NorthEast

August 31st 2022  |  10:00AM to 2:00PM EDT

Early Bird Access from 09:00AM to 10:00AM 

About Event

CIOarena™ is taking its world-class conferences virtual! More than just webinars, CIOarena Virtual is a glimpse of the digital future; immersing attendees into an interactive 3D world. Every aspect of a traditional conference is recreated for an engaging and fun experience; from live presentations, Q&A with industry experts, public & private networking, life-like vendor exhibit hall with live reps, and digital downloads for your virtual swag bag. The entire platform is gamified, adding a sense of engagement and interaction that is not found in your typical webinar environment. Collect points throughout the day and redeem them for one of dozens of amazing prizes in our end of day raffle.

CIOarena has the simple goal of uniting IT executives and professionals, while providing them with expert insights that they can integrate into their professional roles to help optimize and secure their organizations. The most successful executives will agree that a key attribute to growing one’s professional profile, is the power to develop key relationships both internally and externally. CIOarena is designed to take you to the next step in strategic relationship building! This event will gather IT professionals from your region, thus enabling you to boost your career by developing strategic relationships within your area, while comparing and contrasting the successes and pitfalls of peers across all industries and disciplines.

Become a transformational leader by leveraging the newest technologies for a competitive advantage. The insights and best practices shared by our renowned industry experts will guide you in the right direction and the knowledge you walk away with is invaluable. CIOarena's short, no-frills agenda ensures that you reap maximum reward with minimal time wasted. As an invitation-only conference, there is no cost to attend CIOarena.

Why should you register for CIOarena

Accessibility

CIOarena™ Virtual is a web-based event that can be accessed from your home or office with no need to download any third-party applications

Exclusivity

In order to attend the CIOarena™ event, you must be invited or qualified to attend. The philosophy behind this is to ensure that every person in the audience is on the same "playing field". Many verticals are represented, but all attendees are generally within the IT department or senior management.

Networking

Develop relationships with your local peers and discover the newest tech. Successful CIOs realize the need for creating relationships to boost their careers. Gaining an understanding of other executives' issues in the context of their function promotes understanding and gives IT executives a clear sense of their own targets and goals. Expanding your personal network is a crucial facet of becoming a successful leader.

Engaging Agenda

The CIOarena™ agenda is designed to engage every attendee from beginning to end. The day is comprised of industry expert keynotes, case studies, and thought leading discussions.

Intimate

Much different than your average trade show or large conference, CIOarena's agenda is designed with comfort and enjoyment in mind. Come and share your ideas, challenges, and successes with your peers, but most importantly, enjoy doing it in an unguarded environment.

Return on Investment

Your time is important, and CIOarena™ realizes that. We expect all of our attendees to walk away with immediate ROI from participation at this event in the form of new strategic contacts, vital solutions for the changing IT landscape, and ideas that assist you in that next step in leadership.

Unique Prizes

All CIOarena™ conferences raffle off prizes which include: Tablets, TVs, Camera's, Gift Cards and more!

Agenda


Webinars

       09:00am

Early Bird Hour, Registration, Networking

The platform is open from 09:00am - 10:00am ET for an early-bird networking session. Take this time to review on-demand assets, chat with peers, and visit vendor exhibits. You can also get a head start on the leaderboard by completing various tasks for entry into our prize raffles.

       10:05am

Reduce SaaS Waste - Without Sacrificing Productivity

Aashish Chandarana - Chief Information Officer, Productiv

The question on the minds of CIOs is how to get leadership on the same page to effectively optimize spend. IT, finance, procurement, and LOB managers all hold pieces of the puzzle. Teams are more effective when they work together. That’s why you need a single source of truth to improve ROI and alignment across your organization. This discussion will be centered around strategies to optimize your SaaS portfolio by increasing:
Visibility that drives value across teams
Spend optimization & efficiencies
Specific, actionable insights for faster time to value

       10:25am

Never Trust. Always Verify

Eddie Doyle - Cyber Security Evangelist, Check Point

Humans are inherently both trusting & distrusting, without even knowing it! We pick up on innumerable subtle micro expressions & nuances of our environment, instantly spotting what’s out of place. Without a second thought, our computer brains process & alert us to “things out of place” & focus our attention, silencing distractions so we can verify trust. In this session, Eddie Doyle will demonstrate that when we design systems after our neuro-biology, we can focus our networks to eliminate threats in much the same manner as our natural born instincts.

       10:45am

Passwordless Authentication…Problematic, Probable or Panacea?

Jeff Carpenter - Director of Product Solutions, ForgeRock

Are we headed towards a passwordless future, or are we destined always to be in the grips of user-selected, static passwords? Few security and risk professionals argue for the use of more passwords, it’s just that there are myriad challenges - both human and technological – that make achieving a truly passwordless future seem always just out of reach. Can we innovate our way out of the password morass? What’s holding us back? What’s on the horizon? Join ForgeRock for an informative and entertaining “no frills” discussion on the passwordless future. We’ll examine what new innovations have taken place recently – in distributed identity, the digital wallet and mobile technology – that give us hope we’ll someday be performing our very last user password reset. We’ll discuss risks and tradeoffs, and talk about what forward-thinking organizations are doing to reduce their reliance on, and ultimately get rid of, those pesky passwords.

       11:15am

Safe, Secure Collaboration as a Differentiator

Clint Anderson - Principal Industry Overlay, TPx

As the work-from-anywhere model matures, have you deployed a hybrid work solution that keeps all employees safe, secure, and productive? The magic formula includes a secure, collaboration toolset that balances rapid innovation with business integration. One that differentiates the way employees and customers interact and get things done. Will your organization gain or lose employees during the Great Resignation? Your tools can be differentiators, find out how to leverage them.

      11:45am

Mid-Day Break & Networking

Take the next 30 minutes to stretch your legs and grab a bite to eat. This is also a good time to review on-demand resources, and webinars that you might have missed.

      12:15pm

Why Traditional IAM Solutions are Insufficient in Protecting Against the Current Threat Landscape

Larry Chinski - Vice President Global IAM Strategy, One Identity

Over the last few years, we have seen a shift in the credential-based cyber security market that has caused organizations to rethink their security posture. Traditional IAM tools are deployed in a fragmented, tactical fashion that is no longer able to effectively protect against cyber attacks, specifically ransomware. Understanding what has caused this shift, how organizations have responded, and the best approach for future-proofing your IAM platform is critical for mitigating risk and building a flexible yet controlled identity-based ecosystem. In this session, we will discuss this approach and create a roadmap for IAM success based on the current threat surface and the future of IAM.

      12:40pm

Getting Better at Failure

Dormain Drewitz - VP Product Marketing & Developer Relations, PagerDuty

Having accelerated as a result of the pandemic, digital transformation efforts remain a top priority for organizations across industries. Delivering reliable and effective digital experiences has become an operational necessity. While much progress has been made to digitize processes, many efforts haven’t met expectations. So, why is digital transformation so hard? The answer lies, in part, in the question: to succeed at digital transformation you have to embrace failures. Not preparing for failures means you haven’t accounted for the full lifecycle of innovation.

In this talk, Dromain Drewitz will highlight how failure normalization is a common thread modern digital technologies and practices, including:

How cloud-native technologies and approaches embrace failure as normal

Why teams need enablement to deal with failures

How failure normalization unlocks experimentation and innovation

What steps you can take to get better at failure

      01:00pm

How AI Can Think Like an Attacker

Justin Fier - Director Cyber Intelligence & Analytics, Darktrace

In the face of skyrocketing cyber risk, detecting and responding to attacks is no longer enough. Organizations must take proactive steps to prevent threats before they happen, and to recover if compromised. In this session, Darktrace unveil an ambitious new approach to security, with core engines powering AI technologies to prevent, detect, respond, and ultimately heal from attacks. Together, these engines combine to strengthen organizations’ security posture in a virtuous AI feedback ‘loop,’ which provides powerful end-to-end, bespoke, and self-learning solutions unique to each organization.

      01:30pm

End of Day Networking

Thank you for joining us at CIOarena. The remaining time is open for you to wrap up conversations with exhibitors or peers, view past webinars that you missed, and browse the exhibit hall. All tasks for the leaderboard raffles must be completed by 3pm ET. 

On-Demand

Don't Trust Your Inbox

Austin Munro - Regional Account Manager, Cloudflare Area 1

On-Demand

Cybersecurity Insurance: Where to Start & How to Qualify

Chris Hills - Chief Security Strategist, BeyondTrust

The blistering pace and expanding scope of cyberthreats and ransomware attacks is forcing cyber insurance companies to steeply increase their rates and premiums, and even drop coverage for high-risk organizations. Underwriting requirements to be approved for cyber insurance are becoming more stringent.
In this upcoming session with Christopher Hills, Chief Security Strategist at BeyondTrust]hear how the cyber insurance market is changing, why it is changing, and the new expectations for a company seeking to obtain, or maintain, cyber liability coverage. Chris, will also answer some common questions:
· How can I qualify for cybersecurity insurance – what are carriers requiring for coverage?
· What can I expect when applying for cybersecurity insurance?
· How much cyber insurance do I need?

Learn how implementing Privileged Access Management (PAM) can enable your organization to not only reduce your cyber risk and improve operational performance, but also qualify for cyber insurance, or lower existing premiums.

On-Demand

Behind The Curtain: A glimpse at modern security operations

John Davies - Principal Pre-Sales Systems Engineer, Arctic Wolf Networks

Sponsors


 
   

Frequently Asked Questions

Absolutely nothing! This Virtual Event is completely FREE for you.
Absolutely. We are counting on you to invite others! Help us spread the word. You can simply share the link to this page, and they can register at their convenience using your name as the referral. All guests will be reviewed and must meet our attendee criteria.
Yes. Like any physical event, we will have a Cart for you! You can add all of the documents available to the online Cart in your account and then email them to yourself or share items with colleagues and friends by simply entering their email.
Yes, you will receive 5-6 credits towards your program. We are a direct submitter for (ISC)2 but can provide certificates of completion for attendees to submit as well. A link will be provided during the event and post event where you may submit your credentials.
Your login details will be emailed to you ahead of the event. You can use these details to access the online event.
NO. You do not need to download or install any software to participate in our conference. You only need to have access to the Internet.
We recommend Chrome and Firefox.
Good internet connectivity will ensure high quality video streaming.