nIn this session\, Zsca
ler will share experiences of leading the massive network\, security and d
atacenter application transformation that he managed across all business u
nits of GE. Example topics will include: \;
\n
\n \;&nbs
p\;  \;-How to transform your hub &\; spoke network into a cloud-en
abled network \;
\n \; \;  \;-How to transform datace
nter applications to a SaaS\, AWS and Azure environment \;
\n&nbs
p\; \;  \;-New security paradigm for the new world of cloud \;
\n \; \;  \;-Changing role of IT execs \;
\n&nb
sp\; \;  \;-Lessons learned
\n \;
\n9:50 am - 10:15
am
\nExecutive Exchange \;
\n \;
\nThought Leadersh
ip \;
\n
\nKnow Which Risks Are Worth Taking: Scalable Risk
Management
\n
\nIn the constantly changing landscape of cyber ri
sk\, executives and board members are increasingly forced to take ownershi
p of and accountability relating to digital risks. Yet\, many lack the cri
tical knowledge to make effective risk management decisions and incorporat
e them into their overall business strategy. This inevitably leads to secu
rity strategies which are ineffective and reactionary. This presentation w
ill outline RSA'\;s Business Driven Security strategy and focus on the
intersection of risk management and IT &\; security initiatives.
\
n
\nSponsored by: RSA
\n
\n \;
\n10:20 am - 10:30
am
\nMorning Networking Coffee Break
\n \;
\n10:35 am -
11:00 am
\nExecutive Exchange \;
\n \;
\nThink Tan
k \;
\n
\nEvolving From Legacy To Achieve Digital Transforma
tion
\n
\nFor most IT organizations\, the way to get there is th
rough a digital transformation framework\, which produces a radically diff
erent and modern approach to technology and support that is based on a pri
nciple of business agility. It emphasizes moving quickly to adjust to the
way the customer in the global techno-society wants to interact. \;
\n
\nDigital transformation requires a new business operating visi
on and a strategy on how to deliver that vision. includes technology infra
structure\, tools\, applications\, communications\, staff capabilities\, s
taff competencies and more. The CIO has to work closely with corporate pla
nning to define the type of support that will be needed and how the techno
logy infrastructure and capability will evolve and to create a flexible in
vestment plan that can be adjusted over time. Key elements must include th
e redesign of the technology infrastructure to reduce complexity and cost
while increasing scalability\, a rethinking of how business and IT work to
gether\, and an ability to quickly adopt and integrate new advanced techno
logies. \;
\n
\nUntil recently\, this goal has been almost i
mpossible to achieve\, because few companies have the ability to replace l
egacy infrastructure and applications. And it has been almost impossible t
o unlock legacy functionality and data for use with modern technology.
\n
\nThe Blockchain &\; Enhanced security \;
\n
\n
Big Data Analytics and the Impact on Fraud
\n
\nThere is a defin
ite need to rethink the future of identity management on the web. The abil
ity to verify your identity is the lynchpin of financial transactions that
happen online. In today'\;s digital age\, an individual'\;s identit
y is not defined by a single attribute such as a name\, address or user ID
. Rather\, it is a collection of attributes including\, but not limited to
\, name\, age\, financial history\, work history\, address history and soc
ial history. However\, remedies for the security risks that come with web
commerce are imperfect at best. IF Blockchain is the answer? how are you g
oing to take it from being seen by senior management\, as a futuristic sol
ution to the way your organization may survive competition in the next fiv
e years. \;
\n
\nTakeaways: \;
\n
\n \; -G
rowth of trusted Blockchain providers is growing exponentially \;
\n \; -It'\;s not just the financial industry this will affect -Re
tail\, Health Care....are going to be in for the pound as well as in for t
he \;  \;  \;  \;  \; bitcoin. \;
\n \; &
nbsp\; -Uses for Blockchain from ecommerce to supply chain management 
\;
\n
\nPresented by: Karl Schoen-Rene\, CISO\, Knights of Colum
bus
\n
\n \;
\n11:05 am - 11:30 am
\nExecutive Exc
hange \;
\n \;
\nThought Leadership \;
\n
\nBoat Anchor to Business Enabler: A Metric-Driven Journey to DevOps Trans
formation
\n
\nMeet Sarah. Sarah leads a 3000-person IT shop ser
vicing a large financial institution that is deeply concerned about operat
ional performance and market disruption. She has two years to reduce costs
\, accelerate innovation\, and improve IT productivity -- but where to sta
rt and how to get there? In this session we will illustrate a metric-drive
n approach to transforming IT based on DevOps. Specifically\, we will look
at performance metrics that intersect with DevOps practices and principle
s like continuous delivery (CD)\, test driven development (TDD)\, lean\, a
nd software engineering. Integrating these concepts\, we will share a scal
able model for this transformation and real results from successful pilots
.
\n
\n \;
\n11:35 am - 12:00 pm
\nExecutive Excha
nge \;
\n \;
\nExecutive Boardroom \;
\n
\
nCyber Exposure: The Next Frontier for Security
\n
\nCyber  
\;Exposure is an emerging discipline for managing  \;and  \;measur
ing  \;the modern  \;attack  \;surface  \;to  \;accura
tely  \;understand  \;and  \;reduce  \;cyber  \;risk.
 \;Built  \;on  \;the  \;roots  \;of Vulnerability &nb
sp\;Management  \;designed  \;for  \;traditional  \;IT\, &
nbsp\;Cyber  \;Exposure  \;transforms  \;cybersecurity  \;
from identifying  \;bugs  \;and misconfigurations  \;and  
\;expands  \;it  \;to  \;live  \;discovery  \;into &nb
sp\;every  \;asset  \;in  \;any environment.  \;Cyber &nbs
p\;Exposure  \;also  \;delivers  \;continuous  \;visibilit
y  \;into  \;where  \;assets  \;are  \;secure  \;v
ersus exposed\,  \;and  \;to  \;what  \;extent\,  \;an
d  \;prioritizes  \;remediation  \;based  \;on  \;the
 \;asset'\;s  \;business  \;criticality and the  \;seve
rity  \;of  \;the  \;exposure.  \;
\n
\nThe &nbs
p\;adoption  \;of  \;Cyber  \;Exposure  \;will  \;ulti
mately  \;empower  \;organizations to  \;translate  \;raw
 \;security  \;data  \;into  \;a  \;metrics-driven &nb
sp\;program  \;where  \;every  \;business  \;decision &nbs
p\;factors  \;in Cyber  \;Exposure  \;in  \;the  \;sam
e  \;way  \;as  \;other  \;business  \;risks\,  \;
to  \;make  \;more  \;proactive  \;and  \;better decis
ions.
\n
\nSponsored by: Tenable Network Security
\n
\
nExecutive Boardroom \;
\n
\nThe Enterprise Immune System: U
sing Machine Learning for Next-Generation Cyber Defense
\n
\nFro
m insiders to sophisticated external attackers\, the reality of cyber secu
rity today is that the threat is already inside. A fundamentally new appro
ach to cyber defense is needed to detect and investigate these threats tha
t are already inside the network - before they turn into a full-blown cris
is. Based on unsupervised machine learning and probabilistic mathematics d
eveloped by specialists from the University of Cambridge\, new '\;immun
e system'\; technologies are capable of learning the '\;self'\; o
f an organization. By analyzing every network\, device\, and user\, and mo
deling them as they go about their day-to-day activity\, the Enterprise Im
mune System can establish a highly accurate understanding of normal behavi
or. It can therefore spot abnormal activity as it emerges\, and even take
precise\, measured actions to automatically curb the threat. Rules and sig
natures are not keeping pace with today'\;s rapidly evolving cyber atta
cks. The Enterprise Immune System represents a fundamental step-change in
automated cyber defense\, is relied upon by organizations around the world
\, and can cover up to millions of devices. \;
\n
\nTakeaway
s:  \;
\n
\n \; \;  \;-How new machine learning
and mathematics are automating advanced cyber defense \;
\n \
; \;  \;-Why 100% network visibility allows you to detect threats
as they happen\, or before they happen \;
\n \; \;  \
;-How smart prioritization and visualization of threats allows for better
resource allocation and lower risk \;
\n \; \;  \;-Re
al-world examples of unknown threats detected by '\;immune system'\;
technology
\n
\nSponsored by: Darktrace
\n
\n12:05 pm
- 12:30 pm
\nExecutive Exchange \;
\n \;
\nThink T
ank \;
\n
\nIoT and IT/OT
\n
\nToday'\;s world
of IoT brings several challenges. Navigating the complexity of IoT - softw
are\, customer requirements\, support and integration brings new demands.
Keeping the lights on and introducing new capabilities is complex. Navigat
ing the reality of process\, data\, security and functionality can be a po
tential minefield. What does today'\;s IT executive do? Keeping the foc
us to meet both Operational and IT demands and deliver value to the bottom
line is today'\;s reality. \;
\n
\nTakeaways: \;
\n
\n \; \;  \;-What are the key areas of concern and r
isk for IoT adoption. \;
\n \; \;  \;-What can be don
e to mitigate risk and deliver viable and secure solutions. \;
\n
 \; \;  \;-How we are dealing with the rapid marketplace\, new
solutions and demand.
\n
\nThink Tank \;
\n
\nAI
Meets IG
\n
\nAutomating Information Governance For most corpora
tions today\, information security is inextricably intertwined with the le
gal and compliance functions. Threat landscapes grow larger and more compl
ex by the day\; so\, too\, do the legal and regulatory frameworks within w
hich those landscapes lie. Most boards of directors today grasp the strate
gic and operational imperatives associated with information security\, yet
at most organizations\, nearly 80% of IT budgets goes to operational spen
d - paying to maintain technology already purchased and to manage and prot
ect information already created"\;leaving only 20% to drive innovation
and create new value for business. Legal and compliance\, as well\, are e
xpected to do more with less\, including by finding ways to embrace new te
chnologies and new models for procurement of professional services. How ca
n you do that when most of your time\, money\, and effort go just to techn
ologies and new models for procurement of professional services. How can y
ou do that when most of your time\, money\, and effort go just to keeping
the lights on? Join us as we explore this issue and examine some of the su
ccessful strategies that are being leveraged by top IT leaders. \;
\n
\nTakeaways: \;
\n
\n \; \;  \;-The pr
essure on CISOs to drive change has never been higher\, but fortunately ne
ither has the opportunity to do so \;
\n \; \;  \;-Di
sruptive technologies don'\;t just have the power to disrupt informatio
n security for the worse\, they have the power to disrupt the business for
the better \;
\n \; \;  \;-Fortune favors the bold\;
now is the time to take a leap into new modes of business to break the op
erational spend stranglehold
\n
\nPresented by: Richard Kessler\
, Executive Director\, GISO\, UBS
\n
\n \;
\n12:35 pm -
1:20 pm
\nNetworking Luncheon
\n \;
\n1:25 pm - 1:50 p
m
\nExecutive Exchange \;
\n \;
\nThink Tank \;
\n
\nThe Future of the CIO in the Digital Economy
\n
\nAs more businesses undergo a digital transformation\, and as digital tra
nsformations become more ingrained into organizational culture\, Digital b
ecomes not something unique and different from the business\, but a core c
omponent of every aspect of the business. As this shift occurs\, IT itself
faces the very real possibility of no longer being a unique value prop fo
r the business\, but just another facility and overhead. In the new Digita
l world\, what role then exists for the CIO? Two clear paths are presentin
g themselves\; one leads to a focus on infrastructure and integration\, to
keeping the lights on for the digital innovators\, while the other is lea
ding the charge and helping with innovation itself. Knowing what path to c
hoose\, how to choose it\, and how to see it through will be one of the gr
eatest challenges CIOs of this era will face.
\n
\nTakeaways:
\n
\n \; \;  \;-The Digital Godzilla\, Digital Disrupt
ion and Digital Change is here\, or coming for all companies. CIOs that do
n'\;t prepare for this change may not like the results when it arrives<
br />\n \; \;  \;-Digital transformation reshapes core busines
s models and creates new products\, services and experiences. Disrupt or b
e disrupted.
\n
\n
\nThink Tank \;
\n
\nDrivi
ng Digital: Enabling the Data Driven Organization
\n
\nTo what e
xtent is your organization leveraging data and analytics to make both stra
tegic and tactical decisions? Are your analytics near real time and pullin
g data from multiple sources\, or are your analysts producing insights thr
ough a myriad of manually maintained spreadsheets? How are you retooling y
our organizations with self-service BI and data tools and are you leveragi
ng citizen data scientists to close the analytics skills gap? What is the
impact on your IT organization that must support new database architecture
s\, cloud and SaaS infrastructure\, growing data sets\, and increased regu
lation? \;
\n
\nTakeaway:
\n
\n \; \; &nbs
p\;-Isaac Sacolick\, author of Driving Digital: The Leader'\;s Guide to
Business Transformation Through Technology will lead an engaging session
sharing lessons learned from executing digital transformation in three dif
ferent industries.
\n
\n \;
\n1:55 pm - 2:20 pm
\n
Executive Exchange \;
\n \;
\nThought Leadership \;<
br />\n
\nSay Goodbye to Vulnerability Backlogs: Using RASP to Reclai
m Control and Reduce Risk
\n
\nKnowing is half the battle when i
t comes to protecting applications and their sensitive data. \;
\
n
\nApplication security testing tools scan your code to reveal the l
ong lists of known vulnerabilities\, but not all are remediated before the
next release-even with mature secure software development practices. Ente
rprises resort to using theoretical levels of criticality - not actual ris
ks-to prioritize which accumulated vulnerabilities to fix and in what orde
r. Many vulnerabilities often undergo an exception process and make it int
o protocol. \;
\n
\nA real-time\, embedded solution like Pre
voty'\;s runtime application self-protection (RASP0 changes the game co
mpletely. Prevoty places an automated security mechanism at the front of t
he line - directly in the application'\;s operating environment - to im
mediately lower risk and act as a compensating control at runtime. \;<
br />\n
\nAs such\, Prevoty-enabled enterprises see 98%+ of their kno
wn vulnerabilities mitigated instantly\, reducing backlogs and expediting
an otherwise cumbersome release process. Prevoty RASP detects live product
ion attacks and generates real-time security event longs and reports. Secu
rity teams can then correlate pre-production vulnerability scan results wi
th Prevoty'\;s runtime attack logs to go back\, remediate based on actu
al risk - not just hypothetical threats. The result? Improved forensics.\n
\nSponsored by: Prevoty
\n
\n \;
\n2:25 pm
- 2:50 pm
\nExecutive Exchange \;
\n \;
\nThought L
eadership \;
\n
\nA Modern ERP for Digital Value Creation
\n
\nReduce cost\, increase revenue and improve productivity: Thes
e are the three critical business imperatives for leading companies regard
less of their geography or industry. These imperatives have been supported
by ERP systems for more than two decades through business process automat
ion.  \;However\, we now live in a digital world in which companies st
ruggle to run their operations smoothly while adopting emerging technologi
es\, all the while keeping a laser focus on meeting or surpassing their sp
ecific business objectives. \;
\n
\nJoin us to learn about h
ow the next generation of ERP can support modern day digital challenges an
d enable companies to "\;run live"\;. You'\;ll get real-life ex
amples with tangible business outcomes\, explore deployment options\, and
get practical next steps. \;
\n
\n \;
\n2:55 pm - 3
:20 pm
\nExecutive Exchange \;
\n \;
\nThink Tank&n
bsp\;
\n
\nThe Unbearable Lightness of Digital Transformation
\n
\nManaging digital transformation teams means organizing\, moti
vating and empowering technology and business stakeholders to address long
-term needs\, technology trends and uncertainties to execute a strategy th
at provides effective\, secure and adaptable IT capabilities to enable bus
iness innovation and sustainability.
\n
\nDigital Transition is
about the business'\; use of technology.  \;IT transformation is ab
out ensuring that the business has the technology it will need.  \;Tec
hnology organizations have an obligation and opportunity to make IT transi
tion a strategic program. Transition means change in relationships\, roles
\, capabilities and responsibilities\; architecture\, tools and methods.\n
\nIT Transformation is a challenge.  \;It works best where
team members are cognitively ready- mindfully aware\, supporting a common
vision and emotionally\, socially and organizationally intelligent- to wo
rk in and manage change in a cross functional\, interdepartmental\, interd
isciplinary team.
\n
\nTakeaways:
\n
\n \; \;
 \;-Cognitive readiness has the greatest impact on the success of tran
sition teams and should be an area of primary focus for IT Transformation
team leads\, all team members and their management. \;
\n \;&
nbsp\;  \;-Managing expectations- using strategic\, architectural and
project planning\; systems and process thinking\; effective communication\
; a sense of organizational awareness\, and a significant dose of practica
l reality- is a critical success factors to be addressed by transition tea
ms. \;
\n
\n
\nThink Tank \;
\n
\nBest-of
-Breed or Consolidated: Principles in Security Architecture Design
\n
\nWhen it comes to implementing network security infrastructure ther
e are two schools of thought: use best-of-breed point solutions\, or go wi
th all round consolidated platforms. Pros and cons abound for either appro
ach revolving around varying levels of protection\, integration\, and admi
nistrative overhead but the increasing complexity of current security infr
astructure is showing a winning approach. Even though consolidated solutio
ns may offer greater benefits in the long run\, no one exists in a green-f
ield situation when it comes to network and infrastructure security so car
eful planning is required to ensure the necessary protection. \;
\n
\nTakeaways:  \;
\n
\n \; \;  \;-The man
agement burden of best-of-breed outweighs performance benefits \;
\n \; \;  \;-Consolidated platforms can lead to feature overl
ap and unnecessary cost \;
\n \; \;  \;-Planning is r
equired to maximize coverage but minimize effort and spend
\n
\n
Presented by: Nasser Fattah\, Managing Director at Bank of Tokyo-Mitsubish
i UFJ
\n
\n \;
\n
\n3:25 pm - 3:35 pm
\nAfter
noon Networking Coffee Break
\n \;
\n3:40 pm - 4:05 pm
\nExecutive Exchange \;
\n \;
\nInnovation Showcase 
\;
\n
\nAn exclusive opportunity to be exposed to the hottest ne
w solutions providers in a quick-hit format designed to whet the appetite
and spark immediate interest.
\n
\n
\n4:10 pm - 4:50 pm
\nExecutive Visions \;
\n
\nFacilitating Technology-Enable
d Business Transformation
\n
\nThe role of the modern IT Executi
ve is more complex than it has ever been before\, not just because the tec
hnology landscape has become more complex\, but also because increasingly
IT execs have had to become a business-focused executive\, not just a tech
nologist. Long have we talked about the CIO and CISO getting a seat at the
table but modern businesses are now demanding that their technology impre
sario join them and leverage his deep and rich technical acumen to allow t
he organization as a whole to better position itself for market-place succ
ess. To be successful\, CxOs need to invest in themselves\, in their perso
nnel\, and in the right technologies to allow them to position the IT depa
rtment to proactively address business needs as an innovator and driver\,
rather than order-taker and enabler.
\n
\nTakeaways:
\n
\n \; \;  \;-IT leadership can no longer be simply technolog
y focused\, but must instead take their visibility into business process a
nd become business focused
\n \; \;  \;-A broader busines
s-focus does not preclude maintaining technology excellence however and in
deed may demand more of it than ever before
\n \; \;  \;-
Success for CxOs will be measured not in how they can enable enterprise de
cisions\, but in how they can drive growth
\n
\nPanelists:
\n
\nDavid Van Skiver\, Director- Information Risk Management &\;
Security\, Merck
\n
\nKarl Schoen-Rene\, CISO\, Knights of Colum
bus
\n
\n \;
\n4:55 pm - 5:00 pm
\nThank You Addre
ss and Closing Remarks \;
\n \;
\n5:00 pm - 5:25 pm
\nTechnology Innovation: The FreshPour
\n
\nPresented by: Kuv&e
acute\;e
\n5:30 pm - 7:00 pm
\n
\n
\nSummit Happy Hour
\n
\n--------------------------------------------------
\n
\nPast and Present CIO New York Summit Speakers
\nBig Data\, Li
ttle Data. Secure Data\, Lost Data \;
\nEric Chacon View details<
br />\nHead of Data Architecture
\nCitigroup
\n
\n
\nF
acilitating Technology-Enabled Business Transformation \;
\nPaul
Wilner View details
\nCIO
\nPall Corporation
\n
\n
\nThe Future of the CIO in the Digital Economy \;
\nRichard Ent
rup View details
\nGlobal CIO
\nChristie'\;s
\n
\n<
br />\nThe Unbearable Lightness of Digital Transformation \;
\nGe
orge Pitagorsky View details
\nCIO
\nNYC Department of Education
\n
\n
\nIoT and IT/OT \;
\nTimothy Reed \;
\nCIO
\nEMCOR Building Services
\n
\n
\nDriving Dig
ital: Key Practices CIO Should Lead to Enable Transformation \;
\
nIsaac Sacolick View details
\nPresident\, CIO/CDO
\nStar CIO
\n
\n
\nCybersecurity - Information Sharing \;
\nEar
l Newsome
\nCIO
\nPraxair
\n
\n
\nNFV and SDN - B
uilding the Network of the Future \;
\nMony Weschler \;
\nChief Technology Officer\, Chief Strategist and Architect
\nMontefi
ore Medical Center
\n
\n
\nReal-time People and Project Fee
dback - Opening Pandora'\;s Box or a Treasure Chest? \;
\nEliz
abeth King \;
\nCIO
\nWhite Plains Hospital
\n
\n<
br />\nReal-time People and Project Feedback - Opening Pandora'\;s Box
or a Treasure Chest? \;
\nRalph Groce III \;
\nGlobal CI
O
\nEverest Reinsurance Company
\n
\n
\nWhat&rsquo\;s
the Future of QA in a digital world? How do DevOps and QA see QA after the
shift? \;
\nGabriella Szasz
\nExecutive Technology Leader/
Expert in IT GOV\, DEV\, PMO &\; QA
\nWells Fargo
\n
\n<
br />\nReal-time People and Project Feedback - Opening Pandora'\;s Box
or a Treasure Chest? \;
\nMichael Gabriel \;
\nCEO\, Rel
ationship Barometer LLC and former EVP &\; CIO\, HBO
\nRelationshi
p Barometer LLC
\n
\n
\nWhat CIOs Will Need to Lead and Suc
ceed in a Big Data World \;
\nJason Stearns \;
\nDirecto
r\, Legal &\; Compliance- Information Governance
\nBlackRock
\n
\n
\nThe Business of IT- How IT Transforms into a Business Di
fferentiator \;
\nEmmanuel Offiong \;
\nVP &\; Chief
Architect
\nWyndam Hotel Group
\n
\n
\nThe Role of the
CIO: Business Challenger\, Innovation Driver \;
\nArvind Jangi&n
bsp\;
\nEVP - Business Information Officer
\nMastercard
\n<
br />\n
\nLeadership Considerations in a Multi-Generational World&nbs
p\;
\nGabriella Vacca \;
\nVice President\, Systems and Tech
nology
\nComcast
\n
\n
\nWhat CIOs Will Need to Lead a
nd Succeed in a Big Data World \;
\nRichard Kessler \;
\
nGlobal Director\, Cyber Security Services Strategy and Governance
\n
KPMG
\n
\n
\nReducing the Talent Dearth &\; Tech Skills
for 2020 &\; Beyond \;
\nJay VanDerwerken \;
\nSenior
Managing Director
\nNYU Tandon School of Engineering
\n
\n
\nThe Role of the CIO: Business Challenger\, Innovation Driver \
;
\nUrsuline Foley
\nCIO\, Corporate Platform Officer &\; Int
erim Chief Data Officer at XL Group Ltd
\nXL Group
\n
\n
\nThe Role of IT Security and the CIO &ndash\; Together or Separate?&nb
sp\;
\nAndre Bromes \;
\nCIO/CSO
\nGoodwill Industries
of Greater NY and Northern NJ\, Inc.
\n
\n
\nThe Role of th
e CIO: Business Challenger\, Innovation Driver
\nGrace Monahan \;
\nVP &\; Global CIO
\nHenry Schein
\n
\n
\nTh
e Role of the CIO: Business Challenger\, Innovation Driver \;
\nL
arry Bonfante
\nCIO
\nUS Tennis Association
\n
\n
\nEye Opening Technology - How US Bank'\;s visual Big Data Approach to
Technology Management has Them Focused on Customers \;
\nChristo
pher Bowman \;
\nUS Bank
\n
\n
\nMaking Decisions
in a World Awash in Data \;
\nAnthony Scriffignano \;
\n
SVP Chief Data Scientist
\nDun &\; Bradstreet
\n
\n
\nInnovating With the &ldquo\;Lights On&rdquo\; &ndash\; How to Tip the B
alance \;
\nJoe Tait
\nChief Information Officer
\nLyda
ll\, Inc
\n
\n
\nNavigating the Complexities of Developing
a Cloud Computing Business Strategy for Large Enterprises \;
\nAl
ex Fuss \;
\nDirector of Enterprise Architecture
\nAXA US
\n
\n
\nFrom Crisis Response to Crisis Prevention \;
\nAtefeh Riazi \;
\nAssistant Secretary-General Chief Informatio
n Technology Officer
\nUnited Nations
\n
\n
\nSolidify
ing the Role of the CIO \;
\nRobert Lux View details
\nEVP a
nd CIO
\nFreddie Mac
\n
\n
\nCloud Computing - Lessons
Learned \;
\nArthur Riel \;
\nChief Enterprise Architec
t
\nThe World Bank
\n
\n
\nBusiness Transformation &am
p\; System Rationalization \;
\nRadhika Venkatraman \;
\
nSVP &\; CIO - Network &\; Technology
\nVerizon Wireline
\
n
\n
\nA passion for the possible: How a technology culture pays
off \;
\nLarry Quinlan \;
\nGlobal Chief Information Of
ficer
\nDeloitte
\n
\n
\nIs the cloud blurring the lin
es between information technology and digital marketing in the enterprise?
 \;
\nBill Barrett \;
\nGlobal Head of Digital Marketing
\nWillis Towers Watson
\n
\n
\nEnabling IT as a Busin
ess \;
\nPeter Presland-Byrne \;
\nVP\, Chief Architect<
br />\nFreddie Mac
\n
\nJOA180508CEV
\n \;
SUMMARY:CIO New York Summit
BEGIN:VALARM
ACTION:DISPLAY
TRIGGER:-PT1H
SUMMARY:CIO New York Summit
END:VALARM
END:VEVENT
END:VCALENDAR