Hoosier Sunrise Breakfast Buffet: Seasonal fresh fruit and berries, freshly baked pastries, muffins and croissants, low fat fruit yogurts with locally made granola, assorted bagels, whipped cream cheese, assorted individual cereals with milk, farm fresh scrambled eggs, aged cheddar and fresh herbs, breakfast potatoes, smoked pork bacon, country link sausage, assorted fruit juices, ice water, freshly brewed coffee, herbal teas with sliced lemon
There’s a common misconception in business today: that organizational change happens through education and performance management systems. In other words, if we give people enough facts, and use the right mix of carrots and sticks to get them to perform, change happens.
And, that’s completely backward.
It’s also one of the chief reasons why, in my experience, more than 2/3rds of “typical” change efforts fail. One of my favorite sayings is this: “The way we approach change is critical to how hard (or not) and how successful (or not) change will be...”
Change can leverage our desires instead of our fears, our choices instead of our insecurities, our strengths instead of our shortcomings. And when this happens, change—while in many cases remaining a challenge—becomes something “other than hard,” and something where success can be normal and expected.
This keynote inspires a mind reboot, a shift toward helping the people around you to CHOOSE change. Here are some remarkable benefits we’ll quantify and that you’ll experience first hand in the session:
1. Engagement is driven by a sense of trusted appreciation
2. Authentically-engaged employees do “whatever it takes” to assure change happens
3. High-trust relationships reduce costs and shorten timeframes associated with change
Here’s the bottom line: change is an emotional decision, not an intellectual one, and CHOOSING change makes ALL
1. There’s no such thing as organizational change - the people in organizations change, one at a time. If we get the right people, in the right roles, at the right time, in the right sequence to change together, then it feels like the organization itself is changing.
2. There’s a PROFOUND difference between change done to us versus change done through us.
3. Accelerating three kinds of trust (a. I am trusted; b. I trust the situation and my leaders; and c. we trust each other) drive real, quantifiable business benefits. It’s not just some fluffy notion.
4. Real, sustainable change happens only when we want it. Period.
Our panel will touch on topics such as networking, mentoring, taking risks, navigating challenging personalities, authenticity, building your personal brand, and work/life “balance” versus work/life “integrity.” This session will provide real-world examples of challenges and obstacles that women experience in STEM-related fields, and tools and tips to overcome them and reach your maximum potential.
Your employees are still your front line of defense against cyber threats. What are they up against and what do they need to know? This session, including time for discussion, will provide a law enforcement perspective on recent Cyber events, lessons learned from recent intrusion investigations, and how to work with law enforcement when the need arises.
Recent developments in reimbursement, including shared savings and pay-for-performance plans have increased incentives for healthcare providers to improve efficiencies using various telehealth services. This session will discuss the financial and quality motivations that are driving providers into telehealth, and provide a solid foundation for providers to explore and implement such expansion. Telehealth is a tool to assist providers and healthcare facilities in moving from a fee-for-service to a value-based-purchasing reimbursement methodology. The session will include an interactive discussion where leaners can ask questions and learn about the free resources available through the National Consortium of Telehealth Resource Centers.
Doug Theis will share how cloud-based information technology levels the playing field for organizations to streamline operations and uncover unforeseen innovations that can set them apart.
Participants will come away with insight that may lead them to consider new approaches when an opportunity or change event arises, including:
- Shifting from building to buying IT as a service
- Positioning IT as a business enabler, not a cost center
- Creating a multi-cloud and hybrid strategy
After Indiana Members Credit Union virtualized their environment, they needed a BC/DR strategy that worked in their new environment, provided them with a better RTO than their previous tape back-up solution, and minimized their data loss. Learn how David McSpadden, Network Administrator at IMCU, accomplishes this and more with Zerto Virtual Replication.
Over the course of the last several years, the IT industry has seen a shift in how organizations deploy on-premises infrastructure. We are currently standing at a cusp of the next great revolution where hyperconverged systems become the de-facto standard for datacenter infrastructure. In this session, we'll examine the "build vs. buy" decision facing IT departments and discuss how hyperconverged can be leveraged to deliver business outcomes.
Consumer expectations, digital capabilities, big data, information security requirements and emerging technologies are all creating demands to transform IT. To transform effectively, we need to enable innovation within while we also respond effectively and timely to business imperatives. We’ll explore examples of the demands to transform as well as examples of innovations IT leaders can sponsor and support. We’ll also explore ways to applaud successes and learn from the inevitable failures that are inherent with innovation.
Many IT professionals see the legal team as an obstacle to getting things done. In reality, they can be a huge ally. They are worried about many of the same issues, but from a different perspective. Plus they have huge, if not unlimited budgets and a direct line of communication to the CEO to break roadblocks and resolve issues. This session will help you understand the mindset and objectives of your legal team and how, with a little preparation, you can enlist their support in accomplishing your common goals.
Our story of how a 2 person support staff strove to provide all-encompassing tech coverage for over 600 end-users scattered across the nation without adding staff or inordinate costs. By utilizing outside services, new support software, and creative labor practices, we were able to cut IT costs dramatically, improve automation and record keeping, and change our praxis from reactive to proactive. This is a tale of how a department straddling between the small business and big business world learned to provide a depth and breadth of support mirroring larger support staffs.
The Pondurance team will show you a live demonstration of an external attack and a look behind the scenes at breach detection and network monitoring. The group will also discuss the compliance ramifications and the various tools that attackers and defenders use.
A customers story about their migration from a complex IT environment to a simple Hyperconverged Infrastructure. We will walk through the lessons learned, the benefits of the migration, and how this transition to HCI allowed IT resources to focus on business initiatives.
Interoperability, as it related to healthcare, has been defined and discussed in variety of manners, we’ll explore these and a few others as well as how this related to organizations outside of healthcare. There is lots that healthcare can learn for the other industry sectors on the topic of interoperability. The topic provides an opportunity for a discussion more than a presentation.
Customer Savor Indiana Lunch Buffet: Garden salad with creamy ranch and vinaigrette dressings, garden harvest vegetable crudités, crisp seasonal vegetables, five grain salad with Indian husk corn, pine nuts, dried fruits and fresh herbs, tossed in citrus vinaigrette, slow roasted pulled pork simmered in Sun King beer BBQ sauce, grilled chicken breast with Hoosier Husk corn succotash, butter roasted sweet potatoes, freshly baked rolls and butter, fruit cobblers, Wick’s famous sugar cream pie, freshly brewed coffee, ice water, herbal tea and unsweetened iced tea with sliced lemons
What are the risks of using Social Media Securely today?
Social media has provided a new threat vector to the the company and to customer data. Understanding the challenge this poses has been overlooked by most companies. How does a company protect themselves from inappropriate social media usage by employees, either through malicious intent or simple mistakes? How is true risk and new threats identified in social media? New understanding has to be developed to provide structured methods for dealing with social media, for educating employees and for monitoring and maintaining a positive social media presence and protect company data.
Hear from a panel of talent management experts about the top trends, strategies and real world experiences across multiple industries for recruiting, retaining and engaging top talent to win the talent war.
Bringing the Right Solution to the Right Problems at the Right time is what Information technology Projects are all about. In this session we will look at 5 common stumbling blocks that cause projects to fail, as well as collaboration techniques that can mitigate them.
In this hour you will receive an over view Innovation Games and then become a hands-on Practitioner in techniques that will Forever Change how you Deliver.
Together, we will help you build the smartest room and provide best of class technology experiences to your customers
System implementations are critical events for corporations and proper planning and execution are cornerstones for success. This discussion will focus on the importance of making the correct decisions in the areas of software selection, infrastructure planning, and partner selection to ensure success. The project referenced in the discussion has taken five disparate ERP systems into one across multiple countries.
Not all approaches to increasing diversity are research-based or effective! This interactive session is intended to help you identify common misunderstandings that surface when people talk about how to increase the participation of women (and other underrepresented groups) in technology. You will learn tips and techniques to help you spot statements that might be "red flags" or a sign that the discussion is headed in a direction that is not research-based.
IT Leaders are facing an ever increasing set of demands, requests and threats. The growing workspace in the cloud, mounting vulnerabilities and the need to protect and contain sensitive information, makeup a changing new set of requirements for the leader in the Information Technology workspace. Take a look at a prioritized approach to help your company face these risks, while obtaining buy-in from fellow business leaders. Real-world techniques and examples will be shared, preparing you to make a stance in your quest for Security and IT Resources.
The increase in data breaches and the rise in external threats has reminded us of the importance of securing emails. Organizations need to be confident that the millions of emails leaving their network each day are protected where necessary, whether sent from a desktop or from a mobile device. Implementing secure email solutions should increase productivity and mitigate risk without creating employee frustration.
Join security experts from Zix for a discussion on solutions to solve your most pressing secure email challenges.
Managing the risk of social engineering is a key element of any cybersecurity plan. Human carelessness and mistakes are responsible for more data loss than high-tech external attacks. The panel will lead a discussion of best practices for both local and cloud environments for addressing this important element of cybersecurity.
Board rooms across the nation are searching for leaders who understand both business and technology. In an increasingly digital world where companies are scrambling to keep up with changing business models, new sources of value, and the attendant risks that accompany ubiquitous technology, seasoned governance is necessary. Learn why technology executives are uniquely suited to a governance role, and how you can position yourself for board membership.
The term “Best Practices” has become a cornerstone of many IT organizations vocabulary. Why is there such a focus on best practices, what value do these bring to the organization and the business partners it supports? Is it possible to double the size the business, reduce the backlog of incidents, significantly reduce resolution times, all while keeping IT operational costs flat simply by applying “best practices”? By getting back to the basics, we were able to achieve all of these wins while increasing the value realized by our business partners with increased stability, reliability, and additional services.
Over the past three years, ransomware has jumped into the spotlight of the cyberthreat landscape. Until recently, most ransomware attacks were simply opportunistic and mostly affected individual users’ or small businesses’ computers. The ransom demands have commonly been the equivalent of just a few hundred dollars for an individual PC. But now, attackers have set their sights on larger organizations that have bigger budgets to pay bigger ransom demands. They also have more important files and computer systems that are critical to the organizations’ daily operations. Understanding what happens at each phase of a ransomware attack, and knowing the indicators of compromise (IOCs) to look for, increases the likelihood of being able to successfully defend against—or at least mitigate the effects of-an attack.
Keeping employees happy and engaged is extremely important for reducing turnover, increasing productivity, and establishing a strong company culture. Yet many companies struggle with employee engagement, especially when the teams are distributed. Due to the high-demand and short-supply of technology talent, a diverse and distributed workforce is increasingly becoming the norm, yet close collaboration and a shared vision remains essential.
Learn how CSpring uses technology to connect employees, from collaboration to employee engagement.
In a presentation modeled after his best-selling book, Last Man Down, FDNY Chief Richard Picciotto offers a tribute to the lives that were lost on September 11, 2001. His recount is not one of death and destruction, but a celebration of life and its unpredictable nature. Picciotto offers an eyewitness account of the defining historical event of our lives; his story is that of a man, a hero, and a tragic event that inspired a nation.
Enjoy this complimentary cocktail reception featuring an open bar, hors d’oeuvres and conversation. Make this an important element of your attendance to the Summit. The ability to network and collaborate with your peers in an open and no-hype environment will prove to provide long lasting value to your key business initiatives moving forward.
Event VenueDirections & Information Below
INDIANA CONVENTION CENTER
100 South Capitol Ave • Indianapolis, IN • ph. 317-262-3400