Orange, Grapefruit, Tomato, Apple Juices, Seasonal Fruits, Yoplait Yogurt, Cold Cereals, 2% and Skim Milk, Fresh Scrambled Eggs, Breakfast Sausage Links and Bacon, Breakfast Potatoes, Danish, Muffins, Croissants, Bagels, Coffee, Decaffeinated Coffee, Tea
There’s a common misconception in business today: that organizational change happens through education and performance management systems. In other words, if we give people enough facts, and use the right mix of carrots and sticks to get them to perform, change happens.
And, that’s completely backward.
It’s also one of the chief reasons why, in my experience, more than 2/3rds of “typical” change efforts fail. One of my favorite sayings is this: “The way we approach change is critical to how hard (or not) and how successful (or not) change will be...”
Change can leverage our desires instead of our fears, our choices instead of our insecurities, our strengths instead of our shortcomings. And when this happens, change—while in many cases remaining a challenge—becomes something “other than hard,” and something where success can be normal and expected.
This keynote inspires a mind reboot, a shift toward helping the people around you to CHOOSE change. Here are some remarkable benefits we’ll quantify and that you’ll experience first hand in the session:
1. Engagement is driven by a sense of trusted appreciation
2. Authentically-engaged employees do “whatever it takes” to assure change happens
3. High-trust relationships reduce costs and shorten timeframes associated with change
Here’s the bottom line: change is an emotional decision, not an intellectual one, and CHOOSING change makes ALL
1. There’s no such thing as organizational change - the people in organizations change, one at a time. If we get the right people, in the right roles, at the right time, in the right sequence to change together, then it feels like the organization itself is changing.
2. There’s a PROFOUND difference between change done to us versus change done through us.
3. Accelerating three kinds of trust (a. I am trusted; b. I trust the situation and my leaders; and c. we trust each other) drive real, quantifiable business benefits. It’s not just some fluffy notion.
4. Real, sustainable change happens only when we want it. Period.
As one of the main drivers in business innovation, “cloud” is either in your portfolio or on your radar screen and is increasingly deployed in a critical area of business operations and strategy. This session will walk through a number of common legal issues and high risk business issues in cloud contracts, including some best practice observations garnered from 15+ years of negotiating technology contracts.
While the Cloud revolution is in progress, gaining a clear competitive advantage that provides your organization and customers significant business value with minimum risk will continue to be a strategic goal. What are your deployment choices? Which one will allow you to move workload seamlessly and securely from on-premise to the public cloud? How can you ensure that your business transformation yields a secure information fortress? This presentation will share how to transform your business addressing these challenges all while achieving significant cost savings and assuring deeply integrated security.
Whether an organization is large or small, a Cyber Security framework is necessary to manage risk, ensure compliance to State, Federal, and Contractual regulations, and stay in step with new threats and emerging security best practices. CISOs must leverage a Cyber Security framework to gain credibility, heat map vulnerabilities, justify investments, and manage risk. NIST 800.53 and ISO27001/2 Cyber Security frameworks can be used to establish a baseline approach to successfully meet HITRUST, HIPAA, CJIS, Tech. Pub 1075, PCI, PII, FERC, NERC, FIPS, GLB and Executive Order 13636.
In this presentation we will explore the how IT and digitalization are transforming industries and what are some practical tools you can use to bring about this necessary change, illustrated with real life examples.
The challenges are many: budget, time, talent and opportunity. How do you staff, maintain, mentor and lead people in an IT function that strives to be industry-best. Leading an IT function is part salesperson when building a team of professionals. Sell candidates and staff on how their work and success works for both the organization and their professional growth and be part of the discussion on how we can craft a department that people want to join and has a reputation for professional satisfaction.
Network electronics have been characterized as a commodity market. However, switch selection more than price; it is tightly integrated with network protocols, OEM selection, and the architectural design. This case study presents one organization’s journey to transform its network architecture by selecting the appropriate partner.
Virtualization, hyper-convergence, mobility, and cloud services are transforming IT in organizations world-wide, but far too many companies are being left behind as they cope with rigid legacy datacenter infrastructure built upon of standalone storage. This technical session will tackle traditional workloads, deploy new scale-out applications, simply operations, reduce costs and make your datacenter infrastructure invisible by embracing these disruptive new technologies. The talk will also cover performance and availability best practices for storage, networking, and compute/virtualization for high performance databases and applications, and server workloads and explore a few examples of production deployments on HCI.
Corporate data and systems can be located anywhere: on premise, in the cloud, or on your endpoint devices. Does your business have a strategy to ensure your data and systems are available and protected no matter where they are? Modern backups and disaster recovery solutions are available to help you transform your data into a powerful asset and enable you to protect, access, and use your data and systems whenever and wherever you need them. Learn to leverage public, private, and hybrid clouds and subscription based managed services in order to create an affordable data management and disaster recovery strategy while reducing dedicated, specialized personnel for data compliance and DR testing and recovery functions.
Warm Rolls and Butter, Buffet Salads, Caesar Salad, Herbed Pasta Salad, Field Green Salad with Assorted Dressings, Roasted Pork Loin, Chicken Piccata, Medley of Fresh Vegetables, Roasted Rosemary Fingerling Potatoes, Assorted Pies and Cakes, Coffee, Decaffeinated Coffee, Tea
Many IT and non-IT organizations are like the proverbial frog in the pot of water that is ready to boil; they are not anticipating the changes taking place all around them. The purpose of our annual IT trends research is to communicate these important changes. Are we seeing the end of the CIO as we have known it? We are clearly seeing the role of the CIO and the overall IT organization experiencing a significant transformation. It is those organizations and individuals who are best prepared that will prosper in these exciting times.
An overview of the cyber threat landscape, as seen by the FBI. This presentation will touch on the threat posed by both criminal and state sponsored actors, and what the FBI does on a daily basis to investigate and counter those threats. We will discuss how the FBI stays in front of current and emerging cyber trends, and how we gather and share information with our public and private sector partners worldwide.
To be effective information security must be “owned” by everyone throughout the organization. Legacy thinking, organization structure, and company culture can be a challenge to spreading adoption of individual ownership. In many companies information security is just another regulatory compliance or “best practice” initiative lead by the CISO, auditors, or Risk Managers. At the Healthcare Association of New York State (HANYS) information security became a business imperative, essential to the life of the company. Learn the steps HANYS took to take the responsibility for information security out of the hands of individual leaders and into the hands of every employee; creating a successful, sustainable information security culture. (You’ll also learn what the title 11$wM@H! means and how it was used.)
Many of us negotiate formally and informally in the workplace on a regular basis. This can be within our teams, departments and organization, as well as, with external players. If you think about the negotiation process from the inception of the idea that a negotiation is needed, all the way through the process until its conclusion and implementation of the results, what percentage of your time do you spend in preparation? We will propose that overall we spend a lot less time than we probably should in getting ready for a negotiation that probably has a longer lasting effect than the timing of the actual interaction.
In this experiential workshop we will:
• Explore negotiation and the role of preparation in the process
• Introduce Neptune software as a tool that supports negotiation preparation
• Examine a case study application
• Provide an opportunity for participants to apply some of what is being covered
As physical computing environments have become virtualized, more opportunities for cloud services have evolved. Ensure business continuity, lower costs, and meet compliance goals with tight RTO’s and RPO’s. Matthew Chesterton, CEO of OffsiteDataSync, will discuss cloud solutions for your IT infrastructure.
Security incidents and data breaches are becoming common events for companies in all industries. These companies (and governments) have invested millions in technology and top-notch security professionals, yet their companies are breached. We will explore one of the largest exposures to all organizations: People.
People are trained to perform their jobs in technology, accounting, sales, etc. but lack the basic knowledge of how to protect company data from being exposed. You can’t assume that everyone knows the rules, cautions and dangers. Hackers are getting better and better at disguising their methods, it’s not always obvious.
Security awareness is a critical issue for all organizations that depend upon Information Technology (which covers pretty much everyone).
In this session, we will discuss the importance of exposing everyone in the organization to security awareness and risks. Practical solutions for promoting day-to-day security awareness for general users, and conducting more specific training for staff with greater security responsibilities will be discussed.
Disruption is defined on Vocabulary.com as a major disturbance, something that changes your plans or interrupts some event or process.
Disruptive Technology is one that significantly alters the way that a business operates or a government delivers services. Examples of disruptive technologies and innovations include the PC, the Internet (World Wide Web), email, digitized music, movies, books, pictures (i.e. content), eCommerce, Mobile Internet (Smartphones and cell/wifi), social networking, Internet of Things (IoT) -- including sensors and wearables, Cloud (computing, XAAS, always on devices). All of these technologies/innovations have in some way altered or even replaced/created entire industries.
In this session, you will hear many examples of disruption and how it’s impact on People, Processes and Technology, as well as how to lead your way through it.
In this session, we will cover some of the critical points to consider when moving from a legacy, physical datacenter to a virtualized one when looking through the lens of backups. And then how the role of backups in a virtualized world play into a Disaster Recovery strategy.
You have a large amount of data, with personal information, but you want to use that data for learning, for data analytics, or mining. You're careful, and you deidentify your data, so there's no way a third party could find the information for any individual, right? This talk looks at the issue of reverse anonymization, using examples from search, Netflix and social media, to illustrate the problems of anonymity in large data sets.
Our closing keynote speaker is Jack Barsky, a man with an incredible career, part of which was featured this past year on the CBS series 60 Minutes.
Jack was a chemistry professor in Germany before he joined the KGB and led a ten-year undercover existence in the United States. In this country Jack worked as a bike messenger, computer programmer, IT manager and IT executive. For 15 years he was a trusted source for the FBI.
During his thirty years in Information Technology, Jack used the professional curiosity of a spy as well as the analytical skills of a scientist to derive observation about the essence of corporate life, particularly as it relates to the field of information technology.
In addition to some tidbits from his soon to be published book (Working Title is “Deep Undercover”) Jack will share some of those observations.
His overview of the issues in Information Technology is eclectic and will cover subjects such as
- How would you expect a spy to penetrate a target today
- Security vs. Compliance
- We all lie – how do we deal with that fundamental truth
- Mergers – the us against them syndrome
- Secrets of success (and failure) in one’s career
- What does the KGB and the Corporation have in common – the law of big organizations
- Decisions under pressure
- Perception is NOT reality but it is often stronger than reality
- The essence of leadership
When a spy is finally unencumbered to tell the unvarnished truth it will get interesting. Jack will make you think, so join us and get ready for the power of “aha”!
Enjoy this complimentary cocktail reception featuring an open bar, hors d’oeuvres and conversation. Make this an important element of your attendance to the Summit. The ability to network and collaborate with your peers in an open and no-hype environment will prove to provide long lasting value to your key business initiatives moving forward.
Event VenueDirections & Information Below
189 Wolf Road • Albany, NY 12205 • ph. 517-458-8444