Download Summit Snapshot

PDF Download May 3-4, 2016 Agenda (PDF)

CIO Cloud Summit
May 3-4, 2016

↓ Agenda Key

View detailsKeynote Presentation

Visionary speaker presents to entire audience on key issues, challenges and business opportunities

View detailsExecutive Visions

Panel moderated by Master of Ceremonies and headed by four executives discussing critical business topics

View detailsThought Leadership

Solution provider-led session giving high-level overview of opportunities

View detailsThink Tank

End user-led session in boardroom style, focusing on best practices

View detailsRoundtable

Interactive session led by a moderator, focused on industry issue

View detailsExecutive Exchange

Pre-determined, one-on-one interaction revolving around solutions of interest

View detailsFocus Group

Discussion of business drivers within a particular industry area

View detailsAnalyst Q&A Session

Moderator-led coverage of the latest industry research

View detailsVendor Showcase

Several brief, pointed overviews of the newest solutions and services

View detailsCase Study

Overview of recent project successes and failures

View detailsOpen Forum Luncheon

Informal discussions on pre-determined topics

View detailsNetworking Session

Unique activities at once relaxing, enjoyable and productive

Tuesday, May 3, 2016 - CIO Cloud Summit

12:00 pm
-
1:30 pm

Registration and Greeting

1:30 pm
-
1:40 pm

Welcome Address and Opening Remarks

1:40 pm
-
2:25 pm

Keynote Presentation

Cloud, Crowd, Content: Changing the Big Data Game

It’s no secret that Big Data is a big deal, but just how big is it? Some estimates show that while we have a massive 2 Zettabytes under collective corporate management, that this represents one ten thousandth of a percent of the data that has been created. Fortunately those other “nexus” technologies are providing the opportunity to make use of these untapped data resources – mobile is providing a ubiquitous input channel, cloud a dynamically scalable processing capability, and social the community involvement to process and find value. Leveraged well Big Data can solve a wealth of corporate challenges, ranging from improving efficiency, through mitigating risk, to actually growing bottom line revenue. 

Takeaways:

  • Understand how big Big Data really is and where the value to your organization lies 
  • Learn what problems Big Data solves and how it achieves value
  • Be challenged to think about the future of Big Data in your organization

2:35 pm
-
3:05 pm

Executive Exchange

Thought Leadership

IT Integration in a Distributed IT World

It’s no secret – the integration of disparate systems, disparate applications, and disparate data stores has long been one of the biggest challenges faced by the IT department. Simply put, getting everything to talk to everything is no easy task. The rapid adoption of cloud delivered services has compounded this problem almost exponentially – if it was hard to integrate when you controlled the whole stack it has become nearly impossible when you control very little of it. To be efficient and effective IT departments need to adopt a new model of system, application, and data integration. Endless webs of one-off point-to-point integrations simply won’t cut it anymore and a purposeful, structured approach is required. 

Takeaways 

• Learn how to build a holistic strategy to integrate systems, applications, and data. 

• Understand how to leverage SOA and ESB to streamline app to app communications 

• Discover the power and impact of holistic Master Data Management and other data integration processes.

3:10 pm
-
3:40 pm

Executive Exchange

Think Tank

Embrace the Cloud: Adopting a Brokerage Model

The allure of the Cloud is three-fold: the widely seen benefits are reduced cost, increased flexibility, and enhanced time to market. As a result business are rushing to the Cloud in ever increasing droves. In many cases, however, the rush is omitting the IT department until it is too late, and the specter of incompatible data and communications standards, of an inability to integrate with existing on-premise systems hangs over these deployments. To combat these issues, IT leaders need to recognize the value provided by the Cloud and develop a brokerage model whereby IT can direct business peers to the right Cloud delivered service. 

Takeaways 

• Learn what the benefits of the cloud are, and why estimates are being missed. 

• Understand the drivers of these misses and why they are a problem 

• Determine the best approach for IT to take to head those problems off while offering an even higher level of service and value

Think Tank

Innovation in Sourcing Delivery

The convergence of Social, Mobile, Analytics, and Cloud is creating enormous opportunity for companies, and changing the way that services are delivered and consumed. These technologies are even having an impact on traditional sourcing models, which are evolving to meet new client requirements and to deliver on desired business outcomes. Best of breed partners need to invest heavily in capabilities such as analytics and automation to allow them to deliver unmatched services, tailored to each client’s specific needs and environment. 

Takeaways: 

• To help client organizations become transformative, sourcing partners must become transformational themselves 

• Sourcing partners must be prepared and able to ingrate with and extend out to cloud and mobile environments for service delivery 

• Beyond delivery models, innovative partners must provide innovative services and must deliver those services in innovative ways

3:45 pm
-
4:00 pm

Networking Break

4:05 pm
-
4:35 pm

Executive Exchange

Roundtable

Disrupting Markets with Disruptive Technologies

While the combination of Social, Mobile, Analytics, and Cloud have been present and disrupting IT departments and enterprises as a whole for over two years now, in many ways organizations have still not fully embraced them, have still not fully leveraged them. These new platforms allow organizations radically new ways to go to market, allowing for broad scale deployment of “systems of engagement” that create dynamic relationships with clients and prospects. Finding the resources, wherewithal, and ability to fully commit to these technologies and the capabilities they create has proven to be a struggle for many, but a struggle that can be overcome by leveraging the right partners that bring the right skills and experiences to bear. 

Takeaways: 

• Social, Mobile, Analytics, and Cloud are all here to stay; each one adds value to enterprises but collectively that value increases exponentially 

• The manner in which these technologies are implemented, operated, and utilized is different than the foregoing systems of record we are used to 

• Unique skills and capabilities are required to leverage the power and value of these platforms, skills and capabilities that can be in short supply

Roundtable

Overcoming the Data/Privacy Divide

To drive greater focus and flexibility in retail capability, retailers are investing heavily in customer data capture and customer data analytics capabilities, whether from traditional loyalty programs, online data capture, or in-store mobile tracking. As more and more personable data is collected or created however, the specter of customer privacy issues begin to loom larger and larger. Enterprises need to take a long hard look at the information they are capturing and the manner in which it is being used to determine whether the potential value outweighs the potential risk, and whether the incentive offer to the customer is sufficient to overcome any reticence on their part. 

Takeaways:

  • Data privacy is not a show-stopper; customers are willing to share personal information if the payoff is sufficiently worthwhile
  • Not all information gathering needs to be personal and in many cases anonymous aggregated data can be just as instructive, certainly about trends
  • Where information gathering does get personal, opt-in with balancing opt-back-out requirements are essential

4:40 pm
-
5:10 pm

Executive Exchange

Thought Leadership

Big Data and Analytics at the Next Level

The explosive growth of data volume and data variety that have characterized this new big data era are set to head in a steeper upward trajectory as IoT moves from being a fringe technology, to a mainstream capability. When a single Boeing 787 is able to capture 70Tb of data per flight from thousands of individual sensors throughout the vehicle, just imagine the data volume that can be captured when not just every plane, or even every vehicle, but every device and every individual is streaming a constant set of “status” information. Data growth by itself however is only a small portion of the story, as to have value this data must be analysed in essentially real-time in order to create actionable outcomes. 

Takeaways 

• Big data today may be big, but every single one of the “v’s” that compose it (Volume, Variety, Velocity, Veracity and Value) is set to increase exponentially as a result of IoT 

• The ability to analyse, interpret, and find meaning in this vast sea of data will be single biggest differentiator in enterprise success

• Enterprises will have to walk a fine line when it comes to privacy of the information they collect to ensure the continued ability to do so.

Sponsored by:

Cirba

5:15 pm
-
6:15 pm

Executive Visions Panel

The Evolution of the Private Cloud

Once upon a time applications ran directly on physical hardware. Then the boxes got bigger and more capable and multiple applications were run on the same hardware. There were some resource constraints, but things in general became more efficient. Time passed, things evolved and virtualization was introduced, allowing enterprises to run even more applications even more efficiently on the same hardware. And then the cloud came on the scene, extending the virtualization model to the point that it looked like something completely different, to the point that it became true utility computing. Cloud computing is not just “virtualization on a bigger scale” and as CIOs prepare their organizations to dive into private clouds at an increasing rate, it is very important to understand what they are and are not, and how they differ from their forbear computer models with which we are all familiar. 

Takeaways: 

• Private clouds are big and becoming bigger, but calling something a private cloud and having it actually be one are different things 

• While virtualization may be a core enabling technology of a private cloud, virtualizing an environment doesn’t make it a cloud 

• True private clouds have both pros and cons in relation to other compute models; they are not the be-all and end-all and careful consideration needs to be given before pushing ahead with private cloud deployment

6:15 pm
-
7:00 pm

Cocktail Reception

7:00 pm
-
8:30 pm

Networking Dinner

8:30 pm
-
10:30 pm

After Dinner Networking

Wednesday, May 4, 2016 - CIO Cloud Summit

7:00 am
-
8:00 am

Networking Breakfast

8:10 am
-
8:55 am

Keynote Presentation

Cloudy with a Chance of Breaches

Cloud delivered computing services, whether Software, Platform, or Infrastructure as a Service offer the potential of significant business advantages such as reduced cost and increased flexibility. These advantages however come with very real risks, chief among them security concerns and the risk of data and compliance breaches – how do you secure what you can’t see, touch, and control? Combining security solutions that are tied more closely to the data that is to be protected with more comprehensive monitoring and management platforms is the key to ensuring protection in a world where the cloud simply cannot be ignored. 

Takeaways: 

• Be exposed to the true security and compliance cloud threat landscape 

• Learn how successful cloud adopters have mitigated these risks 

• Discover how to build cloud protection capabilities keyed to you needs

9:05 am
-
9:35 am

Executive Exchange

Thought Leadership

Re-Architecting Enterprise IT with an Interconnection Oriented Architecture

Join Equinix to explore how renovating the IT core with an Interconnection Oriented Architecture™ is empowering enterprises to directly connect partners, customers and employees across geographies, devices and cloud services to deliver maximum growth, speed, security, scale and engagement.

Sponsored by:

View detailsEquinixEquinix

9:40 am
-
10:10 am

Executive Exchange

Think Tank

Applying Big Data Principles to Security Paradigms

Volume, variety, velocity, veracity; all four of the hallmarks of Big Data have a clear fit in the world of security as the number of threats grows, their natures diverge, the speed with they are encountered (and subsequently have to be dealt with) accelerates, and the need to be ever more accurate enhances. As enterprises have made significant investments in Big Data programs and analytics platforms, they are beginning to reap real benefits in terms of business efficiency and innovation. The time then has come to begin applying those same principles and platforms to the security challenges facing enterprises to allow for faster, more effective overall security. 

Takeaways:

  • The nature of the enterprise security challenge closely mimics many of the Big Data challenges business are beginning to learn how to solve
  • Just as Big Data challenges required different tools to address for Line of Business and “general” IT issues, so they will for information security challenges 
  • Security must become the next focus for analytics capabilities, and analytics the next focus for security professionals.

Think Tank

Increase Your Security Intelligence and Enterprise Compliance

The breadth and depth of security threats that are targeting the modern enterprise are bordering on overwhelming, but they’re not alone as the breadth and depth of security solutions are also bordering on overwhelming. When security managers have to respond to alerts and warnings from dozens of security systems, and CISOs have to make strategic decisions based on fragmented data, it’s hard to argue that security is improving. Security Information and Event Management (SIEM) platforms that aggregate the vast quantities of data, correlate diverse events, and filter the signal from the noise are allowing enterprises to get back ahead of the curve and make appropriate tactical and strategic decisions. 

Takeaways: 

• The life of enterprise security staff is being complicated not just by the threats they face, but the tools they use 

• Abandoning tools isn’t an option and CISOs need to help themselves and their staff get ahead of the curve 

• SIEM offers significant benefits in separating the “wheat from the chaff” and letting the business actually become secure

10:15 am
-
10:30 am

Networking Break

10:35 am
-
11:05 am

Executive Exchange

Thought Leadership

The Case for Co-Location Outsourcing

Enterprises are increasingly experimenting with outsourcing capabilities, as these capabilities can promote information partnerships, growth, and development. Outsourcing can promote capabilities to deliver proper omni-channel outputs, however, complexity behind this increases as enterprises increase in size. C-suite executives should encompass a solid understanding in co-location outsourcing – and if it’s the right fit for the enterprise. When considering co-location services, understanding it’s influence on CAPEX as well as cost transparency are critical factors. 

Takeaways: 

• Understanding complexity within the enterprise behind co-location outsourcing 

• Develop a continued understanding of co-location outsourcing 

• Validate if outsourcing is an accurate strategy for your enterprise

11:10 am
-
11:40 am

Executive Exchange

Think Tank

Implementing Effective Mobile Device Management

Though Mobile Device Management (MDM) has become the de facto mobile computing security platform offering the ability to control devices, and contain critical data, only 50% of organizations have deployed an MDM platform. Not all MDM platforms are equal, nor are the needs of individual adopters. How then should the enterprise make the best of us of the selected tool, ensuring the right level of protection while avoiding the infringement of individual rights? The key to efficient and effective deployment is balancing the protection you need, the capabilities of the tool selected, and the demands to be placed on mobile users. 

Takeaways: 

• Discover the costs and benefits and of MDM deployment 

• Determine the capability differences between common MDM platforms 

• Learn about common deployment patterns; what works and what doesn’t

Think Tank

Cloud Success through Vendor Management

As enterprises increasingly move compute loads to the cloud, whether as Software as a Service or Infrastructure as a Service, the prevailing belief is that the requirement for IT staff is reduced – less work to do means fewer people needed. This is rarely the case because cloud vendors tend to be the source of point solution instead of being “one stop shops” and so one of the key areas in which IT staff requirements balloon is in the area of vendor management – more vendors to work with means more management required. Vendor management tends to be an area of weakness for many organizations, but as they push to the cloud, IT leaders will need to make it a strength or risk suffering the consequences. 

Takeaways: 

• Vendor management starts during contract negotiation; the tone you set at the beginning will impact the relationship for the duration of the term 

• Everything comes down to SLA so they need to be established correctly, monitored consistently and failures pursued vigorously 

• People skills are needed to complement technical skills so make sure your IT staff have them in spades, or be prepared to find new staff that do

11:45 am
-
12:15 pm

Executive Exchange

Roundtable

Security in an Outsourced World

Building security into your enterprise processes, and integrating it with your existing technology investments has never been more critical or complicated than it is in this era of decentralized computing, and ever-tightening compliance requirements. Furthering this complication is the impact that partnering deals can have since infrastructure, applications, and even data may no longer be under your direct control. To be able to ensure efficient and effective security capabilities you need to understand the nature of the threats that exist today, the impact a sourcing relationship can have on these threats, and the mitigation strategies and tools key industry leaders are using to address the challenge. 

Takeaways: 

• Social, Mobile, Cloud, and Analytics is already having a significant impact on enterprise security, sourcing potentially adds another layer of complexity 

• Beyond “simple” security however there are also issues such as privacy and compliance that also need to be considered 

• Investing in the right tools and practices is essential to weather the storm without breaking the bank

Roundtable

Sourcing Enabled Business Transformation

Innovation is more than just a buzzword; it’s fast becoming the mantra by which successful companies live. As enterprises strive to become ever more agile, offloading mundane responsibilities to sourcing partners can free the resources to become innovative. While beneficial, this really only scratches the surface as it still requires and relies on your resources to undertake that innovation journey. Partners that can bring innovation wherewithal to the table however, that can bake it directly into the service offering provide a greater opportunity to innovate. Understanding how such services can be integrated into your day to day operations, how they can spring board your innovation efforts, and how they can allow you to become truly transformational is essential to innovation success. 

Takeaways: 

• Transformational innovation often requires knowledge, insight, and data that you simply don’t have the access to yourself 

• A strong partner not only provides the opportunity to innovate, it also provides the resources to help make it happen 

• By leveraging a single for both operational and transformational initiatives, significant economies of scale can be leveraged making innovation easier

12:20 pm
-
1:20 pm

Networking Lunch

1:25 pm
-
1:55 pm

Executive Exchange

Thought Leadership

Is Security Obscuring the Benefit of the Cloud?

Cloud delivered computing services, whether Software, Platform, or Infrastructure as a Service offer the potential of significant business advantages such as reduced cost and increased flexibility. These advantages however come with very real risks, chief among them security concerns and the risk of data and compliance breaches – how do you secure what you can’t see, touch, and control? Join our panel as we explore both the security and compliance issues inherent in Cloud deployments, look at the hidden issues that first time Cloud adopters may simply not be aware of, and discuss through solutions that can be used to address these challenges and allow enterprises to fully and firmly embrace the Cloud. 

Takeaways: 

• Be exposed to the true security and compliance cloud threat landscape 

• Learn how successful cloud adopters have mitigated these risks 

• Discover how to build cloud protection capabilities keyed to you needs

2:00 pm
-
2:30 pm

Executive Exchange

Roundtable

Defining Data Governance

Data volume, data variety, and data velocity have all grown exponentially over the last few years, the so-called “Big Data” explosion. And while this increased organizational focus on data, the information it contains, and the insights that can be gleaned from it promises tremendous opportunity, that opportunity isn’t achieved without overcoming significant challenges. Whether it be the increased need for better data quality (an issue unresolved from the “small” data days), more efficient and effective data management, answering questions around data ownership vs. stewardship, or even increased regulatory pressure as a result of data security and data privacy, this increased focus on data has created an increased need for Data Governance. Join our panelists as we discuss the thorny issue of Data Governance: what it is, how it works, why you need it, and who should be responsible for it. 

Takeaways:

  • Data management issues have existed as long as data has existed but the Big Data boom has increased these challenges exponentially
  • Resolving data management issues requires a strong data governance program to make rules, resolve issues, and enforce compliance
  • Determining “what” to about data governance is the easy part, determining how and by whom it should be done will be the real challenge facing IT

Roundtable

Maintenance & Operations Cost Containment

As the cost of new generation facilities continue to increase, and the economies of scale that can be leveraged out of increased generation capacity decrease, increasingly it is the transmission grid that becomes the expensive component of a public utility. As a result utility companies must drive greater levels of cost control out the maintenance and operations of the grid itself in order to stay competitive with the decreasing cost of self-generation. IT departments have a major role to play by providing field maintenance staff with the necessary tools in terms of devices, applications, and connectivity, to drive the required efficiencies. 

Takeaways: 

  • Grid operations have become the most significant cost component of an electric utility and as a result, efficient maintenance is now a key differentiator 
  • Field service has traditionally been a low-tech role, but these staff members must become IT enabled to achieve required efficiencies 
  • Beyond simple enablement, IT departments must have develop internal systems that allow for efficient maintenance decision making based on predictive analytics

2:35 pm
-
3:05 pm

Executive Exchange

Think Tank

Embracing the Internet of Things

The Internet of Things (IoT) is moving from being Science Fiction, to be Science Fact as sensors are being imbedded in everything, and ubiquitous wireless networks are facilitating constant communications. Value driven use cases are being made, but in many cases are far and few between and so CIOs evaluating this paradigm shift are left to wonder whether this is something they should drive, should enable, should control, or should ignore. CIOs need to begin taking action now to embrace the changes that can be wrought by IoT, not for the benefit of the IT department, but as value generators for the organization as a whole. 

Takeaways 

• Understand the two broad uses cases – Information & Analysis, and Automation & Control 

• Learn about the specific ways that IoT can drive enterprise growth 

• Determine the changes needed within the IT department to prepare it to leverage the value and power of IoT

Think Tank

Using Cloud Delivered Services to Enable Business Transformation

As IT leaders begin to make the Cloud an inherent component of their long-term plans, they face the risk of falling into old habits and simply approaching the Cloud from a purely tech-centric perspective. While addressing the technology questions presented by increased Cloud adoption is important, more important is understanding the business enablement opportunities offered by broader Cloud adoption strategies. Innovative CIOs will need to see the Cloud for what it is; a way to change the conversation and focus away from the bits and bytes to an evaluation of what capability enables optimized business initiatives. 

Takeaways: 

• Learn why viewing the Cloud as an alternate technology delivery channel only is career suicide 

• Understand the real value of the Cloud, and that it goes beyond surface metrics like cost savings 

• Develop, instead of a Cloud adoption strategy, a Cloud/Business enablement strategy

3:10 pm
-
3:40 pm

Executive Exchange

Thought Leadership

The Role of the Cloud in IoT Deployments

Though cloud has been loosely defined by many users as vendors alike as “not here” computing, the base definition for “true” cloud includes elasticity, dynamic allocation, and multi-tenancy as de facto capabilities. Given that IoT type deployments, by their very definition, are dynamic is usage pattern, highly variable in demand, and encompassing of thousands of individual users or tenants, we can see that IoT workloads are perhaps the ultimate expression of cloud workloads. As a result and serious effort at developing IoT based solutions must be making use of cloud based storage and compute capabilities, not to mention on-demand software solutions in order to extract maximum value. Cloud may have started as a way of providing greater efficiency and flexibility for traditional computing paradigms, but may well find its true calling in enabling IoT computing paradigms instead. 

Takeaways 

• In many ways cloud computing will become the backbone of IoT computing 

• Those organizations that have not yet embraced the cloud, or have done so only in a tentative manner, put themselves at a significant disadvantage in the race to an IoT future compared to their more cloud-savvy peers 

• Embracing the cloud requires significant process changes at the backend in terms of governance, etc. Now is the time to build that new cloud foundation

3:45 pm
-
4:00 pm

Networking Session


4:05 pm
-
4:35 pm

Executive Exchange

Roundtable

Planning for a MultiCloud Future

The promise of the cloud is almost beyond compare; infinite computing resources, unmatched reliability and uptime, instantaneous service availability, simplistic self-service and provisioning, and the low-low prices of a “buy by the drink” model. These are the reasons behind the rush to the cloud that we are currently experiencing, but the wholesale adoption does bring a downside – as more and more capability is moved to the cloud, more and more cloud providers are utilized since, for the most part, each provider offers only a limited suite of services. The MultiCloud environment that creates a new set of challenges that IT leaders need to overcome, notably resiliency, interoperability/integration, and security and compliance through careful planning and the lessons learned from building complex on premise distributed systems. 

Takeaways: 

• As enterprises move to the cloud, MultiCloud environments will increasingly become the norm, not the exception 

• Consistent planning and thoughtful architecture will be essential to efficient and effective cloud deployments 

• IT leaders do not need to be alarmed, they’ve been down the complex environment path before, but they do need to be careful

Roundtable

Securing Divergent Endpoints

Over the last few years, as cloud and mobile technologies have taken hold within the enterprise, the concept of the network perimeter has dissolved, and with it the concepts around traditional network security. The broad scale adoption of IoT technologies however will make this first phase of network disaggregation seem trivial in comparison as enterprises begin to connect to not just thousands but millions of disparate and divergent endpoints. To ensure appropriate security in such a dispersed networking world and entirely new paradigm to security will be required that encompasses not just wildly diverse types of devices in wildly diverse locations, but the threat of low-powered, low complexity endpoints that have no internal capacity for monitored and managed security capabilities. 

Takeaways: 

• The number and type of enterprise endpoints is about to go through explosive growth and each of these endpoints will represent security threat 

• These new endpoints will not have the capacity for internal security and so central security solutions will be required to ensure appropriate protection 

• The volume and variety of new security data feeds and security threat info will overwhelm traditional security platforms and capabilities

4:40 pm
-
5:10 pm

Executive Exchange

Thought Leadership

Turning Big Data into Big Opportunity

It has been said that leveraging Big Data is like looking for a needle in a haystack; that the challenge is finding the one piece of insight in the sea of irrelevant data. The truth is there is no irrelevant data just data without initial context or meaning, suggesting the problem in actuality is one of looking for a needle in a needle stack. Compounding this problem is that, to offer maximum value, these insights need to found as quickly as possible lest someone else find the relevance first and exploits the opportunity that goes along with it. IT Leaders need to focus not just on building the toolset that allow the business to find insights, but on building an insight pipeline that finds the relevance and feeds it to business peers.

Takeaways:

  • See that Big Data is an opportunity engine waiting to be exploited
  • Learn to identify the insights the business needs to succeed
  • Understand how to build the capability to find and deliver those insights

5:15 pm
-
6:15 pm

CIO Executive Visions

Regulatory Impacts of a Cloud Computing Model

Cloud computing is the new, hot method for delivering enterprise-grade computing capability. It does so efficiently and cost effectively and allows businesses to be quicker to market, to more nimble in their responses, and to do so with greater fiscal constraint. What Cloud cannot do however is allow enterprises to stay on the right side of archaic and slow-moving government and industry regulations because the technology moves forward far quicker than the regulations can. In this environment, CIOs need to proceed cautiously to ensure they are not putting their enterprises at risk as they embrace the technology they need to move it forward. 

Takeaways:

• Understanding the regulatory landscape is essential for any CIO that is investing in “not here” technologies like the cloud 

• Every enterprise is different and its regulatory exposure is different – prepare to make friends with the legal department or seek outside assistance as needed 

• Don’t let regulation scare you off of the cloud however; the value and benefits are tangible

6:15 pm
-
6:20 pm

Thank You Address and Closing Remarks

6:20 pm
-
7:00 pm

Cocktail Reception

7:00 pm
-
8:30 pm

Networking Dinner

8:30 pm
-
10:00 pm

After Dinner Networking