New York Professional Events List

CIO New York Summit

Sep 14, 2021 - 07:00 AM
CDM Media
1, Main St

New York,
ZIP: 10001

CIO New York Summit

About CDM Media Summits

CDM Media Summits bring together leading C-level executives, analysts and solution providers to network and attend interactive agenda sessions on the latest business topics and trends.

The events are organized by industry, topic or organizational role, and offer an opportunity for attendees to have in-depth discussions, while making new business contacts. One-on-one meetings held throughout the events allow vendors to introduce products and services to attending executives.

Other summit highlights include:

    -Agenda topics chosen by each event's Content Committee
    -Interactive agenda sessions that create opportunities for discussion and debate
    -Analyst-led sessions that outline the latest industry research
    -Exclusive environment with 50 C-level executives in average attendance
    -For more information about CDM Media's upcoming summits, visit our Summit Calendar.

Thursday, September 13, 2020 - CIO New York Summit

7:00 am - 7:55 am
Registration and Networking Breakfast

8:00 am - 8:10 am
Welcome Address and Opening Remarks 

8:10 am - 8:40 am
Keynote Presentation 

Malware Management - Past, Present and Future

Malware dates back to the earliest days of connected computing. To date, our approach to dealing with malware has remained relatively static. Currently we rely on being able to determine patterns within unpacked, decrypted files. This provides a single pattern-based signature to defend against a wide range of malware attacks, but is insufficient due to several management aspects. Artificial intelligence is the next step, but how can we leverage it to meet malware management needs? 

In this session you will learn: 

    -The history of AI 
    -How a deep learning system functions  
    -How this type of system is being used to combat the ever-increasing onslaught of malware

Sponsored by: Fortinet

8:45 am - 9:15 am
Keynote Presentation 

Analytics & Cloud Together: Accelerating Innovation in the New Cognitive Era

Leading companies are disrupting the status quo by using data to inform business strategy and create new business models that fuel growth. CIOs have the power to uncover the insight that drives disruption and speeds transformation. Learn how leading IT organizations are maximizing the use of open source and cloud technologies alongside on-premises investments to accelerate innovation. And understand how CIOs are embracing new cloud-enabled consumption models while helping ensure data privacy, security and sovereignty.  


    -Integrating analytics into key applications and systems can enable people throughout an organization to access and act on            insights when and where it matters most. 
    -Take advantage of more sources to enable better decisions. IT must create an environment with easy access to all types of           data - structured and unstructured - from internal sources and those outside the organization. 
    -Data science teams are answering the toughest questions by leveraging open source development platforms and tools to             build models more quickly and easily.
9:20 am - 9:45 am
Executive Exchange 
Thought Leadership 

Secure, Simplify and Transform to a Cloud-Enabled Enterprise

Progressive companies are leveraging cloud, a powerful business enabler, to transform their business and make it more competitive. But cloud and mobility significantly impacts the current IT infrastructure - security, network traffic flow, applications, user experience and cost. As CIOs and CISOs embrace this transformation, they look for opportunities to exchange ideas with their peers who have gone through this journey.  

In this session, Zscaler will share experiences of leading the massive network, security and datacenter application transformation that he managed across all business units of GE. Example topics will include: 

    -How to transform your hub & spoke network into a cloud-enabled network 
    -How to transform datacenter applications to a SaaS, AWS and Azure environment 
    -New security paradigm for the new world of cloud 
    -Changing role of IT execs 
    -Lessons learned
9:50 am - 10:15 am
Executive Exchange 
Thought Leadership 

Know Which Risks Are Worth Taking: Scalable Risk Management

In the constantly changing landscape of cyber risk, executives and board members are increasingly forced to take ownership of and accountability relating to digital risks. Yet, many lack the critical knowledge to make effective risk management decisions and incorporate them into their overall business strategy. This inevitably leads to security strategies which are ineffective and reactionary. This presentation will outline RSA's Business Driven Security strategy and focus on the intersection of risk management and IT & security initiatives.

Sponsored by: RSA

10:20 am - 10:30 am
Morning Networking Coffee Break
10:35 am - 11:00 am
Executive Exchange 
Think Tank 

Evolving From Legacy To Achieve Digital Transformation

For most IT organizations, the way to get there is through a digital transformation framework, which produces a radically different and modern approach to technology and support that is based on a principle of business agility. It emphasizes moving quickly to adjust to the way the customer in the global techno-society wants to interact. 

Digital transformation requires a new business operating vision and a strategy on how to deliver that vision. includes technology infrastructure, tools, applications, communications, staff capabilities, staff competencies and more. The CIO has to work closely with corporate planning to define the type of support that will be needed and how the technology infrastructure and capability will evolve and to create a flexible investment plan that can be adjusted over time. Key elements must include the redesign of the technology infrastructure to reduce complexity and cost while increasing scalability, a rethinking of how business and IT work together, and an ability to quickly adopt and integrate new advanced technologies. 

Until recently, this goal has been almost impossible to achieve, because few companies have the ability to replace legacy infrastructure and applications. And it has been almost impossible to unlock legacy functionality and data for use with modern technology.

The Blockchain & Enhanced security 

Big Data Analytics and the Impact on Fraud

There is a definite need to rethink the future of identity management on the web. The ability to verify your identity is the lynchpin of financial transactions that happen online. In today's digital age, an individual's identity is not defined by a single attribute such as a name, address or user ID. Rather, it is a collection of attributes including, but not limited to, name, age, financial history, work history, address history and social history. However, remedies for the security risks that come with web commerce are imperfect at best. IF Blockchain is the answer? how are you going to take it from being seen by senior management, as a futuristic solution to the way your organization may survive competition in the next five years. 


  -Growth of trusted Blockchain providers is growing exponentially 
  -It's not just the financial industry this will affect -Retail, Health Care....are going to be in for the pound as well as in for the          bitcoin. 
    -Uses for Blockchain from ecommerce to supply chain management 

Presented by: Karl Schoen-Rene, CISO, Knights of Columbus

11:05 am - 11:30 am
Executive Exchange 
Thought Leadership 

Boat Anchor to Business Enabler: A Metric-Driven Journey to DevOps Transformation

Meet Sarah. Sarah leads a 3000-person IT shop servicing a large financial institution that is deeply concerned about operational performance and market disruption. She has two years to reduce costs, accelerate innovation, and improve IT productivity -- but where to start and how to get there? In this session we will illustrate a metric-driven approach to transforming IT based on DevOps. Specifically, we will look at performance metrics that intersect with DevOps practices and principles like continuous delivery (CD), test driven development (TDD), lean, and software engineering. Integrating these concepts, we will share a scalable model for this transformation and real results from successful pilots.

11:35 am - 12:00 pm
Executive Exchange 
Executive Boardroom 

Cyber Exposure: The Next Frontier for Security

Cyber  Exposure is an emerging discipline for managing  and  measuring  the modern  attack  surface  to  accurately  understand  and  reduce  cyber  risk.  Built  on  the  roots  of Vulnerability  Management  designed  for  traditional  IT,  Cyber  Exposure  transforms  cybersecurity  from identifying  bugs  and misconfigurations  and  expands  it  to  live  discovery  into  every  asset  in  any environment.  Cyber  Exposure  also  delivers  continuous  visibility  into  where  assets  are  secure  versus exposed,  and  to  what  extent,  and  prioritizes  remediation  based  on  the  asset's  business  criticality and the  severity  of  the  exposure.  

The  adoption  of  Cyber  Exposure  will  ultimately  empower  organizations to  translate  raw  security  data  into  a  metrics-driven  program  where  every  business  decision  factors  in Cyber  Exposure  in  the  same  way  as  other  business  risks,  to  make  more  proactive  and  better decisions.

Sponsored by: Tenable Network Security

Executive Boardroom 

The Enterprise Immune System: Using Machine Learning for Next-Generation Cyber Defense

From insiders to sophisticated external attackers, the reality of cyber security today is that the threat is already inside. A fundamentally new approach to cyber defense is needed to detect and investigate these threats that are already inside the network - before they turn into a full-blown crisis. Based on unsupervised machine learning and probabilistic mathematics developed by specialists from the University of Cambridge, new 'immune system' technologies are capable of learning the 'self' of an organization. By analyzing every network, device, and user, and modeling them as they go about their day-to-day activity, the Enterprise Immune System can establish a highly accurate understanding of normal behavior. It can therefore spot abnormal activity as it emerges, and even take precise, measured actions to automatically curb the threat. Rules and signatures are not keeping pace with today's rapidly evolving cyber attacks. The Enterprise Immune System represents a fundamental step-change in automated cyber defense, is relied upon by organizations around the world, and can cover up to millions of devices. 


    -How new machine learning and mathematics are automating advanced cyber defense 
    -Why 100% network visibility allows you to detect threats as they happen, or before they happen 
    -How smart prioritization and visualization of threats allows for better resource allocation and lower risk 
    -Real-world examples of unknown threats detected by 'immune system' technology

Sponsored by: Darktrace

12:05 pm - 12:30 pm
Executive Exchange 
Think Tank 

IoT and IT/OT

Today's world of IoT brings several challenges. Navigating the complexity of IoT - software, customer requirements, support and integration brings new demands. Keeping the lights on and introducing new capabilities is complex. Navigating the reality of process, data, security and functionality can be a potential minefield. What does today's IT executive do? Keeping the focus to meet both Operational and IT demands and deliver value to the bottom line is today's reality. 


    -What are the key areas of concern and risk for IoT adoption. 
    -What can be done to mitigate risk and deliver viable and secure solutions. 
    -How we are dealing with the rapid marketplace, new solutions and demand.

Think Tank 

AI Meets IG

Automating Information Governance For most corporations today, information security is inextricably intertwined with the legal and compliance functions. Threat landscapes grow larger and more complex by the day; so, too, do the legal and regulatory frameworks within which those landscapes lie. Most boards of directors today grasp the strategic and operational imperatives associated with information security, yet at most organizations, nearly 80% of IT budgets goes to operational spend - paying to maintain technology already purchased and to manage and protect information already created"leaving only 20% to drive innovation and create new value for business. Legal and compliance, as well, are expected to do more with less, including by finding ways to embrace new technologies and new models for procurement of professional services. How can you do that when most of your time, money, and effort go just to technologies and new models for procurement of professional services. How can you do that when most of your time, money, and effort go just to keeping the lights on? Join us as we explore this issue and examine some of the successful strategies that are being leveraged by top IT leaders. 


    -The pressure on CISOs to drive change has never been higher, but fortunately neither has the opportunity to do so 
    -Disruptive technologies don't just have the power to disrupt information security for the worse, they have the power to disrupt the business for the better 
    -Fortune favors the bold; now is the time to take a leap into new modes of business to break the operational spend stranglehold

Presented by: Richard Kessler, Executive Director, GISO, UBS

12:35 pm - 1:20 pm
Networking Luncheon
1:25 pm - 1:50 pm
Executive Exchange 
Think Tank 

The Future of the CIO in the Digital Economy

As more businesses undergo a digital transformation, and as digital transformations become more ingrained into organizational culture, Digital becomes not something unique and different from the business, but a core component of every aspect of the business. As this shift occurs, IT itself faces the very real possibility of no longer being a unique value prop for the business, but just another facility and overhead. In the new Digital world, what role then exists for the CIO? Two clear paths are presenting themselves; one leads to a focus on infrastructure and integration, to keeping the lights on for the digital innovators, while the other is leading the charge and helping with innovation itself. Knowing what path to choose, how to choose it, and how to see it through will be one of the greatest challenges CIOs of this era will face.


    -The Digital Godzilla, Digital Disruption and Digital Change is here, or coming for all companies. CIOs that don't prepare for this change may not like the results when it arrives
    -Digital transformation reshapes core business models and creates new products, services and experiences. Disrupt or be disrupted.

Think Tank 

Driving Digital: Enabling the Data Driven Organization

To what extent is your organization leveraging data and analytics to make both strategic and tactical decisions? Are your analytics near real time and pulling data from multiple sources, or are your analysts producing insights through a myriad of manually maintained spreadsheets? How are you retooling your organizations with self-service BI and data tools and are you leveraging citizen data scientists to close the analytics skills gap? What is the impact on your IT organization that must support new database architectures, cloud and SaaS infrastructure, growing data sets, and increased regulation? 


    -Isaac Sacolick, author of Driving Digital: The Leader's Guide to Business Transformation Through Technology will lead an engaging session sharing lessons learned from executing digital transformation in three different industries.

1:55 pm - 2:20 pm
Executive Exchange 
Thought Leadership 

Say Goodbye to Vulnerability Backlogs: Using RASP to Reclaim Control and Reduce Risk

Knowing is half the battle when it comes to protecting applications and their sensitive data. 

Application security testing tools scan your code to reveal the long lists of known vulnerabilities, but not all are remediated before the next release-even with mature secure software development practices. Enterprises resort to using theoretical levels of criticality - not actual risks-to prioritize which accumulated vulnerabilities to fix and in what order. Many vulnerabilities often undergo an exception process and make it into protocol. 

A real-time, embedded solution like Prevoty's runtime application self-protection (RASP0 changes the game completely. Prevoty places an automated security mechanism at the front of the line - directly in the application's operating environment - to immediately lower risk and act as a compensating control at runtime. 

As such, Prevoty-enabled enterprises see 98%+ of their known vulnerabilities mitigated instantly, reducing backlogs and expediting an otherwise cumbersome release process. Prevoty RASP detects live production attacks and generates real-time security event longs and reports. Security teams can then correlate pre-production vulnerability scan results with Prevoty's runtime attack logs to go back, remediate based on actual risk - not just hypothetical threats. The result? Improved forensics.

Sponsored by: Prevoty

2:25 pm - 2:50 pm
Executive Exchange 
Thought Leadership 

A Modern ERP for Digital Value Creation

Reduce cost, increase revenue and improve productivity: These are the three critical business imperatives for leading companies regardless of their geography or industry. These imperatives have been supported by ERP systems for more than two decades through business process automation.  However, we now live in a digital world in which companies struggle to run their operations smoothly while adopting emerging technologies, all the while keeping a laser focus on meeting or surpassing their specific business objectives. 

Join us to learn about how the next generation of ERP can support modern day digital challenges and enable companies to "run live". You'll get real-life examples with tangible business outcomes, explore deployment options, and get practical next steps. 

2:55 pm - 3:20 pm
Executive Exchange 
Think Tank 

The Unbearable Lightness of Digital Transformation

Managing digital transformation teams means organizing, motivating and empowering technology and business stakeholders to address long-term needs, technology trends and uncertainties to execute a strategy that provides effective, secure and adaptable IT capabilities to enable business innovation and sustainability.

Digital Transition is about the business' use of technology.  IT transformation is about ensuring that the business has the technology it will need.  Technology organizations have an obligation and opportunity to make IT transition a strategic program. Transition means change in relationships, roles, capabilities and responsibilities; architecture, tools and methods.

IT Transformation is a challenge.  It works best where team members are cognitively ready- mindfully aware, supporting a common vision and emotionally, socially and organizationally intelligent- to work in and manage change in a cross functional, interdepartmental, interdisciplinary team.


    -Cognitive readiness has the greatest impact on the success of transition teams and should be an area of primary focus for IT Transformation team leads, all team members and their management. 
    -Managing expectations- using strategic, architectural and project planning; systems and process thinking; effective communication; a sense of organizational awareness, and a significant dose of practical reality- is a critical success factors to be addressed by transition teams. 

Think Tank 

Best-of-Breed or Consolidated: Principles in Security Architecture Design

When it comes to implementing network security infrastructure there are two schools of thought: use best-of-breed point solutions, or go with all round consolidated platforms. Pros and cons abound for either approach revolving around varying levels of protection, integration, and administrative overhead but the increasing complexity of current security infrastructure is showing a winning approach. Even though consolidated solutions may offer greater benefits in the long run, no one exists in a green-field situation when it comes to network and infrastructure security so careful planning is required to ensure the necessary protection. 


    -The management burden of best-of-breed outweighs performance benefits 
    -Consolidated platforms can lead to feature overlap and unnecessary cost 
    -Planning is required to maximize coverage but minimize effort and spend

Presented by: Nasser Fattah, Managing Director at Bank of Tokyo-Mitsubishi UFJ


3:25 pm - 3:35 pm
Afternoon Networking Coffee Break
3:40 pm - 4:05 pm
Executive Exchange 
Innovation Showcase 

An exclusive opportunity to be exposed to the hottest new solutions providers in a quick-hit format designed to whet the appetite and spark immediate interest.

4:10 pm - 4:50 pm
Executive Visions 

Facilitating Technology-Enabled Business Transformation

The role of the modern IT Executive is more complex than it has ever been before, not just because the technology landscape has become more complex, but also because increasingly IT execs have had to become a business-focused executive, not just a technologist. Long have we talked about the CIO and CISO getting a seat at the table but modern businesses are now demanding that their technology impresario join them and leverage his deep and rich technical acumen to allow the organization as a whole to better position itself for market-place success. To be successful, CxOs need to invest in themselves, in their personnel, and in the right technologies to allow them to position the IT department to proactively address business needs as an innovator and driver, rather than order-taker and enabler.


    -IT leadership can no longer be simply technology focused, but must instead take their visibility into business process and become business focused
    -A broader business-focus does not preclude maintaining technology excellence however and indeed may demand more of it than ever before
    -Success for CxOs will be measured not in how they can enable enterprise decisions, but in how they can drive growth


David Van Skiver, Director- Information Risk Management & Security, Merck

Karl Schoen-Rene, CISO, Knights of Columbus

4:55 pm - 5:00 pm
Thank You Address and Closing Remarks 
5:00 pm - 5:25 pm
Technology Innovation: The FreshPour

Presented by: Kuvée
5:30 pm - 7:00 pm

Summit Happy Hour


Past and Present CIO New York Summit Speakers
Big Data, Little Data. Secure Data, Lost Data 
Eric Chacon View details
Head of Data Architecture

Facilitating Technology-Enabled Business Transformation 
Paul Wilner View details
Pall Corporation

The Future of the CIO in the Digital Economy 
Richard Entrup View details
Global CIO

The Unbearable Lightness of Digital Transformation 
George Pitagorsky View details
NYC Department of Education

IoT and IT/OT 
Timothy Reed 
EMCOR Building Services

Driving Digital: Key Practices CIO Should Lead to Enable Transformation 
Isaac Sacolick View details
President, CIO/CDO
Star CIO

Cybersecurity - Information Sharing 
Earl Newsome

NFV and SDN - Building the Network of the Future 
Mony Weschler 
Chief Technology Officer, Chief Strategist and Architect
Montefiore Medical Center

Real-time People and Project Feedback - Opening Pandora's Box or a Treasure Chest? 
Elizabeth King 
White Plains Hospital

Real-time People and Project Feedback - Opening Pandora's Box or a Treasure Chest? 
Ralph Groce III 
Global CIO
Everest Reinsurance Company

What’s the Future of QA in a digital world? How do DevOps and QA see QA after the shift? 
Gabriella Szasz
Executive Technology Leader/ Expert in IT GOV, DEV, PMO & QA
Wells Fargo

Real-time People and Project Feedback - Opening Pandora's Box or a Treasure Chest? 
Michael Gabriel 
CEO, Relationship Barometer LLC and former EVP & CIO, HBO
Relationship Barometer LLC

What CIOs Will Need to Lead and Succeed in a Big Data World 
Jason Stearns 
Director, Legal & Compliance- Information Governance

The Business of IT- How IT Transforms into a Business Differentiator 
Emmanuel Offiong 
VP & Chief Architect
Wyndam Hotel Group

The Role of the CIO: Business Challenger, Innovation Driver 
Arvind Jangi 
EVP - Business Information Officer

Leadership Considerations in a Multi-Generational World 
Gabriella Vacca 
Vice President, Systems and Technology

What CIOs Will Need to Lead and Succeed in a Big Data World 
Richard Kessler 
Global Director, Cyber Security Services Strategy and Governance

Reducing the Talent Dearth & Tech Skills for 2020 & Beyond 
Jay VanDerwerken 
Senior Managing Director
NYU Tandon School of Engineering

The Role of the CIO: Business Challenger, Innovation Driver 
Ursuline Foley
CIO, Corporate Platform Officer & Interim Chief Data Officer at XL Group Ltd
XL Group

The Role of IT Security and the CIO – Together or Separate? 
Andre Bromes 
Goodwill Industries of Greater NY and Northern NJ, Inc.

The Role of the CIO: Business Challenger, Innovation Driver
Grace Monahan 
VP & Global CIO
Henry Schein

The Role of the CIO: Business Challenger, Innovation Driver 
Larry Bonfante
US Tennis Association

Eye Opening Technology - How US Bank's visual Big Data Approach to Technology Management has Them Focused on Customers 
Christopher Bowman 
US Bank

Making Decisions in a World Awash in Data 
Anthony Scriffignano 
SVP Chief Data Scientist
Dun & Bradstreet

Innovating With the “Lights On” – How to Tip the Balance 
Joe Tait
Chief Information Officer
Lydall, Inc

Navigating the Complexities of Developing a Cloud Computing Business Strategy for Large Enterprises 
Alex Fuss 
Director of Enterprise Architecture

From Crisis Response to Crisis Prevention 
Atefeh Riazi 
Assistant Secretary-General Chief Information Technology Officer
United Nations

Solidifying the Role of the CIO 
Robert Lux View details
Freddie Mac

Cloud Computing - Lessons Learned 
Arthur Riel 
Chief Enterprise Architect
The World Bank

Business Transformation & System Rationalization 
Radhika Venkatraman 
SVP & CIO - Network & Technology
Verizon Wireline

A passion for the possible: How a technology culture pays off 
Larry Quinlan 
Global Chief Information Officer

Is the cloud blurring the lines between information technology and digital marketing in the enterprise? 
Bill Barrett 
Global Head of Digital Marketing
Willis Towers Watson

Enabling IT as a Business 
Peter Presland-Byrne 
VP, Chief Architect
Freddie Mac


Event Categories


Events Calendar

29 30 31 1 2 3 4
5 6 7 8 9 10 11
12 13 14 15 16 17 18
19 20 21 22 23 24 25
26 27 28 29 30 1 2


VIP Life Time Subscription to our Newsletters!

Forbes Women's Summit 2018
Disrupt SF 2018 - Brought to you by Techcrunch
U.S. Naval Institute Annual Meeting 2018
Breast Cancer Research Foundation
Children’s Health Fund
The World Energy Engineering Congress (WEEC)
                            Oct. 17-19, 2018
                            Charlotte, NC