CIO San Francisco Summit | September 18, 2018 | The Ritz Carlton, San Francisco - San Francisco, CA, USA

↓ Agenda Key

Keynote Presentation

Visionary speaker presents to entire audience on key issues, challenges and business opportunities

Keynote Presentations give attending delegates the opportunity to hear from leading voices in the industry. These presentations feature relevant topics and issues aligned with the speaker's experience and expertise, selected by the speaker in concert with the summit's Content Committee." title="Keynote Presentations give attending delegates the opportunity to hear from leading voices in the industry. These presentations feature relevant topics and issues aligned with the speaker's experience and expertise, selected by the speaker in concert with the summit's Content Committee.

Executive Visions

Panel moderated by Master of Ceremonies and headed by four executives discussing critical business topics

Executive Visions sessions are panel discussions that enable in-depth exchanges on critical business topics. Led by a moderator, these sessions encourage attending executives to address industry challenges and gain insight through interaction with expert panel members." title="Executive Visions sessions are panel discussions that enable in-depth exchanges on critical business topics. Led by a moderator, these sessions encourage attending executives to address industry challenges and gain insight through interaction with expert panel members.

Thought Leadership

Solution provider-led session giving high-level overview of opportunities

Led by an executive from the vendor community, Thought Leadership sessions provide comprehensive overviews of current business concerns, offering strategies and solutions for success. This is a unique opportunity to access the perspective of a leading member of the vendor community." title="Led by an executive from the vendor community, Thought Leadership sessions provide comprehensive overviews of current business concerns, offering strategies and solutions for success. This is a unique opportunity to access the perspective of a leading member of the vendor community.

Think Tank

End user-led session in boardroom style, focusing on best practices

Think Tanks are interactive sessions that place delegates in lively discussion and debate. Sessions admit only 15-20 participants at a time to ensure an intimate environment in which delegates can engage each other and have their voices heard." title="Think Tanks are interactive sessions that place delegates in lively discussion and debate. Sessions admit only 15-20 participants at a time to ensure an intimate environment in which delegates can engage each other and have their voices heard.

Roundtable

Interactive session led by a moderator, focused on industry issue

Led by an industry analyst, expert or a member of the vendor community, Roundtables are open-forum sessions with strategic guidance. Attending delegates gather to collaborate on common issues and challenges within a format that allows them to get things done." title="Led by an industry analyst, expert or a member of the vendor community, Roundtables are open-forum sessions with strategic guidance. Attending delegates gather to collaborate on common issues and challenges within a format that allows them to get things done.

Case Study

Overview of recent project successes and failures

Case Studies allow attending executives to hear compelling stories about implementations and projects, emphasizing best practices and lessons learned. Presentations are immediately followed by Q&A sessions." title="Case Studies allow attending executives to hear compelling stories about implementations and projects, emphasizing best practices and lessons learned. Presentations are immediately followed by Q&A sessions.

Focus Group

Discussion of business drivers within a particular industry area

Focus Groups allow executives to discuss business drivers within particular industry areas. These sessions allow attendees to isolate specific issues and work through them. Presentations last 15-20 minutes and are followed by Q&A sessions." title="Focus Groups allow executives to discuss business drivers within particular industry areas. These sessions allow attendees to isolate specific issues and work through them. Presentations last 15-20 minutes and are followed by Q&A sessions.

Analyst Q&A Session

Moderator-led coverage of the latest industry research

Q&A sessions cover the latest industry research, allowing attendees to gain insight on topics of interest through questions directed to a leading industry analyst." title="Q&A sessions cover the latest industry research, allowing attendees to gain insight on topics of interest through questions directed to a leading industry analyst.

Vendor Showcase

Several brief, pointed overviews of the newest solutions and services

Taking the form of three 10-minute elevator pitches by attending vendors, these sessions provide a concise and pointed overview of the latest solutions and services aligned with attendee needs and preferences." title="Taking the form of three 10-minute elevator pitches by attending vendors, these sessions provide a concise and pointed overview of the latest solutions and services aligned with attendee needs and preferences.

Executive Exchange

Pre-determined, one-on-one interaction revolving around solutions of interest

Executive Exchanges offer one-on-one interaction between executives and vendors. This is an opportunity for both parties to make key business contacts, ask direct questions and get the answers they need. Session content is prearranged and based on mutual interest." title="Executive Exchanges offer one-on-one interaction between executives and vendors. This is an opportunity for both parties to make key business contacts, ask direct questions and get the answers they need. Session content is prearranged and based on mutual interest.

Open Forum Luncheon

Informal discussions on pre-determined topics

Led by a moderator, Open Forum Luncheons offer attendees informal, yet focused discussions on current industry topics and trends over lunch." title="Led by a moderator, Open Forum Luncheons offer attendees informal, yet focused discussions on current industry topics and trends over lunch.

Networking Session

Unique activities at once relaxing, enjoyable and productive

Networking opportunities take various unique forms, merging enjoyable and relaxing activities with an environment conducive to in-depth conversation. These gatherings allow attendees to wind down between sessions and one-on-one meetings, while still furthering discussions and being productive." title="Networking opportunities take various unique forms, merging enjoyable and relaxing activities with an environment conducive to in-depth conversation. These gatherings allow attendees to wind down between sessions and one-on-one meetings, while still furthering discussions and being productive.

 

Tuesday, September 18, 2018 - CIO San Francisco Summit

8:00 am - 8:40 am

Registration and Networking Breakfast

 

8:45 am - 8:55 am

Welcome Address and Opening Remarks

Moderated by:

Paul Valente, CISO, ASAPP View details

 
 
 

9:00 am - 9:30 am

Share:

Keynote Presentation

Your Cloud for Smarter Business - Accelerate Your Digital Transformation with Cloud & AI

How can you accelerate your digital transformation journey? With Cloud! Listen and learn what it means when Cloud is: 

  • Built for all your applications 
  • AI-ready 
  • Secure to the core  

Then, walk away with practical knowledge on how far and fast you can go and grow with an open, flexible cloud architecture. This includes why and how you will want to migrate, modernize and innovate on Cloud using the latest AI technology and data -- and that is from any data source. 

You will not be locked in. Your options are limitless. You will be on a clear path to digital transformation complete with rethinking client value and creating new business models.

Presented by:

Eric Herness, CTO, IBM View details

 
 

IBM View details

 
 
 

9:35 am - 10:00 am

Executive Exchange

 

Share:

Thought Leadership

Top Five Challenges & Mistakes in Breach Detection & Response

Organizations of all sizes are under attack today and one common challenge is how ill-prepared we all tend to be while responding. Join RSA as we talk about lessons learned and how to most effectively combine people, processes, and technologies in the midst of a breach response.

Sponsored by:

RSA View details

 
 

Ben Smith, Principal Sales Engineer + Field CTO (US), RSA View details

 
 
 

10:05 am - 10:30 am

Executive Exchange

 

Share:

Think Tank

Designing a Digital Workplace: Balancing Security with Effectiveness

Employees are consumers of digital technologies such as IoT, AR and VR. The plethora of mobile devices has enabled them to work where they want and when they want which has raised the bar on employee expectations for tools and capabilities from their employers. In order for companies to retain the best and get the most out of their employees, it is vital to design and continually update the digital workplace. We will discuss the current trends as well as share case studies of successful digital workplace implementations including how to deal with the inherent security risks of expanded accessibility to company resources.

Takeaways:

  1. Highly skilled employees will demand a mobile and efficient workplace.  
  2. Keeping these skilled employees fully engaged and passionate about your company is critical to achieving the desired Digital Transformation

Presented by:

Jeff Klaben, CISO, SRI International View details

 
 

Share:

Think Tank

Enterprise ?IT? can no longer justify one-size-fits-all software solutions, as centralized governance and standardization become organizational anachronisms

Global business' has become addicted to and accepted slow and underperforming IT functions, an addiction created by a dependency on commoditization driven by system integrators, ERP vendors, and consultants and the adoption of so called ?best practices?    This  addiction like any other kind,  requires IT organizations  to go through recovery steps that prioritize self-realization, honesty, and a willingness to make future change. 

Presented by:

Alan Boehme, Global Chief Technology Officer, VP of IT Services, and Chief IT Innovation Officer, Proctor & Gamble

 
 

10:30 am - 10:40 am

Morning Networking Coffee Break

 

10:45 am - 11:10 am

Executive Exchange

 

Share:

Thought Leadership

Become a Change Agent for Business Transformation

Today's modern CIO is embarking on a digital transformation journey exploring radical hybrid IT strategies and leveraging new technologies like Cloud, Social, Mobile and Big Data. However, with 'keeping the lights on' legacy IT components costing nearly 90% of a typical IT budget, how can IT make powerful advancements and lead business change? 

Join this interactive session to learn how award-winning CIOs are successfully tipping the balance by liberating people, time and money from costly ongoing maintenance of their ERP systems including SAP and Oracle, to invest in strategic initiatives that create real-world competitive advantage.

Presented by:

Sebastian Grady, President & COO, Rimini Street View details

 
 

Rimini Street View details

 
 
 

11:15 am - 11:40 am

Executive Exchange

 

Share:

Thought Leadership

Making Your Way Through the Fog of Cloud Computing in a Secure Path

Application security testing tools scan your code to reveal the long lists of known vulnerabilities, but not all are remediated before the next release-even with mature secure software development practices. Enterprises resort to using theoretical levels of criticality - not actual risks-to prioritize which accumulated vulnerabilities to fix and in what order. Many vulnerabilities often undergo an exception process and make it into protocol. 

A real-time, embedded solution like Prevoty's runtime application self-protection RASP changes the game completely. Prevoty places an automated security mechanism at the front of the line - directly in the application's operating environment - to immediately lower risk and act as a compensating control at runtime. 

As such, Prevoty-enabled enterprises see 98%+ of their known vulnerabilities mitigated instantly, reducing backlogs and expediting an otherwise cumbersome release process. Prevoty RASP detects live production attacks and generates real-time security event longs and reports. Security teams can then correlate pre production vulnerability scan results with Prevoty's runtime attack logs to go back, remediate based on actual risk - not just hypothetical threats. The result? Improved forensics.

Presented by:

Chris Prevost, Vice President, Solutions, Prevoty, Inc. View details

 
 

Prevoty, Inc. View details

 
 
 

11:45 am - 12:10 pm

Executive Exchange

 

Share:

Think Tank

Shift Up: Security for Your Production Network in the Right Way

This talk is an introduction to shift up paradigm. Think of it as an extension of shift left, but a culture that only strives in production. Shift up enables an organization to identify remediate, insecure code and address any security gaps within infrastructural stack in a seal-healing and iterative manner. To achieve this end state, an organization needs to perform defensive dynamic security testing and test configuration as well as system failures against A/B units. These exercises helps validate effectiveness of production's layered protection, which is responsible to protect application code and most importantly customer's data. 

Last, but not least, building capabilities to identify external-facing assets in continuous manner and monitor it through out its existence. Enabling an organization with a feedback loop between AST tools (SAST, DAST, IAST, MAST) and layered defenses in production. Further arming them with a protective shield against ever-evolving attacks and ultimately gaining IT utopia!

Presented by:

Swapnil Deshmukh, Senior Director, Visa

 

Think Tank

Insights Into the Digital Transformation Journey

As technologists, it is easy to overlook that digital transformation transcends the technology. To be successful, an organization needs to embrace a culture of digital transformation, defining the who, what, how, and why.  Learn more about how CalPERS is navigating such considerations in their digital transformation pursuit.   

Presented by:

Timothy Taylor, Chief Technology Innovation Officer, CalPERS View details

 
 
 

12:15 pm - 12:40 pm

Executive Exchange

 

Share:

Executive Boardroom

Year of the Defender - Cybersecurity Predictions for 2018

Cybersecurity dominated the news cycle in 2017. There were headlines about viral ransomware, global destructive wipers posing as ransomware, leaks of spy tools from U.S. intelligence agencies, and breaches at major companies. 

What does 2018 hold in store for the defenders? Come discuss the largest security trends Cybereason researchers have identified for 2018.

Presented by:

Tim Amey, Solution Engineering, Cybereason View details

 
 

Cybereason View details

 
 
 

12:45 pm - 1:55 pm

Share:

Working Lunch and Panel

CIOs/CISOs as the Consummate Communicator

It is also changing the role of the CIO and CISO to be a business leader and internal sales leader for transformation. CIOs are now responsible for communicating strategies and recommendations to CxOs, boards and key stakeholders within a company. Join us, during lunch, for a passionate panel discussion with your peers as they share how they are successfully communicating internally to accomplish the company's goals.

Takeaways:

  1. CIOs must be great communicators, not only with their teams, but the rest of the organization
  2. CIOs must learn the best ways to communicate clarity and urgency with Boards and CXOs

Moderated by:

Paul Valente, CISO, ASAPP View details

 
 

Panelists:

Asif Alam, Senior Vice President & Senior Site Officer, Thomson Reuters View details

 
 

Steven Zalewski, Chief Security Architect, Levi Strauss & Co. View details

 
 

Ali Bouhouch, Chief Technology Officer, Sephora View details

 
 

Nancy Selph, SVP, Advanced Technology and Partnerships, Wells Fargo View details

 
 

Presented by:

Alan Boehme, Global Chief Technology Officer, VP of IT Services, and Chief IT Innovation Officer, Proctor & Gamble

 
 

2:00 pm - 2:25 pm

Executive Exchange

 

Share:

Executive Boardroom

Cyber Risk at the C-Level: Escaping the Trap Between Cyber-Attacks & Regulatory Investigations

Cybercriminals netted massive returns from ransomware and other crippling cyber-attacks in 2017. Over and above the cost of the initial breach, victim organizations were left to deal with regulatory investigations, punitive penalties and Corrective Action Plans (CAPs) enforced by the ever-evolving regulatory landscape.

In a world ruled by online business interactions, Board and C-level executives must consider cyber risk as a core tenant of their fiduciary responsibilities, as well as their mission to drive long-term sustainability for their organizations. In this talk, we will explore cyber-attack trends and share best practices and preventative measures to help you reduce risk and avoid regulatory investigations. We will also detail recent examples of regulatory enforcement post-breach. 

During this session, you'll learn:

  • The importance of incorporating cybersecurity into your business strategy 
  • Current regulatory bodies and requirements 
  • Real-life examples of Corrective Action Plans (CAPs) 
  • Trends, best practices and proactive measures to help you mitigate risk and avoid regulatory investigations

Sponsored by:

eSentire View details

 
 

Mark Sangster, Vice President, Strategic Marketing, eSentire View details

 
 
 

2:30 pm - 2:55 pm

Executive Exchange

 

Share:

Think Tank

Big Data, Little Data. Secure Data, Lost Data.

If digital transformation is a journey, then data is the fuel that will transport your company from here to there. What data do you have access to? How can you make sense out of the data and thus make decisions from it? How does a company use data to be a disruptor and not a victim? And how do you secure that data to ensure that the digital transformation journey does not end prematurely? 

Takeaways: 

  1. Digital transformation without constant access to usable and reliable data will be a slow and arduous journey.  
  2. Digital transformation exposes increasing amounts of data potentially vulnerable to cyber attacks and must be addressed.

Presented by:

Phil Mui, SVP of Technology, Salesforce

 

Share:

Think Tank

Architecting Secure Systems - A Design-Led Life Cycle approach

Executives are currently facing a difficult challenge in terms of designing and maintaining robust and secure systems. The challenges come not just from technology but from people and process. Designing for secure systems means binding different generational thinking into a single consistent approach. These differences if not managed holistically lead to lack of understanding and conflict in a lot of cases, conflict that leaders must learn how to overcome. This is achieved by instilling a more rigorous process oriented approach to design. 

Takeaways: 

  • Designing for Secure Systems involves tight coupling of people that are from different generations and have had different life experiences which has given them different outlooks 
  • Each group has specific and unique strengths that can and should be brought to bear to improve the enterprise 
  • Establishing a variety of frameworks (technical and managerial) enable groups to bind together into a cohesive unit

Presented by:

Steven Zalewski, Chief Security Architect, Levi Strauss & Co. View details

 
 
 

3:00 pm - 3:25 pm

Executive Exchange

 

Share:

Executive Boardroom

The Human Firewall is on fire - what do you do when the smoke clears?

Many enterprises are focused on prevention and are too busy with day-to-day firefights to look beyond the flames and think about how to recover. Beyond preventing attacks, organizations need to focus on detection and response. It is no longer a matter of if you are going to be attacked, but when. Join this session to:

  • Learn the cutting edge tactics of these digital thieves  
  • Identify and combat these attacks 
  • Learn how to recover, should an attack break through your defenses

Sponsored by:

Mimecast View details

 
 

Wayne Tynes, Sales Engineer, Mimecast View details

 
 
 

3:25 pm - 3:35 pm

Afternoon Networking Coffee Break

 

3:40 pm - 4:05 pm

Executive Exchange

 

Share:

Think Tank

Disrupt or Be Disrupted: The Digital Transformation Journey Has No Parking Lots

The seemingly ever expanding cadre of technological tools available to incumbent industry leaders are also available to myriad start-ups.  Start-ups are using these new technologies to disrupt industries of all types, changing how customers think about tried and true industries.  Disruption is found on every corner and it is critical for CIOs to lead their organizations in a way that make them as nimble as their competitors.

Takeaways:

  1. Technology enables companies, especially start-ups with no legacy infrastructure, to disrupt industries overnight
  2. CIOs need to lead their companies in ways that disrupt before they are disrupted by others

Presented by:

Shouvik Ray, Senior Vice President, Technology, Bank of the West View details

 
 

Share:

Think Tank

Navigating Security and Risk In a Changing IT Landscape

Agile, DevOps, containers, microservices, the cloud are all seeing increased adoption across the enterprise. But, while there are valid business reasons to embrace these new models, there is potential risk in implementation. Is this change necessary? If so, how can this change be accommodated effectively, safely? This session will cover some common elements of the risk of change - and of not changing - and suggest approaches to minimize risk as you adopt these new technologies.

Presented by:

Lakshmi Hanspal, Chief Security Officer, SAP Ariba View details

 
 
 

4:10 pm - 4:35 pm

Executive Exchange

 

Share:

Innovation Partners Showcase

Extending Network Security Visibility into the Cloud

Enterprises are taking advantage of the economies of scale of cloud computing and migrating applications to public and private clouds. The new technology offers many advantages, but also requires taking a step back and evaluating whether existing network security tools and processes are relevant and effective in these new environments. To maintain their security posture, network security professionals need unified visibility and control as deployments spread to and across clouds. This is critical both to ensure that cloud payloads are protected against the growing number of attacks and breaches and also to satisfy regulatory compliance requirements such as PCI, HIPAA and NERC. 

In this session, Anner Kushnir, VP of Technology at AlgoSec, will share insights on the latest cloud security technologies and best practices for maintaining full-blown corporate security governance as enterprises deploy their applications in the cloud.

Sponsored by:

Algosec View details

 
 

Anner Kushnir, VP Technology, Algosec View details

 
 

Share:

Innovation Partners Showcase

A brief, but compelling review of three new innovative technologies supporting digital transformation.

Sponsored by:

NetMotion Wireless View details

 
 

Jay Klauser, Senior Manager, Pre-Sales Engineering (North America), NetMotion Wireless View details

 
 
 

4:40 pm - 5:00 pm

What's the Next Stop On the Transformation Journey?

Our Master of Ceremonies will summarize the learnings from the day and discuss the path forward for building an ongoing community of IT and security executives where common issues can be addressed and success stories can be shared.

Takeaways:

  1. Building an ongoing community with your peers can be an invaluable resource for tackling the Digital Transformation projects ahead of you
  2. Sharing stories of success (and failures) is not reserved to a one day CIO Summit but should be shared on a regular basis with your peers

Moderated by:

Paul Valente, CISO, ASAPP View details

 
 
 

5:00 pm - 6:00 pm

Summit Happy Hour