Select conference presentations and multimedia are available for members of the Evanta Leadership Network.

Media from this event includes
  • Audio
  • pdf
  • Slides
  • Video


November 18, 2013 / Governing Body Private Dinner

6:00pm Governing Body Private Dinner

An Owner's Perspective – How Technology Leads to Success in Sports

Dinner Keynote

Robert Sarver
Managing Partner - PHX Suns & Mercury
Phoenix Suns
Expand Additional Information

Sustained success in sports begins and ends with ownership. For the Phoenix Suns, a team that owns the NBA's fourth-best all-time winning percentage and has made nine trips to the Western Conference Finals, a strong executive team with a forward-thinking vision continues to carry the organization forward. In this dynamic keynote presentation, Robert Sarver offers a behind-the-scenes look at his 9-year leadership journey with the Phoenix franchise. Join Sarver he discusses the tenets of strong leadership, the importance of aligning with the technology organization for success, and what a company needs in a CIO.

November 19, 2013 / Conference

7:00am - 7:30am

Registration & Breakfast

7:30am - 9:00am Opening Keynote

Information Governance in the 21st Century


John Iannarelli
Assistant Special Agent in Charge, Phoenix Division
Federal Bureau of Investigation
Expand Additional Information

Guarding assets, staff and accounts has always been key to protecting the business. But in the information age, protecting your company’s internal and client data is top priority. Businesses lose billions of dollars each year to data leakage, on top of which the government often imposes millions in fines. And this does not include the irreparable damage caused to your company’s reputation. It is not a matter of if you will be a victim — it is a matter of when.

In this thought-provoking presentation, John Iannarelli will uncover the most current and common cyber and physical threats to the private sector’s sensitive information. Through real-life examples of crimes in operation, discover how simple actions in information governance can mitigate both losses and liability to your business.

9:00am - 9:30am

Networking Break

9:30am - 10:30am Breakout Sessions

BYOD – Breach Your Own Data

Best Practice sponsored by: Jive Software

Caren Shiozaki
TMST, Inc.
Expand Additional Information

In the BYOD space, data security issues are a top-of-mind concern for CIOs. More and more, employees are entering into BYOD practice without considering the implications of having both business and personal data on one device. With BYOD policy still evolving, how can CIOs help their employees avoid falling into traps? How can employees become informed consumers of BYOD? What can happen when employees circumvent BYOD policies? Join Caren Shiozaki for a candid session on working through the main pain points of BYOD governance from the employees’ data perspective.


Audio Slides

Balancing Risk and Innovation

Featured Speaker

Cormac Foster
Research Director
Expand Additional Information

“Risk versus innovation” is a headline phrase in today’s technology news. Stated this way, the phrase suggests a dichotomy, when in fact, a solid understanding of an organization’s risk management profile drives innovation by creating a controlled environment to work within. In short, risk management enables great change. So, how do development teams balance risk and innovation? How do they embrace it and sell it to the CEO, and ultimately shift culture with it?

Join Cormac Foster, research director at GigaOM, for an interactive session on several hot points of innovation including cloud strategy, mobile and social enterprise. Come prepared to discuss case studies and practical examples, and to collaborate on creative solutions.

Using Threat Modeling to Define Security Strategy

Security Discussion sponsored by: Websense

Lamont Orange
Expand Additional Information

Today’s advanced threats demand a sophisticated security approach, one which allows the IS group to identify threats with the greatest potential impact on the organization and define countermeasures to prevent them. In this session, we’ll discuss how threat modeling and other methods have begun to reformulate enterprise security programs and how you can take steps to prioritize security investments, learn from security incidents, and strategize the best safeguards for your organization.

Session discovery topics:

  • Comparing active versus passive security strategies
  • Increasing your security posture to better protect organizational intellectual property
  • Understanding event correlation and maturing event value
10:30am - 11:00am

Networking Break

11:00am - 12:00pm Breakout Sessions

IT Means Business – IT Governance and Business Alignment

Best Practice

Brad Jensen
US Airways, Inc.
Expand Additional Information

IT plays a key role in the realization of business strategy, and CIOs are faced with balancing multiple business goals while optimizing resources and evolving IT process maturity. For Brad Jensen of US Airways, the key to success is astute portfolio management and a balanced IT governance structure that encompasses program and quality management, enterprise services, data architecture and security. Join Jensen in exploring how portfolio management and related best practices can contribute to productive business partnerships and effective IT governance. Come to this session prepared to engage in an interactive conversation.

Facing the Hack – Preparing Security for Compromise

Featured Speaker sponsored by: Cisco Systems, Inc.

David Stuart
Director of Product Marketing
Sourcefire, Inc.
Expand Additional Information

Networks have changed, but our approach to security hasn’t. Modern networks are constantly evolving and now extend to include endpoints, mobile devices, virtual desktops and data centers, spawning new attack vectors. Yet, organizations continue to try to defend these networks with "silver bullet" solutions that create gaps in protection. Attackers know this and are seizing this opportunity, presenting organizations with a new reality: compromise is inevitable. To truly protect these networks, security teams need to start thinking like an attacker and shift to a new, continuous security model that addresses the extended network and the full attack continuum — before, during and after an attack. Join this session for a conversation on what to expect from security when facing inevitable compromise.

The Human Nature of Security

Security Discussion

Kim Jones
SVP & Chief Security Officer
Expand Additional Information

Despite the growing maturity of security programs and frameworks, many security practices are still not accepted by the executive team. In a recent poll of CEOs and C-level security executives to determine their level of concern regarding a security breach, 60 percent of the security executives were very concerned, compared to only 15 percent of CEOs. It’s time to close the communication gap by embracing the “people” portion of the people-process-technology triad.

Join this session as Kim Jones provides insight into some of the common human-related stumbling blocks to program implementation, as well as practical guidance and techniques to avoid them. A recognized information security leader with more than 25 years of experience, Jones will provide valuable lessons learned in addressing this critical and often underappreciated aspect of enterprise information security.

Modern Mobility – Becoming an Experience Enterprise

Executive Boardroom

Cindy Berger
Arizona Public Service Company
Bert Odinet
Global CIO
Freeport-McMoRan Copper & Gold Inc.
Expand Additional Information

The modern enterprise, regardless of industry, seeks to deliver exceptional mobile and web experiences in order to increase customer loyalty, ensure employee productivity and promote brand identity. Given today’s multi-channel user, it is imperative that these experiences are unified and optimized across all end-user devices throughout the day. How can CIOs meet and stay ahead of these business needs? In this boardroom discussion, join Cindy Berger and Bert Odinet to discuss how organizations are managing performance, access and connectivity to deliver on the promise of user-first multi-channel experiences.

12:00pm - 12:30pm

Networking Break

12:30pm - 2:00pm Luncheon Keynote

Five Level Leadership


Doug Keeley
CEO & Chief Storyteller
The Mark of a Leader
Expand Additional Information

Great organizations are built on remarkable stories and powerful leadership. When it comes to accelerating growth and innovation, they are the “secret sauce.”

Based on a premise called Five Level Leadership, Doug Keeley’s The Mark of a Leader program uses unforgettable stories to show how many of the world’s greatest leaders and brands have harnessed the power of full engagement, story and focused leadership to succeed.

In this thought-provoking and entertaining keynote, Keeley promises to challenge leaders, teach new ideas, and inspire you to raise your game to get the best out of your team.

2:00pm - 2:30pm

Networking Break

2:30pm - 3:30pm Breakout Sessions

Education Intelligence – Developing an A-level Analytics Program

Best Practice

Mark Masterson
Arizona Department of Education
Expand Additional Information

In any progressive organization today, IT is using sophisticated data analytics to drive the most valuable outcomes for the customer. But the path from data to client is a long one, and full of uncertainty. What is the “right” data to use? How can data best be leveraged? At the Arizona Department of Education, Mark Masterson works with a unique customer — the student. To increase the success rate for each student, his team is building operational data stores that provide predictions for teachers about student needs. In this $28M “Education Intelligence” operation, his organization is using pure supply chain theory to improve the customization of the student experience and increase success in learning. Join this session to hear how ADE is breaking ground on data-driven innovation.

Avoiding Turf Warfare – Building a Healthy IT and Marketing Alliance

Best Practice

Jason Grovert
The Ryland Group, Inc.
Expand Additional Information

Customer-driven innovation continues to shape the unique hybrid of marketing and technology. These departments, virtually disparate until several years ago, now actively collaborate to redesign and redevelop the connectivity experience for customers. But in many organizations, these units still face a perplexing breakdown of roles. Both sides are asking: Who owns what in terms of roles and responsibilities? How can we work together to manage the content of the brand and improve customer experience? In this session, Jason Grovert will discuss the trends and macro areas causing this relationship, identifying how these help to define the partnership. Join the conversation to discover the organizational hierarchies, processes and handoffs between groups that need to be efficient for the relationship to work.


Slides Audio

Mobile Security at US Airways

Security Discussion sponsored by: IBM

Todd Christy
VP, Business Technology & CISO
US Airways, Inc.
Expand Additional Information

Mobile devices are integral to life and business. So integral that a single device often doesn’t meet all business requirements, and employees are asking for the ability to manage personal and business information on one tool. Security leaders must decide where they are going to spend money. Do they invest in security prevention resources, or do they pay to clean up infections that inevitably leak into the enterprise from unauthorized devices?

US Airways took the proactive approach. In this session, Todd Christy will share their program, outlining how they successfully enabled dual functionality for trusted users, while maintaining the security standards necessary to avoid extensive clean up. Join him for insight on designing a secure, smart mobile program.

Looking at the Future of Cyber-Incident Response

Executive Boardroom sponsored by: RSA, The Security Division of EMC

Rich Owen
American Traffic Solutions, Inc
Tina Thorstenson
Asst VP & CISO
Arizona State University
Tom Chmielarski
Practice Lead, Advanced Cyber Defense Practice – Americas
RSA, The Security Division of EMC
Expand Additional Information

The escalation of cyber-attacks has challenged many organizations to re-evaluate the safety of their critical business information. The threat landscape has evolved and organizations often feel more reactive than proactive. What kind of attacks are common? What new risks do organizations face? What new competencies are required to defend against evolving cyber-attacks? Join Tom Chmielarski, Rich Owen and Tina Thorstenson in this boardroom to discuss how organizations can improve their readiness to handle the increasing volume of cybersecurity incidents.

3:30pm - 4:00pm

Networking Break

4:00pm - 5:00pm Closing Keynote

Elevating Conversations With the C-Suite

Keynote sponsored by: Insight Enterprises, Inc.

Kenneth Lamneck
President & CEO
Insight Enterprises, Inc.
Expand Additional Information

As IT redefines its role as a business innovator, CIOs must also rebrand themselves as mentors, and stepping into this new role requires CIOs to evolve the dialogue with their C-suite colleagues. This engagement puts the CIO in a unique position to help drive organizational change. In this session, Ken Lamneck will explore areas of change based upon the transformation of the CIO role, and how that is driving a closer alliance between the CIO and CEO. Where can the CIO make an immediate impact in the CEO’s complex decision-making process? How will the CIO advocate for the future while articulating the pragmatic here and now? And where are the opportunities for providing a strategic vision of technology’s role in business transformation?

5:00pm - 6:00pm

Closing Reception & Prize Drawings