imac

Presents The

ALBANY IT SYMPOSIUM

"Building the Digital Enterprise"

Wednesday April 27, 2016
Albany Marriott

Dynamic Industry Keynotes

Robert Tipton | Chief Transformation Accelerator, Change Management Pro

Jerry Luftman | Founder & Managing Director, Global Institute for IT Management, Renowned International on IT Business & IT Trends

Jack Barsky | Retired IT Executive

Interactive Breakout Sessions

Innovation, Leadership, Agility
Enterprise, Architecture, Hybrid Storage
Security, Infrastructure, & More!

Invaluable Networking Opportunities

Network, Connect &
Reconnect with Colleagues

Value & Convenience

Education & Resources
From Your Regional Peers

 
Executive Level Attendees in 2015
Companies Participated in 2015
 

Download the Mobile App

For the 2016 Symposium
Join Us At The 2016 Albany IT Symposium

April 27, 2016

At The Albany Marriott
SIM

Hosted by:

One of the newest chapters of the Society for Information Management (SIM), our membership consists of Upstate New York's top Information Systems (I.S.) executives, senior academics, and selected, leading-edge I.S. consultants.

Follow this link to the Albany SIM web site which provides on-line access to information about our Chapter.

Learn More

Advisory Committee

Click here to view the hard working people responsible for making this event happen.

Kristine Cottom

CIO/VP Information Security
Healthcare Association of New York State

John Finch

CIO
HealthAlliance of the Hudson Valley

John Hinkle

CIO/CISO
CommerceHub

Clay Johnson

CIO
GE Power

John Kelleher

CIO
Glens Falls Hospital

Tracy Nolan

Former SVP & CIO
Golub Corporation

Eric Decker

SVP & CIO
Independent Health

James Poole

VP & CIO
MVP Health Care

Neil Brandmaier

CIO
CDPHP

Allen Look

Global IT Executive
SIGroup, Inc

Jack Barsky

Retired IT Executive

Sigrid Cerio

VP, Enterprise Quality Management
CDPHP

George Waghorn

VP, IT Infrastructure & Operations
CDPHP
Join Us At The 2016 Albany IT Symposium

April 27, 2016

At The Albany Marriott

Agenda

Click here to view the 2016 Agenda

7:30am | Attendee Check-In: Breakfast Buffet Served

Orange, Grapefruit, Tomato, Apple Juices, Seasonal Fruits, Yoplait Yogurt, Cold Cereals, 2% and Skim Milk, Fresh Scrambled Eggs, Breakfast Sausage Links and Bacon, Breakfast Potatoes, Danish, Muffins, Croissants, Bagels, Coffee, Decaffeinated Coffee, Tea

8:20am - Salon A-E | Welcome Message

Ethan Suib

Director, Enterprise Info Systems
Regeneron Pharmaceuticals
 
8:30am - Salon A-E | The Power of Choice-Based Leadership: Why Choosing Change Makes ALL The Difference

Robert Tipton

Chief Transformation Accelerator
Change Management Pro

There’s a common misconception in business today: that organizational change happens through education and performance management systems. In other words, if we give people enough facts, and use the right mix of carrots and sticks to get them to perform, change happens.

And, that’s completely backward.

It’s also one of the chief reasons why, in my experience, more than 2/3rds of “typical” change efforts fail. One of my favorite sayings is this: “The way we approach change is critical to how hard (or not) and how successful (or not) change will be...”
Change can leverage our desires instead of our fears, our choices instead of our insecurities, our strengths instead of our shortcomings. And when this happens, change—while in many cases remaining a challenge—becomes something “other than hard,” and something where success can be normal and expected.

This keynote inspires a mind reboot, a shift toward helping the people around you to CHOOSE change. Here are some remarkable benefits we’ll quantify and that you’ll experience first hand in the session:

1. Engagement is driven by a sense of trusted appreciation
2. Authentically-engaged employees do “whatever it takes” to assure change happens
3. High-trust relationships reduce costs and shorten timeframes associated with change

Here’s the bottom line: change is an emotional decision, not an intellectual one, and CHOOSING change makes ALL
the difference.

KEY TAKEAWAYS:

1. There’s no such thing as organizational change - the people in organizations change, one at a time. If we get the right people, in the right roles, at the right time, in the right sequence to change together, then it feels like the organization itself is changing.
2. There’s a PROFOUND difference between change done to us versus change done through us.
3. Accelerating three kinds of trust (a. I am trusted; b. I trust the situation and my leaders; and c. we trust each other) drive real, quantifiable business benefits. It’s not just some fluffy notion.
4. Real, sustainable change happens only when we want it. Period.

9:15am - | Networking Break
9:45am - | Breakout Sessions
9:45am - Albany/Colonie | Legal Issues & Best Practices in Cloud Contracting

Paul Gillan

Health Care & Technology Attorney
Wilson Else Moskowitz Edelman & Dicker LLP

As one of the main drivers in business innovation, “cloud” is either in your portfolio or on your radar screen and is increasingly deployed in a critical area of business operations and strategy. This session will walk through a number of common legal issues and high risk business issues in cloud contracts, including some best practice observations garnered from 15+ years of negotiating technology contracts.

9:45am - Schenectady/Troy | How Will You Take Advantage of Innovations That Happen Only Once Every Decade?
sponsored by Oracle

Michael Sachs

VP, Sales Engineering, Cloud Technology & Transformation
Oracle

While the Cloud revolution is in progress, gaining a clear competitive advantage that provides your organization and customers significant business value with minimum risk will continue to be a strategic goal. What are your deployment choices?  Which one will allow you to move workload seamlessly and securely from on-premise to the public cloud? How can you ensure that your business transformation yields a secure information fortress? This presentation will share how to transform your business addressing these challenges all while achieving significant cost savings and assuring deeply integrated security.

9:45am - Salon F | Heat Mapping the Risk

Jim Garrett

CISO, Enterprise Information Security Office
NYS Office of IT Services

Whether an organization is large or small, a Cyber Security framework is necessary to manage risk, ensure compliance to State, Federal, and Contractual regulations, and stay in step with new threats and emerging security best practices. CISOs must leverage a Cyber Security framework to gain credibility, heat map vulnerabilities, justify investments, and manage risk.  NIST 800.53 and ISO27001/2 Cyber Security frameworks can be used to establish a baseline approach to successfully meet HITRUST, HIPAA, CJIS, Tech. Pub 1075, PCI, PII, FERC, NERC, FIPS, GLB and Executive Order 13636. 

9:45am - Salon G | Breakaway Business Leadership Through Business Strategy & IT Innovation

Tracy Nolan

Former SVP & CIO
Golub Corporation

In this presentation we will explore the how IT and digitalization are transforming industries and what are some practical tools you can use to bring about this necessary change, illustrated with real life examples.

10:30am - | Networking Break
11:00am - | Breakout Sessions
11:00am - Albany/Colonie | Staffing: Creating the Destination Environment

Eric Caballero

IT Director
Byrne Dairy

The challenges are many: budget, time, talent and opportunity. How do you staff, maintain, mentor and lead people in an IT function that strives to be industry-best. Leading an IT function is part salesperson when building a team of professionals. Sell candidates and staff on how their work and success works for both the organization and their professional growth and be part of the discussion on how we can craft a department that people want to join and has a reputation for professional satisfaction.

11:00am - Schenectady/Troy | Making the "Sick" Network Well - A Case Study in Healthcare
sponsored by GSS Infotech

Robert Duthe

CIO
Cortland Regional Medical Center

Network electronics have been characterized as a commodity market. However, switch selection more than price; it is tightly integrated with network protocols, OEM selection, and the architectural design. This case study presents one organization’s journey to transform its network architecture by selecting the appropriate partner.

11:00am - Salon F | Making Datacenter Infrastructure Invisible: Demystifying Hyperconvergence and the Cloud
sponsored by Nutanix

Mike Sheehy

Sales Engineer
Nutanix

Virtualization, hyper-convergence, mobility, and cloud services are transforming IT in organizations world-wide, but far too many companies are being left behind as they cope with rigid legacy datacenter infrastructure built upon of standalone storage. This technical session will tackle traditional workloads, deploy new scale-out applications, simply operations, reduce costs and make your datacenter infrastructure invisible by embracing these disruptive new technologies. The talk will also cover performance and availability best practices for storage, networking, and compute/virtualization for high performance databases and applications, and server workloads and explore a few examples of production deployments on HCI.

11:00am - Salon G | Next Generation Backup & Disaster Recovery for the Modern Business
sponsored by Ubistor

Dan Hill

Founder & CEO
Ubistor

Corporate data and systems can be located anywhere: on premise, in the cloud, or on your endpoint devices. Does your business have a strategy to ensure your data and systems are available and protected no matter where they are? Modern backups and disaster recovery solutions are available to help you transform your data into a powerful asset and enable you to protect, access, and use your data and systems whenever and wherever you need them. Learn to leverage public, private, and hybrid clouds and subscription based managed services in order to create an affordable data management and disaster recovery strategy while reducing dedicated, specialized personnel for data compliance and DR testing and recovery functions.

11:45am - Hot Lunch Buffet Served

Warm Rolls and Butter, Buffet Salads, Caesar Salad, Herbed Pasta Salad, Field Green Salad with Assorted Dressings, Roasted Pork Loin, Chicken Piccata, Medley of Fresh Vegetables, Roasted Rosemary Fingerling Potatoes, Assorted Pies and Cakes, Coffee, Decaffeinated Coffee, Tea

12:40pm - Salon A-E | Keynote Introduction

Jack Barsky

Retired IT Executive
Former KGB
 
12:45pm - Salon A-E | 2016 Global IT Trends

Jerry Luftman

Founder & Managing Director
Global Institute for IT Management
Renowned International Expert on IT Business & IT Trends

Many IT and non-IT organizations are like the proverbial frog in the pot of water that is ready to boil; they are not anticipating the changes taking place all around them. The purpose of our annual IT trends research is to communicate these important changes. Are we seeing the end of the CIO as we have known it? We are clearly seeing the role of the CIO and the overall IT organization experiencing a significant transformation. It is those organizations and individuals who are best prepared that will prosper in these exciting times.

1:30pm - | Networking Break
2:00pm - | Breakout Sessions
2:00pm - Albany/Colonie | The FBI Cyber Program

Eric Lurie

Special Agent
FBI

An overview of the cyber threat landscape, as seen by the FBI.  This presentation will touch on the threat posed by both criminal and state sponsored actors, and what the FBI does on a daily basis to investigate and counter those threats.  We will discuss how the FBI stays in front of current and emerging cyber trends, and how we gather and share information with our public and private sector partners worldwide.

2:00pm - Schenectady/Troy | 11$wMAH! Creating an Information Security Culture

Kristine Cottom

CIO/VP Information Security
Association of New York State

To be effective information security must be “owned” by everyone throughout the organization. Legacy thinking, organization structure, and company culture can be a challenge to spreading adoption of individual ownership. In many companies information security is just another regulatory compliance or “best practice” initiative lead by the CISO, auditors, or Risk Managers. At the Healthcare Association of New York State (HANYS) information security became a business imperative, essential to the life of the company. Learn the steps HANYS took to take the responsibility for information security out of the hands of individual leaders and into the hands of every employee; creating a successful, sustainable information security culture. (You’ll also learn what the title 11$wM@H! means and how it was used.)

2:00pm - Salon F| Negotiation Preparation & Resource Management (How can software help create more effective outcomes?)

Dr Beth Fisher-Yoshida

Director of Faculty of the Master of Science in Negotiation & Conflict Resolution
Columbia University

Rodney Erb

Founder & CEO
Negotiated Solutions, Inc

Many of us negotiate formally and informally in the workplace on a regular basis. This can be within our teams, departments and organization, as well as, with external players. If you think about the negotiation process from the inception of the idea that a negotiation is needed, all the way through the process until its conclusion and implementation of the results, what percentage of your time do you spend in preparation? We will propose that overall we spend a lot less time than we probably should in getting ready for a negotiation that probably has a longer lasting effect than the timing of the actual interaction.

In this experiential workshop we will:
• Explore negotiation and the role of preparation in the process
• Introduce Neptune software as a tool that supports negotiation preparation
• Examine a case study application
• Provide an opportunity for participants to apply some of what is being covered

2:00pm - Salon G | The Evolution of Disaster Recovery As A Service (DRaaS) Into The Cloud
sponsored by Zerto

Matthew Chesterton

CEO
OffsiteDataSync

As physical computing environments have become virtualized, more opportunities for cloud services have evolved. Ensure business continuity, lower costs, and meet compliance goals with tight RTO’s and RPO’s. Matthew Chesterton, CEO of OffsiteDataSync, will discuss cloud solutions for your IT infrastructure.

2:45pm - | Networking Break
3:00pm - | Breakout Sessions
3:00pm - Albany/Colonie | Improving Security Awareness Within Your Organization

Christopher Bernard

Managing Director, Global Risk & Security
Cushman & Wakefield

Security incidents and data breaches are becoming common events for companies in all industries. These companies (and governments) have invested millions in technology and top-notch security professionals, yet their companies are breached. We will explore one of the largest exposures to all organizations: People.

People are trained to perform their jobs in technology, accounting, sales, etc. but lack the basic knowledge of how to protect company data from being exposed. You can’t assume that everyone knows the rules, cautions and dangers. Hackers are getting better and better at disguising their methods, it’s not always obvious.

Security awareness is a critical issue for all organizations that depend upon Information Technology (which covers pretty much everyone).

In this session, we will discuss the importance of exposing everyone in the organization to security awareness and risks. Practical solutions for promoting day-to-day security awareness for general users, and conducting more specific training for staff with greater security responsibilities will be discussed.

3:00pm - Schenectady/Troy | Leading Through Disruption

John Norton

CIO, Human Services Cluster
NYS Office of Information Technology

Disruption is defined on Vocabulary.com as a major disturbance, something that changes your plans or interrupts some event or process.

Disruptive Technology is one that significantly alters the way that a business operates or a government delivers services. Examples of disruptive technologies and innovations include the PC, the Internet (World Wide Web), email, digitized music, movies, books, pictures (i.e. content), eCommerce, Mobile Internet (Smartphones and cell/wifi), social networking, Internet of Things (IoT) -- including sensors and wearables, Cloud (computing, XAAS, always on devices). All of these technologies/innovations have in some way altered or even replaced/created entire industries.

In this session, you will hear many examples of disruption and how it’s impact on People, Processes and Technology, as well as how to lead your way through it.

3:00pm - Salon F | Changing Role of Backups in a Virtualized World
sponsored by Whalley Computer Associates

Bill Suarez

Director of IT Engineering
Carbon Black Inc

In this session, we will cover some of the critical points to consider when moving from a legacy, physical datacenter to a virtualized one when looking through the lens of backups. And then how the role of backups in a virtualized world play into a Disaster Recovery strategy.

3:00pm - Salon G | Do You Know Who I Am? Anonymity and Big Data

Nick Webb

Assistant Professor, Department of Computer Science
Union College

You have a large amount of data, with personal information, but you want to use that data for learning, for data analytics, or mining. You're careful, and you deidentify your data, so there's no way a third party could find the information for any individual, right? This talk looks at the issue of reverse anonymization, using examples from search, Netflix and social media, to illustrate the problems of anonymity in large data sets.

3:45pm - | Networking Break
3:55pm - Salon A-E | Keynote Introduction

Neil Brandmaier

CIO
CDPHP
 
4:00pm - Salon A-E | From Under Cover Into the Corporate Office: Lessons Learned & Applied

Jack Barsky

Retired IT Executive
Former KGB

Our closing keynote speaker is Jack Barsky, a man with an incredible career, part of which was featured this past year on the CBS series 60 Minutes.

Jack was a chemistry professor in Germany before he joined the KGB and led a ten-year undercover existence in the United States.  In this country Jack worked as a bike messenger, computer programmer, IT manager and IT executive.  For 15 years he was a trusted source for the FBI.

During his thirty years in Information Technology, Jack used the professional curiosity of a spy as well as the analytical skills of a scientist to derive observation about the essence of corporate life, particularly as it relates to the field of information technology.

In addition to some tidbits from his soon to be published book (Working Title is “Deep Undercover”) Jack will share some of those observations.

His overview of the issues in Information Technology is eclectic and will cover subjects such as

  1. How would you expect a spy to penetrate a target today
  2. Security vs. Compliance
  3. We all lie – how do we deal with that fundamental truth
  4. Mergers – the us against them syndrome
  5. Secrets of success (and failure) in one’s career
  6. What does the KGB and the Corporation have in common – the law of big organizations
  7. Decisions under pressure
  8. Perception is NOT reality but it is often stronger than reality
  9. The essence of leadership

When a spy is finally unencumbered to tell the unvarnished truth it will get interesting.  Jack will make you think, so join us and get ready for the power of “aha”!

4:45pm - Salon A-E | Closing Remarks

Ethan Suib

Director, Enterprise Info Systems
Regeneron Pharmaceuticals
 
4:50pm - Networking Reception

Enjoy this complimentary cocktail reception featuring an open bar, hors d’oeuvres and conversation. Make this an important element of your attendance to the Summit. The ability to network and collaborate with your peers in an open and no-hype environment will prove to provide long lasting value to your key business initiatives moving forward.

 

What Our Attendees Say.

Customer Testimonails

Many of us across the IT community are facing the same issues. This is the event where you can connect with people who have developed creative solutions to these issues. Even more importantly, they are happy to share these solutions with you.

Sigrid Cerio VP, Enterprise Quality Management
CDPHP
Customer Testimonails

SIM Albany is the premier networking group for IT leaders. This group delivers high level content like this on a monthly basis and culminates with this annual event.

Allen Look Global IT Executive
SI Group, Inc
Join Us At The 2016 Albany IT Symposium

April 27, 2016

At The Albany Marriott

Sponsors



Click here to view the 2016 Sponsors of the Conference

Title Sponsor

Clients

Platinum Sponsors

Clients
Clients

Silver Sponsors

Clients
Clients
Clients
Clients
Clients
Clients
Clients
Clients
Clients
 

Event Venue

Directions & Information Below

ALBANY MARRIOTT

189 Wolf Road • Albany, NY 12205 • ph. 517-458-8444

MAP & DIRECTIONS

Get in Touch with us

Still have Questions? Contact Us using the Form below.

Send us an Email

Copyrights © 2016 All Rights Reserved by EFM Inc.
1202 3rd Ave N, Humboldt, IA 50548 · 515-332-7940 ·