Westin Chicago North Shore, IL
October 8-10th, 2017

This event is co-located with

Westin Chicago North Shore, IL
October 8-10th

Speakers & Session Topics

The MIDTECH Fall Educational Program will include:


• 2 Keynote Addresses
• 12 Peer Led Plenary Presentations
• 10 Customer Led Case Studies
• 1 Meet the Analysts Round Table


PLUS
• Targeted one on one Research Meetings with Carefully Selected Leading Solution Providers


AND
• Unparalleled Peer Networking Opportunities with other high profile Executives over onsite Breakfasts, Lunches and Receptions.

Keynote Presentations

Fielding Your Vendor Dream Team - Moneyball for Software

SPEAKERS

Matthew Mandich
Director, Innovation & Strategy, Info-Tech Research Group

Details

Fielding Your Vendor Dream Team - Moneyball for Software

Each year, organizations cumulatively spend nearly 1 trillion dollars on enterprise software & services, and that number is rapidly increasing. The challenge Info-Tech has found is that over 50% of software purchasing decisions are ineffective. Worse, organizations are extremely likely to renew their software regardless of whether they are satisfied with it.

In this session we will share analytical insights from over 5000 in-depth enterprise software reviews we’ve collected from IT and business leaders to help you understand how you can more effectively select and manage enterprise software, and save money while doing it. Learn what processes are most and least effective, and where the risks are.

 

Hint: it’s not where you think.

Breakout Presentations

A Team for All Times

SPEAKERS

Liz Reich
Vice President, IT Asset Management, Mastercard

Details

A Team for All Times

Team building is not a party…but it doesn’t have to be a circus! When we recognize we can leverage seemingly unpredictable human nature, we can collectively effect positive change. Learn how expecting the unexpected can create a collaborative and effective team.

 
Key Takeaways:
  • You cannot always know all the variable – sometimes "good enough" is all you get
  • It is always about the numbers – know your costs to defend your value
  • Managers hire you for what they need not for what you want to do – learn the difference to make a difference
  • Changing perception is hard: Say what you mean, mean what you say and don’t say it mean
Data: Will we ever have enough?

SPEAKERS

Gerald T. Hope
Vice President, Global Head of Technology, Milestone AV Technologies

Details

Data: Will we ever have enough?

It seems like today's businesses require more and more data to be competitive.  What should we be concerned with the proliferation of data?  How to do we manage it?  What value can we derive from it?

Key Takeaways: 
  • 90% of all the data in the world has been created in the past 2 years
  • The National Nuclear Security Administration records 10,000,000 hacks a day
  • IDC Digital Universe predicts that by 2020 emerging markets will have over 25 Zettabytes of space used with over 40 Zettabytes in the entire universe 
  • Hybrid Clouds and the next generation Data Lake
  • Data awareness and data aware players like Data Gravity and Qumulo run real-time data analytics at the storage dice level
Cybersecurity: A Pragmatic Approach

SPEAKERS

Venkat Kandru
CIO and EVP of IT, The Howard Hughes Corporation

Details

Cybersecurity: A Pragmatic Approach

In the age of constant threats, ever-changing security solutions, and never-ending accountability, how does a CISO ensure the integrity of the corporate data and computing assets? In this session, we will explore and share a pragmatic approach of achieving maturity in technology, people, process and accountability in the world of cybersecurity. By practicing the cybersecurity from the view point of these four core pillars, attaining the required maturity is not only possible but also is not nerve racking.

 

Key Takeaways:

  • Technology: Prevent, detect, monitor and respond
  • People: Bring awareness, make them accountable, enhance communication
  • Process: Define policies, communicate risk, share incidents’ impact, instill confidence
  • Accountability: Board of Directors, Shareholders, Customers and Employees

Above all, this discussion will focus on “Get it right” and “Keep it right with the changing threat scape”

The Scary Marriage of Disruptive Innovation and Dark Data

SPEAKERS

John C. Martin
Chief Information Officer, Georgia Department of Natural Resources

Details

The Scary Marriage of Disruptive Innovation and Dark Data

Come hear about the “Scary Marriage” of Mr. Christensen’s theories of “Disruptive Innovation” and the concept of “Dark Data” was executed at the Georgia Department of Natural Resources, and how that combination brought new revenue streams to the State of Georgia.

Key Takeaways:
  • What is Dark Data & Disruptive Innovation
  • A simple 4 step framework for implementing Disruptive Innovation in your organization
  • How can you leverage Dark Data to enhance revenue at your organization
  • What is a single strategy an organization can use to successfully combine the two
  • Case study of how it worked at Georgia DNR
 

 

What Could and Should Organizations be doing to decrease their average time to detect Mega-Breaches

SPEAKERS

Joseph Greene
CISO, American Chemical Society

Details

What Could and Should Organizations be doing to decrease their average time to detect Mega-Breaches

In an era of mega-breaches where the average compromise goes undetected for more than 200 days, what could and should organizations be doing to decrease their average time to detect.

During this session, Joe Greene will host a collaborative panel group discussion focused on shared lessons learned, challenges, best practices, and Q&A with the audience

Technology Infrastructure Program - A Process to Grid Modernization

SPEAKERS

Donald Redden
Vice President of Information Technology, Otter Tail Corporation

Details

Technology Infrastructure Program - A Process to Grid Modernization

Long-term vision and framework for proactive investments in technology and infrastructure, which enable a mobile, automated, analytics-based future to optimally and efficiently operate utility.

 
Key Takeaways:
  • GIS will be the primary source for most company data unless disproven and GIS will be integrated with nearly all major company systems to improve decision making
  • AMI will be strategically deployed to minimize employee change and maximize benefits
  • Greater interconnected systems that minimize redundancy of feature sets
  • Communications and other operational systems will enable switches to operate remotely to isolate system issues. This will enable demand savings and energy efficiency possibilities through automated regulator and capacitor control (i.e. Conservation Voltage Reduction, Volt/Var Optimization) Customer loads will be synched to the markets to react in real time to pricing signals to improve load factors and system efficiency. (DERMS) This communication system will be used to support all utility applications from SCADA, to AMI, to load management.
Technical Staffing - Recruitment and Retention Challenges and Solutions

SPEAKERS

Karen M. Davis
Business Group CIO & VP, Research Computing, RTI International

Details

Technical Staffing - Recruitment and Retention Challenges and Solutions

The Research Triangle Park area in NC is known as a hub of technology companies. As a result, competition is fierce for technology staff. This session will discuss the challenges inherent in technology staffing in a highly competitive environment, and some of the solutions we have employed.

Key Takeaways:
  • Challenges in recruiting and retaining high quality technology staff, including mobile developers
  • Solutions tried -- the successes and the failures
  • Opportunities to retain staff, rather than having to recruit constantly to replace those who have left the organization.
Successfully Navigating the Turbulent Times- On the Right Side of a Merger

SPEAKERS

Mary Buckley
CIO, Penn Medicine Chester County Hospital

Details

Successfully Navigating the Turbulent Times- On the Right Side of a Merger

In 2013 The Chester County Hospital reached out to a much larger University of Pennsylvania Health System. Healthcare economists were forecasting Accountable Care Networks that could only be satisfied by organizations with more than $5Billion in revenues. With only $300Million in revenues, our marketplace sustainability was at risk. The culture at CCH called for high quality, low cost delivery of patient care. We were willing to bring our culture to an organization as we traded off our autonomy.

 
Key Takeaways:
  • IT leads the way. New systems, new work-flows. Be prepared to take the leadership role across all organizational disciplines to introduce change.
  • Get out in front. Don't wait for the Merger to dictate change. Be ready to use your skills to your advantage.
  • Don't pass judgment. People come to work every day to do a good job. Let them express themselves.
  • You need your legacy staff to plow through the Merger activity. Show them you care.
  • Be part of the teams - yes, both teams - legacy team and new larger team.
How to Recover from an IT Crisis?

SPEAKERS

Esteban Velez
VP of IT & Cyber Security, Classic Hotels & Resorts

Details

How to Recover from an IT Crisis?

Steps on what to do during a technology crisis. Wrong and right ways and how others handle similar situations. Necessary to have audience involvement as there is no right way.

 
Key Takeaways:
  • Its going to happen?
  • What to do when it happens?
  • Multiple levels to what a crisis is, virus, system failure, power outage, INTERNET outage, data breach.
  • How to utilize your resources and recover?
  • How to translate IT speak to the masses in your business? This is key as communication and recovery steps are most likely overlapping as you and your teams try to recover from the IT Crisis.
Analytics, Machine Learning & Artificial Intelligence - The What & How?

SPEAKERS

Dr. Michael Valivullah
Chief Technology Architect, National Agricultural Statistics Service (NASS) United States Department of Agriculture (USDA)

Details

Analytics, Machine Learning & Artificial Intelligence - The What & How?

This presentation will explain big data analytics, internet of things (IoT), machine learning, neural networks, deep learning artificial intelligence (AI) and data science. It will also cover how these technologies are being leveraged to increase efficiencies in enterprise's daily operations, to identify new business opportunities and to enhance customer service.

Key Takeaways:
  • Distinction between and understanding of: Analytics, Machine Learning, Artificial Intelligence (AI), Neural Nets, etc.
  • Examples of how these technologies are being used to create new business models and enhance customer service
  • How to integrate data from various sensors (IoT) - Challenges and opportunities
  • How sensors are being used in Precision Agriculture to increase profit
  • How to initiate digital transformation in a legacy organization
A Mid-Sized Company's Two Year Journey to the Cloud

SPEAKERS

Bill Packer
Chief Information Officer, American Financial Resources, Inc

Details

A Mid-Sized Company's Two Year Journey to the Cloud

American Financial faced a choice between continued investment in on-premise and co-location facilities or to proceed into the cloud.  Once determining that the cloud was the right choice, it had to choose between the public cloud, a private cloud or a hybrid.  Once determining that the public cloud was the right solution, which public cloud?

Key Takeaways:
  • Start with the problem statement - what and why are you trying to achieve
  • Analyze your investment choices - both from an economic standpoint and a tax standpoint
  • Reinvent your staff earlier (and often)!
  • Be open to changing direction - this space is evolving fast
  • Be open to opportunities somewhat related to your primary business model
An Analytics Journey: Case Study over 7 Years

SPEAKERS

Richard Pollack
CIO & VP, VCUHealth

Details

An Analytics Journey: Case Study over 7 Years

Beginning in 2009 and seeing the future need for a “center of excellence” around Analytics, we set about laying the foundation to what would become (7 years later) an 18 person “Enterprise Analytics” department reporting to the corporate level VP of Strategy. That journey encompassed multiple and sequential steps along a path to eventual success.

 
Key Takeaways:
  • Understanding the needed "ecosystem" to support successful Enterprise Analytics
  • Understand how to achieve executive buy in and support for changing the status quo
  • Realize the value and role played by a defined Data Governance/Data Stewardship structure
  • Consider the increased complexities brought to the EDW when the schema includes EMR data
Building a Transformational IT Team: Create the Future and Make it Sustainable

SPEAKERS

David Threm
CIO, Ash Brokerage

Details

Building a Transformational IT Team: Create the Future and Make it Sustainable

Talent acquisition, development and retention are critical to all IT projects, and especially to digital transformation. Building transformational and high performance teams requires a general framework, a vision towards the future and a means to sustain progress in the event of team, talent and market disruptions. In this session we'll discuss how you can acquire, create and retain highly performing IT teams despite adcersity and change. 

 
Key Takeaways:
  • Surround yourself with exceptional senior leadership, 3 to 5 key members
  • Tie into the local universities in a big way – advisory committees, adjuncts, etc.
  • Build your intern bench as large as your organization will allow
  • Create a social contract – everyone must develop their replacement• Develop future technical, managerial and executive leaders
  • For complete employee buy-in, make your framework organizationally agnostic
  • Pay employees at or slightly above area market
Technology Development at Scale, a LeSS Overview

SPEAKERS

Doug Spencer
Chief Information Officer, Goldline LLC

Details

Technology Development at Scale, a LeSS Overview

Traditional sequential-lifecycle application development doesn’t work well.  Since 2001, Agile development and Scrum in particular have revolutionized software development.  LeSS is a scaling framework that finds the sweet spot between defined concrete elements and empirical process control.  LeSS as a framework is more than a set of principles and experiments. It also provides a framework with rules. The LeSS Rules define what is LeSS (and what isn’t) and they provide a concrete framework for applying LeSS

 
Key Takeaways:
  • LeSS Principles

  • A Framework that Focuses on Customer Value and Rapid Innovation

  • Organizational Impact of Agile at Scale
 
Cybersecurity War Stories: Tales from the Trenches

SPEAKERS

Brian NeSmith
Co-Founder and CEO, Arctic Wolf Networks

Details

Cybersecurity War Stories: Tales from the Trenches

In today’s world, it’s imperative for organizations of all sizes to have an online presence to succeed in business. But there’s a risk to always being connected—organizations are prime targets for cyber attacks. Recent ransomware strains like Petya and WannaCry demonstrate how business can be brought to a grinding halt by encrypting your business critical data. Join CEO and Founder of Arctic Wolf Networks (AWN), Brian NeSmith, as he highlights some of the most interesting attacks that Arctic Wolf Networks has seenin 2017. You’ll also hear why a robust SOC-as-a-service with human augmented machine learning is critical to bolster your defenses against the most advanced of threats.

So you need to build a Cybersecurity Program....

SPEAKERS

Jeffrey Potter
SVP, Chief Technology Officer, Davenport & Company LLC

Details

So you need to build a Cybersecurity Program....

This presentation will walk you through different considerations with regards to developing an effective cybersecurity program. I will discuss partnership strategies, hiring practices, iterative program development, common pitfalls and incident management.

 
Key Takeaways:
  • building the program will start with a small approach and continue to refine. 
  • being a mid-market organization, you will most likely have to partner. 
  • Things to look for in a good partner 
  • Tips for hiring security people 
  • exposure to incident management framework
Zero Trust: A New, More Agile, Effective Approach to Security

SPEAKERS

Joe Kuster
Security Solutions Director, Catapult Systems

Details

Zero Trust: A New, More Agile, Effective Approach to Security

Perimeter-centric security models simply don't work in today's digital workplace. Users and data are no longer bound to the company firewall, which requires a new approach to IT Security. CIOs must instead adapt data and identity centric security to successfully protect their company.

Key Takeaways:

  • Current approaches to security can’t mitigate the consequences of a breach.
  • A zero trust approach to security doesn’t distinguish between internal and external networks.
  • You're able to leverage existing investments in technology and skills through the Zero Trust Security method.
  • The zero trust model allows companies to transform digitally.