IN-PERSON

Charlotte CIO Executive Summit

November 14, 2024 | Westin Charlotte

November 14, 2024
Westin Charlotte

APPLY TO PARTICIPATE

Collaborate with your peers

Get together with Charlotte's top CIOs to tackle shared business challenges and critical priorities facing your role today. Participate in this one-day, local program with peer-driven topics and interactive discussions with your true C-level peers.

Join your peers to discuss the most critical issues impacting CIOs today:

Strengthening influence and partnerships across organization

Making data-driven decisions to improve business outcomes and allow for innovation

Thoughtfully leveraging AI to develop needed, business-enabling tools and processes

Charlotte CIO Governing Body


The Governing Body Co-Chairs shape the summit agenda, ensuring that all content is driven by CIOs, for CIOs.

Governing Body Co-Chairs

Ken Athanasiou

VF Corp
CISO

Christina Bray

Collins Aerospace
Deputy CISO

William Curtiss

Paper Excellence
Global CISO

Frank DePaola

Enpro
VP, CISO

Steve Hagood

Trane Technologies
SVP & CIO

Murshid Khan

Coastal Federal Credit Union
CIO

John Scrimsher

Kontoor Brands
CISO

Patrick Thompson

DXC Technology
Senior Vice President, Enterprise Transformation Office

Bonnie Titone

Duke Energy
SVP & Chief Administration Officer

Kimberly Trapani

American Tire Distributors
SVP & CISO

What to Expect

Interactive Sessions

Hear from CIO practitioners and thought leaders on how they're solving critical challenges impacting your role today in Keynote sessions, and join smaller, interactive discussions with your peers in Breakout and Boardroom sessions.

Community Networking

Make new connections and catch up with old friends in casual conversations during dedicated time for networking designed to better acquaint you with your Charlotte CIO community.

Peer-to-Peer Meetings

Connect with like-minded peers in a private, one-on-one setting through Evanta's Peer-to-Peer Meetings. You will be matched with peers in your community based on your shared interests and priorities.

Agenda


November 14, 2024

7:45am - 8:30am  Registration & Breakfast

Registration, Breakfast and Leadership Book Swap

Please join us for breakfast to start out the day. We also invite you to bring your favorite leadership books for a Book Swap at the Executive Summit throughout the day. Which books have influenced you as a leader? Bring a book with your notes in the margins or a fresh copy to leave, and then swap for a book one of your fellow executives has brought. This idea was inspired by one of your own Governing Body Members!

8:30am - 9:15am  Keynote

You Speak, They Swarm — The Power of Story in Reaching Your Audience

Arthur Zards headshot

Arthur Zards

Thought Leader, TED/TEDx Speaker, Coach & Producer

Guest Speaker

"Those who tell the stories rule society." (Plato) Busy executives don’t have time to learn complex communication models or esoteric storytelling processes — you need a simple, effective framework that can help you not only connect with any audience, but also elicit real change. Enter the SWARM Effect.

Join this session with Arthur Zards — an expert on storytelling, TEDster and provocateur — to:

  • Hone your skills in executive influence
  • Adopt a more authentic and engaging approach to speaking
  • Take your next presentation from “understandable” to “compelling”

9:15am - 9:40am  Networking Break

9:40am - 10:25am  Breakout Session

AI Data Readiness — A Blueprint for Success

Andre Walker-Upshur headshot

Andre Walker-Upshur

Senior Principal, Data Analytics/Security, Value Creation

Google Cloud

Achieving AI data readiness is crucial for organizations aiming to leverage machine learning effectively. By prioritizing high-quality, well-structured data, companies can enhance the accuracy and efficiency of their AI systems. Implementing robust data management practices, including collection, preprocessing and validation, supports scalable and reliable AI applications, driving innovation and maintaining a competitive edge in the tech industry.

Join this session to learn more about:

  • Prioritizing high-quality, well-structured data to enhance AI system accuracy and efficiency
  • Implementing robust data management practices
  • Focusing on scalable and reliable AI applications to drive innovation and maintain a competitive edge

9:40am - 10:25am  Executive Boardroom

Privacy by Design — Win Consumer Trust and Loyalty in Age of AI

Ken Athanasiou headshot

Ken Athanasiou

CISO

VF Corp

Eric Christian headshot

Eric Christian

SVP & Enterprise Chief Technology Officer

Advocate Health

Personal data holds immense value for organizations and, as more commerce takes place over digital channels, consumers are increasingly concerned about what’s happening to all their data.  According to a recent study, 98% of consumers want brands to do more to guarantee the privacy of their data, as well as be more transparent about how their data is used. Earning consumer trust starts with being a good steward of customer data, which makes the topic of data privacy and protection a critical issue for all businesses, and especially for those companies looking to use new AI tools to scale.

Join this session to discuss:

  • Navigating the convergence of consumer, government, and market forces that shape global flows of data
  • Integrating privacy by design principles into the entire customer journey and product life cycle
  • Responsibly leveraging new technologies, such as AI, without sacrificing customer trust and loyalty

9:40am - 10:25am  Executive Boardroom

Extending the Identity Security Frontier

Mike Williams headshot

Mike Williams

SVP, Americas Sales

Delinea

Michael Irwin headshot

Michael Irwin

CISO

Odyssey Logistics

John Opala headshot

John Opala

VP & Global CISO

Hanesbrands

With the sensitivity of privileged accounts, unpatched vulnerabilities and an extensive remote workforce, robust and automated identify security is essential to securing your most critical systems and data. Implementing this is a journey, not a quick fix.

Join this interactive boardroom to discuss:

  • The difference between strong identity solutions and simple password management
  • Address different approaches to solving Privilege Access Management
  • Gain buy in from across the organization on effective solutions

10:25am - 11:05am  Networking Break

10:30am - 10:55am  Peer-to-Peer Meetings

Peer-to-Peer Meetings

Connect with like-minded peers in a one-on-one setting through Evanta’s Peer-to-Peer Meetings. You will be matched with peers in your community based on your shared interests and priorities.

11:05am - 11:50am  Breakout Session

Driving Growth and Value Through IT and Business Alignment

Prashant Nema headshot

Prashant Nema

EVP, Global CIO

Arch

Alignment between IT and business strategies is critical to drive organizational growth and optimize costs. At Arch we have adopted operating model which prioritizes key transformation over a broad range of IT changes towards business strategy. This has fueled several transformation initiatives across Data, Process and Underwriting to enable to business goals.

Join this session to hear about:

  • Integrating technology with business strategy through focused OKRs
  • Using your IT investments through smart prioritization that improves business outcomes
  • Working across the business & IT with an agile portfolio management
  • Data transformation core to Automation and AI improvements
  • Continuous Talent development

11:05am - 11:50am  Executive Boardroom

Generative AI — Should CISOs be Guardians or Gatekeepers?

Lior Yaari headshot

Lior Yaari

CEO and Co-Founder

Grip Security

Mick Leach headshot

Mick Leach

Field CISO

Abnormal Security

John Scrimsher headshot

John Scrimsher

CISO

Kontoor Brands

From content generation to data analysis, generative AI is transforming the way people work and drastically improving productivity. However, the benefits do not come without risks, and the technology has the potential to do more harm than good when placed in the wrong hands. So what do security leaders need to know about the risks of generative AI, and how do they mitigate them?

Join this session for an insightful discussion on the latest cybersecurity challenges associated with generative AI, including:

  • How the threat landscape is changing as a result of generative AI
  • How businesses can ensure the privacy and security of sensitive data used in generative AI applications and govern them appropriately
  • What tools and capabilities are necessary to protect organizations from malicious uses of generative AI

11:05am - 11:50am  Executive Boardroom

SecOps Transformation — Cybersecurity at Scale

Xavier Saavedra headshot

Xavier Saavedra

Director, SOC Transformation Advisors

Palo Alto Networks

Today’s security operations centers are facing a barrage of “more.” More attacks. More threat actors. More devices and data. More security tools. More regulations. More specialized focus areas. More silos. With the modern security landscape changing fast, the SOC must evolve to meet current threats, demands and pressures.

 Join this session to discuss:

  • Balancing business demands and a stable security architecture at scale
  • Gaining clarity with AI-driven intelligence
  • Integrating incident responses for faster reaction

11:50am - 12:35pm  Lunch Service

12:35pm - 1:10pm  Keynote

Building a Cloud Culture Supportive of Innovation

Amish Patel headshot

Amish Patel

Chief Technology Officer

Elevance Health

James Weaver headshot

James Weaver

Secretary and State CIO

State of North Carolina

IT leaders at cloud-powered organizations know that transformation is a cross-enterprise effort requiring sustained innovation. By leveraging new technologies throughout the infrastructure, leaders can rapidly deploy new capabilities, remain agile, create stability, and reduce costs. But to make all this work, collaboration is crucial.

Join this keynote to hear about:

  • Embracing new technologies alongside the integration of a cloud environment
  • Aligning IT goals with business goals
  • Collaborating with across the organization and with business partners

1:10pm - 1:35pm  Networking Break

1:35pm - 2:20pm  Breakout Session

Enhancing Security in a Converging IT/OT Landscape

Frank DePaola headshot

Frank DePaola

VP, CISO

Enpro

Todd Wiedman headshot

Todd Wiedman

Global Chief Security Officer

Landis+Gyr

As IT and OT environments converge, robust OT cybersecurity becomes crucial. This session will explore practical insights and strategies to strengthen OT cybersecurity while maintaining financial efficiency, ensuring the resilience and reliability of your organization's critical operations.

Join this interactive session to discuss:

  • The evolving cyber threat landscape and its impact on OT systems
  • Budget-friendly best practices for layered cybersecurity in OT environments and the ROI of these measures
  • Strategies for bridging the gap between IT and OT cybersecurity teams

1:35pm - 2:20pm  Executive Boardroom

Strengthening Business Continuity through Rapid IT Recovery

Wayne Segar headshot

Wayne Segar

Global Field CTO

Dynatrace

Ben Schwering headshot

Ben Schwering

CISO

Premier

Recovering quickly from system disruptions is crucial for business resilience and the bottom line. Recent incidents have further highlighted the need for robust recovery strategies. CIOs can leverage best practices, advanced technologies and communication across the organization to maintain stability during crises.

Join this session to discuss:

  • Implementing capabilities for immediate situational awareness
  • Building resilient IT infrastructure to withstand future challenges
  • Safeguarding operations through application reliability and early issue detection

1:35pm - 2:20pm  Executive Boardroom

The Art of Data Security — Protecting Your Most Important Asset

Michael Ferguson headshot

Michael Ferguson

Chief Data Security Strategist

Cyera

As leaders you’re being asked to find ways to securely enable your business to use data to drive innovation - and become a data master. But this takes a fundamental understanding of what data exists within your environment, where it's running, its risk level, who has access to it, and how it's being used. This interactive discussion will cover the challenges and solutions CISOs and CIOs use to discover their data attack surface, monitor, detect and respond to data threats - including the scope of breach identification - and ensure data compliance.

Join this session to discuss:

  • Gaining data visibility as a foundation for data governance
  • Managing the evolving landscape of laws, regulations, and industry standards around data security
  • Working with the right tools and teams across a shared responsibility model to ensure compliance

2:20pm - 3:00pm  Networking Break

2:25pm - 2:50pm  Peer-to-Peer Meetings

Peer-to-Peer Meetings

Connect with like-minded peers in a one-on-one setting through Evanta’s Peer-to-Peer Meetings. You will be matched with peers in your community based on your shared interests and priorities.

3:00pm - 3:45pm  Breakout Session

The Essential Qualities of an Effective and Impactful Leader

Neil Khatod headshot

Neil Khatod

CISO, Americas

Hays

Truly exceptional leaders create a culture of trust and respect, inspire innovation, and drive high performance. They lead by example and encourage collaboration. This session will explore stories of leadership and strategies on how to have a true impact on not just an organization, but on people.

Join this interactive session to discuss:

  • Building High-Performing Teams: Creating supportive, adaptable, and growth-focused environments
  • Influencing Across the Organization: Strategically engaging stakeholders through strong communication
  • Navigating Evolving Responsibilities: Embracing accountability with authenticity and resiliency

3:00pm - 3:45pm  Executive Boardroom

Bringing DevSecOps to Cloud Security

Brooks Cunningham headshot

Brooks Cunningham

Sr. Security Strategist

Fastly

Mike Brannon headshot

Mike Brannon

Director, Infrastructure & Security

National Gypsum

The threat landscape is continuing to expand and diversify as organizations move to a multi-cloud environment. CISOs need to ensure that their DevSecOps capabilities are incorporated within their overall business strategy to guarantee that their cloud applications and code can remain secure.

  • Understanding there is no one-size-fits-all model for DevSecOps
  • Best practices for integrating DevSecOps into your cloud security strategy
  • Exploring the intersection between development, security and DevSecOps

3:00pm - 3:45pm  Executive Boardroom

Generating ROI with AI

David Ellison headshot

David Ellison

Chief Data Scientist

Lenovo

No business leader chooses technology for technology’s sake—they’re looking for substantive improvements in outcomes for their enterprise. AI is no different, but the speed of its evolution can make choosing the best path forward challenging. From people and processes to security and technology, join this boardroom to talk through what’s working and what’s not, including how to:

  • Choose use cases that generate revenue and identify KPI’s for ROI tracking
  • Evaluate the constantly evolving AI ecosystem
  • Build and educate teams to support AI adoption and implementation

3:45pm - 4:10pm  Networking Break

4:10pm - 4:45pm  Keynote

Maximize IT Investment Value with a Business Capability Approach

Janelle Hill headshot

Janelle Hill

Distinguished VP Analyst

Gartner

Accelerating IT demand combined with limited budgets exacerbate digital executive leaders’ perennial struggle to prioritize IT change requests. Learn to use business capabilities, categorized by value contribution to strategy execution, to create an IT investment criterion that transcends organizational boundaries and budgets.

Join this Keynote to answer these questions:

  • What are business capabilities and why are they important?
  • How can CIOs and CISOs use them to reconcile demand for technology-enabled business change with IT capacity?
  • What can CIOs and CISOs do to sustain a capability-led investment approach?

4:45pm - 5:00pm  Closing Comments and Prize Drawing

5:00pm - 6:30pm  Governing Body Reception

Governing Body Reception

Governing Body members host this reception for executives to close out the event with an evening of peer networking, food and drinks.

7:45am - 8:30am  Registration & Breakfast

Registration, Breakfast and Leadership Book Swap

Please join us for breakfast to start out the day. We also invite you to bring your favorite leadership books for a Book Swap at the Executive Summit throughout the day. Which books have influenced you as a leader? Bring a book with your notes in the margins or a fresh copy to leave, and then swap for a book one of your fellow executives has brought. This idea was inspired by one of your own Governing Body Members!

8:30am - 9:15am  Keynote

You Speak, They Swarm — The Power of Story in Reaching Your Audience

Arthur Zards headshot

Arthur Zards

Thought Leader, TED/TEDx Speaker, Coach & Producer

Guest Speaker

"Those who tell the stories rule society." (Plato) Busy executives don’t have time to learn complex communication models or esoteric storytelling processes — you need a simple, effective framework that can help you not only connect with any audience, but also elicit real change. Enter the SWARM Effect.

Join this session with Arthur Zards — an expert on storytelling, TEDster and provocateur — to:

  • Hone your skills in executive influence
  • Adopt a more authentic and engaging approach to speaking
  • Take your next presentation from “understandable” to “compelling”

9:15am - 9:40am  Networking Break

9:40am - 10:25am  Breakout Session

AI Data Readiness — A Blueprint for Success

Andre Walker-Upshur headshot

Andre Walker-Upshur

Senior Principal, Data Analytics/Security, Value Creation

Google Cloud

Achieving AI data readiness is crucial for organizations aiming to leverage machine learning effectively. By prioritizing high-quality, well-structured data, companies can enhance the accuracy and efficiency of their AI systems. Implementing robust data management practices, including collection, preprocessing and validation, supports scalable and reliable AI applications, driving innovation and maintaining a competitive edge in the tech industry.

Join this session to learn more about:

  • Prioritizing high-quality, well-structured data to enhance AI system accuracy and efficiency
  • Implementing robust data management practices
  • Focusing on scalable and reliable AI applications to drive innovation and maintain a competitive edge

9:40am - 10:25am  Executive Boardroom

Privacy by Design — Win Consumer Trust and Loyalty in Age of AI

Ken Athanasiou headshot

Ken Athanasiou

CISO

VF Corp

Eric Christian headshot

Eric Christian

SVP & Enterprise Chief Technology Officer

Advocate Health

Personal data holds immense value for organizations and, as more commerce takes place over digital channels, consumers are increasingly concerned about what’s happening to all their data.  According to a recent study, 98% of consumers want brands to do more to guarantee the privacy of their data, as well as be more transparent about how their data is used. Earning consumer trust starts with being a good steward of customer data, which makes the topic of data privacy and protection a critical issue for all businesses, and especially for those companies looking to use new AI tools to scale.

Join this session to discuss:

  • Navigating the convergence of consumer, government, and market forces that shape global flows of data
  • Integrating privacy by design principles into the entire customer journey and product life cycle
  • Responsibly leveraging new technologies, such as AI, without sacrificing customer trust and loyalty

9:40am - 10:25am  Executive Boardroom

Extending the Identity Security Frontier

Mike Williams headshot

Mike Williams

SVP, Americas Sales

Delinea

Michael Irwin headshot

Michael Irwin

CISO

Odyssey Logistics

John Opala headshot

John Opala

VP & Global CISO

Hanesbrands

With the sensitivity of privileged accounts, unpatched vulnerabilities and an extensive remote workforce, robust and automated identify security is essential to securing your most critical systems and data. Implementing this is a journey, not a quick fix.

Join this interactive boardroom to discuss:

  • The difference between strong identity solutions and simple password management
  • Address different approaches to solving Privilege Access Management
  • Gain buy in from across the organization on effective solutions

10:25am - 11:05am  Networking Break

10:30am - 10:55am  Peer-to-Peer Meetings

Peer-to-Peer Meetings

Connect with like-minded peers in a one-on-one setting through Evanta’s Peer-to-Peer Meetings. You will be matched with peers in your community based on your shared interests and priorities.

11:05am - 11:50am  Breakout Session

Driving Growth and Value Through IT and Business Alignment

Prashant Nema headshot

Prashant Nema

EVP, Global CIO

Arch

Alignment between IT and business strategies is critical to drive organizational growth and optimize costs. At Arch we have adopted operating model which prioritizes key transformation over a broad range of IT changes towards business strategy. This has fueled several transformation initiatives across Data, Process and Underwriting to enable to business goals.

Join this session to hear about:

  • Integrating technology with business strategy through focused OKRs
  • Using your IT investments through smart prioritization that improves business outcomes
  • Working across the business & IT with an agile portfolio management
  • Data transformation core to Automation and AI improvements
  • Continuous Talent development

11:05am - 11:50am  Executive Boardroom

Generative AI — Should CISOs be Guardians or Gatekeepers?

Lior Yaari headshot

Lior Yaari

CEO and Co-Founder

Grip Security

Mick Leach headshot

Mick Leach

Field CISO

Abnormal Security

John Scrimsher headshot

John Scrimsher

CISO

Kontoor Brands

From content generation to data analysis, generative AI is transforming the way people work and drastically improving productivity. However, the benefits do not come without risks, and the technology has the potential to do more harm than good when placed in the wrong hands. So what do security leaders need to know about the risks of generative AI, and how do they mitigate them?

Join this session for an insightful discussion on the latest cybersecurity challenges associated with generative AI, including:

  • How the threat landscape is changing as a result of generative AI
  • How businesses can ensure the privacy and security of sensitive data used in generative AI applications and govern them appropriately
  • What tools and capabilities are necessary to protect organizations from malicious uses of generative AI

11:05am - 11:50am  Executive Boardroom

SecOps Transformation — Cybersecurity at Scale

Xavier Saavedra headshot

Xavier Saavedra

Director, SOC Transformation Advisors

Palo Alto Networks

Today’s security operations centers are facing a barrage of “more.” More attacks. More threat actors. More devices and data. More security tools. More regulations. More specialized focus areas. More silos. With the modern security landscape changing fast, the SOC must evolve to meet current threats, demands and pressures.

 Join this session to discuss:

  • Balancing business demands and a stable security architecture at scale
  • Gaining clarity with AI-driven intelligence
  • Integrating incident responses for faster reaction

11:50am - 12:35pm  Lunch Service

12:35pm - 1:10pm  Keynote

Building a Cloud Culture Supportive of Innovation

Amish Patel headshot

Amish Patel

Chief Technology Officer

Elevance Health

James Weaver headshot

James Weaver

Secretary and State CIO

State of North Carolina

IT leaders at cloud-powered organizations know that transformation is a cross-enterprise effort requiring sustained innovation. By leveraging new technologies throughout the infrastructure, leaders can rapidly deploy new capabilities, remain agile, create stability, and reduce costs. But to make all this work, collaboration is crucial.

Join this keynote to hear about:

  • Embracing new technologies alongside the integration of a cloud environment
  • Aligning IT goals with business goals
  • Collaborating with across the organization and with business partners

1:10pm - 1:35pm  Networking Break

1:35pm - 2:20pm  Breakout Session

Enhancing Security in a Converging IT/OT Landscape

Frank DePaola headshot

Frank DePaola

VP, CISO

Enpro

Todd Wiedman headshot

Todd Wiedman

Global Chief Security Officer

Landis+Gyr

As IT and OT environments converge, robust OT cybersecurity becomes crucial. This session will explore practical insights and strategies to strengthen OT cybersecurity while maintaining financial efficiency, ensuring the resilience and reliability of your organization's critical operations.

Join this interactive session to discuss:

  • The evolving cyber threat landscape and its impact on OT systems
  • Budget-friendly best practices for layered cybersecurity in OT environments and the ROI of these measures
  • Strategies for bridging the gap between IT and OT cybersecurity teams

1:35pm - 2:20pm  Executive Boardroom

Strengthening Business Continuity through Rapid IT Recovery

Wayne Segar headshot

Wayne Segar

Global Field CTO

Dynatrace

Ben Schwering headshot

Ben Schwering

CISO

Premier

Recovering quickly from system disruptions is crucial for business resilience and the bottom line. Recent incidents have further highlighted the need for robust recovery strategies. CIOs can leverage best practices, advanced technologies and communication across the organization to maintain stability during crises.

Join this session to discuss:

  • Implementing capabilities for immediate situational awareness
  • Building resilient IT infrastructure to withstand future challenges
  • Safeguarding operations through application reliability and early issue detection

1:35pm - 2:20pm  Executive Boardroom

The Art of Data Security — Protecting Your Most Important Asset

Michael Ferguson headshot

Michael Ferguson

Chief Data Security Strategist

Cyera

As leaders you’re being asked to find ways to securely enable your business to use data to drive innovation - and become a data master. But this takes a fundamental understanding of what data exists within your environment, where it's running, its risk level, who has access to it, and how it's being used. This interactive discussion will cover the challenges and solutions CISOs and CIOs use to discover their data attack surface, monitor, detect and respond to data threats - including the scope of breach identification - and ensure data compliance.

Join this session to discuss:

  • Gaining data visibility as a foundation for data governance
  • Managing the evolving landscape of laws, regulations, and industry standards around data security
  • Working with the right tools and teams across a shared responsibility model to ensure compliance

2:20pm - 3:00pm  Networking Break

2:25pm - 2:50pm  Peer-to-Peer Meetings

Peer-to-Peer Meetings

Connect with like-minded peers in a one-on-one setting through Evanta’s Peer-to-Peer Meetings. You will be matched with peers in your community based on your shared interests and priorities.

3:00pm - 3:45pm  Breakout Session

The Essential Qualities of an Effective and Impactful Leader

Neil Khatod headshot

Neil Khatod

CISO, Americas

Hays

Truly exceptional leaders create a culture of trust and respect, inspire innovation, and drive high performance. They lead by example and encourage collaboration. This session will explore stories of leadership and strategies on how to have a true impact on not just an organization, but on people.

Join this interactive session to discuss:

  • Building High-Performing Teams: Creating supportive, adaptable, and growth-focused environments
  • Influencing Across the Organization: Strategically engaging stakeholders through strong communication
  • Navigating Evolving Responsibilities: Embracing accountability with authenticity and resiliency

3:00pm - 3:45pm  Executive Boardroom

Bringing DevSecOps to Cloud Security

Brooks Cunningham headshot

Brooks Cunningham

Sr. Security Strategist

Fastly

Mike Brannon headshot

Mike Brannon

Director, Infrastructure & Security

National Gypsum

The threat landscape is continuing to expand and diversify as organizations move to a multi-cloud environment. CISOs need to ensure that their DevSecOps capabilities are incorporated within their overall business strategy to guarantee that their cloud applications and code can remain secure.

  • Understanding there is no one-size-fits-all model for DevSecOps
  • Best practices for integrating DevSecOps into your cloud security strategy
  • Exploring the intersection between development, security and DevSecOps

3:00pm - 3:45pm  Executive Boardroom

Generating ROI with AI

David Ellison headshot

David Ellison

Chief Data Scientist

Lenovo

No business leader chooses technology for technology’s sake—they’re looking for substantive improvements in outcomes for their enterprise. AI is no different, but the speed of its evolution can make choosing the best path forward challenging. From people and processes to security and technology, join this boardroom to talk through what’s working and what’s not, including how to:

  • Choose use cases that generate revenue and identify KPI’s for ROI tracking
  • Evaluate the constantly evolving AI ecosystem
  • Build and educate teams to support AI adoption and implementation

3:45pm - 4:10pm  Networking Break

4:10pm - 4:45pm  Keynote

Maximize IT Investment Value with a Business Capability Approach

Janelle Hill headshot

Janelle Hill

Distinguished VP Analyst

Gartner

Accelerating IT demand combined with limited budgets exacerbate digital executive leaders’ perennial struggle to prioritize IT change requests. Learn to use business capabilities, categorized by value contribution to strategy execution, to create an IT investment criterion that transcends organizational boundaries and budgets.

Join this Keynote to answer these questions:

  • What are business capabilities and why are they important?
  • How can CIOs and CISOs use them to reconcile demand for technology-enabled business change with IT capacity?
  • What can CIOs and CISOs do to sustain a capability-led investment approach?

4:45pm - 5:00pm  Closing Comments and Prize Drawing

5:00pm - 6:30pm  Governing Body Reception

Governing Body Reception

Governing Body members host this reception for executives to close out the event with an evening of peer networking, food and drinks.

November 14, 2024

We look forward to seeing you at an upcoming in-person gathering


Evanta cares about the health and safety of our community. Please review the following recommendations prior to attending the gathering.

Location


Venue & Accommodation

Westin Charlotte
MORE INFORMATION

A block of rooms has been reserved at the Westin Charlotte at a reduced conference rate. Reservations should be made online or by calling 1-866-837-4148. Please mention Evanta CISO and CIO Executive Summit to ensure the appropriate room rate.

Deadline to book using the discounted room rate of $284 USD (plus tax) is October 22, 2024.

Your Community Partners


CIO Thought Leaders
CISO Thought Leader
Key Partners
Program Partners

Community Program Manager


For inquiries related to this community, please reach out to your dedicated contact.

Marsha Wick

Community Program Manager

503-701-1111

marsha.wick@evanta.com