|Aligning IT and Business Strategies to Drive Strategic Outcomes||Blake Holman - BBG, Inc.|
Vince Pierce - Level 1
Most today’s business leaders agree that Information Technology (IT) is an indispensable part of the products and services they provide – that IT and business strategies must be aligned, if not tightly integrated, to drive strategic outcomes. And yet, despite that sentiment, leaders in both functions often struggle (or find little value) with this essential task.
Blake and Vince will offer their perspectives, in straight talk format, on what they have found to be a straightforward, repeatable, and effective approach to aligning IT and business strategies in a way that delivers the mail.
Their talk will cover perspectives on:
|Critical Success Factors for Building Your Brand in a Hybrid or Remote Workplace|
|Enabling Business with a Modernized Real-Time Data Strategy||George Trujillo - DataStax|
This discussion will share a data journey to execute the right technology stack for "real-time" decisioning, machine learning and AI. A modernized real-time data architecture that is flexible and adaptable will be shared. Attendees will learn to recognize critical business friction points in data ecosystems. This presentation is recommended for technical, business and analytics leaders looking to improve the time to insight for business transformation.
|Going Beyond “Lift and Shift” - Getting the Most Out of the Cloud|
As companies increasingly migrate to the cloud, they are looking for more than simple cost savings. What was once the main reason for cloud migrations – moving away from heavy Capex investments in hardware and infrastructure, toward more predictable and flexible Opex, is only the beginning. To take full advantage of the cloud and benefit from all that it offers and glean competitive advantages including real innovation and enhanced speed to market, organizations need to truly go beyond just “lift and shift.” However, they may not know how to get there, and determine a roadmap, tech stack, best practices, methodologies, etc. In this presentation, we will address the different approaches of cloud migration, and describe how organizations can migrate to the cloud in a way that not only minimizes their costs but as importantly achieves new capabilities and other benefits. This presentation will address the business drivers and expectations that are now leading the way for cloud migrations, as well as how and why to formulate different cloud strategies such as rehosting, replatforming, and refactoring. Other topics will be covered such as whether to migrate or decompose monolithic applications, and how to choose from a variety of cloud tools, technologies, and platforms.
|Human Security Engineering: Stop Relying on the Failed Human Firewall|
While the main perception is that the “user problem” is due to a malicious party trying to trick well intentioned users, users who are unaware, apathetic, careless, etc., are more likely to be the cause of loss. Either way, the cybersecurity industry realizes this and develops tactics such as awareness, MFA, DLP, etc. to mitigate the problem. Despite all of these tactics, 90%+ of all losses result from attacks targeting users. This presentation is a comprehensive strategy to address the insider threat, whether it results from malicious or well-meaning insiders.
|Managing and Motivating Teams in a Hybrid Environment||The pandemic ushered in a period of constant change for all managers — pivoting to a remote or hybrid workplace, meeting by Zoom and dealing with the personal challenges employees faced working with kids and pets in the mix. Becoming an expert at managing and motivating from afar became a required skillset. For IT leaders, however, the stress has been multiplied as they addressed the raging talent war, staff raiders, candidate fraud and more. Our panel of IT Executives will share their experiences and the solutions they have found for managing hybrid teams in the post-pandemic world.|
|The Future of Security: It's Not All Doom and Gloom||Blake Holman - BBG, Inc.|
This panel discussion will bring together security and technology leaders to discuss the following: What proactive, preventative measures will truly enhance an organization's security posture -- and what's over-hyped? We've all heard that ""people, process and technologies"" are the key to success, but what does that actually mean? How do you bring major awareness to a company in all three of these areas? Before an actual attacker tries to breach the company, what tactics should you use? What can you do to stay secure if you are strapped for money, talent and guidance?
|What Happened on the Way to the C-Suite and What’s Next|
This panel of trailblazers provides fascinating insight into the dynamic world of women succeeding in the world of technology, the paths they followed, the obstacles they overcame, the advice they wish they’d had as they followed to bring their dreams to reality.
|Your Digital Journey – How to Bring Value to the External Customer|
As a technology leader, you are now responsible for both internal and external customers. As business process has drastically transformed over the past two years, what do your external customers expect now? What level of digital needs are expected compared to your internal customer base how do you get there?