New Jersey CIO Virtual Executive Summit

October 13, 2020 | 8:00am - 1:15pm EDT

October 13, 2020 | 8:00am - 1:15pm EDT

Collaborate with your peers

Come together with your peers virtually to tackle top business challenges through peer-driven content and discussions at the New Jersey CIO Virtual Executive Summit.

Join your peers to discuss the most critical issues impacting CIOs today:

Pursuing New Digitally-Enabled Business Models

Improving Business Performance by Transforming Operations

Developing a Comprehensive Digital Security Strategy

Governing Body Co-Chairs

Roota Almeida

Delta Dental of New Jersey

Lookman Fazal

NJ Transit
Chief Information & Digital Officer

Zouhair Guelzim

L'Oreal USA

Warren Kudman

Turner Construction
SVP & Chief Information Officer

Hussein Syed

RWJBarnabas Health
Chief Information Security Officer

Gabrielle Wolfson

Quest Diagnostics Inc
Senior VP & Chief Information & Chief Digital Officer


October 13, 2020

8:00am - 8:45am  EDT Virtual Summit Keynote

Finding Success with Adopting a SASE Architecture

Jason Clark headshot

Jason Clark

Chief Strategy Officer


Dustin Wilcox headshot

Dustin Wilcox



Organizations are feeling a shift in the world of networking and security as they rapidly adopt and embrace the cloud. On-premises private data centers are no longer the place for data and workloads to exist. With this shift, security and networking are brought closer than ever. Enterprises need speed, visibility, security and reliability without compromise. Enter, the secure access service edge, better known as SASE. This evolved concept of cloud security architecture outlines a convergence of multiple security functions to offer identity-based secure access. How can your organization best position itself for the transition?

In this session, you will discuss:

  • Problems SASE can address in the modern enterprise
  • Benefits of moving to a SASE architecture
  • Insights from organizations adopting SASE today

9:00am - 10:00am  EDT Virtual Summit Boardroom

Harnessing Enterprise AI to Bolster Supply Chain Resilience in the Face of Continuous Volatility

Kevin Gokey headshot

Kevin Gokey

Vice President & Global Chief Information Officer

Church & Dwight

Danielle Maurici-Arnone headshot

Danielle Maurici-Arnone

Chief Information Officer, North America

Reckitt Benckiser

Michael Hulbert headshot

Michael Hulbert

Vice President, Consumer Business

Consumer goods companies, already facing a paradigm shift in customers, channels and tech, found their complex situations compounded when the pandemic of our lifetime hit in 2020. How can advanced digital technologies like artificial intelligence support the technical and human resilience needed regain equilibrium, reinvigorate the workforce and create a vision for supply chains that serve customers in the new normal? We will discuss the “Why, What and How” of advanced supply chain planning systems powered by AI and what questions to ask when considering adding this to your toolkit.

In this session you will discover how:

  • AI leverages your data to get beyond the limitations of deterministic rules-based systems 
  • Utilizes probabilistic predictions that drive decisions for direct revenue and profit margin impact 
  • Optimizes for system-wide planner/operator performance improvements and transformational agility
  • Example companies that are getting started, quickly and realizing tangible value with AI

9:00am - 10:00am  EDT Virtual Summit Boardroom

Cloud IAM – Enlightenment or Inferno

Jose Dominguez headshot

Jose Dominguez


TD Ameritrade

Rob Suárez headshot

Rob Suárez

VP, Chief Information Security Officer

Becton, Dickinson and Co

Jeremy Snyder headshot

Jeremy Snyder

VP Business Development and Corporate Development


A strong IAM is one key to preventing data breaches and limiting the blast radius, should a security incident occur. But cloud IAM presents a new set of constructs for organizations to build and manage. Is this the most comprehensive identity and access control out there, or yet another layer of complexity added to your program?

In this session, you will discuss:

  • Why managing cloud IAM is so complex
  • The challenges cloud IAM creates for IT and cybersecurity professionals
  • How leading organizations are governing cloud IAM to reduce risk and the chance of a data breach

10:00am - 10:45am  EDT Virtual Summit Keynote

Accelerate Your Secure Digital Transformation

Jay Chaudhry headshot

Jay Chaudhry

CEO, Chairman & Founder


Eric Brohm headshot

Eric Brohm


Wyndham Hotels and Resorts

The cloud and mobility are powerful enablers of digital transformation, but many organizations are grappling with legacy architectures that haven't evolved much in decades. With most applications in the cloud and employees working remotely, legacy network and security models are not only ineffective, but they hinder your ability to take advantage of the agility, productivity, efficiency, and speed enabled by digital transformation. Network and security architectures need to evolve to securely connect any entities — users, devices, applications — to meet business needs in the digital era.

In this session, Zscaler CEO Jay Chaudhry talks with CISO Eric Brohm, who will discuss how Wyndham's digital transformation has made the company more resilient, enabling its entire staff to work remotely with minimal disruption and no compromising on security.

  • “Owning the moment” — IT’s opportunity to accelerate secure digital transformation
  • Best practices for securing work-from-anywhere using Gartner’s secure access service edge (SASE) and zero trust network access (ZTNA) frameworks
  • What comes next — IT’s new role as strategic business enabler

9:00am - 10:00am  EDT Virtual Summit Boardroom

Forging a Culture of Connectivity and Collaboration

Cherif Amirat headshot

Cherif Amirat

Chief Information Officer


John Kavak headshot

John Kavak


County of Chester

Effective communication is critical, especially when dealing with a crisis. But how can you successfully balance communication needs for multiple disruptions such as the pandemic, economic uncertainty and social unrest, especially while most workforces are continuing to work remotely? How can you keep everyone successfully connected and informed in order to help your business achieve its mission-critical priorities?

Join this session to discover how you can:

  • Create and maintain a vibrant and supportive corporate culture
  • Adapt for success in a rapidly evolving environment
  • Set expectations during changing circumstances while demonstrating empathy, transparency, and action

9:00am - 10:00am  EDT Virtual Summit Boardroom

Enabling and Monitoring a Secure Work-From-Home Culture

Ankur Ahuja headshot

Ankur Ahuja

Vice President and Global CISO


Ravi Ivaturi headshot

Ravi Ivaturi

Sr. Vice President - Digital Security Architecture & Innovation


As businesses plan their post-COVID remote work strategies, now’s the time to set your organization up for success. CIOs and CISOs are at the forefront of building and nurturing a new culture that will outlast the emergency move to remote work.

In this virtual peer-to-peer discussion, CIOs and CISOs will discuss:

  • How technology priorities have shifted to align with business objectives
  • Optimizing business continuity strategies for success in the work-anywhere economy
  • Future-proofing your organization for an uncertain world

8:45am - 9:00am  EDT Break

10:45am - 11:00am  EDT Break

11:00am - 12:00pm  EDT Virtual Summit Boardroom

Cultivating a Culture of Security Awareness

Rod Aday headshot

Rod Aday

Director, Information Risk Management


Balu Arumugam headshot

Balu Arumugam

Head of Global Security Architecture/ Chief Security Architect


Many CIOs and CISOs would agree that human error remains a huge challenge in a cohesive information security strategy. Employees, vendors and even customers all have a role to play when clicking one malicious link can put the organization at serious risk. The CIO and CISO must instill discipline, responsibility and buy-in across a huge swath of users – no easy task.

Join this session to learn:

  • How today’s society informs security awareness training needs and objectives
  • Training techniques that work at scale and resonate with audiences
  • How to measure success and hold users accountable

11:00am - 12:00pm  EDT Virtual Summit Boardroom

Navigating the Organization Through Tomorrow’s Cyberthreats

Scott Bourne headshot

Scott Bourne

IT Risk Management/ Attack Surface Reduction

Merck & Co.

Ken Loisch headshot

Ken Loisch

Director, Information Security & Compliance


Rob Reiser headshot

Rob Reiser

Director Information Security

Tory Burch

At a time when customer trust is paramount and private data is precious, a major breach can be catastrophic for any organization. Effective security is an essential part of effective business strategy, yet security leaders face an ever-growing challenge to guide their enterprise through the evolving threat landscape.

Join your peers in this virtual boardroom to discuss:

  • Strategies for addressing the emerging threat landscape

  • The role today’s CISO plays in guiding business strategy to mitigate risk

  • Communication strategies for educating users about security – and holding them accountable

12:00pm - 12:45pm  EDT Virtual Summit Keynote

Leading Through Disruption

Arvin Bansal headshot

Arvin Bansal

Sr. Director Data & Cloud Security


Koos Lodewijkx headshot

Koos Lodewijkx



The timeline for adopting strategic technology and security trends rapidly increased in recent months, and now CIOs and CISOs are on the forefront of leading innovative business opportunities.

Join C-level executives from our community as they share:

  • Dynamic leadership in a volatile world
  • Remastering your brand in times of transition
  • Practical examples of adaptive strategy in action

By registering for this session, this serves as your authorization to Evanta or its vendor to provide your contact information to IBM to follow up on your interaction and participation. IBM’s use of your contact information is governed by the IBM Privacy Policy. If you need more information on how IBM is using your personal data you may refer to the IBM Privacy Statement. To withdraw your marketing consent and unsubscribe to receiving emails click on the unsubscribe button at this address:

12:45pm - 1:15pm  EDT Networking

Community Discussion

Thomas Etheridge headshot

Thomas Etheridge

Senior Vice President Services


An informal and interactive opportunity for you to network with peers in small groups. 

11:00am - 12:00pm  EDT Virtual Summit Boardroom

Actionable Intelligence – Harnessing the Power of Data and Analytics

Bruce Mathews headshot

Bruce Mathews



Ritesh Patel headshot

Ritesh Patel

Chief Digital Officer

Ogilvy CommonHealth Worldwide

Efficiently employing actionable threat intelligence is key to staying ahead of the next wave of threats. A fast-moving data and analytics program that highlights the latest risks can spell the difference between preventing a breach or becoming the next headline.

Join this session to learn:

  • What key metrics CIOs and CISOs are effectively using
  • Technologies that help automate data and analytics processes
  • More about the evolving nature of today’s threat landscape

October 13, 2020

Your Community Partners

CISO Thought Leader
Key Partner
Program Partners

Community Program Manager

For inquiries related to this community, please reach out to your dedicated contact.

Alyssa Berry

Program Manager