About Event
CIOarena™ is taking its world-class conferences virtual! More than just webinars, CIOarena Virtual is a glimpse of the digital future; immersing attendees into an interactive 3D world. Every aspect of a traditional conference is recreated for an engaging and fun experience; from live presentations, Q&A with industry experts, public & private networking, life-like vendor exhibit hall with live reps, and digital downloads for your virtual swag bag. The entire platform is gamified, adding a sense of engagement and interaction that is not found in your typical webinar environment. Collect points throughout the day and redeem them for one of dozens of amazing prizes in our end of day raffle.
CIOarena has the simple goal of uniting IT executives and professionals, while providing them with expert insights that they can integrate into their professional roles to help optimize and secure their organizations. The most successful executives will agree that a key attribute to growing one’s professional profile, is the power to develop key relationships both internally and externally. CIOarena is designed to take you to the next step in strategic relationship building! This event will gather IT professionals from your region, thus enabling you to boost your career by developing strategic relationships within your area, while comparing and contrasting the successes and pitfalls of peers across all industries and disciplines.
Become a transformational leader by leveraging the newest technologies for a competitive advantage. The insights and best practices shared by our renowned industry experts will guide you in the right direction and the knowledge you walk away with is invaluable. CIOarena's short, no-frills agenda ensures that you reap maximum reward with minimal time wasted. As an invitation-only conference, there is no cost to attend CIOarena.
Why should you register for CIOarena
Accessibility
CIOarena™ Virtual is a web-based event that can be accessed from your home or office with no need to download any third-party applications
Exclusivity
In order to attend the CIOarena™ event, you must be invited or qualified to attend. The philosophy behind this is to ensure that every person in the audience is on the same "playing field". Many verticals are represented, but all attendees are generally within the IT department or senior management.
Networking
Develop relationships with your local peers and discover the newest tech. Successful CIOs realize the need for creating relationships to boost their careers. Gaining an understanding of other executives' issues in the context of their function promotes understanding and gives IT executives a clear sense of their own targets and goals. Expanding your personal network is a crucial facet of becoming a successful leader.
Engaging Agenda
The CIOarena™ agenda is designed to engage every attendee from beginning to end. The day is comprised of industry expert keynotes, case studies, and thought leading discussions.
Intimate
Much different than your average trade show or large conference, CIOarena's agenda is designed with comfort and enjoyment in mind. Come and share your ideas, challenges, and successes with your peers, but most importantly, enjoy doing it in an unguarded environment.
Return on Investment
Your time is important, and CIOarena™ realizes that. We expect all of our attendees to walk away with immediate ROI from participation at this event in the form of new strategic contacts, vital solutions for the changing IT landscape, and ideas that assist you in that next step in leadership.
Unique Prizes
All CIOarena™ conferences raffle off prizes which include: Tablets, TVs, Camera's, Gift Cards and more!
Agenda
Webinars
Early Bird Hour, Registration, Networking
The platform is open from 09:00am - 10:00am ET for an early-bird networking session. Take this time to review on-demand assets, chat with peers, and visit vendor exhibits. You can also get a head start on the leaderboard by completing various tasks for entry into our prize raffles.
Reduce SaaS Waste - Without Sacrificing Productivity
Aashish Chandarana - Chief Information Officer, Productiv
The question on the minds of CIOs is how to get leadership on the same page to effectively optimize spend. IT, finance, procurement, and LOB managers all hold pieces of the puzzle. Teams are more effective when they work together. That’s why you need a single source of truth to improve ROI and alignment across your organization. This discussion will be centered around strategies to optimize your SaaS portfolio by increasing:
Visibility that drives value across teams
Spend optimization & efficiencies
Specific, actionable insights for faster time to value
Never Trust. Always Verify
Eddie Doyle - Cyber Security Evangelist, Check Point
Humans are inherently both trusting & distrusting, without even knowing it! We pick up on innumerable subtle micro expressions & nuances of our environment, instantly spotting what’s out of place. Without a second thought, our computer brains process & alert us to “things out of place” & focus our attention, silencing distractions so we can verify trust. In this session, Eddie Doyle will demonstrate that when we design systems after our neuro-biology, we can focus our networks to eliminate threats in much the same manner as our natural born instincts.
Passwordless Authentication…Problematic, Probable or Panacea?
Jeff Carpenter - Director of Product Solutions, ForgeRock
Are we headed towards a passwordless future, or are we destined always to be in the grips of user-selected, static passwords? Few security and risk professionals argue for the use of more passwords, it’s just that there are myriad challenges - both human and technological – that make achieving a truly passwordless future seem always just out of reach. Can we innovate our way out of the password morass? What’s holding us back? What’s on the horizon? Join ForgeRock for an informative and entertaining “no frills” discussion on the passwordless future. We’ll examine what new innovations have taken place recently – in distributed identity, the digital wallet and mobile technology – that give us hope we’ll someday be performing our very last user password reset. We’ll discuss risks and tradeoffs, and talk about what forward-thinking organizations are doing to reduce their reliance on, and ultimately get rid of, those pesky passwords.
Safe, Secure Collaboration as a Differentiator
Clint Anderson - Principal Industry Overlay, TPx
As the work-from-anywhere model matures, have you deployed a hybrid work solution that keeps all employees safe, secure, and productive? The magic formula includes a secure, collaboration toolset that balances rapid innovation with business integration. One that differentiates the way employees and customers interact and get things done. Will your organization gain or lose employees during the Great Resignation? Your tools can be differentiators, find out how to leverage them.
Mid-Day Break & Networking
Take the next 30 minutes to stretch your legs and grab a bite to eat. This is also a good time to review on-demand resources, and webinars that you might have missed.
Why Traditional IAM Solutions are Insufficient in Protecting Against the Current Threat Landscape
Larry Chinski - Vice President Global IAM Strategy, One Identity
Over the last few years, we have seen a shift in the credential-based cyber security market that has caused organizations to rethink their security posture. Traditional IAM tools are deployed in a fragmented, tactical fashion that is no longer able to effectively protect against cyber attacks, specifically ransomware. Understanding what has caused this shift, how organizations have responded, and the best approach for future-proofing your IAM platform is critical for mitigating risk and building a flexible yet controlled identity-based ecosystem. In this session, we will discuss this approach and create a roadmap for IAM success based on the current threat surface and the future of IAM.
Getting Better at Failure
Dormain Drewitz - VP Product Marketing & Developer Relations, PagerDuty
Having accelerated as a result of the pandemic, digital transformation efforts remain a top priority for organizations across industries. Delivering reliable and effective digital experiences has become an operational necessity. While much progress has been made to digitize processes, many efforts haven’t met expectations. So, why is digital transformation so hard? The answer lies, in part, in the question: to succeed at digital transformation you have to embrace failures. Not preparing for failures means you haven’t accounted for the full lifecycle of innovation.
In this talk, Dromain Drewitz will highlight how failure normalization is a common thread modern digital technologies and practices, including:
How cloud-native technologies and approaches embrace failure as normal
Why teams need enablement to deal with failures
How failure normalization unlocks experimentation and innovation
What steps you can take to get better at failure
How AI Can Think Like an Attacker

Justin Fier - Director Cyber Intelligence & Analytics, Darktrace
In the face of skyrocketing cyber risk, detecting and responding to attacks is no longer enough. Organizations must take proactive steps to prevent threats before they happen, and to recover if compromised. In this session, Darktrace unveil an ambitious new approach to security, with core engines powering AI technologies to prevent, detect, respond, and ultimately heal from attacks. Together, these engines combine to strengthen organizations’ security posture in a virtuous AI feedback ‘loop,’ which provides powerful end-to-end, bespoke, and self-learning solutions unique to each organization.
End of Day Networking
Thank you for joining us at CIOarena. The remaining time is open for you to wrap up conversations with exhibitors or peers, view past webinars that you missed, and browse the exhibit hall. All tasks for the leaderboard raffles must be completed by 3pm ET.
Don't Trust Your Inbox
Austin Munro - Regional Account Manager, Cloudflare Area 1
Cybersecurity Insurance: Where to Start & How to Qualify
Chris Hills - Chief Security Strategist, BeyondTrust
The blistering pace and expanding scope of cyberthreats and ransomware attacks is forcing cyber insurance companies to steeply increase their rates and premiums, and even drop coverage for high-risk organizations. Underwriting requirements to be approved for cyber insurance are becoming more stringent.
In this upcoming session with Christopher Hills, Chief Security Strategist at BeyondTrust]hear how the cyber insurance market is changing, why it is changing, and the new expectations for a company seeking to obtain, or maintain, cyber liability coverage. Chris, will also answer some common questions:
· How can I qualify for cybersecurity insurance – what are carriers requiring for coverage?
· What can I expect when applying for cybersecurity insurance?
· How much cyber insurance do I need?
Learn how implementing Privileged Access Management (PAM) can enable your organization to not only reduce your cyber risk and improve operational performance, but also qualify for cyber insurance, or lower existing premiums.
Behind The Curtain: A glimpse at modern security operations
John Davies - Principal Pre-Sales Systems Engineer, Arctic Wolf Networks
Sponsors











