The Future of IT & Cybersecurity

CIO & CISO Think Tank

October 24, 2024 - Dallas, TX

Visionaries

Tanweer S (FIller) PNC
Tanweer Surve

Head of Cloud Center of Enablement (CCoE) & Solutions Engineering

PNC

Think Tank Speaker

Over 20 years of proven track record in IT & Business, executing various leadership roles as Technology CTO (Cloud), Head of Enterprise Architecture & Cloud Technologies, Director of IT Infrastructure Shared Services, Solutions Architect, and Business Development Manager. Constructively contributed to the ever growing analytical and technical Business scenarios conceptualizing, implementing and delivering complex Global IT Digital Transformation Programs across NORTAM, EMEA, LATAM and ASPAC with my Technical and Business Management expertise in Business Architecture, Infrastructure Systems Architecture, Data & Application Architecture and Information Security around Cloud Computing. Strategic and delivery focused Senior Technology Leader with deep subject matter expertise. Build cross functional teams by hiring, mentoring several team members and assisting with developing personnel career-paths. Drives alignment of resources, processes and systems to seamlessly support and advance the business strategy of the organization through technology. Adept at planning, leveraging, researching and implementing technologies and effective IT service delivery models to continuously improve all aspects of business. With experience in diverse lines of business across Financial, Healthcare, Manufacturing, Retail, Telecom & Technology, highly effective in understanding business requirements and translating them to Architectural Design Requirements which helps in resolving complex technical issues during implementation, quickly and effectively.

Jodi W (Filler) GTN Technical Staffing and Consulting
Jodi Watkins

Chief Commercial Officer

GTN Technical Staffing and Consulting

Think Tank Speaker

Responsible for client delivery and direction to our Fortune 500 companies. Determine and formulate policies and business strategies and provide overall direction for specialized recruitment teams. Plan, direct, and coordinate sales activities at the highest level of management. Prudently manage the organization’s goals and initiatives in Field Services, IT, Professional Services, MSP vendor relations. Company-wide committee facilitation including planning, production and staff. Assures that the organization and its mission, programs, and services are consistently presented in a strong, positive image. Promotes a culture that reflects the organization’s values, encourages good performance, and rewards productivity. Actively advocates for the organization, its beliefs, and its programmatic efforts. Acts as a liaison between the organization and the community, building relationships with peer organizations when appropriate. Oversees design, delivery, and quality of MSP programs and services. Collaborate to define and articulate the organization’s vision and to develop strategies for achieving that vision.

Vince Blake Zero Networks
Vince Blake

Customer Engineer

Zero Networks

Think Tank Speaker

Vince Blake is a Customer Engineer at Zero Networks (which means he'll be with you from pre-sale through post-sale and beyond as your partner). He comes to Zero following four years at CyberArk, where he began as an Enterprise Sales Engineer. He was later promoted to their newly formed Strategic team to provide a white-glove approach for the company's largest customers. Before that, he has another six years of experience acting as all forms of consultant and implementation engineer for various industry solutions. He has a Bachelor of Science in Psychology and he's not always sure how he got here, either.

Robert Pace Invitation Homes
Robert Pace

CISO

Invitation Homes

Think Tank Speaker

Robert is the Vice President, Information Security and CISO for Invitation Homes. He is responsible for leading the Information Security program for Invitation Homes. Responsibilities include establishing a sound security strategy, governance, operations, service delivery, business integration and end-user awareness training. Robert’s career spans over 20 years in leading global teams in the delivery of IT Security operations. Robert has been influential in the leadership, design of security operations and delivery at First American Payment Systems, Dell Services, Williamson-Dickie Mfg. Co., Bell Helicopter, Textron and Ameritech. Robert also has significant consulting experience obtained while working at PricewaterhouseCoopers. Robert has a Bachelor of Science Degree from Michigan State University and a Master of Science Degree from Walsh College of Business and Accountancy. Robert has completed the Executive Leadership Program at Thunderbird - Gavin School of International Management. He is a Certified Information Systems Security Professional (CISSP), a Certified Information Security Manager (CISM), Certified Chief Information Security Officer (C|CISO), ITILv3 and a Certified Six-Sigma Green Belt.

Amy Horowitz Informatica
Amy Horowitz

VP of Data Governance and Data Integration

Informatica

Think Tank Speaker

Amy Horowitz is the VP of the Data Governance and Data Integration solution sales team for Informatica. With more than 25 years of leadership experience in the technology industry, Amy's passion for Data Governance, Integration and Data Management led her to Informatica. Amy's role at Informatica is to help customers realize the transformative power of data with the Informatica Intelligent Data Management Cloud- specifically with Data Governance and Data Integration. Armed with a master's degree in leadership and ethics, Amy brings a unique blend of technical expertise and leadership to her roles. Throughout her career, she has demonstrated a passion for leveraging data to drive business success. Her adeptness in navigating the complexities of Data Governance and Data Integration has earned her a reputation as a trusted leader in the industry. Her ability to bridge the gap between IT and Sales has been a key factor in her success, enabling organizations to seamlessly integrate data solutions into their business strategies. Prior to Informatica, Amy spent over a decade in IT Leadership as well as leading Enterprise Sales teams. Amy is a native Texan who loves all things data! Outside of work, Amy spends time mentoring students and participating on an Advisory Board at Texas State University for the CIS program. Amy is based in the vibrant tech hub of Austin, TX.

October 24, 2024

Agenda

All times Central Time

8:30 AM-9:00 AM

Registration


9:00 AM-9:30 AM

Morning Networking


9:30 AM-9:40 AM

Opening Remarks


9:40 AM-10:05 AM
Vision Voices Keynote

Bridging the Gap: Mastering the Art of Business-Technology Harmony

Bridging the gap between business and technology is not easy and requires discipline and balance between technology, people, and business. For so many organizations today, technology is the business. Technology needs to be understood as a critical enabler in every part of the organization from the front line to the back office. It creates new value by crunching data to deliver new insights, it spurs innovation, and it disrupts traditional business models.

For business and technology leaders alike, new actions and behavioral changes can help their organizations make this shift. CIOs and CISOs must take responsibility for problems, they should convey that when technology fails, many people typically share responsibility.


10:10 AM-10:35 AM
Keynote

Fortifying Cyber Security Together: A CISO's Call to Increase Cyber Transparency

In the evolving landscape of cybersecurity, the imperative to increase transparency takes center stage, driven by new laws and regulations mandating prompt reporting of cyber breaches. A notable example is the SEC's cyber disclosure rule, necessitating companies to report incidents within 72 hours. This shift from voluntary to mandatory information-sharing not only presents challenges but also opportunities. Compliance empowers organizations to construct more comprehensive defenses and actions against cyber risks. Regulatory guardrails provide confidence, allowing companies to explore, experiment, and compete securely. To stay ahead, a tech-enabled approach embedding cybersecurity across the enterprise is crucial. Looking forward, collaboration with the C-suite, particularly the Chief Risk Officer and General Counsel, is vital. Crafting a consistent narrative, setting priorities, and adapting to new cyber risk management practices become essential. Moreover, understanding board expectations, simplifying complex cyber regulations, and extending cybersecurity measures to external reporting teams are key considerations for navigating the regulatory landscape effectively.


10:35 AM-10:55 AM

Coffee Break


10:55 AM-11:10 AM
Vision Voices

Data Revolution Leadership: CIOs at the Helm of Modernization for Strategic Value

This session explores the pivotal role of CIOs in modernizing data to unlock its full value. In the contemporary digital landscape, data stands as a strategic asset, and CIOs are at the forefront of harnessing its potential. The abstract emphasizes the CIO's responsibility in implementing cutting-edge technologies and data management strategies that go beyond mere storage, enabling organizations to derive actionable insights. By adopting innovative approaches, such as advanced analytics, artificial intelligence, and cloud solutions, CIOs can transform data into a valuable resource, driving efficiency, innovation, and informed decision-making across the enterprise. The discussion delves into the evolving responsibilities of CIOs in leading the charge towards data modernization, ensuring organizations remain competitive and agile in an increasingly data-centric world.


11:15 AM-12:00 PM
Panel

Building Cyber Fortitude: CISO Strategies for Resilient Cybersecurity

In the realm of building cyber resilience, organizations confront increased risk exposure amidst bold moves and evolving external challenges. Despite investments in technology and data, risk leaders, including CISOs, express difficulty in keeping pace with the persistent threat of cyber crises. However, in today's business landscape, discussions of digital transformation or reinvention are inseparable from considerations of cybersecurity. Looking ahead, stakeholders, from the board to frontline cybersecurity operations, pose critical questions about resiliency. This includes inquiries about the adequacy of efforts to safeguard the company and its customers in the face of cyber attacks. The focus shifts to identifying opportunities to minimize the impact on business and shareholder value through effective threat response. Embracing cybersecurity as a whole-of-business endeavor, organizations are urged to align themselves with business owners, adapting to changes in the cyber landscape and fortifying resilience against disruptions. Building confidence in the cybersecurity program becomes paramount in navigating the dynamic and challenging cyber landscape effectively.


12:00 PM-1:00 PM

Lunch & Disruptor Showcase


12:40 PM-12:55 PM
Lunch & Disruptor Showcase

Elevating Agility: The Strategic Imperative for CIOs in Prioritizing Cloud Engineering

In this session, we delve into the imperative for CIOs to prioritize cloud engineering in the contemporary digital landscape. As organizations increasingly rely on cloud computing for operational efficiency and innovation, CIOs play a central role in shaping robust strategies. The session emphasizes the strategic importance of cloud engineering in optimizing infrastructure, ensuring scalability, and fostering agile application development. Attendees will explore practical approaches to resource management, automation, and aligning cloud initiatives with overarching business goals. The discussion navigates the evolving realm of cloud technologies, highlighting how CIOs can strategically prioritize cloud engineering to drive competitiveness and resilience in the dynamic digital ecosystem.


1:00 PM-1:15 PM
Vision Voices

Navigating the Cyber Frontier: CISO Strategies for Effective Risk Management

In the context of effective cyber risk management, the challenge lies in keeping up with evolving technology, particularly during cloud or technology transformations. The adoption of threat intelligence,GenAI, the metaverse, and machine learning presents both opportunities and challenges, with a need for technology leaders to grasp the security implications. While these technologies enhance cyber risk management, they also offer efficiencies through task automation. Striking a balance between risks and rewards is crucial for gaining trust and staying competitive. Looking forward, organizations must explore innovative approaches to cyber risk management, emphasizing resilience against third-party risks. Collaboration with the leadership team is essential to take an enterprise-wide view of current and future threats, develop action plans, safeguard critical assets, and facilitate quick recovery. Early collaboration with the executive team is encouraged to integrate risk management into transformation strategies and extract maximum benefits from emerging technologies.


1:20 PM-2:05 PM
Panel

Build AI Success on Trusted Data

Artificial intelligence (AI) and generative AI (GenAI) are crucial for staying competitive and driving efficiency and innovation. While GenAI introduces new capabilities, AI success depends on navigating regulatory landscapes like the European Union AI Act and ensuring data is trusted, governed, holistic and democratized. Understanding the impact and challenges of AI and GenAI is essential for data leaders.  

  • AI and GenAI’s impact and common pitfalls 
  • Considerations for successful AI implementation    
  • Requirements for AI-ready data and how to scale AI projects  
  • Best practices around data management for AI  
In partnership with:
Informatica

2:10 PM-2:45 PM
Fireside Chat

Securing mMission Critical Networks: Enhancing OT Security by Prioritizing, and Protecting, your Operations.

In today’s rapidly evolving digital business landscape, safeguarding mission-critical networks is more crucial than ever. This panel, will delve into the complexities and challenges of securing Operational Technology environments. The discussion will explore the latest strategies and technologies for prioritizing and protecting operations within mission-critical sectors, including medical facilities, data centers, and academic institutions. Attendees will gain insights into the importance of standardization, the integration of cutting-edge security solutions, and the critical role of leadership in maintaining resilient and secure OT networks. This session is essential for professionals and executives committed to enhancing the security and reliability of their organization’s most vital systems.

In partnership with:
AXYS Global

2:45 PM-3:05 PM

Networking Break


3:05 PM-3:20 PM
Vision Voices

Innovation Unleashed: Navigating the Future through IT Evolution with CIOs at the Helm

In this session, embark on a transformative exploration of the evolving landscape of IT operations. Delving into the strategic imperative for Chief Information Officers to reshape and modernize their IT operating models, the discussion unfolds the critical role technology plays in driving business success. Participants will gain practical insights into the adaptive strategies CIOs can employ to enhance organizational agility, foster innovation, and align IT with overarching business goals. Join us for a dynamic conversation that unveils the power of evolving IT operating models, empowering organizations to thrive in the ever-evolving digital age.


3:25 PM-3:40 PM
Disruptor

Beyond Detection and into True Cyber Prevention: A Cultural Shift

In the last decade, the "assume breach" mindset has dominated cybersecurity strategies, leading organizations to heavily invest in detection and response technologies. While this approach is necessary, it often results in a reactive posture that only addresses symptoms rather than root causes. It's time for a paradigm shift.

This session will focus on the necessity of a cultural transformation within organizations, and will delve into the limitations of the current cybersecurity paradigm and introduce a proactive, quality-driven approach. By integrating quality management principles into cybersecurity, we can uncover and address the fundamental issues that lead to breaches. We will discuss how focusing on root causes, rather than just patching up problems, can lead to more robust, business-aligned security solutions. Attendees will gain valuable insights into how this shift can enhance risk management, reduce long-term costs, and ultimately improve business outcomes.

Join us to explore how moving beyond mere detection and response to true cyber prevention can fortify your organization's cybersecurity posture and drive sustainable success.

In partnership with:
Zero Networks

3:45 PM-4:20 PM
Fireside Chat

Next-Level Innovations: Unveiling GenAI - The Hype, The Reality, and The Future

We will explore the evolution of Generative AI, from its inception to its transformative impact across various industries. Experts will discuss the disparity between the media-driven hype and the technology's real-world capabilities, sharing case studies and addressing current challenges. The conversation will also cover the economic and ethical implications of Gen AI, providing insights into its future advancements and regulatory landscape. Attendees will gain a nuanced understanding of Gen AI's potential and the strategic considerations necessary for its successful integration into diverse sectors.


4:25 PM-4:30 PM

Closing Remarks & Raffle Giveaway


4:30 PM-5:30 PM

Cocktail Hour