We live in a society where convenience trumps privacy. Societal norms have shifted – things that were once sacred are openly shared in perpetuity for the world to see. Advances in technology have made us vulnerable in ways that have yet to be discovered. Our “always on” society, connected by the internet of things, creates an environment where even our personal devices are spying on us. “This is Personal” explores this phenomena. The presenter reviews where we are today and how to co-exist with the internet of everything and identifies opportunities for tomorrow.
Many organizations are aware of the cybersecurity and privacy risks brought about by the BYOD craze. Early solutions simply dealt with the technical challenges involved. Tackling these risks however, opens up a whole new world of problems as corporations attempt to control what happens on devices they don’t own. Employee privacy issues arise, HR and Legal get involved and the initiative gets out of control. We will discuss the requirements for a fully effective mobile device management platform and how companies can manage corporate owned mobile devices and deliver secure content to employee owned devices while maintaining control of that content and still respecting employee privacy all without limiting the effectiveness of a true mobile workforce.
Experts estimate that by 2020 there will be 50 billion devices connected to the internet. The proliferation of the “Internet of things” – the network of connected objects with the ability to communicate and share data with each other– brings both untold benefits to businesses as well as significant security, privacy, and legal risks. Vulnerabilities in some of these internet-connected devices can be exploited to allow hackers to access and misuse personal information, or even cause harm to the device or the device’s user. In this session, we will give you an overview of the emerging legal issues and trends from the “Internet of things.”
Technology continues to evolve as the network perimeter evaporates into the cloud and electrons become the new global currency. Enterprises are continuously challenged by an elusive and morphing cyber threat from bad actors and opportunists who use the vulnerabilities in our Information Systems as weapons. From fraudsters to nation state-sponsored cyber warfare, these attacks come at us from every direction as the ingenuity of criminal minds seek new and creative ways to infiltrate our valuable information resources and engage in cyber warfare against our businesses and our way of life--compromising our financial and national security. We are bombarded daily with newspaper headlines and digital media reports about the latest cyber security breach. This breakout session will allow our panel of Executives the opportunity to share hard won experience and best practices with the Louisiana IT Symposium audience.
- How predictive analytics can solve the remaining issues that All Flash storage cannot address
- Why app-centric approach to storage helps IT better service the business
- How Nimble’s Unified Flash Fabric delivers the freedom of choice
Join Pure Storage Principal Engineer, Dave Whitlock for an interactive dialogue on the current trends and technology from a storage vendor’s perspective and what we are seeing and hearing from customers of all sizes. We’ll also share our perspective and provide best practices on how we advise our customers and prospects the importance of setting your IT strategy first before filling up a data center with just hardware and software without a vision or strategy.
Intrigued by the term ‘Data Science’? How does it differ from standard ‘Business Intelligence’? In this session I will share my journey to learn ‘Data Science’ and how this experience changed how I look at data reporting. We will review the basics of ‘Data Science’ that you have probably already seen but we will relate them to the IT Professional, plus we’ll talk about how you may be able to begin your own or your team’s journey as well.
In today’s rapidly evolving business climate, companies must constantly contend with new challenges and aggressively pursue new opportunities-and so often, that requires drastic shifts in the way businesses operate. And more than ever, IT is driving those changes. Transformation is hard, and not everyone enjoys it. Hear from three top executives—all of whom have “CIO-Plus” experience-who have driven dramatic changes in their businesses. In this interactive panel and Q&A session, these executives will share perspectives on leading transformations, getting buy-in and support from their fellow leaders, and truly driving change-all while getting results that are reshaping their industries.
IT can often feel like an unwinnable game, with limited resources, changing priorities, multiple stakeholders and increased demands. Too often, IT leaders must make decisions with insufficient information and without knowing the true effect on the business.
Info-Tech’s framework removes the guesswork from what makes the business happy and predicts the impact of key decisions before they happen.
Info-Tech will walk you through the 3 real drivers of business satisfaction, and help IT leaders navigate a world in which:
- Only 28% of Business Leaders are satisfied with the performance of IT
- 67% of CIOs are not aligned with executives on the role of IT
Adam will be discussing GE’s journey to the cloud, covering transformational elements of cloud services, and how the cloud is driving brilliant outcomes for GE and its customers.
An effective software asset management strategy has two primary goals: compliance and optimization. The CIO and IT director of Jones Walker will share with the audience the factors driving their decision to develop a robust software asset management strategy, how they selected a tool for their environment, why managed services help to drive the most value out of their SAM implementation, and the unexpected returns of their investment in a SAM tool and strategy.
Ransomware has rapidly emerged as a significant threat to businesses and organizations of all verticals and sizes. In this day and age where data is invaluable, cybercriminals are taking advantage of people who don’t know a lot about malware behavior. Unfortunately, there is no silver bullet when it comes to ransomware. Being prepared to deal with it requires a multilayered, step-by-step approach for the best risk mitigation. Join our conversation to learn how you can best protect your organization from ransomware and avoid business disruption, loss of productivity, damage to brand reputation and legal implications that come along with recovering from a ransomware attack.
The value of information technology results in part from effective IT governance – the organization’s allocation of IT decision rights and accountability. IT can no longer be thought of as an isolated function in our organizations but rather an organizational competency. IT governance is a set of policies and associated processes that defines WHAT decisions must be made, WHO should make the decisions, and HOW the decisions will be made and monitored. In this session we will explore how Tulane University’s Technology Services is leading the effort to define IT governance policies and build a set of processes that support the decision-making from request to budgetary approval.
- Discover how to improve results by managing request intake and assessment.
- Explore how to align resources and business strategy.
- Learn how good technology governance leads to better business results.
- See how ServiceNow’s Demand Management can be used to evaluate requests, establish costs, and align strategic initiatives
The pace of innovation and change in the IT industry is accelerating. Cloud IT and the traditional IT we live and breathe today appear to be diverging. How are these two approaches different and what might they have in common? What advantages can be gained by moving towards Cloud IT operating methodologies in a traditional IT world? What practical steps should IT practitioners and leaders take to start their own journey to operating in a Cloud IT world? What should these customers begin looking for in technology products and vendors in the near term as they prepare for a Cloud-oriented future?
The Federal CIO Council has described eleven core competencies relevant to CIOs of Federal Agencies to assure compliance with the Clinger-Cohen Act and other relevant statutes, as follow:
1. Policy and Organization
2. Leadership and Human Capital Management
3. Process and Change Management
4. Information Resources Strategy and Planning
5. IT Performance Assessment
6. IT Project and Program Management
7. Capital Planning and Investment Control
8. Information and Knowledge Management
9. Cybersecurity/Information Assurance
10. Enterprise Architecture
11. Technology Management and Assessment
Creating a technology platform that helps your business thrive in a disruptive marketplace takes experience and an understanding of how IT systems interact with each other—and the people who use them, to create relevant business outcomes. Turn ideas into value through the agility of the cloud, through data-driven insights to drive revenue, and through secure, anywhere, anytime collaboration. Welcome to the idea economy. Accelerate your next big idea by embracing change now.
In a presentation modeled after his best-selling book, Last Man Down, FDNY Chief Richard Picciotto offers a tribute to the lives that were lost on September 11, 2001. His recount is not one of death and destruction, but a celebration of life and its unpredictable nature. Picciotto offers an eyewitness account of the defining historical event of our lives; his story is that of a man, a hero, and a tragic event that inspired a nation.
Enjoy this complimentary cocktail reception featuring an open bar, hors d’oeuvres and conversation. Make this an important element of your attendance to the Summit. The ability to network and collaborate with your peers in an open and no-hype environment will prove to provide long lasting value to your key business initiatives moving forward.
Event VenueDirections & Information Below
SHERATON NEW ORLEANS
500 Canal St • New Orleans, LA 70130 • ph. 504-525-2500