#CIOarena Virtual Events

CIOarena Virtual

May 29th 2024

10:00am - 2:00pm CT

LOGIN

About the Event

CIOarena™ is taking its world-class conferences virtual! More than just webinars, CIOarena Virtual is a glimpse of the digital future; immersing attendees into an interactive 3D world. Every aspect of a traditional conference is recreated for an engaging and fun experience; from live presentations, Q&A with industry experts, public & private networking, life-like vendor exhibit hall with live reps, and digital downloads for your virtual swag bag. The entire platform is gamified, adding a sense of engagement and interaction that is not found in your typical webinar environment. Collect points throughout the day and redeem them for one of dozens of amazing prizes in our end of day raffle....

CIOarena has the simple goal of uniting IT executives and professionals, while providing them with expert insights that they can integrate into their professional roles to help optimize and secure their organizations. The most successful executives will agree that a key attribute to growing one’s professional profile, is the power to develop key relationships both internally and externally. CIOarena is designed to take you to the next step in strategic relationship building! This event will gather IT professionals from your region, thus enabling you to boost your career by developing strategic relationships within your area, while comparing and contrasting the successes and pitfalls of peers across all industries and disciplines.

Become a transformational leader by leveraging the newest technologies for a competitive advantage. The insights and best practices shared by our renowned industry experts will guide you in the right direction and the knowledge you walk away with is invaluable. CIOarena's short, no-frills agenda ensures that you reap maximum reward with minimal time wasted. As an invitation-only conference, there is no cost to attend CIOarena.

Networking and Unique Prizes

Accessibility

CIOarena™ Virtual is a web-based event that can be accessed from your home or office with no need to download any third-party applications

Exclusivity

In order to attend the CIOarena™ event, you must be invited or qualified to attend. The philosophy behind this is to ensure that every person in the audience is on the same "playing field". Many verticals are represented, but all attendees are generally within the IT department or senior management.

Networking

Develop relationships with your local peers and discover the newest tech. Successful CIOs realize the need for creating relationships to boost their careers. Gaining an understanding of other executives' issues in the context of their function promotes understanding and gives IT executives a clear sense of their own targets and goals. Expanding your personal network is a crucial facet of becoming a successful leader.

Engaging Agenda

The CIOarena™ agenda is designed to engage every attendee from beginning to end. The day is comprised of industry expert keynotes, case studies, and thought leading discussions.

Intimate

Much different than your average trade show or large conference, CIOarena's agenda is designed with comfort and enjoyment in mind. Come and share your ideas, challenges, and successes with your peers, but most importantly, enjoy doing it in an unguarded environment.

Accessibility and engaging agenda

Your time is important, and CIOarena™ realizes that. We expect all of our attendees to walk away with immediate ROI from participation at this event in the form of new strategic contacts, vital solutions for the changing IT landscape, and ideas that assist you in that next step in leadership.

Unique Prizes

All CIOarena™ conferences raffle off prizes which include: Tablets, TVs, Camera's, Gift Cards and more!

Agenda

May 29, 2024 01:20 pm

[REPLAY] Unlocking Useful Data in a Siloed Storage Environment

As companies grow their demand for data storage grows and over time a multiple file system architecture is employed to house the expanding amount of data. This approach creates data silos where each silo has to be searched separately to find the desired files. All5 can provide a global name space for all of your files which reduces the time and effort in finding information. This also eliminates unintended replication because we can see if duplicate files are contained in separate silos. In addition to this global view we store files you are not using in an economical manner, we backup your files and keep you safe from ransomware and a lot more. Join me for a discussion on how we deliver a global view and save your organization money in the process.

speaker headshot

Jason McGinnis - Chief Product Officer
All5Data

[ON-DEMAND] The Future of AI: Friend or Foe? The Role of Governance

In this presentation, we explore the critical role of governance in shaping the impact of artificial intelligence in IT. As AI technologies become increasingly integrated into every facet of our digital landscape, establishing robust governance frameworks is essential to ensure they serve as beneficial tools rather than disruptive forces. This presentation will delve into how effective governance can not only mitigate risks but also enhance the reliability and ethical deployment of AI systems, ultimately determining whether AI will emerge as a friend or foe in the future of IT.

speaker headshot

Riaz Yusuff, Chief Information Officer
Harper College

[ON-DEMAND] Three IT Risks that are Not Cybersecurity

These days everyone knows that cybersecurity is a huge IT risk. While we focus on cyber-risk, we mustn’t lose sight of other serious IT risks. Wayne is here to talk about three other risks: Technical Debt, IT governance, Single Points of Failure. He illustrates each risk with a recent newspaper headline, then digs deeper to discuss what might have failed and how to mitigate the risk.

speaker headshot

Wayne Sadin - CIO/CTO
Pricesmart

[ON-DEMAND] Fulfilling the Promise of Single-Vendor SASE through Network Modernization

As organizations navigate the complexities of digital transformation, the promise of Single-Vendor Secure Access Service Edge (SASE) emerges as a beacon of streamlined security and network management. This presentation delves into the critical intersection of SASE and network modernization, elucidating how organizations can harness the full potential of SASE through strategic modernization initiatives.

speaker headshot

Michael Keane - Senior PMM
Cloudflare

May 29, 2024 10:00 am

[REPLAY] Gen AI and future of Enterprise Solutions: On Organizational Creativity and Agility

Every interaction with ChatGPT redefines the boundaries of knowledge and solution-finding. This even gets scaled up when entire departments or corporate entities leveraging AI as a collaborative force multiplier. Yet, many organizations remain tethered to the past, even when they present their Gen AI solutions, they are showing rigid workflows and a one-size-fits-all approach, which Gen AI stands ready to disrupt.

In this presentation, we will aim to challenge the status quo, advocating for the freedom to innovate and adapt that Gen AI promises. Solution builders should be honoring each organization's unique dynamics, and the fact that is will be need for quicker adaptability and transformation.

speaker headshot

Ahmed Elyamany - Sr. Product Marketing Manager
Sitecore

May 29, 2024 10:25 am

[REPLAY] How to Safeguard Personal Information from Web Tracking Pixels on your Websites

In 2024, websites remain a critical juncture where personal information and web tracking technologies intersect, posing significant privacy and security risks.


You will learn how to:

1. See what auditors and litigators can see on your website, which you likely don't.
2. Turn your website into a fortress.
3. Make it easy for you and your teams.

This session, offers an indispensable guide for IT security teams and compliance officers seeking to navigate the complexities of protecting information in compliance with Federal, State, and Global privacy regulations regarding tracking technologies. 

Our discussion is based on the findings of our latest research—the 'Beware of Pixels & Trackers on U.S. Healthcare Websites, Q4 2023 Report.' This comprehensive analysis scrutinizes hundreds of healthcare websites and web portals, focusing specifically on the proliferation of tracking pixels and trackers embedded within the software supply chain. These elements, often overlooked, play a pivotal role in the inadvertent leakage of Protected Health Information (PHI), challenging organizations' compliance with HHS rules and compromising patient privacy.

speaker headshot

Ivan Tsarynny - CEO & Co-Founder
Feroot Security

May 29, 2024 12:15 pm

[REPLAY] Ancient Wisdom, Modern Warfare: Sun Tzu’s Influence on Cybersecurity

The principles laid out by Sun Tzu in his Art of War have transcended time and directly apply to the realm of cybersecurity. Join us with your fellow IT professionals as we explore Sun Tzu's teachings and their impact on today's digital battleground. In an era where digital threats loom large, cybersecurity compliance has emerged as a modern-day battlefield for organizations. As we delve into our discussion, we’ll explore how companies grapple with the ever-evolving landscape of cyber risks. Prepare to be inspired and enlightened by the wisdom of a military strategist and its contemporary applications in the ever-evolving cyber landscape.

speaker headshot

David Hagen - Security Evangelist
TPX

May 29, 2024 12:50 pm

[REPLAY] From Friction to Flow: Reducing Login Friction & Improving Customer Experience

Simple and unified customer registration and login experience increases user adoption, helps with brand continuity, and provides an overall improved customer experience. Working together, Capgemini and National Grid ESO have developed a secure, simple & unified way for their customers to access their digital applications & services by leveraging the orchestration and single sign-on capabilities of the PingOne platform. Join this webinar for a first-hand account of the challenges faced, solutions developed, and outcomes of orchestrating customer authentication.

speaker headshot

Dhanya Nandakumar
National Grid ESO

speaker headshot

Rahul Tendulkar
Capgemini

May 29, 2024 11:30 am

Unleashing the Power of ADX technology

Cyberthreats, including ransomware are continually evolving, with cybercriminals constantly adapting their techniques to break through an organizations’ defenses to exfiltrate their most valuable asset - their data. With a record-breaking number of ransomware attacks making headlines last year, and 91% of those attacks exfiltrating data, it's clear that traditional cybersecurity solutions aren’t up to the task when it comes to defending against threat actors' advances.

Join us as we explore BlackFog’s new preventative approach to cybersecurity and how its innovative on-device anti data exfiltration (ADX) technology leverages AI based behavioral analytics to prevent unauthorized data leaving the network.

speaker headshot

Brett Kunkle - Cybersecurity Account Executive
BlackFog

May 29, 2024 11:00 am

Empowering SMBs: Navigating the Cybersecurity Landscape with Confidence

This will be an overview of the cybersecurity threat landscape with items like Ransomware and will give key performance indicators about Blumira. The main topic of her presentation would be about how Blumira's 24/7 Security Operations team works hand-in-hand with the client's teams, making it a committed partnership between the two.

speaker headshot

Heidi Craun - VP Customer Experience
Blumira

Sponsors

Frequently Asked questions


Absolutely nothing! This Virtual Event is completely FREE for you.
Absolutely. We are counting on you to invite others! Help us spread the word. You can simply share the link to this page, and they can register at their convenience using your name as the referral. All guests will be reviewed and must meet our attendee criteria.
Yes. Like any physical event, we will have a Cart for you! You can add all of the documents available to the online Cart in your account and then email them to yourself or share items with colleagues and friends by simply entering their email.
Yes, you will receive 5-6 credits towards your program. We are a direct submitter for (ISC)2 but can provide certificates of completion for attendees to submit as well. A link will be provided during the event and post event where you may submit your credentials.

Your login details will be emailed to you ahead of the event. You can use these details to access the online event.
NO. You do not need to download or install any software to participate in our conference. You only need to have access to the Internet.
We recommend Chrome and Firefox.
Good internet connectivity will ensure high quality video streaming.