Advisory Board Members
Lack of employee engagement is the biggest challenge facing business owners and leaders today. Daren Martin delivers proven insights and solutions he uses to create ownership cultures in some of the biggest companies in the world. Using insights gleaned from years helping companies and coaching leaders, Dr. Martin teaches company leaders how to turn team members into owners. He will describe why employee engagement is so low at many companies, and what you can do to maximize it at yours. He will also touch on Company Culture Killers as well as how to Act Like an Owner and become indispensable to any organization or company.
Douglas will discuss economic conditions for the Memphis Zone of the Federal Reserve Bank of St. Louis which includes Northern Mississippi, Western Tennessee and Eastern Arkansas. During the talk particular attention will be paid to labor markets, manufacturing/transportation and banking/finance. This talk will include a session for Q and A.
Innovation is critical for organizations in a world driven by globalization, competition and technology. CIO’s consistently rank innovation as one of their critical success factors. How do organizations define innovation? What are the essential ingredients necessary to create a culture of innovation? How are innovative projects being funded? Find out how CIO’s are addressing these and other challenges.
Disasters are real and can be deadly to both your Business and your Family. Devastating regional events highlight the need for all us to be better prepared. 3D thinking MUST include emergency preparedness for your business (BCM - Business Continuity Management), Data Center (DRP – Disaster Recovery Planning) and for your family (Home Emergency Plan). This session examines actual regional disasters and a time-tested approach helping enterprises stay in business and keeping families safe.
Data growth and the management of data is a big concern for organizations meaning your database is critical to your business remaining competitive. This session will share how to deliver superior performance, operational simplicity, and value with a range of models designed for single instance database to full consolidation and high-availability, you can choose the model that best meets your needs. Dawit Bereket will also discuss the Oracle Database Appliance family, delivering application and database performance simply and affordably.
The current threat landscape has been in a state of evolution that presents a significant risk to organization’s assets, reputation and presence in the marketplace. Attackers are represented by nation states with practically infinite resources, cyber criminals with world class hackers and an underground marketplace to satiate all of their malicious motivations. This talk will focus on new and existing threat vectors such as ransomware and nation state attacks and how traditional defenses fail to stop them.
Thomas will discuss how the industry can take a new approach to incident response that has proven effective in hundreds of organizations across all verticals and particularly in regards to the OPM breach, in which Cylance played a pivotal role. Thomas will additionally discuss how Cylance’s processes and tools allow organizations to take their security program to the next level by employing a preventative methodology.
Organizations are embracing data analytics to provide insight for better business decisions and forecasts. The role of the CIO is critical to enable this effort, which requires specific leadership and technical competencies for success. Learn about the challenges and opportunities CIO’s face as the world of analytics matures.
This talk discusses theories of the firm and their strategies especially as they related to information technology. In this interactive session you will be encouraged to think about the purpose of strategic thinking, what this means to your company, and how IT plays a role in making strategies work. Various alternatives to strategic thinking will be covered and applied to business examples.
The University of Tennessee Health Science Center’s network is based around Cisco network gear. Switches, routers wireless and VPN devices are all Cisco appliances. In an effort to make sure UTHSC is using the right equipment to fit our needs, we've been evaluating Arista network devices for use in certain cases on our network. I'll talk about why we're using them and how they are doing. (Spoiler alert: they're working out quit well!)
Server virtualization and high availability across geographically dispersed data centers are common in data center deployments today. In order to meet increasing workloads and to support disaster recovery, location independence for server resources and the flexibility to move these resources from one data center to another is required.
This session will review how Fred’s Inc. built an architecture that addresses these challenges and how the Nimble Storage platform has played a key role. The session will detail how Fred’s leveraged this platform to begin their data center convergence project.
How do you drive technology to the C-Suite? How do you effectively communication to them? Learn from this panel of Executives as they describe what they want to hear from IT leadership and what gets their attention.
According to Gartner 89% of the average IT budget goes to ongoing operations and enhancements while only 11% of that budget is spent on things that really move the needle for your organization, like business transformation initiatives. How can you reduce your annual maintenance spend while optimizing your existing systems of record? How can investing in new systems of engagement further strategic transformation initiatives? David Jamieson, Financial Applications Manager, of LifeWay Christian Resources will share how he has taken back control of his IT budget while freeing-up funds to focus on strategic initiatives including adding new software and services around his existing Oracle applications platform.
Social engineering is evolving so rapidly that technology solutions, security policies, and procedures are not enough. Hackers continue to manipulate employees into giving away “secrets” by using old fashioned con-artist techniques with a technology flair. Many victims unknowingly reveal the sensitive information needed to bypass security. Proactively fostering a culture of security awareness within your company is one of the most important ways you can mitigate the risk of social engineering.
Center of Excellence on Mobile Sensor Data-to-Knowledge (http://md2k.org) is 12-university national big data-to-knowledge (BD2K) center (headquartered at Memphis) funded by National Institutes of Health (NIH) to advance the science of Mobile Health (mHealth) Big Data. MD2K has developed an open-source mobile software platform that can be used to collect, analyze, visualize, and interpret high-frequency mobile sensor data for managing health and wellness.
Cybersecurity is becoming a top of mind topic for many executives driven by media coverage, high profile breaches and regulatory pressures. IT leaders must respond to educate their peers and share their action plans to build confidence and gain continued support. The panelists will share what they are doing at their organizations as well as lessons learned.
Deploying a new website is an exciting marketing strategy for any company. We will share some of our best practices that made our new website deployment very successful.
IT resilience is achieved when a company is capable of responding to disruptions or change so that end-users are not aware that a disruption has occurred. Today's IT and data disruptions aren’t just weather-related disasters. Power outages, ransomware and even deploying new infrastructure can cause issues for IT. In order to achieve true IT Resilience, an organization must shift their thinking beyond traditional data backups and DR and work towards a complete solution with no dependencies on hypervisors, hardware, or clouds. In this session, you will hear from an IT professional who has observed the evolution of data resilience solutions over the years as a recognized IT consultant, business owner, virtual CIO, and solutions architect.
In a presentation modeled after his best-selling book, Last Man Down, FDNY Chief Richard Picciotto offers a tribute to the lives that were lost on September 11, 2001. His recount is not one of death and destruction, but a celebration of life and its unpredictable nature. Picciotto offers an eyewitness account of the defining historical event of our lives; his story is that of a man, a hero, and a tragic event that inspired a nation.
Enjoy this complimentary cocktail reception featuring an open bar, hors d’oeuvres and conversation. Make this an important element of your attendance to the Summit. The ability to network and collaborate with your peers in an open and no-hype environment will prove to provide long lasting value to your key business initiatives moving forward.
Event VenueDirections & Information Below
939 Ridge Lake Blvd • Memphis, TN 38120 • ph. 901-684-6664
Self Parking (Complimentary)
Valet Parking $9.00 (daily taxes included)
From I-240 either East or West, take the Germantown/Poplar exit 15A East (Highway 72). Once on Poplar Ave, prepare for a left hand turn. Turn left at first traffic light onto Ridgeway Loop Road. Stay in the left hand lane until you turn left at second traffic light onto Ridge Lake Blvd. The hotel will be straight ahead on the left hand side.
Upon arrival to Memphis International Airport, please call the Hilton Memphis from the hotel phone kiosk or directly at 901-684-6664. Advise the agent you require transportation from the airport, as well as the airline you are traveling on. Exit the airport near baggage claim and proceed to the Hotel sign outside baggage claim. The Hilton Memphis complimentary shuttle will depart on the hour(by request), between the hours of 6am and 10pm. Shuttle schedules subject to change during inclement weather.