CIO Boston Summit | September 19, 2019 | Courtyard by Marriott Boston Downtown - Boston, MA, USA

↓ Agenda Key

Keynote Presentation

Visionary speaker presents to entire audience on key issues, challenges and business opportunities

Keynote Presentations give attending delegates the opportunity to hear from leading voices in the industry. These presentations feature relevant topics and issues aligned with the speaker's experience and expertise, selected by the speaker in concert with the summit's Content Committee." title="Keynote Presentations give attending delegates the opportunity to hear from leading voices in the industry. These presentations feature relevant topics and issues aligned with the speaker's experience and expertise, selected by the speaker in concert with the summit's Content Committee.

Executive Visions

Panel moderated by Master of Ceremonies and headed by four executives discussing critical business topics

Executive Visions sessions are panel discussions that enable in-depth exchanges on critical business topics. Led by a moderator, these sessions encourage attending executives to address industry challenges and gain insight through interaction with expert panel members." title="Executive Visions sessions are panel discussions that enable in-depth exchanges on critical business topics. Led by a moderator, these sessions encourage attending executives to address industry challenges and gain insight through interaction with expert panel members.

Thought Leadership

Solution provider-led session giving high-level overview of opportunities

Led by an executive from the vendor community, Thought Leadership sessions provide comprehensive overviews of current business concerns, offering strategies and solutions for success. This is a unique opportunity to access the perspective of a leading member of the vendor community." title="Led by an executive from the vendor community, Thought Leadership sessions provide comprehensive overviews of current business concerns, offering strategies and solutions for success. This is a unique opportunity to access the perspective of a leading member of the vendor community.

Think Tank

End user-led session in boardroom style, focusing on best practices

Think Tanks are interactive sessions that place delegates in lively discussion and debate. Sessions admit only 15-20 participants at a time to ensure an intimate environment in which delegates can engage each other and have their voices heard." title="Think Tanks are interactive sessions that place delegates in lively discussion and debate. Sessions admit only 15-20 participants at a time to ensure an intimate environment in which delegates can engage each other and have their voices heard.

Roundtable

Interactive session led by a moderator, focused on industry issue

Led by an industry analyst, expert or a member of the vendor community, Roundtables are open-forum sessions with strategic guidance. Attending delegates gather to collaborate on common issues and challenges within a format that allows them to get things done." title="Led by an industry analyst, expert or a member of the vendor community, Roundtables are open-forum sessions with strategic guidance. Attending delegates gather to collaborate on common issues and challenges within a format that allows them to get things done.

Case Study

Overview of recent project successes and failures

Case Studies allow attending executives to hear compelling stories about implementations and projects, emphasizing best practices and lessons learned. Presentations are immediately followed by Q&A sessions." title="Case Studies allow attending executives to hear compelling stories about implementations and projects, emphasizing best practices and lessons learned. Presentations are immediately followed by Q&A sessions.

Focus Group

Discussion of business drivers within a particular industry area

Focus Groups allow executives to discuss business drivers within particular industry areas. These sessions allow attendees to isolate specific issues and work through them. Presentations last 15-20 minutes and are followed by Q&A sessions." title="Focus Groups allow executives to discuss business drivers within particular industry areas. These sessions allow attendees to isolate specific issues and work through them. Presentations last 15-20 minutes and are followed by Q&A sessions.

Analyst Q&A Session

Moderator-led coverage of the latest industry research

Q&A sessions cover the latest industry research, allowing attendees to gain insight on topics of interest through questions directed to a leading industry analyst." title="Q&A sessions cover the latest industry research, allowing attendees to gain insight on topics of interest through questions directed to a leading industry analyst.

Vendor Showcase

Several brief, pointed overviews of the newest solutions and services

Taking the form of three 10-minute elevator pitches by attending vendors, these sessions provide a concise and pointed overview of the latest solutions and services aligned with attendee needs and preferences." title="Taking the form of three 10-minute elevator pitches by attending vendors, these sessions provide a concise and pointed overview of the latest solutions and services aligned with attendee needs and preferences.

Executive Exchange

Pre-determined, one-on-one interaction revolving around solutions of interest

Executive Exchanges offer one-on-one interaction between executives and vendors. This is an opportunity for both parties to make key business contacts, ask direct questions and get the answers they need. Session content is prearranged and based on mutual interest." title="Executive Exchanges offer one-on-one interaction between executives and vendors. This is an opportunity for both parties to make key business contacts, ask direct questions and get the answers they need. Session content is prearranged and based on mutual interest.

Open Forum Luncheon

Informal discussions on pre-determined topics

Led by a moderator, Open Forum Luncheons offer attendees informal, yet focused discussions on current industry topics and trends over lunch." title="Led by a moderator, Open Forum Luncheons offer attendees informal, yet focused discussions on current industry topics and trends over lunch.

Networking Session

Unique activities at once relaxing, enjoyable and productive

Networking opportunities take various unique forms, merging enjoyable and relaxing activities with an environment conducive to in-depth conversation. These gatherings allow attendees to wind down between sessions and one-on-one meetings, while still furthering discussions and being productive." title="Networking opportunities take various unique forms, merging enjoyable and relaxing activities with an environment conducive to in-depth conversation. These gatherings allow attendees to wind down between sessions and one-on-one meetings, while still furthering discussions and being productive.

 

Thursday, September 19, 2019 - CIO Boston Summit

8:00 am - 8:45 am

Registration & Networking Breakfast

 

8:45 am - 8:55 am

Welcome Address & Opening Remarks

Presented by:

Deidre Diamond, Founder and CEO, CyberSn

 
 

8:55 am - 9:25 am

Keynote Presentation

Bringing Down the Barriers

With the role of the CIO expanding, CIOs are being pushed to increase digital business by using IT in ways that deliver cost saving methods and increased levels of productivity, as well as new opportunities. However, many believe that current methods for these opportunities have reached their end. As a result, it is time to reconfigure these methods in new, unique ways.

Takeaways:

  1. Latest strategies or methods to increase digital business
  2. How to confront resiliency or resistance to new digital initiatives
  3. The different types of behavioral patterns or mindsets to confront

Presented by:

Ron Ford, Regional Cybersecurity Advisor, U.S. Department of Homeland Security

 
 

9:30 am - 10:00 am

Keynote Presentation

Building the business case for ServiceDesk Task Automation

ITSM solutions, such as ServiceNow, are essential if you want to give employees a modern workplace experience. However, digitizing your helpdesk workflow is only the first step. To achieve the full spectrum of productivity enhancements that ITSM solutions offer, they must be complemented by task automation to further reduce incident volume and improve issue resolution times.

 

In this session, automation experts from 1E will walk you through how to craft and present a business case for workflow and task automation based on real-world application and a business-first approach.

 

Sponsored by:

1E View details

 
 

Presented by:

Sean Capes, VP-Technical Sales, 1E View details

 
 
 

10:05 am - 10:30 am

Executive Exchange

 

Think Tank

The Future of Autonomous Things

Today, we are seeing more Autonomous Things technology than ever before. As a result, functions formerly performed by humans are being replaced with AI. This technology's automation goes beyond the automation by using AI to deliver innovative behaviors that interact more efficiently and effectively with their surroundings and with their end-users.

Takeaways:

  1. Cover the latest innovations in autonomous and networked entities for 2019
  2. Learn how these innovations will shape the different industries and business landscapes
  3. Discuss the potential compromises to privacy and safety in the future of AI

Presented by:

Jin Chun, SVP Head of Cognitive Computing, IT, Fidelity Investments

 
 

10:30 am - 10:40 am

Morning Networking Coffee Break

 

10:45 am - 11:10 am

Executive Exchange

 

Share:

Thought Leadership

3 Best Practices for Application Security (and Bonus Tip)

Applications are the lifeblood of the enterprise, but as the threats multiply, as applications move to the cloud, as legacy applications need to be maintained, and as organizations seek competitive advantage with new technologies and faster release cycles, it's easy to see that application security can be a thankless, endless and challenging job.

 Imperva has distilled three best practices (and a bonus tip) that help enterprises of any size vastly improve and simplify application security, accelerate threat detection and operationalize application security in a dynamic world where change is the only constant.

Sponsored by:

Imperva View details

 
 

Presented by:

Tim Chang, VP WW Sales Engineering, Imperva View details

 
 
 

11:15 am - 11:40 am

Executive Exchange

 

Share:

Think Tank

AI-Driven Development

Due to market shifts, the need for collaboration between professional data scientists and application developers is no longer necessary. Today, professional developers can operate alone using predefined models to deliver the top, AI-enhanced solutions. These models allow for developers to utilize tools tailored to integrating AI capabilities into your organization's solution. 

Takeaways:

  1. Learn more about how to utilize predefined AI integration models
  2. Learn how to apply AI to various data sciences, application development and testing functions
  3. Understand the potential benefit of self-governing programs over large data sets

Presented by:

Srinivasan Sankar, Chief Data Officer, The Hanover Insurance Group View details

 
 
 

11:45 am - 12:10 pm

Executive Exchange

 

Share:

Thought Leadership

ENABLING A BUSINESS-FIRST NETWORK: Moving from Software-defined to a Self-driving Wide Area Network

The Silver Peak Unity EdgeConnect? SD-WAN platform enables enterprises to shift to a business-first networking model where the network enables the business. Advancements in AI and machine learning enable EdgeConnect to continuously adapt to deliver real-time response and eliminate the impact of network disruptions. EdgeConnect unifies SD-WAN, firewall, segmentation, routing, WAN optimization and application visibility and control in a single platform. EdgeConnect is business-driven so business priorities are reflected in the way the network behaves to deliver the highest quality of experience.

Sponsored by:

Silver Peak Systems View details

 
 

Presented by:

Scott Stanney, Regional Sales Manager, Silver Peak Systems View details

 
 
 

12:15 pm - 12:40 pm

Executive Exchange

 

Share:

Thought Leadership

Mobile-centric Zero Trust Security Framework

Passwords are no longer sufficient protection against breaches because users are accessing information from a variety of untrusted devices, apps, networks, locations and services. So, in the reality of today's security world how does an organization protect itself? One answer is with a Zero Trust approach and framework to security. But with numerous theories about Zero Trust, how do you ensure that you've taken the right approach? in this session, discover how to: 

Takeaways: 

  • Drive business innovation with mobile productivity by giving employees the ability to use mobile, cloud and endpoints 
  • Enforce corporate security without impacting the user experience 
  • Redefine enterprise security strategies to address a perimeter-less environment

Sponsored by:

MobileIron View details

 
 

Presented by:

James Plouffe, Lead Solutions Architect, MobileIron View details

 
 
 

12:40 pm - 1:50 pm

Working Lunch & Panel

The Revitalizing Change in the Role of the CXO

A CXO's role, goals and objectives have drastically changed over the years as most CXOs supervise teams and units beyond their IT's security. Because of these changes in responsibilities, a CXO's success is measured in greater business metrics. As a result, the role of a CXO has become both more attractive and more demanding.

Takeaways:

  1. What are the significant changes regarding the role of the CXO
  2. How to keep up with the changing requirements
  3. How to properly measure a CXO's success

Moderated by:

Madge Meyer, Author, former EVP, Chief Innovation Officer , State Street Corporation, State Street View details

 
 

Panelists:

Navid Atoofi, Global Digital Technology Director, Schneider Electric View details

 
 

Len Van Greuning, VP Technology Officer (CTO), John Hancock Financial Services View details

 
 

Srinivasan Sankar, Chief Data Officer, The Hanover Insurance Group View details

 
 
 

1:55 pm - 2:20 pm

Executive Exchange

 

Executive Boardroom

Still Using Passwords? Forget That Sh*t

The constant barrage of breaches over the last decade has made it clear that usernames and passwords - invented back in 1964 - are simply no longer secure enough. According to the 2019 Verizon Breach Investigations Report, compromised credentials are responsible for over 80% of all breaches. 

Despite attempts to make static credentials more secure by adopting two-factor authentication utilizing SMS, OTPs or hardware tokens, these added layers still leave organizations vulnerable to phishing attacks, keylogging, malware and more. 

By removing the past reliance on usernames and passwords, you can enhance your organization's security by significantly reducing your overall attack surface and virtually eliminating the risk of compromised credentials. 

Takeaways: 

  1. Learn how usernames and passwords are leaving your organization at risk. 
  2. See how how passwordless authentication removes major threat vectors. 
  3. Provide users a fast, simple and consistent authentication experience across any channel.

Sponsored by:

Trusona, Inc. View details

 
 

Presented by:

Sharon Vardi, Chief Marketing Officer, Trusona, Inc. View details

 
 
 

2:25 pm - 2:50 pm

Executive Exchange

 

Executive Boardroom

Not That Other TTP: Tools, Threat Hunting, and People.

Advances in AI, ML, and the rest of the acronym soup are leading to more effective security tools. However, these tools have an increasingly narrow scope, requiring an ever-expanding security catalog and inherent integration challenges. This presentation will discuss the advantages of using human threat hunting to detect advanced threats instead of point products.

Sponsored by:

eSentire View details

 
 

Presented by:

Alex Boccio, Senior Solutions Engineer, eSentire View details

 
 
 

2:55 pm - 3:20 pm

Executive Exchange

 

Share:

Executive Boardroom

Insider Threats and How to Hunt for Malicious Insiders

Real-world insider threats causing the most harm go well beyond news headlines or Hollywood stories. For example, what about the system administrator caught selling corporate data to acquisition targets? Or the employee caught trying to steal a manufacturing process formula and client lists, and who sent confidential information to other employees? How were they caught, how quickly could your organization be breached by malicious insiders like these, and how could your team find them? Threat hunters are often tasked with looking for attackers' tools, techniques and procedures, but how can your team look for malicious insiders? Join us for this session as we discuss the techniques used during specific investigations that helped uncover these insider threats. We'll get inside the minds of various kinds of malicious insiders -- from the leaker, to the blackmailer, to the snooper, to the wannabe spy - and why every organization needs to expand threat hunting to insiders like them. 

My talk will cover: Real vs. Hollywood insider threats. During the talk, I will show instances of insider threats from around the world including two specific cases I have worked over the years where I caught insider threats. We'll talk about what they took, how they took it and how we were able to catch them. These examples will reinforce my talk with personal experiences. Case No. 1 will be the story of a rouge system administrator who was selling info to acquisition targets. Case No. 2 will review a case where an employee was trying to steal the formula for a manufacturing process and client lists, as well as trying to damage the employer by sending confidential info to employees.

Sponsored by:

Carbon Black View details

 
 

Presented by:

David Balcar, Security Strategist, Carbon Black View details

 
 

Executive Boardroom

From Models to Data: The Rise of Data-driven Architecture

Companies begin digital transformations with the technology environments they have, which often means thousands of applications, and hence tremendous complexity. 

This session explores how strategic Application Portfolio Management helps optimize the existing application landscape to free up resources for digital innovation.

Sponsored by:

LeanIX View details

 
 

Presented by:

Hylton Southey, Managing Director, LeanIX View details

 
 
 

3:20 pm - 3:30 pm

Afternoon Networking Coffee Break

 

3:35 pm - 4:00 pm

Executive Exchange

 

Think Tank

AI/NLP Use Cases in Healthcare Payer

Exploring many use cases for AI/NLP such as: 

  • RPA for Claims Processing, Financial processing 
  • Fraud, Waste and Abuse using Machine Learning, NLP/AI to identify high risk claims 
  • NLP/AI for Member Services using a Chatbot 
  • Using AI/NLP based Voice Assistant for Surveys and follow-ups, e.g. 
  • Member call center solution for ?Voice to Text? providing sentiment analysis and customer intent 
  • And more?

Presented by:

Vijay Bhatt, CTO, Harvard Pilgrim Health Care View details

 
 
 

4:05 pm - 4:30 pm

Executive Exchange

 

Share:

Thought Leadership

Is AI the future of Email Security?

Email continues to be the dominant attack vector for threat actors in today's landscape. Email security gateways have been focused and effective on widespread attacks and campaigns, but have been porous to sophisticated, highly targeted attacks. Despite significant investments into email security, Business Email Compromise (BEC) losses have nearly doubled year over year over year - from $360M in 2016 to $1.3B in 2018. This represents roughly 48% of all cybercrime losses. Combatting BEC and other socially-engineered, payload-less attacks requires a shift in mindset and approach. AI and Machine Learning have hyped technologies in security over the past several years. So the question is - Is AI the future of email security?

Presented by:

Jeshua Bratman, Head of Machine Learning, Abnormal Security View details

 
 
 

4:35 pm - 5:00 pm

Executive Exchange

 

Think Tank

Machine Learning Is Here to Help, Not Replace

Over the next few years, machine learning (ML) will be a regular security practice and will offset skills and staffing shortfalls. Today though, ML is better at addressing smaller, more specific problems. Technology leaders have to understand that humans and machines complement each other and work better together than alone, as ML can assist humans in addressing uncertainty by presenting relevant information.

Takeaways:

  1. Discuss the ways machine learning can assist teams and organizations
  2. How to make the right machine learning choices for your organization
  3. The future of machine learning

Presented by:

Len Van Greuning, VP Technology Officer (CTO), John Hancock Financial Services View details

 
 
 

5:00 pm - 5:15 pm

What's the Next Stop On the Transformation Journey?

Our Governing Board will summarize the learnings from the day and discuss the path forward for building an ongoing community of CISOs where common issues can be addressed and success stories can be shared.

Takeaways:

  1. Building an ongoing community with your peers can be an invaluable resource for tackling the digital transformation projects ahead of you
  2. Sharing stories of success (and failures) is not reserved to a one-day CISO Summit, but should be shared on a regular basis with your peers

Presented by:

Madge Meyer, Author, former EVP, Chief Innovation Officer , State Street Corporation, State Street View details

 
 
 

5:15 pm - 6:30 pm

Summit Happy Hour