CIO Houston Summit | May 2, 2017 | JW Marriott Houston - Houston, TX, USA

↓ Agenda Key

Keynote Presentation

Visionary speaker presents to entire audience on key issues, challenges and business opportunities

Keynote Presentations give attending delegates the opportunity to hear from leading voices in the industry. These presentations feature relevant topics and issues aligned with the speaker's experience and expertise, selected by the speaker in concert with the summit's Content Committee." title="Keynote Presentations give attending delegates the opportunity to hear from leading voices in the industry. These presentations feature relevant topics and issues aligned with the speaker's experience and expertise, selected by the speaker in concert with the summit's Content Committee.

Executive Visions

Panel moderated by Master of Ceremonies and headed by four executives discussing critical business topics

Executive Visions sessions are panel discussions that enable in-depth exchanges on critical business topics. Led by a moderator, these sessions encourage attending executives to address industry challenges and gain insight through interaction with expert panel members." title="Executive Visions sessions are panel discussions that enable in-depth exchanges on critical business topics. Led by a moderator, these sessions encourage attending executives to address industry challenges and gain insight through interaction with expert panel members.

Thought Leadership

Solution provider-led session giving high-level overview of opportunities

Led by an executive from the vendor community, Thought Leadership sessions provide comprehensive overviews of current business concerns, offering strategies and solutions for success. This is a unique opportunity to access the perspective of a leading member of the vendor community." title="Led by an executive from the vendor community, Thought Leadership sessions provide comprehensive overviews of current business concerns, offering strategies and solutions for success. This is a unique opportunity to access the perspective of a leading member of the vendor community.

Think Tank

End user-led session in boardroom style, focusing on best practices

Think Tanks are interactive sessions that place delegates in lively discussion and debate. Sessions admit only 15-20 participants at a time to ensure an intimate environment in which delegates can engage each other and have their voices heard." title="Think Tanks are interactive sessions that place delegates in lively discussion and debate. Sessions admit only 15-20 participants at a time to ensure an intimate environment in which delegates can engage each other and have their voices heard.

Roundtable

Interactive session led by a moderator, focused on industry issue

Led by an industry analyst, expert or a member of the vendor community, Roundtables are open-forum sessions with strategic guidance. Attending delegates gather to collaborate on common issues and challenges within a format that allows them to get things done." title="Led by an industry analyst, expert or a member of the vendor community, Roundtables are open-forum sessions with strategic guidance. Attending delegates gather to collaborate on common issues and challenges within a format that allows them to get things done.

Case Study

Overview of recent project successes and failures

Case Studies allow attending executives to hear compelling stories about implementations and projects, emphasizing best practices and lessons learned. Presentations are immediately followed by Q&A sessions." title="Case Studies allow attending executives to hear compelling stories about implementations and projects, emphasizing best practices and lessons learned. Presentations are immediately followed by Q&A sessions.

Focus Group

Discussion of business drivers within a particular industry area

Focus Groups allow executives to discuss business drivers within particular industry areas. These sessions allow attendees to isolate specific issues and work through them. Presentations last 15-20 minutes and are followed by Q&A sessions." title="Focus Groups allow executives to discuss business drivers within particular industry areas. These sessions allow attendees to isolate specific issues and work through them. Presentations last 15-20 minutes and are followed by Q&A sessions.

Analyst Q&A Session

Moderator-led coverage of the latest industry research

Q&A sessions cover the latest industry research, allowing attendees to gain insight on topics of interest through questions directed to a leading industry analyst." title="Q&A sessions cover the latest industry research, allowing attendees to gain insight on topics of interest through questions directed to a leading industry analyst.

Vendor Showcase

Several brief, pointed overviews of the newest solutions and services

Taking the form of three 10-minute elevator pitches by attending vendors, these sessions provide a concise and pointed overview of the latest solutions and services aligned with attendee needs and preferences." title="Taking the form of three 10-minute elevator pitches by attending vendors, these sessions provide a concise and pointed overview of the latest solutions and services aligned with attendee needs and preferences.

Executive Exchange

Pre-determined, one-on-one interaction revolving around solutions of interest

Executive Exchanges offer one-on-one interaction between executives and vendors. This is an opportunity for both parties to make key business contacts, ask direct questions and get the answers they need. Session content is prearranged and based on mutual interest." title="Executive Exchanges offer one-on-one interaction between executives and vendors. This is an opportunity for both parties to make key business contacts, ask direct questions and get the answers they need. Session content is prearranged and based on mutual interest.

Open Forum Luncheon

Informal discussions on pre-determined topics

Led by a moderator, Open Forum Luncheons offer attendees informal, yet focused discussions on current industry topics and trends over lunch." title="Led by a moderator, Open Forum Luncheons offer attendees informal, yet focused discussions on current industry topics and trends over lunch.

Networking Session

Unique activities at once relaxing, enjoyable and productive

Networking opportunities take various unique forms, merging enjoyable and relaxing activities with an environment conducive to in-depth conversation. These gatherings allow attendees to wind down between sessions and one-on-one meetings, while still furthering discussions and being productive." title="Networking opportunities take various unique forms, merging enjoyable and relaxing activities with an environment conducive to in-depth conversation. These gatherings allow attendees to wind down between sessions and one-on-one meetings, while still furthering discussions and being productive.

 

Tuesday, May 2, 2017 - CIO Houston Summit

7:00 am - 7:55 am

Registration and Networking Breakfast

 

8:00 am - 8:10 am

Welcome Address and Opening Remarks

Presented by:

Fred Kesinger, CEO, Kesinger Group View details

 
 
 

8:10 am - 8:40 am

Keynote Presentation

The Future of the CIO in the Coming Digital Economy

As more businesses undergo a digital transformation, and as those digital transformations become more ingrained into organizational culture, "Digital" becomes not something unique and different from the business, but a core component of every aspect of the business. As this shift occurs, IT itself faces the very real possibility of no longer being something unique from the business, but instead a component of every aspect of the business. In this world, what role then exists for the CIO? Two clear paths are presenting themselves - one leads to a focus on infrastructure and integration, to keeping the lights on for the digital innovators, while the other leads to information and innovation itself. Knowing which path to choose, how to choose it, and how to see it through will be one of the greatest challenges CIOs of this era will face.

Takeaways:

  • Change is, if not already here, certainly coming and CIOs who don't prepare for the change may not like the results when it arrives
  • Digital transformation is all about connecting enterprise systems to information technology to drive productivity and performance improvements
  • Be prepared to tackle the tasks that no-one wants to do, but everyone needs done; establish relevance to cultivate importance
 

8:45 am - 9:15 am

Keynote Presentation

Cybersecurity and Critical Infrastructure

The risk of a cyber-attack against Critical Infrastructure has never been greater. We will dive into the current state of cybersecurity; as it relates specifically to critical infrastructure. 

Takeaways: 

  • What are the major concerns?  
  • What is happening on the legislative and regulatory perspective? 
  • What new tools and technologies should organizations be implementing?

Sponsored by:

Cybraics View details

 
 
 

9:20 am - 9:45 am

Executive Exchange

 

Thought Leadership

TBD

Sponsored by:

IBM View details

 
 
 

9:50 am - 10:15 am

Executive Exchange

 

Share:

Thought Leadership

Become a Change Agent for Business Transformation

Today's modern CIO is embarking on a digital transformation journey exploring radical hybrid IT strategies and leveraging new technologies like Cloud, Social, Mobile and Big Data. However with 'keeping the lights on' legacy IT components costing nearly 90% of a typical IT budget, how can IT make powerful advancements and lead business change?  

Join this interactive session to learn how award-winning CIOs are successfully tipping the balance by liberating people, time and money from costly ongoing maintenance of their ERP systems including SAP and Oracle, to invest in strategic initiatives that create real-world competitive advantage.

Sponsored by:

Rimini Street View details

 
 
 

10:20 am - 10:30 am

Morning Networking Coffee Break

 

10:35 am - 11:00 am

Executive Exchange

 

Share:

Think Tank

Next generation Ope-RA-tions - What IT should gear-up to?

Year 2016, was called the year of the Robots. More than 60% of the organizations are still in the planning stage of Robotic Process Automation (RPA) adoption. 2017 will see a significant proliferation and more formal adoption of RPA in the main stream. In January 2017 this year, McKinsey Global Institute's report stated that ?almost half the activities people are paid almost $16 trillion in wages to do in the global economy have the potential to be automated by adapting currently demonstrated technology, according to an analysis of more than 2,000 work activities across 800 occupations. While less than 5 percent of all occupations can be automated entirely using demonstrated technologies, about 60 percent of all occupations have at least 30 percent of constituent activities that could be automated. More occupations will change than will be automated away?. The companies are increasingly gravitating towards ?digital labor arbitrage? from ?outsourcing labor arbitrage? much of which is being driven by advances in robotics, artificial intelligence, and machine learning are ushering in a new age of automation, as machines match or outperform human performance in a range of work activities, including ones requiring cognitive capabilities. Energy service companies are no exceptions to these advancements. With ever increasing pressure to cut costs, increase productivity and customer centricity, Robotic Process Automation provide some of the answers. 

Key takeaways form this think tank: 

  • Get an overview of what RPA is and how it is evolving.  
  • Understand the technology landscape and its impact on the tradition IT. 
  • Explore typical use cases for retail energy service providers. 
  • Best practices in RPA adoption. 
  • Role of IT in RPA adoption. 
  • IT security implications

Presented by:

Vishnu Murali, Executive Director Information Technology, NRG Energy

 
 

11:05 am - 11:30 am

Executive Exchange

 

Thought Leadership

Strategic and Secure Mobility

Is mobility a cost? Or is it a key part of your strategy for business success? Many businesses are leveraging mobility to generate real and measurable returns and to increase their competitiveness. How? Join CDM Media and BlackBerry as we explore ways in which companies can strategically manage their mobility investments. 

In our session we'll look at security - again from a strategic viewpoint. Security covers a wide range of issues in the modern enterprise. While protection of data is at the forefront, security involves many other aspects and issues from secure collaboration to the security and protection of employees in an increasingly tumultuous world. We'll deal not only with securing mobility, but how the strategic use of mobility can make you more secure.

Sponsored by:

BlackBerry View details

 
 
 

11:35 am - 12:00 pm

Executive Exchange

 

Think Tank

IT Risk Assessment: Getting the Business On Board

CISOs generally understand how to determine the magnitude of CIA risk in information systems and resources but often find it difficult to convey urgency and long term impact to business leaders used to reducing risk to dollar cost. Or including the cost of customer fraud or insurance in standard financial planning. We will examine issues that are not neatly reduced to monetary considerations and how to present them and how IT risk might be factored into establishing business priorities.

Presented by:

Willis Marti, CISO, Texas A&M University

 
 

12:05 pm - 12:30 pm

Executive Exchange

 

Thought Leadership

TBD

Sponsored by:

Fortinet View details

 
 
 

12:35 pm - 1:20 pm

Networking Luncheon

 

1:25 pm - 1:50 pm

Executive Exchange

 

Think Tank

Building a Collaborative and Social IT Security Program

In todays environment there can be no arguing that a comprehensive IT Security program is a de facto requirement for every organization. Such a program needs to address the full range of security threats that can be leveraged against an organization, needs to be integrated into whatever regulatory and governance requirements exist, but beyond that it needs to be accessible, consumable, and actionable by everyone that is influenced by it, or interacts with it. Building a program that is shared through social channels and relies on the collaborative input of employees and constituents for not only creation but enforcement will drive higher levels of adoption, responsiveness and, ultimately, protection.

Takeaways:

  • A security program, that is the stated intentions of the organization combined with the policies and tools to back those intentions up is essential
  • The program needs to be easily communicated, easily consumed, and easily complied with
  • Using an open social and collaborative approach to creation, distribution, and enforcement ensure greater adoption and ultimately greater security

Presented by:

Stuart Wagner, Director, IT Security and Compliance (CISO), Enterprise Products View details

 
 
 

1:55 pm - 2:20 pm

Executive Exchange

 

Thought Leadership

The Existential Moment: From Big Data Noise to the Signal

The energy industry is feeling pressure with the increase in renewables, tightening regulations, declining revenue, and increasing cost pressure. Traditional generation is facing an existential moment. Big Data is promising to be the shining star that will solve these problems. The challenge now is cutting through the Big Data noise to find the signal that pinpoints your specific needs and enables faster decision making. The path to real value is made up of smaller opportunities and not about finding the white elephant.

Sponsored by:

Siemens Corporation

 
 

2:25 pm - 2:50 pm

Executive Exchange

 

Executive Boardroom

TBD


Sponsored by:

Hytrust

 
 

2:55 pm - 3:20 pm

Executive Exchange

 

Think Tank

Performing Predictive Analytics with Imperfect Data

Getting into predictive analytics starts with building models that learn from historical data. Determining what you focus your resources on and how machine learning can help improve your organizational insights. 

Takeaways:

  • Value can be gained from your organizational data, without the data needing to be perfect 
  • Focus on gaining value with the data you already have 
  • Focus on cleaning up critical but poor quality data over time

Presented by:

Derek Wilson, Director BI and Analytics, Just Energy View details

 
 
 

3:25 pm - 3:35 pm

Afternoon Networking Coffee Break

 

3:40 pm - 4:05 pm

Executive Exchange

 

Executive Boardroom

Safeguarding the Industrial Control-Plane

Securing industrial networks poses unique challenges resulting from the dichotomy between control-plane and data-plane communications. While many are familiar with the data-plane (a.k.a. user-plane) communications, less are familiar with the industrial control-plane. A critical part of the industrial network activity, the control-plane is invariably overlooked. In ICS/SCADA environments, the most critical assets are the industrial controllers (e.g. PLCs, RTUs and DCS controllers). Controllers are the ?brains? responsible for continuous execution of the entire industrial process lifecycle. Since most devices were designed decades ago, they typically don't include any security controls, like authentication or encryption mechanisms. As a result, there is no way to restrict those operating in ICS networks: anyone with network access, whether a trusted employee or malicious attacker, has unfettered access to these devices. Since most threats to ICS systems materialize in the industrial control-plane, it is essential to monitor it. However, monitoring the industrial control-plane is not a trivial task. 

In this session we will review:

  • What is the industrial control-plane?
  • Why is it important to secure it?
  • What challenges do we face when we look to monitor control-plane activities?
  • What steps and measures should you take to safeguard the control-plane?

Sponsored by:

Indegy View details

 
 
 

4:10 pm - 4:35 pm

Executive Exchange

 

Think Tank

Managing Business Continuity During M&A Activities

Disaster Recovery and Business Continuity Planning can be a taxing exercise at the best of times, particularly when it is the CIO that is expected to assume the mantle of responsibility for ensuring not only the availability of the IT services necessary to support business capabilities, but often those business capabilities themselves. The difficulty increases exponentially during a merger or acquisition because now not only are IT Leaders trying to ensure the availability of the systems theyve built and the capabilities that rely on them, but those systems and capabilities of the acquired company which they didnt build, and likely have next to no knowledge of. And since frequency of mergers & acquisitions is only increasing, the likelihood that the CIO will have to deal with this issue is increasing in lock-step. To ensure that everyone is protected from day one of the merger or acquisition, it is vitally important that IT has a seat at the M&A table, is party to the discussions and planning, and has the financial flexibility to not just tie the two sets of systems together but to extend an umbrella of protection over both. 

Takeaways: 

  • Understand how frequently M&A activities are occurring and therefore how real of an issue this is 
  • See how much of a compounding factor M&A is on regular DRP and BCP initiatives 
  • Learn about industry-standard best practices to extend rocksolid BCP protection over a freshly merged entity

Presented by:

Vikas Parikh, CTO and M&A IT Leader, GE Oil & Gas View details

 
 
 

4:40 pm - 5:20 pm

Executive Visions

Using Artificial Intelligence to improve efficiencies and integrations

The market for cybersecurity continues to get bigger, but the problem is not getting better. Traditional tools are not capable of defending against sophisticated and targeted attacks, adversaries outnumber cybersecurity professionals, and they have bigger budgets. Protecting our critical infrastructure is more important than ever, but we can't out-hire or out-spend them, and current tools are ineffective. To successfully protect their organizations and our critical infrastructure, CISOs should be looking to embrace artificial intelligence to help scale their teams and even the playing fields with the adversary. 

Takeaways:

  • Where is AI most valuable in your security operations? 
  • How can AI make your existing resources better and how can it scale your operations? 
  • How can we use AI for cyber and performance in IT and SCADA systems?

Moderated by:

Cybraics View details

 
 

Panelists:

Brijesh Gupta, Director of Information Technology Head of Technical Platform, Oceaneering View details

 
 
 

5:20 pm - 5:30 pm

Thank You Address and Closing Remarks

Presented by:

Fred Kesinger, CEO, Kesinger Group View details

 
 
 

5:30 pm - 7:00 pm

Cocktail Reception