Advertisement
*

This is an archived conference page.
View Fusion 2014 information →

2005 Agenda

Wednesday, March 2, 2005

7:00 – 7:55 am

Breakfast

8:15 – 8:55 am

IT-Driven Productivity Growth: Macro Consequences and Micro Causes

  • Paul Shain, COO and President, Berbee Information Networks
  • Michael Knetter, Dean, UW-Madison School of Business

From an economics perspective, Dean Knetter discusses the significance of the IT revolution for U.S. macroeconomic performance over the last decade and the prospects for continued productivity growth from IT advances and implementation. He will also discuss the microeconomic environment required for IT to deliver full benefits at the level of firms and government agencies

8:55 – 9:25 am

Business Technology Leadership

  • Stan Gibson, Executive Editor, eWEEk magazine

Emerging from the dot com boom and bust cycle, CIOs faced several years of tight budgets and skepticism regarding the value of information technology. Now, CIOs face tasks that are far less glamorous than they enjoyed just a few years ago: They must secure their enterprises against attacks, viruses, spam and adware; and they must build the infrastructure to assist their companies in complying with a host of new regulations such as Sarbanes-Oxley.
CEOs must understand that this work, although unglamorous, is essential to their business. On top of these necessary supporting tasks, CIOs should be looking to apply new technologies once again in a focused manner that can demonstrate clear return on investment. CIOs and CEOs must reach the understanding that corporate IT resources can be strategic—not merely a cost center—once again.

Key points:

  1. What are some best practices for fighting spam, viruses, attacks and adware?
  2. What are some best practices for engineering compliance with Sarbanes-Oxley?
  3. What are some new technologies that merit investment at this time?
  4. What do CIOs and CEOs need to understand about each other to have a productive relationship today?

10:30 – 10:55 am

Networking and Refreshment Break

10:55 – 12:15 am

Prevention and Response: Legal and Regulatory Perspectives of Information Security

  • Mark McLane, CEO, NameProtect
  • Frank Ace, CIO, Department of Justice
  • Senator Ted Kanavas
  • Daniel J. Vaccaro, Partner, Michael Best & Friedrich LLP
  • John C. Thomure, Jr., Partner, Michael Best & Friedrich LLP
  • David Matthews, Special Agent, WI Dept of Justice

Organizations face increasing challenges to prevent cyber-attacks, identity theft, and the misappropriation of confidential information. Learn what technologies are available to reduce your risk of attack. If attacked, learn what issues a business must consider in formulating a response and what legal remedies may be available to pursue the attackers. Learn what your state government is doing to address these issues.

11:20 – 12:30 pm

Information assets and liabilities: Minimizing Risks

  • Geoffrey Morgan, Attorney, Michael Best & Friedrich
  • John Thomure, Jr., Attorney, Michael Best & Friedrich LLP
  • Paul Benson, Attorney, Michael Best & Friedrich
  • Ron Kral, CEO, Candela Solutions

The Legal Pitfalls Associated with Document Retention and Destruction Policies
This segment provides the latest account of what organizations must do to manage information in a climate when businesses are being sanctioned by the courts for negligent care and/or intentional destruction of information relevant in litigation. The recent case involving a federal court’s sanctioning of Morgan Stanley and its lawyers and other examples provide a powerful incentive for organizations to implement programs, policies and procedures to manage information to avoid trouble whether in litigation or not.

Managing Risk in the Age of Information Misappropriation by Insiders: The Importance of Internal Investigations
This presentation discusses the increasing problem of misappropriation of confidential information by insiders (employees) and provides essential techniques to help management reduce the risk of loss and what to do when an act of misappropriation happens.

12:30 – 1:30 pm

Lunch

1:30 – 2:10 pm

CIO Perspective – Annie Stunden: “What Keeps Me Up At Night”

  • Annie Stunden, CIO: UW-Madison, Director: Division of Information Technology (DoIT)

Security, integration and effective IT decisions make a hard pillow to sleep on. And they’re a just a few of the things a CIO has to worry about in the modern world of always-on, high-demand operations and support while continuing to provide a very effective and contemporary information technology environment. Hear from the CIO of the University of Wisconsin-Madison about some of the challenges of providing an IT infrastructure and IT services worthy of this world-class research university.

Key points:

  1. The challenges of providing network, server, and data security
  2. Building the best organization with shrinking budgets and HR constraints
  3. The conundrum of providing integrated information from diverse administrative systems (and what is this SOA thing anyway?)
  4. Taking part in building a national research infrastructure
  5. Open source adoption – do the benefits outweigh the risks?

2:15 – 3:20 pm

Disaster Planning, Emergency Enterprise Planning and Continuity of Operations

  • Dennis Klinger, Vice President and Chief Information Officer, Florida Power and Light
  • Gina Frank-Reece, Deputy Secretary, Wisconsin Dept. of Administration
  • Brian Jones, Director of App Hosting & Continuity Planning, CUNA Mutual Group
  • David Alvarado, Vice President of Storage Management, CA

When response to natural disasters, terrorist attacks, computer viruses or hacks needs to reach beyond just your headquarters – are you ready? Learn from the CIO of Florida Power & Light about preparation, restoration, management tools and public/customer communications. Following his presentation you will learn more about The State of Wisconsin’s Enterprise Emergency Management Plan from Gina Frank-Reece, deputy secretary of the Department of Administration, and then leaders from a bank, insurance, and telecommunications company will answer your questions about this timely and mission-critical subject.

Key points:

  1. Allocating time, resources and money for planning
  2. Developing a command infrastructure
  3. Executive and Board Awareness and Involvement

3:20 – 3:45 pm

Networking and Refreshment Break

3:45 – 5:00 pm

How Do You Remain a Credible CIO?

  • Stefanie McCann, Editor at Large, CIO Decisions
  • Leslie Hearn, CIO, TDS Telecom
  • David Cagigal, CITO, Alliant Energy
  • Denise Webb, CIO, Dept. of Health and Family Services
  • Sue Peterson, Sr. Director of IT, Sargento Foods, Inc.
  • Bernard Gay, VP of IT, Royal Caribbean International

Running a reliable and successful IT shop is one of the key components for a CIO to become credible in their organization, but there are many other factors that secure their success and help them to be a key player in determining their company’s competitive edge. In this session, Stefanie McCann, Editor at Large of CIO Decisions will interview CIOs from various industries, sharing their tips on how they remain vital executives in their organizations.

They address issues such as:

  1. Are you more believable with operational experience or MBA training?
  2. How do you remain trustworthy after a project is delivered over budget or late?
  3. How important is an IT governance model when proving your success as an equal C-level executive?
  4. How do you communicate with other C-level executives so they see you as a business leader and not the “technology guy?”

5:00 – 6:00 pm

Closing Receoption

WTN Media Presents