Event Description

Annual CIO Summit at the Ritz Carlton, Half Moon Bay

The CIO was first introduced to lead the Data Processing and Information Systems departments of the past. Today, the job is a much different role. The skillset and responsibilities are worlds apart from what they were a decade or two ago. And the role continues to adapt to the changing face of the modern business enterprise. 

Discussing key topics such as the Cloud, Digital Transformation, Data & Analytics and the use of AI and IoT, the CIO Summit gives you the opportunity to meet leading decision-makers under one roof at one time, to be part of the discussions that are shaping the future of security and to network and develop contacts that will strengthen your business.

The program is driven by our senior-level Advisory Board including representatives from TNT, Henley Business School, Fox Networks Group, US Department of Defense and Wyndham Group.

The CIO Summit brings together leaders from across the public, large enterprises & mid-market sectors to provide you with a strategic and practical toolkit to help drive transformation including:

  • A full day of leading CIO’s discussing the latest industry trends
  • Workshops, panel discussions & round table sessions led by visionaries within technology
  • First-hand case studies on the challenges facing IT
  • Fantastic networking opportunities with peers throughout the day
  • Over 50 Senior Level IT Directors
  • Keynotes, Interactive Round-tables, and Lively Panel Discussions
  • Industry-leading topics around IoT, AI, Cloud, etc.
  • Dedicated space and time for peer-to-peer networking with fellow industry leaders

San Francisco


November 10 2022

Event Schedule

clock icon

9:00 AM

Registration Opens

clock icon

10:15 AM

Opening Remarks & Panel Discussion

Cybersecurity Executive Order

Consider it Done with Zero Trust Segmentation

clock icon

11:00 AM

Panel Discussion

360 View on Cybersecurity

clock icon

11:50 PM


Managing Cloud Security Risk without Slowing Application Delivery

clock icon

12:20 PM


Your Digital Transformation is Being Sabotaged

Digital transformation promises business growth by providing value to customers by leveraging emerging technologies and supporting skills for new business models. At its core, data-driven decisions are the lifeblood of digital transformation. When data is poisoned, stolen, and misused for malicious intent, progress slows resulting in poor customer experience and satisfaction. In this session, we will explore how sophisticated bot attacks are contaminating top digital transformation trends related to automation, data analytics, and application architectures that should be part of every security strategy to solve in 2022.

clock icon

12:50 PM


Mitigating Digital Supply Chain Threat's We've Ignored for Too Long

clock icon

1:20 PM


clock icon

2:10 PM


The Impact of Emerging Technologies: Shifting Left to Secure Your Software Supply Chain

As organizations shift to cloud, they are increasingly building and using cloud-native software running in containers. However, this shift creates a need for new processes and approaches to ensure this software is secure. SolarWinds and other recent breaches have highlighted the need to protect the software supply chain. Organizations are now working diligently to better understand their software supply chains and protect software as it’s being built, before it ever goes into production. The software bill of materials (SBOM) is becoming a foundation for transparency, while new technologies are emerging to ensure the security of the software supply chain. This panel will delve into the critical challenges organizations face and the emerging technologies and approaches they are using to advance the security of the software they build and use.

clock icon

3:00 PM


New Approaches to Prevent Advanced Email Threats

Email has long been the primary communication channel for business, and amidst the world’s massive shift to remote work, it also maintains its position as one of the most attractive attack vectors for threat actors. One of the biggest takeaways of several recent attacks is that your security is only as good as your partners' and vendors’ email security.
Abnormal Security uses an innovative behavioral data science-based approach to protect enterprises from sophisticated business email compromise attacks, account takeovers and supply chain compromises.
During this keynote, Abnormal Security CISO Mike Britton, will share real-world examples of attacks and how a new approach can detect and stop them. You’ll also hear from a large California-based organization about their experience with Abnormal, including what they’ve done to protect themselves against the most dangerous attacks.


clock icon

3:30 PM

Mingle Break

clock icon

3:45 PM


Where We’re Going, We Don’t Need Rules: Anomaly-Based Threat Detection

Most security tools battle cyber threats using the tried-and-true method of rules-based detection. But this industry standard has its limitations. What if, instead of endlessly writing (and maintaining) rules to identify bad actors and irregularities, we could base security on the normal, healthy operations of an environment? This session will explore how a new approach to anomaly-based threat detection is driving fundamentally better security outcomes while streamlining investigations

clock icon

4:15 PM


Why Ransomware Continues To Be So Elusive and Pervasive

clock icon

4:45 PM

Mingle Break

clock icon

5:00 PM

Round Tables

clock icon

5:45 PM

Sunset Cocktail Reception

Words from our attendees

I just wanted to say congratulations on a great event and thank you all for your help, especially Kate and Tiffany who have spent time in advance and at the event with me to help me get the most out of the days here.I have really enjoyed the event, and made some good new contacts as well as insights into common challenges we are all facing in the CIO community. It’s been run superbly so thank you, and I look forward to the future events.

Eric Poon - IT Director - Peloton

I thought the quality and mix of contributions and the engagement from the audience was excellent. It felt more like an interactive team exercise in some respects, than a sit back and listen conference, and for me was more enjoyable and genuinely helpful for that. Similar folks, passionate about their brands and their work, but with different best practice to share – very collaborative, which I personally like. So all good and thanks for the chance to take part. It’s always a drain on time, which none of us have, but it was worth it.

Scott Strickland - CIO - Wyndham

Join top decision makers from the leading Organizations in the Country

Are you interested in this event?

Participate in this Summit on our unique platform, learn from industry leaders, and network with peers. The benefits of attending are unmatched. Complimentary to qualified professionals and their team.