November 29, 2016 / Governing Body Private Dinner

6:00pm - 8:30pm Governing Body Private Dinner

Case Studies in Institutional Change

Dinner Keynote 

Gilbert M. Orrantia
Arizona Department of Homeland Security
Expand Additional Information

Miami. 1986. The FBI agents were well trained, and the robbery suspects were outnumbered. Agent Gil Orrantia arrived on the scene to what turned out to be one of the deadliest shootouts in FBI history. The agents had revolvers and shotguns but only two semi-automatic pistols. Two agents were killed and five wounded, prompting the introduction of more powerful handguns in the FBI. The two suspects also were killed. In dramatic fashion, this pivotal moment highlights the balancing act institutions face with new technology. In his 26 years as an FBI agent and nine years as director of the Arizona Department of Homeland Security, Orrantia says he has consistently seen tragedy act as the catalyst for change. In this session, Orrantia draws on his experiences to share insights into the leadership skills needed to communicate risk, get buy-in from the top and do more with less.

November 30, 2016 / Conference

7:00am - 7:40am

Registration & Breakfast

7:40am - 8:30am Opening Keynote

A Pawsitive Transformation


Mike Goodwin
PetSmart, Inc.
Expand Additional Information

CXOs know that in order to be competitive, organizations must predict customers’ needs before they know them. PetSmart Inc. has more than just humans to consider, there’s also its four-legged, finned and reptilian customers. CIO Mike Goodwin joined PetSmart in 2014 and has led an IS transformation to align and empower the business. In this presentation, he dives into his company’s broader transformation, achieved through a new business strategy and IS strategic framework. Learn about PetSmart’s challenges, lessons learned and vision for the future.

8:30am - 9:00am

Networking Break

9:00am - 9:50am Breakout Sessions

Slaying Plain-Text Data Dragons in the Enterprise

Featured Speakers  sponsored by: Box

Gary Nichols
Managing Dir., Sec. Arch.
The Charles Schwab Corporation
Expand Additional Information

With data breaches on the rise, leaders like Gary Nichols, managing director of security design, access and strategy for The Charles Schwab Corporation, look to data encryption and protection as critical components to the enterprise’s defense model. But how do we find and protect sensitive data? In this session, Nichols will walk you through the data-protection lifecycle and show you how to apply best practices when discovering and protecting data. Attendees will walk away empowered, understanding the benefits and caveats of data encryption.

How Hybrid Approaches Are Changing IT Landscapes and Transforming Businesses

Executive Boardroom  sponsored by: Rimini Street, Inc.

Todd Davis
Choice Hotels International, Inc.
David Jarvis
Honeywell Aerospace
Michael Baron
VP, Field Operations
Rimini Street, Inc.
Expand Additional Information

According to a recent Gartner survey, 82 percent of CIOs are taking a hybrid IT approach to transformation by investing in new applications and services to augment their existing on-premises ERP solutions. Why does this make sense in today’s business environment? How can you optimize spending on things like maintaining systems of record? How can investing in new systems of engagement further strategic-transformation initiatives? This interactive boardroom discussion will examine strategies and best practices for the CIO to become a more sophisticated evaluator of innovative business and technology investments and how to multiply them.

Emerging Cloud Technologies – Innovation and Security on a Global Scale

Executive Boardroom  sponsored by: Microsoft Corporation

Jeff Miller
Chief Security Officer
Honeywell Aerospace
Jason Stead
Sr. Director, Sec. & Privacy
Choice Hotels International, Inc.
Ken Malcomson
Executive Security Advisor, Americas, Enterprise Cybersecurity Group
Microsoft Corporation
Expand Additional Information

The business landscape has changed. Organizations are adapting to demands for access to sensitive data any time, any place and on any device. New technologies emerge daily with the promise to be better and more effective than the next, and CXOs must address critical security concerns while balancing the need for collaboration and productivity. How can we unlock the full potential of innovation with new solutions? Ken Malcolmson moderates this discussion on emerging technologies for cloud security and focuses on consolidating complicated security portfolios, achieving better control and visibility, and positioning security as a business enabler.

Lockdown – How to Keep Your Important Data Safe in the Cloud

Executive Boardroom  sponsored by: Vormetric

Bashar Abouseido
SVP, CISO, Information Security Risk Management
The Charles Schwab Corporation
Richard Shetina
Massage Envy Franchising
C.J. Radford
VP, Cloud
Expand Additional Information

For IT security, the cloud presents a unique dilemma: How do you embrace the benefits of cloud while maintaining security controls over your organization’s assets? This shift in control demands new security approaches and techniques to protect data integrity, and CISOs are asking whether the gained agility and economic benefits are worth the increased risks.

When an outside party owns, controls and manages infrastructure and computational resources, how can you be assured sensitive data remains private and secure? Is your organization truly protected from damaging data breaches? Can you still satisfy the full range of reporting, compliance and regulatory requirements? In this interactive session, C.J. Radford of Vormetric will moderate a discussion on how to proactively address security in the cloud so your organization isn’t next week’s data breach headline.

9:50am - 10:20am

Networking Break

10:20am - 11:10am Breakout Sessions

Adaptive Architecture

Featured Session  sponsored by: Dell EMC

Narayanan Krishnakumar
SVP, IT and IT Chief Technology Officer
Dell EMC
Expand Additional Information

In the ever-changing world of technology, IT architecture needs to be able to adapt to new market applications or organizational mergers. Narayanan Krishnakumar, SVP, IT and IT Chief Technology Officer, Dell EMC, will share how the second and third platform approaches can coexist with an adaptive architecture. Krishnakumar will discuss how Dell Technologies — created with the merger of Dell and EMC — is integrating and melding IT environments to meet customer needs and increase productivity while forging the architecture of the future.

Breaching the Horizon – Building a Culture of Security Awareness

Featured Speakers  sponsored by: Palo Alto Networks

Jason Lish
SVP, Sec. Tech. & Ops.
The Charles Schwab Corporation
Jeff Miller
Chief Security Officer
Honeywell Aerospace
Jerry Walters
Gary Nichols
Managing Dir., Sec. Arch.
The Charles Schwab Corporation
Expand Additional Information

Anyone can do the math. An organization’s risks increase daily at an exponential rate. IT leaders cannot get left in the dark or trapped in a black hole of pending threats. Use the resources around you, including these panelists. You will learn how to construct a culture of security awareness, communicate risk, enhance employee education and increase employee engagement. Join the panelists as they decrypt the secrets of building and sustaining a high-performing team and a culture of security consciousness.

Big Data - Beyond the Buzzword

Executive Boardroom  sponsored by: Pentaho

Tom Kato
Sr Manager, BI
Republic Services, Inc.
Tianbing Qian "TQ"
Ports America
Arik Pelkey
Sr. Director of Product Marketing
Expand Additional Information

Big Data is undeniably present and thriving in today’s information landscape. Further, disruptive trends such as the Internet of Things (IoT) are fueling the speed at which leading enterprises are embracing Big Data technologies. Business technology leaders are faced with a unique set of challenges to overcome, given pressure to consolidate, model, and analyze an expanding array of diverse data at a rapidly accelerating pace. Attendees will discuss how to create a clear, strategic approach to apply these new data frameworks and platforms to grow revenue, boost operational efficiency, and ultimately create better customer experiences.

Disrupting Incident Response – Shrinking Detection Times From Weeks to Seconds

Executive Boardroom  sponsored by: PhishMe

Jeffrey Coe
Director and CISO
ON Semiconductor Corporation
Tina Slankas
Cyber Security Coordinator
City of Phoenix
Tom Gibb
Vice President
Expand Additional Information

Data breach reports continue to highlight the substantial lag between incident occurrence and detection, with response mechanisms often kicking in weeks after the initial compromise. As spear phishing becomes the attack vector of choice, organizations can level the playing field by crowdsourcing attack detection to employees and helping IR teams react faster. This session makes the case for cultivating a trusted informant network. It also outlines how to supply attack intelligence in an actionable format and develop response mechanisms that minimize damage.

11:10am - 11:40am

Networking Break

11:40am - 12:50pm Luncheon Keynote

How to Stop Breaches – A New Approach to Cloud-Based Endpoint Security

Keynote  sponsored by: CrowdStrike

Jerry Dixon
Expand Additional Information

Today’s hacktivists, criminals and nation-state adversaries have tremendous advantage over defenders, which manifests daily in a constant stream of breaches. Jerry Dixon shares a new approach to meaningfully changing the game and shifting the advantage to defense. Through fascinating war stories and real-world examples, Dixon will discuss how cloud-based security technologies are thwarting and deterring some of the most persistent and advanced adversaries.

12:50pm - 1:20pm

Networking Break

1:20pm - 2:10pm Breakout Sessions

A Resilient Performance

Featured Speakers  sponsored by: IBM

Robert Crossley
VP, IT Operations
Choice Hotels International, Inc.
Expand Additional Information

When Robert Crossley moved into his new role at Choice Hotels International as VP, IT Operations, he ignited an organization-wide culture and philosophy change. Instead of trying to prevent everything and stretching IT too thin, Crossley embraced resilience through a focus on mean time to recovery (MTTR).

Crossley presents a case study on this culture shift, which enabled him to build a resilience team that drives business revenue and empowers IT to ensure associates have a clear line of sight from daily activities to company goals.

The First 72 Hours

Executive Boardroom  sponsored by: Fidelis Cybersecurity

Mike Lettman
State of Arizona
Steve Reese
Phoenix Suns
Sig Murphy
Regional VP, Security Consulting Svcs.
Fidelis Cybersecurity
Expand Additional Information

The initial signs of a security incident are rarely black and white. The first questions CISOs must ask are “Is this a real incident?” and “How should I respond?” This discussion addresses the first and most critical hours of a potential incident response. While removing the attacker is obviously the end goal, security teams must first understand the nature and scope of the incident to identify the most effective action while balancing the risk and disruption the response can cause.

Head in the Cloud, Finger on the Pulse

Executive Boardroom  sponsored by: Securonix

Marnie Wilking
Orion Health
Randell Smith
City of Phoenix
Michael Lipinski
CISO and Chief Security Strategist
Expand Additional Information

IT is undergoing a massive transformation as organizations adopt cloud technologies to meet business demands of elasticity and on-demand computing. With hybrid IT becoming the norm, critical enterprise assets like sensitive data and infrastructure now reside beyond the traditional perimeter. As organizations deliver sanctioned cloud platforms that meet the needs of users, they must also meet security and compliance mandates. This boardroom discussion investigates unique security requirements for different cloud models like SaaS, PaaS, IaaS and collaboration providers, and analytics-based strategies for creating a holistic risk, access control, governance and compliance solution across the cloud and the enterprise.

1:20pm - 1:35pm Game Changer 1

The Incredible Shrinking Perimeter

Game Changer  sponsored by: Vidder

Josh Pollock
Head of Enterprise Solutions
Expand Additional Information

Learn how a Fortune 50 company leveraged technology to shrink their perimeter, significantly reducing their attack surface and creating a new layer of defense around individual apps and valuable assets.

1:38pm - 1:53pm Game Changer 2

The Age of the Platform

Game Changer 

Phil Simon

Arizona State University
Expand Additional Information

Award-winning author Phil Simon will discuss how Amazon, Apple, Facebook, and Google have redefined business.

1:55pm - 2:10pm Game Changer 3

Scaling the Villain – How Everyday Criminals Are Expanding the Threat Landscape

Game Changer 

Brad Wardman
Senior Manager, InfoSec
PayPal, Inc.
Expand Additional Information

What do the minds of cyber criminals look like? What choices do they make and how? With the widespread distribution of tools and services, cyber criminals are able to attack on magnitudes larger than those seen even a few years ago. As innovation and access to technology increases, so does the threat landscape. Step inside the minds of cyber criminals and learn their decision-making processes. In this session, Brad Wardman provides an in-depth look into the tools, strategies and infrastructure used to target employees, networks and customer bases.

2:10pm - 2:30pm

Networking Break

2:30pm - 3:20pm Breakout Sessions

The Big Migration

Featured Speakers  sponsored by: Cylance

Umesh Manathkar
Corporate VP & CIO
Amkor Technology, Inc.
Expand Additional Information

IT leaders are looking up these days — to the cloud that is. But the future can be ominous, especially when migrating to the cloud can mean complications and unprecedented expenditures. With executive leaders, the board of directors and regulators asking IT leaders to “do more with less,” how are CIOs making cost-effective decisions to upgrade, migrate or even leave behind legacy applications? Umesh Manathkar, Corporate VP & CIO, Amkor Technology Inc., presents a case study in prioritizing and leveraging specific cloud applications to reduce overall costs.

Cyber Strategy and Delivery in the New World

Featured Speakers  sponsored by: Splunk

Rajat Sen
Director, Information Security
Republic Services, Inc.
Nate Smalley
Senior Sales Engineer
Expand Additional Information

Disruption and an ever-changing security landscape have presented a variety of opportunities and challenges for security leaders. Join Rajat Sen, director, information security, Republic Services Inc., and Nate Smalley, senior sales engineer, Splunk, to discuss the top five cybersecurity challenges facing the industry, and the journey from creating a strategy to delivering effective security operations. The discussion will highlight key building blocks and how the Republic Services/Splunk partnership made it happen.

Returning Power to the Defender

Executive Boardroom  sponsored by: Cybereason

Vaughn Hazen
Keith Stocks
Blue Cross Blue Shield of Arizona
Ashish Larivee
VP, Products
Expand Additional Information

Advanced attacks have become everyone’s problem. Cyber criminals have greatly increased their capabilities and techniques, targeting major companies across all industries. This reality is driving new responses that promise a brighter future in the fight against cybersecurity adversaries. Join this session to learn about finding the right mix of talent and technologies to overcome the most daunting security challenges, such as talent shortage and lack of visibility and understanding around cyberattacks that may have already infiltrated your environment.

Email Attacks – Prepare Your Defenses

Executive Boardroom  sponsored by: Mimecast

Jason Grovert
VP, Technology
CalAtlantic Homes
Rekha Reddy-Sareen
Vice President, IT Operations and Governance
Universal Technical Institute, Inc.
Tyrin Ford
Senior Manager
Expand Additional Information

The amount of emails sent around the world each day is nearly unfathomable. One Internet and email giant receives a few thousand email hacks per day through users. How do organizations safeguard against hack accounts and other email attacks? What’s the right response to an email attack? Join this discussion to learn how your email could be hacked by any number of threats, the impact these attacks have on businesses, and why your employees are the weakest link in email security.

3:20pm - 3:40pm

Networking Break

3:40pm - 4:20pm Closing Keynote

Collaboration, Creativity, Cybersecurity – Ports America Case Study

Keynote  sponsored by: Okta, Inc.

Donald Mayo
Ports America
Tianbing Qian "TQ"
Ports America
Expand Additional Information

Companies across a variety of industries are facing similar challenges in the journey toward cybersecurity improvement: How to create synergy among CISOs, CIOs and the rest of the c-suite; how to drive improvement and create momentum with limited resources; and how to bring cybersecurity awareness to an industry that has traditionally been very kinetically focused. The partnership between CIO Tianbing “TQ” Qian and CISO Donnie Mayo has been a critical force in driving Ports America’s cybersecurity transformation. In this session, they will share Ports America’s creative approach to developing a more robust, business-driven cybersecurity program.

4:20pm - 5:00pm

Closing Reception & Prize Drawings