St. Louis CIO Virtual Executive Summit
December 16, 2020 | 8:00am - 1:15pm CST
December 16, 2020 | 8:00am - 1:15pm CST
Collaborate with your peers
Come together with your peers virtually to tackle top business challenges through peer-driven content and discussions at the St. Louis CIO Virtual Executive Summit.
Join your peers to discuss the most critical issues impacting CIOs today:
The Future of the CIO & CISO
Redefining Personal Data Protection and Privacy
Pursuing New Digitally-Enabled Business Models
Governing Body Co-Chairs
Joe Caro
Post Holdings
CIO
Kevin Hardcastle
Washington University in St. Louis
Associate Chief Information Security Officer
Dan Henke
Mercy
VP, CISO
Matt Modica
BJC HealthCare
CISO
Stacy Mill
State of Kansas
Chief Technology Officer
Agenda
December 16, 2020
11:00am - 12:00pm CST Virtual Summit Boardroom
Creating a Secure, Digital, and Modern Environment
Hosted by Zscaler
Gary Harbison
Global CISO
Bayer Corporation
Andrew Wilder
Regional Security Manager
Nestle
Bill Lapp
Solution Architecture, Global Leader
Zscaler
Information security is now, more than ever, playing a role in the organization’s mission to make security personal and collaborative. How are CIOs partnering with CISOs to help establish a security strategy that is an enabler of the digital business rather than an obstacle?
In this interactive session, you’ll discuss:
- How the security team can enable strategy and be a successful partner with the IT team
- Best practices for organizational change management
- Create a communication strategy that ties security to organizational success
11:00am - 12:00pm CST Virtual Summit Boardroom
Bracing for Seismic Shifts – Meeting the Demands of the Business
Tom Henry
Chief Data & Analytics Officer
Schnucks
Shri Ramachandran
Vice President, IT
Boston Scientific
2020 forced technologists to innovate and work smarter [and faster] to meet increased business demands. To succeed, leaders were forced to become flexible and accommodating in delivering new digital and data solutions to their organizations at lightspeed, inciting endless channels of demand. Join your peers in a focused discussion on how to best leverage newfound operating structures/models and manage a rising need for speed, delivery, and value.
Join this virtual boardroom conversation to explore:
- Riding the current momentum to influence and advance the enterprise
- Balancing increased demands with the imperative of tangible business outcomes
- Increasing the pace and reducing friction points in new technology and feature, functionality adoption
- Implementing data and analytic strategies that inform and facilitate desired business outcomes
11:00am - 12:00pm CST Virtual Summit Boardroom
The Continual Shifting of Threats
Craig Byrkit
VP, Global Information Security and Privacy Officer
Reinsurance Group of America
Aman Raheja
SVP CISO & Head of IT Operations
Humana
Whether it’s cybercriminals motivated by profit or nation-state attackers with geopolitical motives, public and private organizations of all sizes have felt the impact of cyberattacks. Enterprise organizations are reeling from the onslaught of massively spread ransomware attacks to surgical pinpointed attacks on their assets from sophisticated state-sponsored actors. How can CISOs best face changing threat vectors?
Join this roundtable conversation to discuss:
- The current threat landscape and development on ransomware attacks
- How to best discover and prevent nation-state attacks
- What security executives can do to build resiliency
12:00pm - 12:45pm CST Virtual Summit Keynote
Cloud Strategies to Power Digital Transformation
Hosted by IBM
Kyle Collins
Interim VP, CIO and Chief Innovation Officer
Saint Louis University
Hillery Hunter
CTO, IBM Cloud
IBM
The most successful businesses today connect digital transformation to business goals using innovative technology and increasing moving more of their enterprise workload to the Cloud. CIOs are charged with clearing adoption hurdles to align mission-critical tasks and business priorities with the multiple cloud environments.
This interactive session explores:
- Examples of transformations using open, flexible, and secure multicloud operating environments
- Fostering digital transformation and creating a competitive advantage through a hybrid cloud strategy
- Accelerating the skills and culture that leverages AI and cloud
By registering for this session, this serves as your authorization to Evanta or its vendor to provide your contact information to IBM to follow up on your interaction and participation. IBM’s use of your contact information is governed by the IBM Privacy Policy. If you need more information on how IBM is using your personal data you may refer to the IBM Privacy Statement. To withdraw your marketing consent and unsubscribe to receiving emails click on the unsubscribe button at this address: ibm.biz/marketingoptout.
12:45pm - 1:15pm CST Networking
Community Discussion
Matt Modica
CISO
BJC HealthCare
Teresa Sanzottera
Vice President and CIO
Mallinckrodt Pharmaceuticals
An informal and interactive opportunity for you to network with peers in small groups.
8:00am - 8:45am CST Virtual Summit Keynote
Finding Success with Adopting a SASE Architecture
Hosted by Netskope
Jason Clark
Chief Strategy Officer
Netskope
Dustin Wilcox
CISO
Anthem
Organizations are feeling a shift in the world of networking and security as they rapidly adopt and embrace the cloud. On-premises private data centers are no longer the place for data and workloads to exist. With this shift, security and networking are brought closer than ever. Enterprises need speed, visibility, security and reliability without compromise. Enter, the secure access service edge, better known as SASE. This evolved concept of cloud security architecture outlines a convergence of multiple security functions to offer identity-based secure access. How can your organization best position itself for the transition?
In this session, you will discuss:
- Problems SASE can address in the modern enterprise
- Benefits of moving to a SASE architecture
- Insights from organizations adopting SASE today
8:45am - 9:00am CST Break
9:00am - 10:00am CST Virtual Summit Boardroom
Optimizing Security Operations
Alan Berry
VP of CyberSecurity
Centene Corporation
Matt Modica
CISO
BJC HealthCare
Larry Woods
Sr. Director, Enterprise Information Security
Post Holdings
Outsource? Insource? A hybrid model? Finding the right processes and design for an effective Security Operations Center (SOC) is a complex leadership challenge weaving technology, budget, talent management and, of course, risk. Learn what peers are doing and questions you should be asking yourself, and other senior leaders, to ensure your SOC is up to par.
Join this session to learn:
- What other companies are doing to optimize their SIEM and SOC
- Effectively managing and reducing false positives
- Incident response and other SOC automation opportunities
- SOC assessment and benchmarking options
- KPIs for measuring SOC effectiveness
- Models and economics for effective insource, outsource and hybrid SOCs
9:00am - 10:00am CST Virtual Summit Boardroom
RPA – Automation’s Golden Age
Steve Kappel
VP & CIO
Safety National
JK Pareek
VP, Global IT and CIO
Nidec
Toss out the manual on redundancies in the business process; RPA is automating its way to greater efficiencies and a brighter bottom line. This peer-to-peer discussion is a mix of RPA advocates, early adopters and outside observers — joining forces to learn from each other and explore:
- How peers have deployed RPA— what has worked and what needs work
- How to measure the return on investment for automated processes
- How automation is being successfully deployed across the enterprise
- How to overcome human barriers — such as employee engagement and leadership buy-in — to realize the full potential of RPA
10:00am - 10:45am CST Virtual Summit Keynote
Accelerate Your Secure Digital Transformation
Hosted by Zscaler
Jay Chaudhry
CEO, Chairman & Founder
Zscaler
Bruce Lee
SVP, CTO
Centene Corporation
The cloud and mobility are powerful enablers of digital transformation, but many organizations are grappling with legacy architectures that haven't evolved much in decades. With most applications in the cloud and employees working remotely, legacy network and security models are not only ineffective, but they hinder your ability to take advantage of the agility, productivity, efficiency, and speed enabled by digital transformation. Network and security architectures need to evolve to securely connect any entities—users, devices, applications—to meet business needs in the digital era.
In this session, Zscaler CEO Jay Chaudhry talks with Bruce Lee of Centene, who will discuss how Centene's digital transformation has made the company more resilient, enabling its entire staff to work remotely with minimal disruption and no compromising on security.
- “Owning the moment”: IT’s opportunity to accelerate secure digital transformation
- Best practices for securing work-from-anywhere using Gartner’s secure access service edge (SASE) and zero trust network access (ZTNA) frameworks
- What comes next: IT’s new role as strategic business enabler
10:45am - 11:00am CST Break
December 16, 2020
Community Program Manager
For inquiries related to this community, please reach out to your dedicated contact.