Phoenix CIO Virtual Executive Summit

May 19, 2021 | 8:00am - 3:00pm MST

May 19, 2021 | 8:00am - 3:00pm MST

REGISTER NOW

Collaborate with your peers

Come together with your peers virtually to tackle top business challenges through peer-driven content and discussions at the Phoenix CIO Virtual Executive Summit.

Join your peers to discuss the most critical issues impacting CIOs today:

The Next Phase of Digital Innovation

Cybersecurity in a New Era

Leading through a Business Culture Shift

Co-Chairs

Mike Goodwin

PetSmart
CIO

Mike Lettman

Department of Homeland Security
Cyber Security Advisor (CSA) Arizona- Cybersecurity and Infrastructure Security Agency

Jason Lish

Advisor
CISO

Shaun Marion

Republic Services
CISO

Todd Redfoot

GoDaddy.com
Chief Privacy & Risk Officer

Justin Replogle

Honeywell Aerospace
VP, IT

Tim Roemer

State of Arizona
CISO

J.R. Sloan

State of Arizona
CIO

What to Expect

Connect with your CIO community through a variety of different session formats at the upcoming Virtual Executive Summit. You'll have the opportunity to listen, engage and create lasting relationships with like-minded peers.

Sessions

Hear from CIO practitioners and thought leaders on how they're solving critical challenges impacting your role today in Keynote sessions, and join intimate, interactive discussions with peers in Boardroom sessions.

Meet the Speakers

Don't miss this opportunity to meet with CIO practitioners and industry thought leaders who shared their insights on the agenda. Come with questions and get ready to meet new friends in this casual session designed to foster peer connections and collaboration in the Phoenix community.

Peer-to-Peer Meetings

Connect with like-minded peers in a private, one-on-one setting through Evanta's Peer-to-Peer Meetings. Be sure to opt in when you register and get matched based on your key priorities.

Agenda


May 19, 2021

8:00am - 8:45am MST Virtual Summit Keynote

Navigating A People-Centric Approach to Security

Lucia Milica headshot

Lucia Milica

Global Resident CISO

Proofpoint

With remote work, organizations around the world are at a greater risk of cyber threats than ever before, and cybercriminals are taking advantage of the situation. In this session, you will examine the biggest challenges security leaders face, and why a people-centric approach to security is everyone’s biggest opportunity to better protect their organization.

In this interactive session, you will explore:

  • How remote work and the move to the cloud has changed the nature of threats to data
  • The ways in which organizations are building controls to better understand and protect their employees
  • The impact of changing behaviors, employee culture and workplace environment on people risk
  • How today’s threats are informing your data protection practices/controls

8:45am - 9:00am MST Break

9:00am - 10:00am MST Virtual Summit Boardroom

Automating for the Road Ahead

Mike Gilfix headshot

Mike Gilfix

VP, IBM Automation

IBM

Gary Desai headshot

Gary Desai

CIO

Discount Tire

Jamie Smith headshot

Jamie Smith

CIO

University of Phoenix

Automation transforms work and simplifies how businesses operate. AI accelerates innovation by making every interaction, experience, and process more intelligent. Combining automation with AI will release $134B in labor value in 2022. Whether you want to automate complex operations or automate repetitive tasks, AI-powered automation can help.

Join this interactive conversation to discuss:

  • How AI-powered automation is transforming the future of work
  • Using machine learning and AI to help collect and analyze operational data
  • Optimizing to reduce your manual processes by up to 80%

By registering for this session, this serves as your authorization to Evanta or its vendor to provide your contact information to IBM to follow up on your interaction and participation. IBM’s use of your contact information is governed by the IBM Privacy Policy. If you need more information on how IBM is using your personal data you may refer to the IBM Privacy Statement. To withdraw your marketing consent and unsubscribe to receiving emails click on the unsubscribe button at this address: ibm.biz/marketingoptout

9:00am - 10:00am MST Virtual Summit Boardroom

Security Awareness — One Size Does Not Fit All

Jason Rader headshot

Jason Rader

Head of National Security & Networking Practice

Insight Enterprises

Tim Guerriero headshot

Tim Guerriero

Information Security Program Manager

P.F. Chang's

J.R. Sloan headshot

J.R. Sloan

CIO

State of Arizona

Managing security awareness is no easy feat – cookie-cutter solutions just won’t do. Successful programs need custom strategies that integrate well with your corporate culture and engage employees at all levels. Join this boardroom to discuss:

  • Creative ways to introduce security awareness to your teams
  • How to partner across the C-suite to integrate security training throughout the organization
  • How to stay ahead of new threats that come with a remote culture

9:00am - 10:00am MST Virtual Summit Boardroom

CIOs Connecting Business, Data, and Technology

Theo Gibson headshot

Theo Gibson

Vice President & Chief Information Officer

TPI Composites

Peter Robinson headshot

Peter Robinson

VP, Global Applications and Americas IT

Avnet

According to Gartner, the challenge for many IT and business leaders today is to instill a culture of data-driven decision making across the organization. Those who want to exploit the potential of new data and advanced analytics capabilities at scale typically face numerous challenges. As CIO, it's critical to develop a strong, clear strategy connecting business, technology, and data and analytics to maintain your competitive advantage and mitigate these challenges.

In this session, CIOs will:

  • Discuss best practices for designing data and analytics programs
  • Identify and define quick-win opportunities supporting the business data strategy
  • Brainstorm technology and resource alignment

9:00am - 10:00am MST Virtual Summit Boardroom

Driving Business Value With Cloud Security Innovation

Shaun Marion headshot

Shaun Marion

CISO

Republic Services

Robert Wahl headshot

Robert Wahl

CISO

PetSmart

Whether you are just moving into the cloud, researching more options within the public cloud, or building your own private cloud, most leaders agree that this is the future of infrastructure as a service. But can CISOs have it all – both increased productivity and cost benefits within a secure cloud?

During this peer-discussion you will explore:

  • Automation, orchestration, AI and machine learning cloud strategies
  • Nuances for hybrid on- and off-premise systems
  • Ways to incorporate the cloud into a fully articulated security strategy

10:00am - 10:45am MST Virtual Summit Keynote

Executive Presence for Lasting Leadership

Chris Ulrich headshot

Chris Ulrich

Body Language Expert & Political Consultant

Guest Speaker

Any given gesture -a nod, a point of the finger - unconsciously communicates powerful ideas and feelings that have tangible consequences. Top executives are generally proficient in their ability to interact with others, but the stakes are raised during high-level negotiations, reporting to the board, inspiring and empowering senior managers or dealing with tricky internal matters. This is especially challenging in a highly remote environment.

Join body language expert Chris Ulrich as he shares:

  • Why every movement and action is magnified in high-level situations
  • Tools and techniques to build rapport quickly
  • How executives can communicate more effectively both virtually and in person

10:45am - 11:00am MST Break

11:00am - 12:00pm MST Virtual Summit Boardroom

The Executioner’s Song – Putting Your Cloud Strategy into Practice

Donna Kidwell headshot

Donna Kidwell

Chief Information Security and Digital Trust Officer

Arizona State University

Kelly Summers headshot

Kelly Summers

Sr. VP, CIO

Valleywise Health

Ninad Tambe headshot

Ninad Tambe

SVP, CIO, Head of Information Technology

VEREIT

You’ve done all leg work of building a robust cloud strategy – business alignment, clear expectations, and the right partners. But taking the step from strategy to execution can bring your efforts to their knees. From decisions on control and configuration to data access and adoption, reaping the rewards of the cloud requires a systematic, comprehensive approach.

In this session, CIOs will discuss:

  • The most successful approaches to driving rapid cloud adoption across the enterprise
  • Collaboration across the C-suite on data ownership, cloud controls and cloud security
  • Ongoing metrics to track the success of your implementation strategy

11:00am - 12:00pm MST Virtual Summit Boardroom

Leadership and the CISO

Scott King headshot

Scott King

Senior Director of Security Advisory Services

Rapid7

Shannon Lawson headshot

Shannon Lawson

CISO

City of Phoenix, AZ

Bob Schlotfelt headshot

Bob Schlotfelt

CISO

LACERA

What is unique about CISO leadership? Information security executives must protect their organization from ever-present antagonists with one hand, and with the other, enable business outcomes. With mandates that often conflict and a mission that can never fail, it takes a special knack to thrive as a CISO. What have your peers learned that can help you grow as a leader?

Join this session to discuss:

  • Common challenges unique to leadership as a CISO
  • Leadership best practices for gaining influence across the organization
  • The measures of a truly exceptional CISO

11:00am - 12:00pm MST Virtual Summit Boardroom

Embracing Zero-Trust in the Cloud

Lynne Pizzini headshot

Lynne Pizzini

Director of Security Governance, Assurance, and Design

CIT Group

Larry Schwarberg headshot

Larry Schwarberg

VP, Information Security

University of Phoenix

PJ Kirner headshot

PJ Kirner

Chief Technology Officer and Founder

Illumio

Speed, visibility, security and reliability without compromise are critical for organizations that are shifting their processes to the cloud. As traditional network perimeters quickly become obsolete, is it possible to secure both cloud and on-prem systems by using the same security method? Discover how you can bring order to the “chaos” with a zero trust approach.

In this session, you will discuss:

  • How to strengthen endpoint security and automate security policy in the cloud
  • Effective strategies for reducing your organization’s attack surfaces
  • How to be proactive rather than reactive when it comes to stopping threats such as malware and ransomware


12:00pm - 12:45pm MST Virtual Summit Keynote

Opportunities Abound for Digital Business Acceleration

Ed Dzadovsky headshot

Ed Dzadovsky

VP Information Technology & Systems, NA

Circle K

Consumer trends speak volumes – Digital experience is the new order and a winning strategy tracks with increasing digital demands. Ed Dzadovsky, VP Information Technology & Systems, NA, Circle K has taken advantage of the new rules of engagement to guide the organization from digital ambition to execution. In this keynote, Dzadovsky will share how Circle K has rapidly made significant strides in improving the customer experience and driving digital innovation.

Join this keynote to hear insights on:

  • Identifying digital opportunities that drive adoption and customer satisfaction
  • Leveraging agile principles to create a culture of innovation
  • Ensuring security is considered at every step of the digital journey

12:45pm - 1:15pm MST Networking

Meet the Speakers

Don't miss this opportunity to meet with CIO practitioners and industry thought leaders who shared their insights on the agenda. Come with questions and get ready to meet new friends in this casual session designed to foster peer connections and collaboration in the Phoenix community. 

1:15pm - 1:30pm MST Break

1:30pm - 3:00pm MST Virtual Peer-to-Peer Meetings

Peer-to-Peer Meetings

Meet virtually for in-depth conversations with your colleagues

May 19, 2021

8:00am - 8:45am MST Virtual Summit Keynote

Navigating A People-Centric Approach to Security

Lucia Milica headshot

Lucia Milica

Global Resident CISO

Proofpoint

With remote work, organizations around the world are at a greater risk of cyber threats than ever before, and cybercriminals are taking advantage of the situation. In this session, you will examine the biggest challenges security leaders face, and why a people-centric approach to security is everyone’s biggest opportunity to better protect their organization.

In this interactive session, you will explore:

  • How remote work and the move to the cloud has changed the nature of threats to data
  • The ways in which organizations are building controls to better understand and protect their employees
  • The impact of changing behaviors, employee culture and workplace environment on people risk
  • How today’s threats are informing your data protection practices/controls

8:45am - 9:00am MST Break

9:00am - 10:00am MST Virtual Summit Boardroom

Automating for the Road Ahead

Mike Gilfix headshot

Mike Gilfix

VP, IBM Automation

IBM

Gary Desai headshot

Gary Desai

CIO

Discount Tire

Jamie Smith headshot

Jamie Smith

CIO

University of Phoenix

Automation transforms work and simplifies how businesses operate. AI accelerates innovation by making every interaction, experience, and process more intelligent. Combining automation with AI will release $134B in labor value in 2022. Whether you want to automate complex operations or automate repetitive tasks, AI-powered automation can help.

Join this interactive conversation to discuss:

  • How AI-powered automation is transforming the future of work
  • Using machine learning and AI to help collect and analyze operational data
  • Optimizing to reduce your manual processes by up to 80%

By registering for this session, this serves as your authorization to Evanta or its vendor to provide your contact information to IBM to follow up on your interaction and participation. IBM’s use of your contact information is governed by the IBM Privacy Policy. If you need more information on how IBM is using your personal data you may refer to the IBM Privacy Statement. To withdraw your marketing consent and unsubscribe to receiving emails click on the unsubscribe button at this address: ibm.biz/marketingoptout

9:00am - 10:00am MST Virtual Summit Boardroom

Security Awareness — One Size Does Not Fit All

Jason Rader headshot

Jason Rader

Head of National Security & Networking Practice

Insight Enterprises

Tim Guerriero headshot

Tim Guerriero

Information Security Program Manager

P.F. Chang's

J.R. Sloan headshot

J.R. Sloan

CIO

State of Arizona

Managing security awareness is no easy feat – cookie-cutter solutions just won’t do. Successful programs need custom strategies that integrate well with your corporate culture and engage employees at all levels. Join this boardroom to discuss:

  • Creative ways to introduce security awareness to your teams
  • How to partner across the C-suite to integrate security training throughout the organization
  • How to stay ahead of new threats that come with a remote culture

9:00am - 10:00am MST Virtual Summit Boardroom

CIOs Connecting Business, Data, and Technology

Theo Gibson headshot

Theo Gibson

Vice President & Chief Information Officer

TPI Composites

Peter Robinson headshot

Peter Robinson

VP, Global Applications and Americas IT

Avnet

According to Gartner, the challenge for many IT and business leaders today is to instill a culture of data-driven decision making across the organization. Those who want to exploit the potential of new data and advanced analytics capabilities at scale typically face numerous challenges. As CIO, it's critical to develop a strong, clear strategy connecting business, technology, and data and analytics to maintain your competitive advantage and mitigate these challenges.

In this session, CIOs will:

  • Discuss best practices for designing data and analytics programs
  • Identify and define quick-win opportunities supporting the business data strategy
  • Brainstorm technology and resource alignment

9:00am - 10:00am MST Virtual Summit Boardroom

Driving Business Value With Cloud Security Innovation

Shaun Marion headshot

Shaun Marion

CISO

Republic Services

Robert Wahl headshot

Robert Wahl

CISO

PetSmart

Whether you are just moving into the cloud, researching more options within the public cloud, or building your own private cloud, most leaders agree that this is the future of infrastructure as a service. But can CISOs have it all – both increased productivity and cost benefits within a secure cloud?

During this peer-discussion you will explore:

  • Automation, orchestration, AI and machine learning cloud strategies
  • Nuances for hybrid on- and off-premise systems
  • Ways to incorporate the cloud into a fully articulated security strategy

10:00am - 10:45am MST Virtual Summit Keynote

Executive Presence for Lasting Leadership

Chris Ulrich headshot

Chris Ulrich

Body Language Expert & Political Consultant

Guest Speaker

Any given gesture -a nod, a point of the finger - unconsciously communicates powerful ideas and feelings that have tangible consequences. Top executives are generally proficient in their ability to interact with others, but the stakes are raised during high-level negotiations, reporting to the board, inspiring and empowering senior managers or dealing with tricky internal matters. This is especially challenging in a highly remote environment.

Join body language expert Chris Ulrich as he shares:

  • Why every movement and action is magnified in high-level situations
  • Tools and techniques to build rapport quickly
  • How executives can communicate more effectively both virtually and in person

10:45am - 11:00am MST Break

11:00am - 12:00pm MST Virtual Summit Boardroom

The Executioner’s Song – Putting Your Cloud Strategy into Practice

Donna Kidwell headshot

Donna Kidwell

Chief Information Security and Digital Trust Officer

Arizona State University

Kelly Summers headshot

Kelly Summers

Sr. VP, CIO

Valleywise Health

Ninad Tambe headshot

Ninad Tambe

SVP, CIO, Head of Information Technology

VEREIT

You’ve done all leg work of building a robust cloud strategy – business alignment, clear expectations, and the right partners. But taking the step from strategy to execution can bring your efforts to their knees. From decisions on control and configuration to data access and adoption, reaping the rewards of the cloud requires a systematic, comprehensive approach.

In this session, CIOs will discuss:

  • The most successful approaches to driving rapid cloud adoption across the enterprise
  • Collaboration across the C-suite on data ownership, cloud controls and cloud security
  • Ongoing metrics to track the success of your implementation strategy

11:00am - 12:00pm MST Virtual Summit Boardroom

Leadership and the CISO

Scott King headshot

Scott King

Senior Director of Security Advisory Services

Rapid7

Shannon Lawson headshot

Shannon Lawson

CISO

City of Phoenix, AZ

Bob Schlotfelt headshot

Bob Schlotfelt

CISO

LACERA

What is unique about CISO leadership? Information security executives must protect their organization from ever-present antagonists with one hand, and with the other, enable business outcomes. With mandates that often conflict and a mission that can never fail, it takes a special knack to thrive as a CISO. What have your peers learned that can help you grow as a leader?

Join this session to discuss:

  • Common challenges unique to leadership as a CISO
  • Leadership best practices for gaining influence across the organization
  • The measures of a truly exceptional CISO

11:00am - 12:00pm MST Virtual Summit Boardroom

Embracing Zero-Trust in the Cloud

Lynne Pizzini headshot

Lynne Pizzini

Director of Security Governance, Assurance, and Design

CIT Group

Larry Schwarberg headshot

Larry Schwarberg

VP, Information Security

University of Phoenix

PJ Kirner headshot

PJ Kirner

Chief Technology Officer and Founder

Illumio

Speed, visibility, security and reliability without compromise are critical for organizations that are shifting their processes to the cloud. As traditional network perimeters quickly become obsolete, is it possible to secure both cloud and on-prem systems by using the same security method? Discover how you can bring order to the “chaos” with a zero trust approach.

In this session, you will discuss:

  • How to strengthen endpoint security and automate security policy in the cloud
  • Effective strategies for reducing your organization’s attack surfaces
  • How to be proactive rather than reactive when it comes to stopping threats such as malware and ransomware


12:00pm - 12:45pm MST Virtual Summit Keynote

Opportunities Abound for Digital Business Acceleration

Ed Dzadovsky headshot

Ed Dzadovsky

VP Information Technology & Systems, NA

Circle K

Consumer trends speak volumes – Digital experience is the new order and a winning strategy tracks with increasing digital demands. Ed Dzadovsky, VP Information Technology & Systems, NA, Circle K has taken advantage of the new rules of engagement to guide the organization from digital ambition to execution. In this keynote, Dzadovsky will share how Circle K has rapidly made significant strides in improving the customer experience and driving digital innovation.

Join this keynote to hear insights on:

  • Identifying digital opportunities that drive adoption and customer satisfaction
  • Leveraging agile principles to create a culture of innovation
  • Ensuring security is considered at every step of the digital journey

12:45pm - 1:15pm MST Networking

Meet the Speakers

Don't miss this opportunity to meet with CIO practitioners and industry thought leaders who shared their insights on the agenda. Come with questions and get ready to meet new friends in this casual session designed to foster peer connections and collaboration in the Phoenix community. 

1:15pm - 1:30pm MST Break

1:30pm - 3:00pm MST Virtual Peer-to-Peer Meetings

Peer-to-Peer Meetings

Meet virtually for in-depth conversations with your colleagues

REGISTER

Your Community Partners


Key Partners
Program Partners

Phoenix CIO Program Manager


For inquiries related to this event, please reach out to your dedicated program contact.

Led Rhodes

Senior Program Manager

503-972-4431

led.rhodes@evanta.com