IN-PERSON

Florida CIO Executive Summit

December 7, 2023 | Loews Miami Beach Hotel

December 7, 2023
Loews Miami Beach Hotel

Collaborate with your peers

Get together with Florida's top CIOs to tackle shared business challenges and critical priorities facing your role today. Participate in this one-day, local program with peer-driven topics and interactive discussions with your true C-level peers.

Join your peers to discuss the most critical issues impacting CIOs today:

Aligning technology with the entire organization to improve business outcomes

Creating a culture of innovation to improve processes and efficiencies

Building a Culture of Security and Enabling Smart, Secure Decision Making

Florida CIO Governing Body


The Governing Body Co-Chairs shape the summit agenda, ensuring that all content is driven by CIOs, for CIOs.

Governing Body Co-Chairs

Otto Contreras

City of Miami, FL
Deputy CIO

Jennifer Greenman

Cancer Treatment Centers of America
Chief Information Officer

Christina Shannon

KIK Consumer Products
Chief Information Officer

Luis Suarez

H.I.G. Capital
Senior VP & Chief Information Officer

Christine Vanderpool

Florida Crystals Corporation
VP & Chief Technology Officer

What to Expect

Interactive Sessions

Hear from CIO practitioners and thought leaders on how they're solving critical challenges impacting your role today in Keynote sessions, and join smaller, interactive discussions with your peers in Breakout and Boardroom sessions.

Community Networking

Make new connections and catch up with old friends in casual conversations during dedicated time for networking designed to better acquaint you with your Florida CIO community.

Peer-to-Peer Meetings

Connect with like-minded peers in a private, one-on-one setting through Evanta's Peer-to-Peer Meetings. You will be matched with peers in your community based on your shared interests and priorities.

Agenda


December 6, 2023

December 7, 2023

6:00pm - 8:30pm  Governing Body Welcome Reception

Governing Body Welcome Reception

Governing Body members host this dinner for attendees to launch the event with an evening of peer networking.

7:45am - 8:30am  Registration & Breakfast

8:30am - 9:15am  Keynote

You Speak, They Swarm — The Power of Story in Reaching Your Audience

Arthur Zards headshot

Arthur Zards

Thought Leader, TED/TEDx Speaker, Coach & Producer

Guest Speaker

Speakers want action, not just applause. But busy executives don’t have time to learn complex communication models or esoteric storytelling processes — they need a simple, effective speaking framework that can help them not only connect with any audience, but also elicit real change. Enter the "Swarm Effect."

Join this session with Arthur Zards — a thought leader, TEDster and provocateur — to:

  • Hone your skills in executive influence
  • Adopt a more authentic and engaging approach to speaking
  • Take your next presentation from “understandable” to “compelling"

9:15am - 9:40am  Networking Break

9:40am - 10:25am  Breakout Session

Achieving Organizational Transformation with Emerging Technologies

Scott Montgomery headshot

Scott Montgomery

VP, Strategic Accounts

Island

As CIOs look for ways to bolster productivity and efficiencies across the enterprise, they are more and more reliant on emerging technologies, such as the enterprise browser. According to recent Gartner research, "Enterprise browsers will evolve to become the core platform for almost all of the day-to-day enterprise productivity and security software used by the workforce."

Join this presentation to understand how tech leaders can leverage emerging applications to transform the enterprise. In this session, we will share:

  • Creating an employee experience centered on productivity and flexibility
  • Reimagining how IT leaders can enable users while creating unique business value
  • Benefits and possibilities for critical application protection

9:40am - 10:25am  Executive Boardroom

Data IS Your Business – How Do You Secure it in the Cloud-Era

Matt Castriotta headshot

Matt Castriotta

Manager, Tech GTM

Rubrik

Christopher Knauer headshot

Christopher Knauer

SVP and Chief Security Officer

Foundever

Giancarlo Yin headshot

Giancarlo Yin

Regional CIO - North America

Bacardi

In these times of rapid technological advancement, data stands as the cornerstone of innovation. As we navigate through the information age, it's evident that data residing in the cloud represents the fastest area of growth. To maintain pace with the agility of cloud operations, it is imperative to discover and adopt strategic approaches and robust architectures.

Gather with your C-level peers to:

  • Start solving the challenge of data visibility in the cloud
  • Determine who in your organization should own data security (CISO? CDO? CPO?)
  • Discuss how automation and agility can be accomplished through tooling or processes

10:25am - 11:00am  Networking Break

10:30am - 10:55am  Peer-to-Peer Meetings

Peer-to-Peer Meetings

Connect with like-minded peers in a one-on-one setting through Evanta’s Peer-to-Peer Meetings. You will be matched with peers in your community based on your shared interests and priorities.

11:00am - 11:45am  Breakout Session

Leading with Digital Sustainability — A Strategy Led by Technology

Loren Hudziak headshot

Loren Hudziak

Sr Customer Engineer Manager

Google Chrome Enterprise

Enterprises are under pressure to address multiple challenges impacting the planet, their people and profitability.  This is all happening while a recession is looming, quiet quitting is real and climate change is a top concern. Now is the time to position technology leaders as key partners in tackling these issues maximizes sustainable value across the business.

Join this session to explore sustainable strategies for:

  • Reducing efforts in the negative impact your company and products have on the planet (environmental sustainability)
  • How to best champion and manage the impact on your people (social sustainability)
  • Managing the business' fiscal health and future profitability (financial sustainability)

11:00am - 11:45am  Executive Boardroom

Analyzing Your Application and Infrastructure Technology Strategy

Chad Simpson headshot

Chad Simpson

Chief Information Officer

City Furniture

Eric Gonzalez headshot

Eric Gonzalez

VP, Business Intelligence Architecture

Eastern Bank

Applications can make or break an organization’s growth. Too many and you create an opportunity for redundancies and inefficiencies; too few and you risk getting left in the past. In today’s digital-first workspaces, how can leaders evolve their strategy to maximize the value of their applications, advance key digital initiatives and remain agile in the face of constant change?

Join your peers to discuss:

  • Discontinuing legacy systems, modernizing, and shifting to agile solutions
  • Building a business case for application and technology rationalization
  • Creating architectures that evolve with ever-changing business requirements

11:45am - 12:30pm  Lunch Service

12:30pm - 1:05pm  Keynote

Accelerate Secure Digital Transformation and Zero Trust Architecture

Sam Curry headshot

Sam Curry

VP, CISO

Zscaler

Alex Borhani headshot

Alex Borhani

Deputy CISO

CSX Corporation

New, special demands constantly arise for decision-makers who steer the fortunes of companies. Business success has become inextricably linked to IT infrastructure. Seamless and secure connectivity is the key to unlocking innovation and accelerating business outcomes. To reach this state, enterprises are transforming their networks and security to a zero trust architecture, augmented more and more by AI/ML capabilities, thereby reducing risk, eliminating cost and complexity and increasing agility.

Join this session and learn:

  • How zero trust architecture secures users, workloads, IoT/OT devices, and your business partners by addressing critical security shortcomings of legacy network architecture
  • How to reduce network complexity without exposing your organization to new risks
  • The real Zero Trust journeys of practitioners contrasted with the ideal state, sharing the good, the bad and the ugly

1:05pm - 1:30pm  Break

1:30pm - 2:15pm  Breakout Session

The Path to Alignment – The CIO and CISO Relationship

Marcos Marrero headshot

Marcos Marrero

Chief Information Security Officer

H.I.G. Capital

Luis Suarez headshot

Luis Suarez

Senior VP & Chief Information Officer

H.I.G. Capital

The relationship between the CIO and CISO is critical to an effective enterprise information security program. The leaders must have a collaborative and transparent approach that balances risk with the support of important business objectives and goals. With effective communication, they can be true business partners that support organizational objectives and goals.

Join this fireside chat with Luis Suarez and Marcos Marrero at H.I.G. Capital as they discuss:

  • Strengthening the IT-Security partnership to fuel innovation and accelerate new technology deployments
  • How security became ingrained throughout the entire enterprise
  • Making the relationship work regardless of the reporting structure

1:30pm - 2:15pm  Executive Boardroom

Generative AI — Enhancing Cybersecurity and Beyond

Jason Stockinger headshot

Jason Stockinger

Director, Global Information Security

Royal Caribbean Cruises

Jeff Worthington headshot

Jeff Worthington

Executive Strategist and Cyber Advisor

CrowdStrike

AI and chatbots are quickly making their way into our daily lives, revolutionizing the way we interact with technology. The introduction of Chat GPT is bringing a new level of sophistication to chatbots, enabling them to generate human-like responses with high accuracy. As a leader, you might be wondering how AI and Chat GPT can be leveraged to enhance cybersecurity and other aspects of your business. But you also may be thinking how you are exposing the company to potential threats.

Join this session to learn:

  • What possibilities and limitations these technologies provide
  • Why you may be at a disadvantage if you don't embrace the future of AI and Chat GPT
  • What risks are involved in using AI and Chat GPT type applications

2:15pm - 2:50pm  Networking Break

2:20pm - 2:45pm  Peer-to-Peer Meetings

Peer-to-Peer Meetings

Connect with like-minded peers in a one-on-one setting through Evanta’s Peer-to-Peer Meetings. You will be matched with peers in your community based on your shared interests and priorities.

2:50pm - 3:35pm  Breakout Session

Buzzer over Buzzwords

Devon Bryan headshot

Devon Bryan

Global CIO

Carnival Corporation

Ben Field headshot

Ben Field

CISO

Florida Crystals Corporation

What's your community's top priority? What do your C-Level peers consider the largest hurdle in when it comes to accomplishing their goals? In this fun, highly-interactive, game-show-style session, we'll put your knowledge to the test. 

Come on down to:

  • Compete in a data-driven, community-specific quiz game
  • Learn more about the struggles and opportunities reported by members of your governing body
  • Share and expand on these reported goals and challenges

2:50pm - 3:35pm  Executive Boardroom

Defining Enterprise-wide IT Strategy — Bridging Business Objectives with Technical Excellence

Shawna Cartwright headshot

Shawna Cartwright

Business Information Officer | CIO | SVP Enterprise Technology

Cushman & Wakefield

Stacey Halota headshot

Stacey Halota

VP, IS & Privacy

Graham Holdings

IT & Security leaders can increase the value of IT through operating model changes and creating business alignment efficiencies. By working collaboratively with business units, CIOs & CISOs can prioritize technology needs and invest in capabilities to achieve excellence in operating model structure.

Join this session to discuss:

  • Building an IT strategy closely aligned with the business strategy
  • Driving operational change with strategic change management
  • Attaining efficiencies with a consistent approach to processes

3:35pm - 4:00pm  Break

4:00pm - 4:35pm  Keynote

Balancing the Risk Versus Reward of AI

Udit Mehta headshot

Udit Mehta

Chief Digital Officer & GM Solutions, Fire & Security

Carrier

Gram Ludlow headshot

Gram Ludlow

SVP, Chief Information Security Officer

Marriott Vacations Worldwide Corporation

Brian Fricke headshot

Brian Fricke

Chief Information Security Officer

City National Bank

The hype around generative AI has been focused on opportunities and concerns. Technology executives are now looking to take the conversation a step further to discuss specific use cases and how organizations are using AI as a driver of innovation. With the ease of access, companies are hurrying to implement policies and are working cross-functionally with peers to figure out how AI can address business needs.

During this keynote, speakers will discuss:

  • Practical AI use cases
  • Strategies for creating governance and policies around AI
  • How AI is affecting IT and security talent

4:35pm - 5:00pm  Closing Reception & Prize Drawing

6:00pm - 8:30pm  Governing Body Welcome Reception

Governing Body Welcome Reception

Governing Body members host this dinner for attendees to launch the event with an evening of peer networking.

7:45am - 8:30am  Registration & Breakfast

8:30am - 9:15am  Keynote

You Speak, They Swarm — The Power of Story in Reaching Your Audience

Arthur Zards headshot

Arthur Zards

Thought Leader, TED/TEDx Speaker, Coach & Producer

Guest Speaker

Speakers want action, not just applause. But busy executives don’t have time to learn complex communication models or esoteric storytelling processes — they need a simple, effective speaking framework that can help them not only connect with any audience, but also elicit real change. Enter the "Swarm Effect."

Join this session with Arthur Zards — a thought leader, TEDster and provocateur — to:

  • Hone your skills in executive influence
  • Adopt a more authentic and engaging approach to speaking
  • Take your next presentation from “understandable” to “compelling"

9:15am - 9:40am  Networking Break

9:40am - 10:25am  Breakout Session

Achieving Organizational Transformation with Emerging Technologies

Scott Montgomery headshot

Scott Montgomery

VP, Strategic Accounts

Island

As CIOs look for ways to bolster productivity and efficiencies across the enterprise, they are more and more reliant on emerging technologies, such as the enterprise browser. According to recent Gartner research, "Enterprise browsers will evolve to become the core platform for almost all of the day-to-day enterprise productivity and security software used by the workforce."

Join this presentation to understand how tech leaders can leverage emerging applications to transform the enterprise. In this session, we will share:

  • Creating an employee experience centered on productivity and flexibility
  • Reimagining how IT leaders can enable users while creating unique business value
  • Benefits and possibilities for critical application protection

9:40am - 10:25am  Executive Boardroom

The Evolution of Identity Access Management

Elvis Clemetson headshot

Elvis Clemetson

Chief Information & Technology Officer

SBA Communications

Eduardo Ortiz-Romeu headshot

Eduardo Ortiz-Romeu

Global Head of Cybersecurity

Techtronic Industries North America, Inc.

As an organization’s security strategy matures, so does the complexities associated with ensuring the proper authorization for accessing systems and application resources. Security leaders must have the right tools and processes in place to make certain that the right people have the right access – nothing more. How can leaders propel the organization into the next generation of IAM and fraud detection strategies that protects business outcomes while enables identity-first security?

Join this session to discuss:

  • Looking at the business and technology changes driving the most significant trends in the evolution of access management
  • Making a business case for investing in the next generation of tools that have a demonstrated ROI
  • Creating more efficient processes that allows for employee buy-in

10:25am - 11:00am  Networking Break

10:30am - 10:55am  Peer-to-Peer Meetings

Peer-to-Peer Meetings

Connect with like-minded peers in a one-on-one setting through Evanta’s Peer-to-Peer Meetings. You will be matched with peers in your community based on your shared interests and priorities.

11:00am - 11:45am  Breakout Session

Leading with Digital Sustainability — A Strategy Led by Technology

Loren Hudziak headshot

Loren Hudziak

Sr Customer Engineer Manager

Google Chrome Enterprise

Enterprises are under pressure to address multiple challenges impacting the planet, their people and profitability.  This is all happening while a recession is looming, quiet quitting is real and climate change is a top concern. Now is the time to position technology leaders as key partners in tackling these issues maximizes sustainable value across the business.

Join this session to explore sustainable strategies for:

  • Reducing efforts in the negative impact your company and products have on the planet (environmental sustainability)
  • How to best champion and manage the impact on your people (social sustainability)
  • Managing the business' fiscal health and future profitability (financial sustainability)

11:00am - 11:45am  Executive Boardroom

Crisis Planning – Flip the Asymmetry with Attackers

Oren Wortman headshot

Oren Wortman

VP, Client Leadership | NA

Sygnia

Prashant Cherukuri headshot

Prashant Cherukuri

CIO

Qualfon

Preetam Sirur headshot

Preetam Sirur

Chief Information Security Officer- EyeCare Leaders Division

Global Growth

Preparing for a cyber crisis is imperative and can determine whether it becomes a major catastrophe or a manageable incident. Whether you have experience navigating a crisis or are preparing for the inevitable attack to come, come together with your peers to leverage the wisdom in the room to tackle complex challenges and get ahead of the attackers.

Join this session to discuss:

  • Evaluating common options, dilemmas, and pitfalls in crisis planning
  • Understanding the impact of technical and stakeholder management decisions on the business
  • Identifying key gaps and vulnerabilities often overlooked by security teams

11:45am - 12:30pm  Lunch Service

12:30pm - 1:05pm  Keynote

Accelerate Secure Digital Transformation and Zero Trust Architecture

Sam Curry headshot

Sam Curry

VP, CISO

Zscaler

Alex Borhani headshot

Alex Borhani

Deputy CISO

CSX Corporation

New, special demands constantly arise for decision-makers who steer the fortunes of companies. Business success has become inextricably linked to IT infrastructure. Seamless and secure connectivity is the key to unlocking innovation and accelerating business outcomes. To reach this state, enterprises are transforming their networks and security to a zero trust architecture, augmented more and more by AI/ML capabilities, thereby reducing risk, eliminating cost and complexity and increasing agility.

Join this session and learn:

  • How zero trust architecture secures users, workloads, IoT/OT devices, and your business partners by addressing critical security shortcomings of legacy network architecture
  • How to reduce network complexity without exposing your organization to new risks
  • The real Zero Trust journeys of practitioners contrasted with the ideal state, sharing the good, the bad and the ugly

1:05pm - 1:30pm  Break

1:30pm - 2:15pm  Breakout Session

The Path to Alignment – The CIO and CISO Relationship

Marcos Marrero headshot

Marcos Marrero

Chief Information Security Officer

H.I.G. Capital

Luis Suarez headshot

Luis Suarez

Senior VP & Chief Information Officer

H.I.G. Capital

The relationship between the CIO and CISO is critical to an effective enterprise information security program. The leaders must have a collaborative and transparent approach that balances risk with the support of important business objectives and goals. With effective communication, they can be true business partners that support organizational objectives and goals.

Join this fireside chat with Luis Suarez and Marcos Marrero at H.I.G. Capital as they discuss:

  • Strengthening the IT-Security partnership to fuel innovation and accelerate new technology deployments
  • How security became ingrained throughout the entire enterprise
  • Making the relationship work regardless of the reporting structure

1:30pm - 2:15pm  Executive Boardroom

Generative AI — Enhancing Cybersecurity and Beyond

Jason Stockinger headshot

Jason Stockinger

Director, Global Information Security

Royal Caribbean Cruises

Jeff Worthington headshot

Jeff Worthington

Executive Strategist and Cyber Advisor

CrowdStrike

AI and chatbots are quickly making their way into our daily lives, revolutionizing the way we interact with technology. The introduction of Chat GPT is bringing a new level of sophistication to chatbots, enabling them to generate human-like responses with high accuracy. As a leader, you might be wondering how AI and Chat GPT can be leveraged to enhance cybersecurity and other aspects of your business. But you also may be thinking how you are exposing the company to potential threats.

Join this session to learn:

  • What possibilities and limitations these technologies provide
  • Why you may be at a disadvantage if you don't embrace the future of AI and Chat GPT
  • What risks are involved in using AI and Chat GPT type applications

1:30pm - 2:15pm  Executive Boardroom

Up Your Cloud Game

Virginia Jacome headshot

Virginia Jacome

Director, Cyber Security

Florida Cancer Specialists

Ricardo Johnson headshot

Ricardo Johnson

VP, CISO

Dentsply Sirona

Simone Williams headshot

Simone Williams

Senior IT Director, Enterprise Security & Risk Services

Dycom Industries

As the cloud landscape continues to evolve, so too should the strategies CISOs develop in order to remain secure. The seismic changes of cloud migration, and ultimately cloud maturity, can be difficult to manage, but the CISOs who transition effectively will find their organizations more agile and secure.

During this peer-discussion you will explore:

  • Strategies to guide your organization's cloud priorities
  • Connecting a “cloud right” strategy to business value
  • Setting realistic goals to achieve cloud maturity

2:15pm - 2:50pm  Networking Break

2:20pm - 2:45pm  Peer-to-Peer Meetings

Peer-to-Peer Meetings

Connect with like-minded peers in a one-on-one setting through Evanta’s Peer-to-Peer Meetings. You will be matched with peers in your community based on your shared interests and priorities.

2:50pm - 3:35pm  Breakout Session

Buzzer over Buzzwords

Devon Bryan headshot

Devon Bryan

Global CIO

Carnival Corporation

Ben Field headshot

Ben Field

CISO

Florida Crystals Corporation

What's your community's top priority? What do your C-Level peers consider the largest hurdle in when it comes to accomplishing their goals? In this fun, highly-interactive, game-show-style session, we'll put your knowledge to the test. 

Come on down to:

  • Compete in a data-driven, community-specific quiz game
  • Learn more about the struggles and opportunities reported by members of your governing body
  • Share and expand on these reported goals and challenges

2:50pm - 3:35pm  Executive Boardroom

Bolstering Your Third-Party Defense Strategy

Michael Calderin headshot

Michael Calderin

CISO

YAGEO Group

Dr. Domingo Castillo headshot

Dr. Domingo Castillo

Chief Information Security Officer

Miami Dade College

Staying ahead of the next third-party event requires a lot; tools, team buy-in and, most importantly, planning. A good third-party defense plan can do a lot more than protect you from data breaches and overlooked vulnerabilities. When done right, your plan can increase efficiency and move you one step closer to improved metrics and KPIs.

Join your C-suite peers to:

  • Discuss the future of third-party defense
  • Learn what some are doing to stay ahead of the next threat landscape shift
  • Chart your third-party defense plan despite potential resource and talent challenges

3:35pm - 4:00pm  Break

4:00pm - 4:35pm  Keynote

Balancing the Risk Versus Reward of AI

Udit Mehta headshot

Udit Mehta

Chief Digital Officer & GM Solutions, Fire & Security

Carrier

Gram Ludlow headshot

Gram Ludlow

SVP, Chief Information Security Officer

Marriott Vacations Worldwide Corporation

Brian Fricke headshot

Brian Fricke

Chief Information Security Officer

City National Bank

The hype around generative AI has been focused on opportunities and concerns. Technology executives are now looking to take the conversation a step further to discuss specific use cases and how organizations are using AI as a driver of innovation. With the ease of access, companies are hurrying to implement policies and are working cross-functionally with peers to figure out how AI can address business needs.

During this keynote, speakers will discuss:

  • Practical AI use cases
  • Strategies for creating governance and policies around AI
  • How AI is affecting IT and security talent

4:35pm - 5:00pm  Closing Reception & Prize Drawing

December 6, 2023

December 7, 2023

We look forward to seeing you at an upcoming in-person gathering


Evanta cares about the health and safety of our community. Please review the following recommendations prior to attending the gathering.

Location


Venue & Accommodation

Loews Miami Beach Hotel
MORE INFORMATION

A block of rooms has been reserved at the Loews Miami Beach Hotel at a reduced conference rate. Reservations should be made online or by calling 1-888-879-0462. Please mention EFS123 to ensure the appropriate room rate.

Deadline to book using the discounted room rate of $599 USD (plus tax) is November 5, 2023.

Your Community Partners


Global Thought Leaders
Key Partners
Program Partners

Community Program Manager


For inquiries related to this community, please reach out to your dedicated contact.

Kaila Overton

Community Program Manager

(713) 206-3323

kaila.overton@evanta.com