Menu
Solutions, Strategy & Connection at IT's Most Powerful Summit
Chris_Surdak
Chris Surdak
Chief Transformation Officer, Intelligent Automation
Virtual
North America
July 18 - 22, 2022
Join North America’s Most Trusted CIO Summit
For 15+ years, executives have found actionable strategy, new solutions, and their path to making a powerful impact at CIO VISIONS.
Average Attendee Rating
Play Video
happy-old-woman
Hear from Industry Experts
Learn from thought leaders making waves in your industry, all from the comfort of your own home.
one-on-one-1
Solve Your Top Challenges
Meet 1-on-1 with solution providers hand selected to meet your needs.
Virtual-Meetings-2
Total Flexibility From Your Locale
Kick back in a cozy corner and access sessions in real time or on demand.

Experience the Only Solutions-Based Event

Tell us the challenges you’re facing, and we’ll schedule meetings with the right solution providers to solve them. You leave with a plan and the tools you need to move your company forwards.

Truity Credit Union Logo Icon
"I receive more than 45 invites daily, this allowed me to control that and to meet potential new partners. I've never seen a format like this, but can tell you I absolutely am impressed and will be sharing with my colleagues. Thank you for a wonderful experience!"
Chief Technology Officer,
Truity Credit Union
Arkwin Industries Logo
"I feel the one-on-one meetings allow me to come with a set of questions and have an intelligent discussion to quickly determine if the vendor has an offering that will fit my company's needs."
Manager of Information Technology,
Arkwin Industries
"Another solid event with lots of well selected vendors, thank you. Just finished up the last of my meetings and was very happy with the fit across the board."
Chief Technology Officer,
Clarity Software Solutions

Hear From Today’s Most Powerful Brands & Voices

Chris Surdak
Chief Transformation Officer, Intelligent Automation
Endré Walls
EVP CISO
Rupa Parameswaran
Head of Security Architecture & Operations
Marcio Esteves
Director Enterprise Shared Applications Development
John O’Malley
Director
Sulabh Sood
Head of Digital Product Management, Strategy & Operations
Charles Sun
Independent Consultant
Royce Stewart
Global Client Partner
David Talby
Chief Transformation Officer, Intelligent Automation
Gayathri Krishnamurthy
AVP CX Product Marketing
Kim Albarella
Global Head of Security Risk, Vendor & Client Assurance
Samara Williams
Manager, Information Security & Risk
Antonio Palumbo
Chief Technology Officer
Pedro Canahuati
Chief Technology Officer
Dr. Lauren Provost Ph.D.
Assistant Professor of Cybersecurity
Andrew Gorecki
Executive Consultant, X-Force

Get Rewarded with High End Swag

Since we can’t treat you to a lavish hotel and delicious dining digitally, we’ve designed a brilliant rewards system worthy of your time. Take all 6 solution provider meetings and earn your choice of amazing SWAG, including Apple products and charitable donations.

Tune In on Your Time

It’s entirely up to you to whether to catch the premiere online or watch presentations on demand.
MondayJuly 18
TuesdayJuly 19
WednesdayJuly 20
ThursdayJuly 21
FridayJuly 22
Is there an Elephant in the Room? The Problems with CIO & CISOs

In this honest conversation, Chris explores how CIO & CISOs may be navigating the Great Resignation incorrectly, and how they may even want to reassess the value that their role gives to an organization. Indeed, is it their roles, processes, and technology that they signed off on that is exacerbating the problems uncovered by the Covid-19 pandemic.

Speakers:

Chris Surdak
Chief Transformation Officer, Intelligent Automation
Enhancing Security with Greater Agency: From Customers to C-Suite Executives

It is fair to say that in we must all do our part to ensure that security is at the forefront of our lives. This is no different for Customers Bank who have taken it upon themselves to provide their customers with accessible security training that has bolstered their security. And while we may want customers to take greater responsibility for their own security, we may also want to think about how CIO/CISOs should have more agency to improve their organizations by taking a larger role in the decision-making process.

Speakers:

Endré Walls
EVP CISO
Avoiding obsolescence in Security Controls & Staff Roles

So many factors go into making a companies’ security watertight. Learning to spot the best vendors needed for your business is the first step. But once you have the tools you believe you need, how do you need to include them into your existing security operations? And how confident are you that your C-suite executives can ensure that this new potential is realized?

Speakers:

Rupa Parameswaran
Head of Security Architecture & Operations
Head in the Cloud: Is your adoption the best it can be?

Correct Cloud adoption is crucial for any business, and while many organizations have already done so, cloud adoption does not mean your organization is cloud native. Furthermore, with so many refinements and new technologies that are constantly appearing it can be hard to keep track of new tech, let alone adopting this technology to its fullest potential.

Cloud migration is crucial to the success of innovative organizations and Marcio Esteves, Director Enterprise Shared Applications Development at Tokyo Marine, will share some of his thoughts of cloud native architecture.

Speakers:

Marcio Esteves
Director Enterprise Shared Applications Development
So, you think you know Quantum?

Momentum around quantum computing grows daily, and its technology is so close to widespread adoption. As some company’s head towards mainstream adoption, what will happen to those that are being left behind? What should these organizing be doing right now?

Furthermore, while quantum computers offer fantastic opportunities, quantum adoption may bring with it severe cyber security threats which may make quantum unviable without first being secured.

Speakers:

John O’Malley
Director
The 5th Industrial Revolution: Why 5G is just the Beginning

What will be the impact of 5G on the threat landscape in the next decade? By understanding the near-term benefits, legacy problems, and the growth of ‘software-defined networks’, are you ready for the next Industrial Revolution?

Speakers:

Royce Stewart
Global Client Partner
The Future of the Contact Center

Businesses today face greater complexity and more challenges than ever before. As if managing remote and hybrid workforces weren’t enough, businesses are dealing with labor shortages, inflation, the great resignation and of course the issue of Customer Retention and CSAT

Any while Hybrid work has been a great blessing to many of us, it has also exposed us to new problems that need to be solved.

Speakers:

Gayathri Krishnamurthy
AVP CX Product Marketing
Genetic Analysis: Science Fiction meets Digital Transformation

The growth of the market for health IT security is being driven by many factors, most notably the rise in the number of healthcare data breaches across the globe. Patient data safety is of course the top priority.

In this session, Sulabh Sood Head of Digital Product Management, Strategy & Operations at Avellino Lab will explore his digital transformation strategies, technologies, and data processing that have helped enhance precision medicine for Avellino Lab and improved data security.

Speakers:

Sulabh Sood
Head of Digital Product Management, Strategy & Operations
The Future of the Internet: Cybersecurity, Emerging Technologies

In the era of Internet of Things (IoT), blockchain, AI, and many other emerging technologies, many public and private organizations, big and small, struggle to react to the aftermath of the constant cybersecurity breaches and ransomware attacks.
Thus, organizations must change their cybersecurity strategies dramatically now to efficiently secure and effectively defend the global network infrastructure before the time is running out.

Joining us for this session is Charles Sun, speaking as an Independent Consultant. Charles’ experience includes his work with the US Department of Homeland Security and as a contributor to Homeland Security Today Magazine.

Speakers:

Charles Sun
Independent Consultant
Revealing the Secrets of the Human Body with Natural Language Processing
Natural language processing is an exciting subfield of linguistics and artificial intelligence, concerned with the interactions between computers and human language.
The goal of NLP is to ‘understand’ the contents of documents, including the contextual nuances of the language within them. This is incredibly useful within many sectors, especially Healthcare and Life Sciences, which we will be looking at today as a setting for our conversation.

Speakers:

David Talby
Chief Transformation Officer, Intelligent Automation
Passwords are Dead: Long Live Passwords!
Who can honestly say they remember all their passwords? If you can, you likely lying, or are guilty of reusing them which defeats their original purpose!
Managing online passwords can be a chore, but there are increasingly louder calls from tech companies to do away with passwords altogether. Passwords are often seen as the weakest part of security, so are we really heading towards a world of multi-factor authentication and biometrics to secure our technology?
While it is enticing to dream of a password-less internet, would it be practical? Or is there still merit to this age-old piece of security?

Speakers:

Pedro Canahuati
Chief Technology Officer
Making your Brand synonymous with Security: TikTok’s Top Tips!

Social media is a space that is moving at a break-neck speed, and unlike traditional industries, social media companies operates in a less regulated and ever-changing environment. It’s a brace new space and TikTok’s priorities are firmly behind offering the best security for its staff, users, and clients.

Join this session to hear from Kim Albarella, Global Head of Security Risk, Vendor & Client Assurance at TikTok discuss these topics and more.

Speakers:

Kim Albarella
Global Head of Security Risk, Vendor & Client Assurance
Crusaders of Change: Threat Intelligence & Cultural Security
Regardless of your industry or company size, security breaches and undetected vulnerabilities have the potential to do serious harm to your organization’s assets.
While having a strong incident response plan is a must-have component of any security team, the best way to defend your organization is to stop an attack from happening in the first place. Threat Intelligence is an excellent piece of the security puzzle: from collecting data to sharing insights to members to other teams. But Threat Intelligence is only as good as the team that leads the charge.
This session is brought to you by Samara Williams, Manager, Information Security & Risk at Cardinal Health who shares her thoughts on her Threat Intelligence models and the Cultural Security that supports it.

Speakers:

Samara Williams
Manager, Information Security & Risk
The Future of Finance: What Do We Want to See?
In the financial world we live in, gone are the days of the abacus, for everything is powered by the white heat of technology. And within this financial world, there are organizations that are making a difference by offering unique economic and community development strategies.
One such organization is the National Development Council, and Antonio Palumbo, Chief Technology Officer will talk about his organizations successes as well as hypothesising what technology the future may bring for this sector.

Speakers:

Antonio Palumbo
Chief Technology Officer
Repairing the Fortress: Cyber Breach Responses that Actually Works
A Former Director of the FBI once said: “There are only two types of companies: those that have been hacked and those that will be hacked.” But as ransomware actors are becoming increasingly specialized, as well as growing in numbers, the amount of companies that are being hacked is increasing. But in this game, it seems almost like an inevitability. So when the inevitable strikes, what are some of the best practices to rebuild your defenses?

Speakers:

Andrew Gorecki
Executive Consultant, X-Force
The Integral & Ethical Hacker
While many of us are worried about our cybersecurity systems being tested, there are individuals that make their own way in the world by legally probing our defenses. We speak of Ethical Hackers.
In this session we are joined by Dr. Lauren Provost Ph.D., Assistant Professor of Cybersecurity, School of Cybersecurity, Data Science, & Computing (CDSC), Norwich University.
Dr. Provost will discuss career pathways that support the field of ethical hacking, its challenges, as well as what private industries can do to receive help from Ethnical Hacking and support it as a profession.

Speakers:

Dr. Lauren Provost Ph.D.
Assistant Professor of Cybersecurity
Cultural Change & The Talent Gap in IT Leadership

The future of work is here, and seismic shifts are happening across the IT industry. For many, this is the age of ‘The Great Resignation’ which heralds greater challenges when attracting and retaining staff. For others, this is the perfect time to adopt cultural change and enjoy new relationships with their work. But who is correct? Are we witnessing a craze that will soon fizzle out, or will organizations need to introduce change to attract the best staff?

Speakers:

Andrew Nuxoll
Sr. Director of Infrastructure, Operations and Cybersecurity
Cloud Migration: Security & Adaptation

Cloud migration is crucial to the success of innovative initiatives, and many industry voices are keen to share their approach to successful cloud migration while ensuring their route is secure. Learning from one’s peers – whether they have fully migrated or are in the final stages – will help ensure success and long-term stability. Speaker: Dara Meath, Divisional Chief Informational Officer, Digital/Ecommerce, Conair LLC.

Speakers:

Dara Meath
Divisional Chief Informational Officer, Digital/E-commerce
Accelerating Enterprise Transformation using Data, AI, and Hybrid Cloud

Organizations are witnessing the dawn of the data-driven, AI, and regulatory era. The digital transformation of organizations is occurring at a rapid pace in order to stay relevant and pave the way to a sustainable future. The consolidation of an organization’s data into a governed, trusted, and well-managed environment that supports both analytics development and production workloads is playing a crucial role in this transformation. Organizations want to take advantage of AI, but they need a trusted foundation and access to the data. Our mission is to deliver a trusted, enterprise-wide, data and AI backbone for transforming IBM into an AI Enterprise. The resulting benefits to business include reduced time to find and consume data and reduced time to implement initiatives.

Speakers:

Ranjan Sinha
IBM Fellow, VP and CTO
Living on the Edge: The Marvels of AI & ML

With cutting-edge technology all around us, it’s important to learn how to use it. With edge computing set to gain momentum in 2022, you will need expert advice before you build or alter your strategy. Joining us is Maharaj Mukherjee who has extensive knowledge on AI & ML, and once worked with the IBM team to help develop Deep Blue. Now, Maharaj will share his thoughts on how AI & ML can help your business build effective edge-computing, as well as best practice examples to consider in the future.

Speakers:

Maharaj Mukerjee
Senior Vice President and Senior Architect Lead
Medical Marvels: Business Value Driven Strategy

We don’t need to tell you how challenging the last few years have been to the US population and their healthcare system. What we can tell you is how this sector has adapted and focused on operational transformation, digital access for patients, and improving their experiences through digitization.

Joining us to highlight real-life examples is Sunila Thelma Levi from CommonSpirit Health. She will explore the current value of IT within the healthcare industry and her steps towards better digitization.

Speakers:

Sunila Levi
VP Digital Healthcare Platform Strategy

KEY THEMES

Cybersecurity

Staff Training, Retention & IT Leadership

Data Storage & Analytics

Digital Transformation & Artificial Intelligence

Cloud Strategy

Network and Communication Systems

Innovation

Over 80% of the Fortune 500 Attends

Learn and grow with 30+ sessions from industry thought leaders. All available on-demand to watch anytime, from anywhere.

Meet our Sponsors

We attract the best in the business. By learning about your projects up front, we match you for 1-on-1 meetings with those best-suited to tackle the challenge.

Amazon-logo
SAP_R_grad_sign
See More

Inspiration, on Your Schedule

Customize the ideal summit experience to fit your busy schedule and connect from the comfort of your own home or office. All presentations are available to watch long after the event has ended.

Still Have Questions?

We've answered a few FAQs to get you started. But please don't hesitate to reach out with more.

Virtual Event Questions

CIO VISIONS Virtual Summit is unique in its ability to connect you to qualified solution providers. They’re more than willing to underwrite the cost of your attendance in exchange for access to such an exclusive audience.

Your virtual pass includes:

  • All sessions and their recordings
  • 6 or 8 one-on-one meetings with vetted solution providers, specifically matched to you
  • $300 or $500 in swag upon meeting completion

Based on the details of your registration, we carefully select at least 6 best-fit solution providers for you to meet with. Each meeting is 30 minutes long and focused on solving a specific priority you have listed. Once completed, you’re eligible to receive a swag package. All meetings will take place on Zoom and all logistics are handled for you!

We are looking for executives with genuine needs for new solutions and buying influence or authority. Invitations are extended to C-level executives, SVPs, VPs, Directors and Managers within all Information Technology functions.

Yes, but only for your one-on-one meetings which are scheduled for a date and time you prefer. The summit sessions do not expire and will all be available on-demand to watch at your leisure—anytime, any place.

There are many reasons to attend! For starters, CIO VISIONS Virtual Summit is the only online event customized to help you with your current challenges. You’ll learn from industry veterans and connect to the solutions you need. Your time is valuable, and sticking to your budget is more important than ever. CIO VISIONS is designed to help you maximize your time and money for the best possible results.

General Event Questions

The most important thing you can do is take the time to complete your registration. Your registration is the basis for all of our methods of personalizing your experience. The more accurate and complete your registration is, the easier it is for us to select opportune sessions and schedule private meetings for you.

We are closely monitoring and following CDC event guidelines and strategies to prevent the spread of COVID-19 and maintain healthy event operations. This includes proper cleaning and disinfecting of surfaces throughout the event venue.

Yes, we offer a variety of networking sessions to interact with speakers and event attendees during the Summit. Following each presentation the speakers often share their contact information so you can continue to foster the relationship.

We encourage you to follow our event Facebook page for speaker updates and great event content leading up to your Summit.

Upon completion of your registration, you will be paired with a personal concierge that will reach out directly to help with any questions and provide assistance that includes scheduling your one-on-one meetings and more.

Become an Exhibitor

Tell us a little about yourself