CISO New York Summit | September 12, 2017 | Convene (32 Old Slip, Downtown) - New York, NY, USA

↓ Agenda Key

Keynote Presentation

Visionary speaker presents to entire audience on key issues, challenges and business opportunities

Keynote Presentations give attending delegates the opportunity to hear from leading voices in the industry. These presentations feature relevant topics and issues aligned with the speaker's experience and expertise, selected by the speaker in concert with the summit's Content Committee." title="Keynote Presentations give attending delegates the opportunity to hear from leading voices in the industry. These presentations feature relevant topics and issues aligned with the speaker's experience and expertise, selected by the speaker in concert with the summit's Content Committee.

Executive Visions

Panel moderated by Master of Ceremonies and headed by four executives discussing critical business topics

Executive Visions sessions are panel discussions that enable in-depth exchanges on critical business topics. Led by a moderator, these sessions encourage attending executives to address industry challenges and gain insight through interaction with expert panel members." title="Executive Visions sessions are panel discussions that enable in-depth exchanges on critical business topics. Led by a moderator, these sessions encourage attending executives to address industry challenges and gain insight through interaction with expert panel members.

Thought Leadership

Solution provider-led session giving high-level overview of opportunities

Led by an executive from the vendor community, Thought Leadership sessions provide comprehensive overviews of current business concerns, offering strategies and solutions for success. This is a unique opportunity to access the perspective of a leading member of the vendor community." title="Led by an executive from the vendor community, Thought Leadership sessions provide comprehensive overviews of current business concerns, offering strategies and solutions for success. This is a unique opportunity to access the perspective of a leading member of the vendor community.

Think Tank

End user-led session in boardroom style, focusing on best practices

Think Tanks are interactive sessions that place delegates in lively discussion and debate. Sessions admit only 15-20 participants at a time to ensure an intimate environment in which delegates can engage each other and have their voices heard." title="Think Tanks are interactive sessions that place delegates in lively discussion and debate. Sessions admit only 15-20 participants at a time to ensure an intimate environment in which delegates can engage each other and have their voices heard.

Roundtable

Interactive session led by a moderator, focused on industry issue

Led by an industry analyst, expert or a member of the vendor community, Roundtables are open-forum sessions with strategic guidance. Attending delegates gather to collaborate on common issues and challenges within a format that allows them to get things done." title="Led by an industry analyst, expert or a member of the vendor community, Roundtables are open-forum sessions with strategic guidance. Attending delegates gather to collaborate on common issues and challenges within a format that allows them to get things done.

Case Study

Overview of recent project successes and failures

Case Studies allow attending executives to hear compelling stories about implementations and projects, emphasizing best practices and lessons learned. Presentations are immediately followed by Q&A sessions." title="Case Studies allow attending executives to hear compelling stories about implementations and projects, emphasizing best practices and lessons learned. Presentations are immediately followed by Q&A sessions.

Focus Group

Discussion of business drivers within a particular industry area

Focus Groups allow executives to discuss business drivers within particular industry areas. These sessions allow attendees to isolate specific issues and work through them. Presentations last 15-20 minutes and are followed by Q&A sessions." title="Focus Groups allow executives to discuss business drivers within particular industry areas. These sessions allow attendees to isolate specific issues and work through them. Presentations last 15-20 minutes and are followed by Q&A sessions.

Analyst Q&A Session

Moderator-led coverage of the latest industry research

Q&A sessions cover the latest industry research, allowing attendees to gain insight on topics of interest through questions directed to a leading industry analyst." title="Q&A sessions cover the latest industry research, allowing attendees to gain insight on topics of interest through questions directed to a leading industry analyst.

Vendor Showcase

Several brief, pointed overviews of the newest solutions and services

Taking the form of three 10-minute elevator pitches by attending vendors, these sessions provide a concise and pointed overview of the latest solutions and services aligned with attendee needs and preferences." title="Taking the form of three 10-minute elevator pitches by attending vendors, these sessions provide a concise and pointed overview of the latest solutions and services aligned with attendee needs and preferences.

Executive Exchange

Pre-determined, one-on-one interaction revolving around solutions of interest

Executive Exchanges offer one-on-one interaction between executives and vendors. This is an opportunity for both parties to make key business contacts, ask direct questions and get the answers they need. Session content is prearranged and based on mutual interest." title="Executive Exchanges offer one-on-one interaction between executives and vendors. This is an opportunity for both parties to make key business contacts, ask direct questions and get the answers they need. Session content is prearranged and based on mutual interest.

Open Forum Luncheon

Informal discussions on pre-determined topics

Led by a moderator, Open Forum Luncheons offer attendees informal, yet focused discussions on current industry topics and trends over lunch." title="Led by a moderator, Open Forum Luncheons offer attendees informal, yet focused discussions on current industry topics and trends over lunch.

Networking Session

Unique activities at once relaxing, enjoyable and productive

Networking opportunities take various unique forms, merging enjoyable and relaxing activities with an environment conducive to in-depth conversation. These gatherings allow attendees to wind down between sessions and one-on-one meetings, while still furthering discussions and being productive." title="Networking opportunities take various unique forms, merging enjoyable and relaxing activities with an environment conducive to in-depth conversation. These gatherings allow attendees to wind down between sessions and one-on-one meetings, while still furthering discussions and being productive.

 

Tuesday, September 12, 2017 - CISO New York Summit

7:00 am - 7:55 am

Registration and Networking Breakfast

 

8:00 am - 8:10 am

Welcome Address and Opening Remarks

 

8:10 am - 8:40 am

Keynote Presentation

Addressing Privacy on a Global Scale

Of all the risk management issues that present themselves to the modern-day CISO, perhaps the most difficult to address is that of privacy. In and of itself, privacy is no different a challenge than protecting any other sensitive information, however the multi-jurisdictional impacts of the issue due to wildly differing laws between the US and European countries (as well as Canada, another country with strong privacy laws) make this an issue that is often times overwhelming to address. CISOs must work diligently to ensure that their privacy efforts conform with the standards of any jurisdiction with which they might work, where their data might be held and this is an almost overwhelming task.

Takeaways:

  • Privacy is one of the most challenging issues for any business and CISO to address
  • The difference in regulations between and among European countries (both those in and out of the EU itself) and North American ones means traversing a fraught landscape
  • A strong approach to privacy that addresses global differences is essential to being a stable and viable global business
 

8:45 am - 9:15 am

Share:

Keynote Presentation

Malware Management - Past, Present and Future

Malware dates back to the earliest days of connected computing. To date, our approach to dealing with malware has remained relatively static. Currently we rely on being able to determine patterns within unpacked, decrypted files. This provides a single pattern-based signature to defend against a wide range of malware attacks, but is insufficient due to several management aspects. Artificial intelligence is the next step, but how can we leverage it to meet malware management needs? 

In this session you will learn: 

  • The history of AI 
  • How a deep learning system functions 
  • How this type of system is being used to combat the ever-increasing onslaught of malware

Presented by:

Keith Rayle, Senior Security Strategist, Fortinet View details

 
 
 

9:20 am - 9:45 am

Executive Exchange

 

Share:

Thought Leadership

Secure, Simplify and Transform to a Cloud-Enabled Enterprise

Progressive companies are leveraging cloud, a powerful business enabler, to transform their business and make it more competitive. But cloud and mobility significantly impacts the current IT infrastructure - security, network traffic flow, applications, user experience and cost. As CIOs and CISOs embrace this transformation, they look for opportunities to exchange ideas with their peers who have gone through this journey. 

In this session, Zscaler will share experiences of leading the massive network, security and datacenter application transformation that he managed across all business units of GE. Example topics will include: 

  •  How to transform your hub & spoke network into a cloud-enabled network  
  • How to transform datacenter applications to a SaaS, AWS and Azure environment  
  • New security paradigm for the new world of cloud 
  • Changing role of IT execs 
  •  Lessons learned

Sponsored by: Zscaler

 

9:50 am - 10:15 am

Executive Exchange

 

Share:

Thought Leadership

Know Which Risks Are Worth Taking: Scalable Risk Management

In the constantly changing landscape of cyber risk, executives and board members are increasingly forced to take ownership of and accountability relating to digital risks. Yet, many lack the critical knowledge to make effective risk management decisions and incorporate them into their overall business strategy. This inevitably leads to security strategies which are ineffective and reactionary. This presentation will outline RSA's Business Driven Security strategy and focus on the intersection of risk management and IT & security initiatives.

Sponsored by:

RSA View details

 
 
 

10:20 am - 10:30 am

Morning Networking Coffee Break

 

10:35 am - 11:00 am

Executive Exchange

 

Think Tank

Evolving From Legacy To Achieve Digital Transformation

For most IT organizations, the way to get there is through a digital transformation framework, which produces a radically different and modern approach to technology and support that is based on a principle of business agility. It emphasizes moving quickly to adjust to the way the customer in the global techno-society wants to interact. 

Digital transformation requires a new business operating vision and a strategy on how to deliver that vision. includes technology infrastructure, tools, applications, communications, staff capabilities, staff competencies and more. The CIO has to work closely with corporate planning to define the type of support that will be needed and how the technology infrastructure and capability will evolve and to create a flexible investment plan that can be adjusted over time. Key elements must include the redesign of the technology infrastructure to reduce complexity and cost while increasing scalability, a rethinking of how business and IT work together, and an ability to quickly adopt and integrate new advanced technologies. 

Until recently, this goal has been almost impossible to achieve, because few companies have the ability to replace legacy infrastructure and applications. And it has been almost impossible to unlock legacy functionality and data for use with modern technology.


Think Tank

Big Data Analytics and the Impact on Fraud

Financial fraud is, unfortunately a huge business, with annual losses so massive that were Fraud a country, it would have the fifth highest global GDP. While enterprises in the financial services sector have always used analytical processes to detect and limit those losses, as technology moves forward the analytical capabilities that can be brought to bear increase in exponentially in capability and those on the leading edge are able to see, and stop, more fraud in less time. Just as Big Data capabilities are bringing significant business benefit to other aspects of the business, they can to fraud mitigation but several challenges need to be overcome for maximum efficiency. Only by addressing quality, volume, security, and integration challenges and by further ensuring the right staff with the right skills are in place can benefits actually be realized. 

Takeaways: 

  •  The increased use of unmanned technology combined with ever quicker financial transaction processing has created a world ripe for the proliferation of fraud 
  • In a fight fire with fire approach, those same machine learning approaches can be repurposed to analyze transactions looking for the needle in the needlestack that is the illicit one 
  •  A Big Data approach only works with the right foundation; garbage in garbage out has never been more true and data and process rigor is essential to success 
 

11:05 am - 11:30 am

Executive Exchange

 

Thought Leadership

Using Data & Analytics to Drive Business Transformation

Big Data initiatives have become a reality among almost every company today, however, what we have seen is lots of initiatives have become just science projects and did not deliver on early expectations. This situation needs to reversed quickly because those organizations that are being successful with Big Data and analytics programs are rapidly leaving those that are unsuccessful in their wake. Big Data and analytics has the potential to be transformational for the enterprise, but IT leaders need to be making the right investments, in the right areas, to ensure optimal success. This panel discussion will focus on how to use data and analytics to drive true business success and show some real examples of companies and individuals who made a difference. 

Takeaways:  

  • Analytics is not a new capability and has always been aligned with the most successful companies 
  • The roles of IT and the lines of business are changing when it comes to data and analytics programs 
  • The business benefits of analytics programs can be huge but efforts need to be constrained so that they don't turn into flights of fancy, yet set free enough that they find the unknown unknowns that truly drive transformation

Sponsored by: Dell EMC

 

11:35 am - 12:00 pm

Executive Exchange

 

Executive Boardroom

TBC


Sponsored by:

Tenable Network Security

 

Share:

Executive Boardroom

The Enterprise Immune System: Using Machine Learning for Next-Generation Cyber Defense

From insiders to sophisticated external attackers, the reality of cyber security today is that the threat is already inside. A fundamentally new approach to cyber defense is needed to detect and investigate these threats that are already inside the network - before they turn into a full-blown crisis. Based on unsupervised machine learning and probabilistic mathematics developed by specialists from the University of Cambridge, new 'immune system' technologies are capable of learning the 'self' of an organization. By analyzing every network, device, and user, and modeling them as they go about their day-to-day activity, the Enterprise Immune System can establish a highly accurate understanding of normal behavior. It can therefore spot abnormal activity as it emerges, and even take precise, measured actions to automatically curb the threat. Rules and signatures are not keeping pace with today's rapidly evolving cyber attacks. The Enterprise Immune System represents a fundamental step-change in automated cyber defense, is relied upon by organizations around the world, and can cover up to millions of devices. 

Takeaways: 

  • How new machine learning and mathematics are automating advanced cyber defense 
  • Why 100% network visibility allows you to detect threats as they happen, or before they happen 
  • How smart prioritization and visualization of threats allows for better resource allocation and lower risk 
  • Real-world examples of unknown threats detected by 'immune system' technology

Sponsored by:

Darktrace View details

 
 
 

12:05 pm - 12:30 pm

Executive Exchange

 

Think Tank

IoT and IT/OT

M2M type technologies. In many cases these older industrial automation initiatives used proprietary communications protocols and dedicated sensors that interfaced with controllers that could manage communications between IT and OT platforms. Fast forward to an IoT world however and these sensors and controllers will need to natively speak IP, natively integrate to back-end enterprise systems beyond just simple controllers, systems such as ERP, BI and other core platforms. Navigating the complexity of process, data, security, and functionality implications has the potential to be a minefield for the unwitting IT executive that goes in without eyes wide open. 

Takeaways: 

  • IT/OT integration is a low-hanging fruit area for IoT adoption 
  •  Existing investments into older M2M IT/OT integrations however can erode any potential value 
  • Before investing in IoT enabled IT/OT integration careful consideration must be made of the implications and whether value can be realized - does the investment justify the returns over what is already in place? 

Presented by: Timothy Reed, SVP CIO, EMCOR Group

Think Tank

AI Meets IG

Automating Information Governance For most corporations today, information security is inextricably intertwined with the legal and compliance functions. Threat landscapes grow larger and more complex by the day; so, too, do the legal and regulatory frameworks within which those landscapes lie. Most boards of directors today grasp the strategic and operational imperatives associated with information security, yet at most organizations, nearly 80% of IT budgets goes to operational spend - paying to maintain technology already purchased and to manage and protect information already created"leaving only 20% to drive innovation and create new value for business. Legal and compliance, as well, are expected to do more with less, including by finding ways to embrace new technologies and new models for procurement of professional services. How can you do that when most of your time, money, and effort go just to technologies and new models for procurement of professional services. How can you do that when most of your time, money, and effort go just to keeping the lights on? Join us as we explore this issue and examine some of the successful strategies that are being leveraged by top IT leaders. 

Takeaways: 

  •  The pressure on CISOs to drive change has never been higher, but fortunately neither has the opportunity to do so  
  • Disruptive technologies don't just have the power to disrupt information security for the worse, they have the power to disrupt the business for the better 
  • Fortune favors the bold; now is the time to take a leap into new modes of business to break the operational spend stranglehold

Presented by:

Richard Kessler, Executive Director, GISO, UBS View details

 
 
 

12:35 pm - 1:20 pm

Networking Luncheon

 

1:25 pm - 1:50 pm

Executive Exchange

 

Think Tank

The Future of the CIO in the Coming Digital Economy

As more businesses undergo a digital transformation, and as those digital transformations become more ingrained into organizational culture, Digital becomes not something unique and different from the business, but a core component of every aspect of the business. As this shift occurs, IT itself faces the very real possibility of no longer being something unique from the business, but instead a component of every aspect of the business. In this world, what role then exists for the CIO? Two clear paths are presenting themselves " one leads to a focus on infrastructure and integration, to keeping the lights on for the digital innovators, while the other leads to information and innovation itself. Knowing what path to choose, how to choose it, and how to see it through will be one of the greatest challenges CIOs of this era will face. 

Takeaways:  

  • Change is, if not already here, certainly coming and CIOs that don't prepare for the change may not like the results when it arrives 
  • Digital transformation is all about connecting enterprise system to information technology to drive productivity and performance improvements 
  • Be prepared to tackle the tasks that no-one wants to do, but everyone needs done; establish relevance to cultivate importance Presented by: 

Richard Entrup, Global CIO, Christie's

Think Tank

Building a Collaborative and Social IT Security Program

In todays environment there can be no arguing that a comprehensive IT Security program is a de facto requirement for every organization. Such a program needs to address the full range of security threats that can be leveraged against an organization, needs to be integrated into whatever regulatory and governance requirements exist, but beyond that it needs to be accessible, consumable, and actionable by everyone that is influenced by it, or interacts with it. Building a program that is shared through social channels and relies on the collaborative input of employees and constituents for not only creation but enforcement will drive higher levels of adoption, responsiveness and, ultimately, protection.

Takeaways:

  • A security program, that is the stated intentions of the organization combined with the policies and tools to back those intentions up is essential
  • The program needs to be easily communicated, easily consumed, and easily complied with
  • Using an open social and collaborative approach to creation, distribution, and enforcement ensure greater adoption and ultimately greater security
 

1:55 pm - 2:20 pm

Executive Exchange

 

Share:

Thought Leadership

Say Goodbye to Vulnerability Backlogs: Using RASP to Reclaim Control and Reduce Risk

Knowing is half the battle when it comes to protecting applications and their sensitive data. 

Application security testing tools scan your code to reveal the long lists of known vulnerabilities, but not all are remediated before the next release-even with mature secure software development practices. Enterprises resort to using theoretical levels of criticality - not actual risks-to prioritize which accumulated vulnerabilities to fix and in what order. Many vulnerabilities often undergo an exception process and make it into protocol. 

A real-time, embedded solution like Prevoty's runtime application self-protection (RASP0 changes the game completely. Prevoty places an automated security mechanism at the front of the line - directly in the application's operating environment - to immediately lower risk and act as a compensating control at runtime. 

As such, Prevoty-enabled enterprises see 98%+ of their known vulnerabilities mitigated instantly, reducing backlogs and expediting an otherwise cumbersome release process. Prevoty RASP detects live production attacks and generates real-time security event longs and reports. Security teams can then correlate pre-production vulnerability scan results with Prevoty's runtime attack logs to go back, remediate based on actual risk - not just hypothetical threats. The result? Improved forensics.

Sponsored by:

Prevoty, Inc. View details

 
 
 

2:25 pm - 2:50 pm

Executive Exchange

 

Thought Leadership

The Path to Live Business

Running your business "live" based on true data-driven decisions, and managing your performance with automated and integrated core business processes requires a modern ERP system. Learn how SAP S/4HANA can help transform your business by reducing IT complexity and increasing business productivity. We will also explore the tactical steps leading companies are taking today to unite enterprise-wide processes into a synergistic digital core. 

Takeaways: 

  • How to connect all parts of your business to run live with a digital core 
  • Which next-generation ERP is right for you: Public Cloud, Private Cloud, On Prem or Hybrid 
  • Short and long-term strategies to simplify IT complexity

Sponsored by: SAP

 

2:55 pm - 3:20 pm

Executive Exchange

 

Think Tank

The Unbearable Lightness of Digital Transformation

Managing digital transformation teams means organizing, motivating and empowering technology and business stakeholders to address long-term needs, technology trends and uncertainties to execute a strategy that provides effective, secure and adaptable IT capabilities to enable business innovation and sustainability. 

Digital Transition is about the business' use of technology. IT transformation is about ensuring that the business has the technology it will need. Technology organizations have an obligation and opportunity to make IT transition a strategic program. Transition means change in relationships, roles, capabilities and responsibilities; architecture, tools and methods. 

IT Transformation is a challenge. It works best where team members are cognitively ready- mindfully aware, supporting a common vision and emotionally, socially and organizationally intelligent- to work in and manage change in a cross functional, interdepartmental, interdisciplinary team. 

Takeaways: 

  •  Cognitive readiness has the greatest impact on the success of transition teams and should be an area of primary focus for IT Transformation team leads, all team members and their management. 
  • Managing expectations- using strategic, architectural and project planning; systems and process thinking; effective communication; a sense of organizational awareness, and a significant dose of practical reality- is a critical success factors to be addressed by transition teams. 

Presented by: George Pitagorsky, CIO, NYC Department of Education

Think Tank

Best-of-Breed or Consolidated: Principles in Security Architecture Design

When it comes to implementing network security infrastructure there are two schools of thought: use best-of-breed point solutions, or go with all round consolidated platforms. Pros and cons abound for either approach revolving around varying levels of protection, integration, and administrative overhead but the increasing complexity of current security infrastructure is showing a winning approach. Even though consolidated solutions may offer greater benefits in the long run, no one exists in a green-field situation when it comes to network and infrastructure security so careful planning is required to ensure the necessary protection.

Takeaways:

  • The management burden of best-of-breed outweighs performance benefits
  • Consolidated platforms can lead to feature overlap and unnecessary cost
  • Planning is required to maximize coverage but minimize effort and spend

Presented by:

Nasser Fattah, Managing Director, Bank of Tokyo-Mitsubishi UFJ Ltd. View details

 
 
 

3:25 pm - 3:35 pm

Afternoon Networking Coffee Break

 

3:40 pm - 4:05 pm

Executive Exchange

 

Thought Leadership

Capacity Planning as Competitive Differentiator

Capacity planning has in many ways become a lost art; common during the era of the mainframe when resources were expensive and time-consuming to procure, the advent of the inexpensive pizza box Windows Server has relegated planning, replacing it with a just buy more mentality. But just buy more creates more problems than it solves as server sprawl, server management, and rampant overprovisioning issues quickly erode any aspect of the value that IT tries to deliver. The lost art need to be rediscovered, to allow IT to get back to offering truly efficient and effective service and service levels. This new era of capacity planning requires new tools that go beyond simplistic benchmarking and trending analysis and instead provides dynamic, flexible, and predictive modeling that allows IT department to truly deploy optimized IT services. 

Takeaways: 

  • Capacity management may have fallen out of favor but its abandonment has created a wealth of problems for IT and business users the world over 
  • In an era of intense innovation pressure, enterprises can no longer afford the inefficiencies of a just buy more approach to capacity provisioning 
  • Traditional capacity planning techniques certainly have value but dynamic modeling based on predictive analytics takes things to a whole new level
 

4:10 pm - 4:35 pm

Executive Exchange

 

Think Tank

Cloud Adoption Challenges on a Macro Level

The hype around the cloud is pervasive and can be potentially overwhelming but numerous studies have shown that tangible benefits can be had, whether in cost savings, efficiency improvements, or flexibility enhancements. That said numerous impediments exist to not just realizing that value, but even considering adoption; regulatory issues, integration challenges, business process revamp, and a dozen other challenges can halt cloud projects in their tracks before they get off the ground. In this group discussion we'll explore those inhibitors, understanding which challenges prevent adoption and what can be done to overcome them. 

Takeaways:  

  • The cloud presents a significant opportunity to organizations and while most have adopted in some form or other, wholesale adoption still lags 
  • To realize benefits enterprises must deal with a variety of challenges each one requiring different solutions 
  • Industry by industry adoption is constrained for different reasons but do common solutions exist that can resolve issues across the board?

Think Tank

How to be Socially Secure (or Securely Social)

Social media is the least hyped and potentially least adopted of the so-called disruptive technologies, at least by enterprises in general. This doesn't mean that employees are embracing these tools personally however, nor does it mean that enterprises should continue to avoid them. The fact of the matter is social platforms allow for incredible levels of interaction that when harnessed can lead to significant creativity and productivity gains allowing enterprises that adopt and encourage the use of social collaboration platforms to be more successful than their non-social peers. But every newly adopted technology brings with it unique problems and so it is the CISOs job to provide the secure landscape within which this social collaboration, both internal and external, sanctioned and not, can occur.

Takeaways:

  • Your employees are already social whether you realize it or not, facilitate it or not so ignoring the issue only leads to greater security problems
  • Social collaboration presents a real security threat as information is more freely shared, and interactions occur outside the boundaries of enterprise control
  • Social security programs must be built in layers, addressing first unsanctioned use, then sanctioned all while differentiating between internal and external social activity
 

4:40 pm - 5:20 pm

Executive Visions

Facilitating Technology-Enabled Business Transformation

The role of the modern IT Executive is more complex than it has ever been before, not just because the technology landscape has become more complex, but also because increasingly IT execs have had to become a business-focused executive, not just a technologist. Long have we talked about the CIO and CISO getting a seat at the table but modern businesses are now demanding that their technology impresario join them and leverage his deep and rich technical acumen to allow the organization as a whole to better position itself for market-place success. To be successful, CxOs need to invest in themselves, in their personnel, and in the right technologies to allow them to position the IT department to proactively address business needs as an innovator and driver, rather than order-taker and enabler.

Takeaways:

  • IT leadership can no longer be simply technology focused, but must instead take their visibility into business process and become business focused
  • A broader business-focus does not preclude maintaining technology excellence however and indeed may demand more of it than ever before
  • Success for CxOs will be measured not in how they can enable enterprise decisions, but in how they can drive growth
 

5:20 pm - 5:30 pm

Thank You Address and Closing Remarks

 

5:30 pm - 7:00 pm

Cocktail Reception