Fresh Chilled Juices, Coffee and Tea Service, Sliced Seasonal Fruits and Berries, Soft Scrambled Eggs with Cheddar Cheese, House Baked Pastries, Greek Vanilla Yogurt and House Made Granola, Applewood Bacon and Pork Sausage Links, Breakfast Potatoes, Oatmeal with Almonds, Craisins and Brown Sugar
Do you want to know what the hackers and spies are doing to your infrastructure? Would you like to see how we are able to evade your expensive physical security and gain access to your valuable intellectual property? Stop wondering and ask! In this highly interactive and demonstration rich session, you'll chat with a professional social engineer and facility breach expert, as he discusses what works and what doesn't in protecting the “trade secrets” that gives you a competitive advantage. You’ll hear what makes his job harder....and sometimes easier. Don't miss this rare engagement!
We are only as good as the talent we have. All of us are challenged to find the qualified talent we need to be successful. The “talent supply chain”, is simply not producing the quantity, diversity and, in some cases, the quality of talent we need. It is time for organizations to get more involved in the supply chain to change the supply of new and renewed talent. Gain insights into the reality of the challenge and how it will grow as a large number of baby boomers are preparing to retire. Understand what opportunities and actions exist to address the challenge. Not only for new people entering the field but also for those currently employed. Learn about how new collaborative efforts among business leaders are working to meet the challenge head on and how you can get involved to solve this broad regional issue.
While the Cloud revolution is in progress, gaining a clear competitive advantage that provides your organization and customers significant business value with minimum risk will continue to be a strategic goal. What are your deployment choices? Which one will allow you to move workload seamlessly and securely from on-premise to the public cloud? How can you ensure that your business transformation yields a secure information fortress? This presentation will share how to transform your business addressing these challenges all while achieving significant cost savings and assuring deeply integrated security.
For decades, IT departments have struggled under the limitations of their storage suppliers. Shackled by the inherent inefficiency of mechanical disk, organizations are slower, inefficient, and less responsive.
We at Pure say, lay down that rusty old disk and fight for a better future! It is high time the IT industry said NO to slow performance, data center bloat, and adversarial business practices. The time for change has come – time for speed, efficiency, and fairness.
Leadership is about acting with integrity, creating an open culture, having discipline, communicating clearly, and building relationships built on mutual trust and confidence. The core of leadership doesn’t change, but the tools of leadership and techniques for training leaders can. Join us for a candid discussion on leadership as we discuss:
- What does it take to be a leader?
- Who were our mentors?
- What considerations are made to identify an appropriate succession candidate?
The tidal forces of the IT industry and how new security threats are affecting CIOs and CISOs in their missions of protection and moving forward. The role of the CIO and CISO is rapidly converging, where the CIO needs to be security savvy and the CISO needs to be a strong business-minded partner. During this session we will discuss:
- The “tidal forces” that are affecting every business moving forward from a business and operational perspective.
- How the “classic security models” are evolving – and how security technology and resource allocation need to evolve with the new models.
- How the inherent nature of data protection is evolving along with the unavoidable “tidal forces” affecting business operations today.
- How to start thinking about how to tackle these issues, plan for them, and evolve your security strategy to meet and exceed your expectations.
IT is stuck in a cycle where more than 80% of our time and resources are spent keeping the lights on. Innovation has taken a back seat to the constant needs of managing, protecting and updating our systems, and supporting end users. The problem is that those that don’t innovate, get left behind.
Some IT groups are trying to make their legacy systems work better, while others have looked to the cloud— but there are tradeoffs in control, data ownership and cost. Enter hyperconvergence, and its ability to deliver on the promise of innovative, agile IT.
This session will examine how utilizing a hyperconverged infrastructure can deliver enterprise-class capabilities, with the speed and economics of the cloud. With the ability to bring dramatic data efficiencies, built-in data protection and a single pane of glass to manage it all, hyperconverged systems are able to deliver the performance and protection required to run today’s Tier 1 applications.
The variety of generational perspectives that exist in the workplace is evident to all. From differences in communication styles, work ethics, and motivations, each generation brings distinctive characteristics to the office. The millennial generation is no exception. Through this presentation, you will be able to identify key traits related to each generation and find out how colleges are preparing millennials for the workforce.
Iceberg Wedge Salad, Loaded Potato Salad, Honey Dijon Slaw, Jalapeno Corn Bread, Smokey BBQ Beef Brisket with Brioche Slider Buns, Buttermilk Fried Chicken, Southern Fried Catfish with Creole Remoulade, Grilled Corn on the Cob, Seasonal Fruit Cobbler with Vanilla Bean Whipped Cream
Reflecting back to time spent with one of his professional role models, Sam Walton, Harry S. Campbell takes the tenants of servant leadership and infuses them with his own business philosophies developed while working at Fortune 500 companies including Procter & Gamble (P&G) and Sprint, as well as smaller private companies. What results is an empowering and fresh approach to managing people and business that Campbell calls Get-Real Leadership.
Wireless access is the new de-facto means for employee productivity, whether in the enterprise, home or from the road. With this new mindset, old methods of securing the perimeter, are a hindrance to productivity and a nightmare for administration. The multi-vendor environments necessary to provide secure access can also create barriers. Join Mark as he discusses tackling these challenges in the most secure of all environments, the financial services industry.
Can you afford to be locked into a vendor’s technology and roadmap? Do you want to control your own future or have it dictated to you? Come and learn how you can make your own future with the help of an open standards technology approach. With the freedom of choice, you can create a data center and campus network that will be leading your organization into the future to support advanced technologies such as SDN, Open Mobility, etc. using the latest procurement models.
Have you ever tried to manage a process that runs entirely in email? Come hear a case study in how we took an unruly, email-driven ordering process at ArcBest Technologies and streamlined it using cloud based tools and internal systems. We will discuss why we chose this process, what we did to automate it, how it improved the customer experience, and how it improved the speed of order fulfillment.
Over the years the following questions have been asked many times but are they being answered? "Are you truly focused on solving business problems and driving business results"? Are you and your team committed to getting to know your business partners better? Have you discussed with them their plans to grow market share and generate revenue? Or are your strategies still focused on an operate and maintain strategy to "keep the lights on"?
Current surveys indicate that meeting business requirements is still a number one issue. This panel presentation will discuss ‘meeting the needs of the business’ and applying strategies to solve business problems.
- How do you move your IT team from an operational focus to a strategic focus?
- What strategies do you use to partner with the business to better understand their needs, challenges, and opportunities?
- What strategies do you use to get the business to view IT as a strategic partner, rather than an order-taker?
- What strategies do you use to show the business how IT can be an enabler and provide solutions that yield a competitive advantage?
Despite a global IT spend of over $4 Trillion, 67% of CEOs & CIOs are misaligned on how IT should be enabling the business*.. With the dramatic increase in digital technology & the business’s appetite to understand and enable their own innovations through technology, CIOs are challenged with the need to rapidly understand business inputs, stakeholder satisfaction, and assess their own teams internal capabilities. Info-Tech has found too often this is done through ad-hoc and informal processes, making improvement hard to measure, and success impossible to define. A new model is needed to enable the CIO to rapidly make decisions, prove success & analyze challenges with DATA.
In this session Info-Tech will present how CIOs can overcome these challenges, and forge a new data driven approach to rapidly accelerate decision making, as well as measure the benefits of IT with DATA. Info-Tech will share insights from Info-Tech’s 3 year Stakeholder Satisfaction Study & how IT can enable transformation at unparalleled rates.
By the Numbers:
- 66% of CEOs don’t understand how to use IT to transform the business.
- 84% of IT Organizations score below 80% on IT satisfaction
- 43% of CIOs overestimate the size of their next budget.
- 78% of CEOs/CIOs are aligned on what IT issues impede innovation BUT are Highly Misaligned on the Business Barriers that Impede Innovation
- 72% of business leaders misjudge which services really matter to them
* Info-Techs CEO/CIO Alignment study
How do I Plan for a Data Breach? Organizations often struggle to plan properly (if they even have a plan) to prepare for a data breach. It’s a daunting task. Cecil will share some insights on how organizations plan for a Data Breach.
PwC Forensics Partner Charles Beard brings practical advice to both Boards and Management teams on the proactive measures they can take TODAY that will minimize the impact of a computer crime events. Having served as the General Manager of a $500M cyber security business and CIO of a $12B national security company, Charles has witnessed company's go from being the victim to a prospective defendant in computer crimes. He brings an operators perspective to investigating computer crimes and will provide an insider’s view of investigations and the practical steps Technology executives should be taking to manage the risk and avoid the tragic consequences of being unprepared.
Enjoy this complimentary cocktail reception featuring an open bar, hors d’oeuvres and conversation. Make this an important element of your attendance to the Summit. The ability to network and collaborate with your peers in an open and no-hype environment will prove to provide long lasting value to your key business initiatives moving forward.
Event VenueDirections & Information Below
STATEHOUSE CONVENTION CENTER
101 E Markham St • Little Rock, AR 72201 • ph. 501-376-4781