HomeMay ConferenceJune ConferenceSeptember ConferenceNovember ConferenceSuppliersDelegatesUpdatesVideoVenue

The CIO & IT Security  Forum | Now in Its 18th Year

Our conference program is refreshingly different to what you're used to seeing at regular tradeshows and conferences. Why?

  • Built Around Your Needs: We create The Forums conference program based on research and feedback from our clients, senior level IT executives, who like you are dealing with critical issues on a daily basis
  • First class speakers: Conference sessions are led by peers or industry experts, who have a clear understanding of the business obstacles inherent in controlling large technology departments and how they can be managed and resolved.
  • Intimate sessions: Sessions are for small groups of under 25 delegates. This environment encourages attendees to be able to share best practices, successful case studies, and receive opinions and suggestions from their colleagues.  


Take part in the program

If you would like to participate in the program or recommend any speakers or topics please get in touch.
2016 / Keynote
2016 / Keynote
  • Think Inside the Box: Creativity Within Constraints and Parameters

    David Kwong, Illusionist and Puzzle Expert

    In this talk, David Kwong explores the complex relationship between boundaries and productivity. Though it may seem counterintuitive, most people are at their most creative when they innovate within a given set of boundaries. How can you tell a clever story while obeying the construction rules of a crossword puzzle, the three-act structure of a screenplay, or the sensitive angles of a stage illusion? Kwong, a master of working within the lines, explains how constraints give us the freedom to create. We are at our most innovative when we design a new form for something familiar, and subsequently express it in a novel and compelling way.

    Kwong demonstrates some of his own groundbreaking puzzles and illusions by way of inspiring a new method of problem solving. ____________________________________________________________________________

    Puzzles and magic might not seem like the most logical companions, but Kwong sees a clear parallel between the two. As human beings, he argues, we are driven by the urge to solve problems and “create order out of chaos." Kwong regularly writes crossword puzzles for a range of national publications, including the New York Times and the Los Angeles Times. He is also the founder of the Misdirectors Guild, an elite group of magicians that specialize in magic for film and television. As the head magic consultant, Kwong created illusions for the bank-heist film Now You See Me, teaching magic to Jesse Eisenberg, Morgan Freeman, Michael Caine, Mark Ruffalo, and Woody Harrelson. Kwong has also designed magic and puzzles for Ant-Man, The Incredible Burt Wonderstone and The Imitation Game, to name a few.


2016 / Industry
2016 / Industry
  • Creating innovation strategies for tangible results

    Denise Fletcher, Vice President Healthcare & Pharma Center of Excellence, Xerox

    Most organizations do a terrific job of creating business strategies and articulating these throughout the organization. But how many of us take those business strategies and develop innovation strategies and road maps to produce tangible results towards growth? This seminar will share the approach we take at Xerox, why its important and how innovation strategies help to serve as enablers to creating clear roadmaps for the business, researchers and innovation team to deliver on. I will also share how combining this with Xerox’s “customer dreaming sessions” helps to narrow in on customer pain points developing points of views that help to validate the innovation strategy & roadmap.


    Cyber Security – A Federal Law Enforcement Perspective

    Supervisory Special Agent, FBI

    The role of the government in protecting the internet has opened the door to a fair amount of discussion regarding who is responsible for ensuring the safe transmission of traffic in the web environment. The presentation provides an examination of the role of U.S. Federal Law Enforcement in responding to cyber attacks and cyber crimes. It further examines the information security dilemma through the lens of the FBI, from both its strategic and tactical response, and an examination of pre-breach efforts recommended for private sector entities of all sizes. Special emphasis is placed on preparation, developing key strategic relationships with vendors providing mitigation services and developing relationships with local FBI and USSS components.


  • You get what you Negotiate

    Jack Nichelson, Director, IT Infrastructure & Security, Chart Industries, Inc

    Your agreements, understandings and relationships make the difference between success and failure. In transitioning to a new company and working with a new CIO, Jack Nichelson has enjoyed the opportunity to learn new business-minded strategies and become a well-rounded and dynamic leader . One...


    Employee Engagement … the cornerstone to your success

    Hans Keller, VP of IT Operations and Customer Support and CISO, Erickson Living

    People… Process… Technology. We have heard this over and over as the foundation for success in any type of change project. In reality, if we have the people part right the other two get taken care of. Conversely if the technology and process are right, and the people are not, the likeliho...


    Portfolio Software Value Management

    Michael D. Harris, Author, The Business Value of Software

    While there may be infinite possibilities for new software, there is always a finite budget that can be invested. Since the publication of his book, “The Business Value of IT” in 2008, Mike Harris has been drawn into many conversations about how to maximize the flow of value from software d...


  • 1nsp1re: the cheat sheet for inspiring leaders

    Melissa Goodwin & Tamara Carillo, Founders, The Idea House

    1nsp1re is a results-driven experience that helps a leader learn a new framework for transforming everyday behaviors and outcomes within their team and the organization. Our foundation is based on our i11 platform - a strategic set of skills developed for an executive to create their own lead...


2016 / Discussion Groups
2016 / Discussion Groups
  • Realistic Disruption

    To be moderated by your peers

    The hype suggests change and transformation, glory through shaking things up and redefining what IT can mean within an organisation. The modern IT Director is brave enough to throw everything out for a singular vision…

    But it leaves out the uneasiness and resistance from the Board, and...


    Engagement Follow-Through

    To be moderated by your peers

    You’ve championed the cause – get people on board and all levels of the organisation to contribute in driving the culture and interests. The board has bought in, and research has been done telling you what people want. What now?

    This discussion group is aimed at how to keep engagement ...


    Understanding Block Chain Tech

    To be moderated by your peers

    Widespread shared databases, or distributed ledgers, can hold immense value to an organization. They can update and execute in real time while remaining exponentially more secure, as there it is stored on numerous databases simultaneously. It has been the underlying system of Bitcoin, and ...


2016 / Supplier Presentations
2016 / Supplier Presentations
  • 2016 / Supplier Presentations

    * A new addition for 2016

    The CIO Forum has added a new dynamic to our conference program: the opportunity to gain insight from supplier side of the equation in a group setting. Our goal is to have interactive thought-leadership approach, where CIOs can dig deeper and engage to learn about potential solutions to their most pressing issues.

    Topic selection will be 100% CIO-led. All of our attending suppliers are invited to submit a presentation for consideration, which will then be vetted and narrowed down to a select few by our CIO attendees. Depending on the length of the event, there will be either two (2) or three (3) supplier presentations available.

    Once on the program, the sessions will then be available on the final itinerary selection site alongside the industry seminars and discussion groups. As will all of our sessions, size would be dependent on popularity of these selections.

    We hope you enjoy this new channel of information, and look forward to receiving your feedback.


General Enquiries:

T: +44 20 8487 2200
F: +44 20 8487 2300

T: +1 212 651 8700
F: +1 212 651 8701

T: +41 79 417 3493
F: +41 61 544 74 44


T: +39 02 312009
F: +39 02 3313976

Get in touch

 Security code