HomeMay ConferenceJune ConferenceSeptember ConferenceNovember ConferenceSuppliersDelegatesUpdatesVideoVenue

The CIO & IT Security  Forum | Now in Its 18th Year

Our conference program is refreshingly different to what you're used to seeing at regular tradeshows and conferences. Why?

  • Built Around Your Needs: We create The Forums conference program based on research and feedback from our clients, senior level IT executives, who like you are dealing with critical issues on a daily basis
  • First class speakers: Conference sessions are led by peers or industry experts, who have a clear understanding of the business obstacles inherent in controlling large technology departments and how they can be managed and resolved.
  • Intimate sessions: Sessions are for small groups of under 25 delegates. This environment encourages attendees to be able to share best practices, successful case studies, and receive opinions and suggestions from their colleagues.  


Take part in the program

If you would like to participate in the program or recommend any speakers or topics please get in touch.
2016 / Keynote
2016 / Keynote
  • Think Inside the Box: Creativity Within Constraints and Parameters

    David Kwong, Illusionist and Puzzle Expert

    In this talk, David Kwong explores the complex relationship between boundaries and productivity. Though it may seem counterintuitive, most people are at their most creative when they innovate within a given set of boundaries. How can you tell a clever story while obeying the construction rules of a crossword puzzle, the three-act structure of a screenplay, or the sensitive angles of a stage illusion? Kwong, a master of working within the lines, explains how constraints give us the freedom to create. We are at our most innovative when we design a new form for something familiar, and subsequently express it in a novel and compelling way.

    Kwong demonstrates some of his own groundbreaking puzzles and illusions by way of inspiring a new method of problem solving. ____________________________________________________________________________

    Puzzles and magic might not seem like the most logical companions, but Kwong sees a clear parallel between the two. As human beings, he argues, we are driven by the urge to solve problems and “create order out of chaos." Kwong regularly writes crossword puzzles for a range of national publications, including the New York Times and the Los Angeles Times. He is also the founder of the Misdirectors Guild, an elite group of magicians that specialize in magic for film and television. As the head magic consultant, Kwong created illusions for the bank-heist film Now You See Me, teaching magic to Jesse Eisenberg, Morgan Freeman, Michael Caine, Mark Ruffalo, and Woody Harrelson. Kwong has also designed magic and puzzles for Ant-Man, The Incredible Burt Wonderstone and The Imitation Game, to name a few.


2016 / Industry
2016 / Industry
  • Creating innovation strategies for tangible results

    Denise Fletcher, Vice President Healthcare, Pharma & Life Sciences, Innovation Center of Excellence LEO-US, Xerox

    Most organizations do a terrific job of creating business strategies and articulating these throughout the organization. But how many of us take those business strategies and develop innovation strategies and road maps to produce tangible results towards growth? This seminar will share the approach we take at Xerox, why its important and how innovation strategies help to serve as enablers to creating clear roadmaps for the business, researchers and innovation team to deliver on. I will also share how combining this with Xerox’s “customer dreaming sessions” helps to narrow in on customer pain points developing points of views that help to validate the innovation strategy & roadmap.


    Cyber Security – A Federal Law Enforcement Perspective

    Supervisory Special Agent, FBI

    The role of the government in protecting the internet has opened the door to a fair amount of discussion regarding who is responsible for ensuring the safe transmission of traffic in the web environment. The presentation provides an examination of the role of U.S. Federal Law Enforcement in responding to cyber attacks and cyber crimes. It further examines the information security dilemma through the lens of the FBI, from both its strategic and tactical response, and an examination of pre-breach efforts recommended for private sector entities of all sizes. Special emphasis is placed on preparation, developing key strategic relationships with vendors providing mitigation services and developing relationships with local FBI and USSS components.


  • You get what you Negotiate

    Jack Nichelson, Director, IT Infrastructure & Security, Chart Industries, Inc

    Your agreements, understandings and relationships make the difference between success and failure. In transitioning to a new company and working with a new CIO, Jack Nichelson has enjoyed the opportunity to learn new business-minded strategies and become a well-rounded and dynamic leader . One...


    Building a Risk and Security Program in Any Organization

    Michael Molinaro, Chief Information Security Officer, BioReference Laboratories Inc

    Through a case study of a high-profile national event, explore how the risk and security programs implemented for the 2012 RNC can be scaled to your environment. Using a risk-based approach and following security frameworks and best practices, your organization can be compliant but, more impor...


    Employee Engagement … the cornerstone to your success

    Hans Keller, VP of IT Operations and Customer Support and CISO, Erickson Living

    People… Process… Technology. We have heard this over and over as the foundation for success in any type of change project. In reality, if we have the people part right the other two get taken care of. Conversely if the technology and process are right, and the people are not, the likeliho...


  • 1nsp1re: the cheat sheet for inspiring leaders

    Melissa Goodwin & Tamara Carillo, Founders, The Idea House

    1nsp1re is a results-driven experience that helps a leader learn a new framework for transforming everyday behaviors and outcomes within their team and the organization. Our foundation is based on our i11 platform - a strategic set of skills developed for an executive to create their own lead...


    Portfolio Software Value Management

    Michael D. Harris, Author, The Business Value of Software

    While there may be infinite possibilities for new software, there is always a finite budget that can be invested. Since the publication of his book, “The Business Value of IT” in 2008, Mike Harris has been drawn into many conversations about how to maximize the flow of value from software d...


2016 / Discussion Groups
2016 / Discussion Groups
  • Realistic Disruption

    To be moderated by your peers

    The hype suggests change and transformation, glory through shaking things up and redefining what IT can mean within an organisation. The modern IT Director is brave enough to throw everything out for a singular vision…

    But it leaves out the uneasiness and resistance from the Board, and...


    Engagement Follow-Through

    To be moderated by your peers

    You’ve championed the cause – get people on board and all levels of the organisation to contribute in driving the culture and interests. The board has bought in, and research has been done telling you what people want. What now?

    This discussion group is aimed at how to keep engagement ...


    Understanding Blockchain Tech

    To be moderated by your peers

    Widespread shared databases, or distributed ledgers, can hold immense value to an organization. They can update and execute in real time while remaining exponentially more secure, as there it is stored on numerous databases simultaneously. It has been the underlying system of Bitcoin, and ...


2016 / Supplier Presentations
2016 / Supplier Presentations
  • 2016 / Supplier Presentations

    * A new addition for 2016

    The CIO Forum has added a new dynamic to our conference program: the opportunity to gain insight from supplier side of the equation in a group setting. Our goal is to have interactive thought-leadership approach, where CIOs can dig deeper and engage to learn about potential solutions to their most pressing issues.

    Topic selection will be 100% CIO-led. All of our attending suppliers are invited to submit a presentation for consideration, which will then be vetted and narrowed down to a select few by our CIO attendees. Depending on the length of the event, there will be either two (2) or three (3) supplier presentations available.

    Once on the program, the sessions will then be available on the final itinerary selection site alongside the industry seminars and discussion groups. As will all of our sessions, size would be dependent on popularity of these selections.

    We hope you enjoy this new channel of information, and look forward to receiving your feedback.


  • Gaining Security Insight Through DNS Analytics

    Blue Cat

    Cloud, mobility and IoT have resulted in a proliferation of endpoints on enterprise networks. This growing volume of DNS queries and IP address requests is posing significant challenges for IT to manage and secure their networks.

    Data related to DNS queries, responses, redirects and other behaviors can provide clues for detecting and protecting against suspicious and malicious activity. However, based on a recent survey commissioned by BlueCat, few enterprises today leverage this data in a meaningful way. The research polled senior IT professionals across North America about their ability to manage their increasingly complex network infrastructure and the collection, analysis and use of DNS query data.

    In this informative session, BlueCat will share the survey results and insights on how companies can leverage DNS data to manage and secure complex network infrastructures.


    1. Cloud, mobility and IoT have resulted in a proliferation of endpoints across enterprise networks.

    2. IT is grappling with how to effectively manage and secure networks that are rapidly growing in complexity.

    3. DNS data can both detect and enforce against suspicious and malicious threats, but few enterprises leverage this information in a meaningful way.

    4. BlueCat commissioned a survey to assess how companies are managing and securing their network infrastructure and how they use DNS query data.

    5. Learn valuable insights from this research and gain insights on how some companies are leveraging the power of DNS to secure their networks.


  • Infrastructure and Software Modernization in the Cloud

    Chris Zavaleta, Founder and Managing Director, Supernaut LLC

    A discussion of high level strategies, planning organization and architectural techniques associated with enterprises and smaller organizations modernizing their infrastructure and software to cloud based environments such as Amazon Web Services and Microsoft Azure as well as other cloud providers.

    Gartner expects cloud adoption to hit $250 billion by 2017. With innovation, crossdevice support for applications and systems as well as costeffective infrastructure costs cloud based infrastructure and software is a must have initiative for all enterprises and across all Clevel executives, software managers, network specialists and customers.


    ● Why Cloud?

    ● Migrating and Hosting Systems in the Cloud

    ● Security in the Cloud

    ● Networking in the Cloud

    ● Scalable Architectures Designed to take advantage of the Cloud

    ● Cost effective Solutioning and Systems

    ● Hiring and Training the Proper Staff to Support Cloud Based Systems

    ● Enterprise Integration with APIs and Microservices

    ● Amazon Web Services Overview

    ● Microsoft Azure Overview

    ● Other Players in the Cloud Space

    ● Question and Answer


  • A Data-Driven Approach for Managing IT Performance

    Matt Mandich, Director, Strategy & Innovation at Info-Tech Research Group

    1. Learning Resources & Educational Insights CTO Ken Platt increases executive team’s IT satisfaction by 18% over three years.

    2. As the business grew, Ken knew that the business could be better served by IT but wasn’t exactly sure how to best tackle it. Using quantitative research to build an IT satisfaction roadmap was the best way forward.

    3. In order to change perception of IT from firefighters to innovative business partners, a transformational approach needed to be applied, that began with a transparent way to collect feedback from key business stakeholders.

    4. In this session Info-Tech will present how CIOs can forge a new data driven approach to rapidly accelerate decision making, as well as measure the benefits of IT with DATA as well as comparing against benchmarks Info-Tech has gathered across 29,000 business leaders.

    5. Info-Tech will share insights from Info-Tech’s 3 year Stakeholder Satisfaction Study & how IT can enable transformation at unparalleled rates.

    Client Name: Learning Resources / Educational Insights


General Enquiries:

T: +44 20 8487 2200
F: +44 20 8487 2300

T: +1 212 651 8700
F: +1 212 651 8701

T: +41 79 417 3493
F: +41 61 544 74 44


T: +39 02 312009
F: +39 02 3313976

Get in touch

 Security code