Sessions / Descriptions for 2017 ITPS

Resilient Leadership: Prepare Today To Prevail Tomorrow

Gen. Russel Honoré

From global and domestic terrorist threats to natural disasters, we encounter new risks to our individual, community and economic security each day. And while we can’t predict what’s around the corner, we can prepare—because when faced with seemingly insurmountable challenges, it is strong leadership guided by clarity of purpose and practical tactics for overcoming adversities that drive us to prevail—better prepared and more resilient.

Enter Gen. Russel Honoré, who expertly connects his 3+ decades of military leadership—including his crucial role in managing New Orleans’ relief efforts post Hurricane Katrina—to the natural disasters and man-made tragedies dominating global headlines to reveal critical strategies for transforming individuals into leaders and helping organizations and communities effectively prepare, react, rebound and unify.

Cyber Security: A Live Hack of a Virtual Environment – Are you Protected?

Vinny Troia

When NSA's digital armory was leaked, it was only a matter of time before the code was morphed into a ransom seeking worm. What do these tools mean for the average user? How can they protect themselves? This talk aims to educate the viewer on understanding their adversary by demonstrating a LIVE HACK of a virtual environment, to show the ease in which any average user can leverage these tools and infiltrate a fully secure network, and will provide users with a better understanding of how they can secure their company systems against these and future attacks.

Current State of the global cyber security industry

o Understanding the modern adversary

· Understanding the recent global Malware outbreaks

o how they started, where they came from, and how they are evolving

· Live Hacking demonstration

o From downloading freely available tools all the way through compromising a fully patched network

· Ways to protect your organization.

o Overview of security control frameworks

· The Cybersecurity Framework

· General security awareness principles and ways to keep yourself safe

Meaningful SLAs for Cloud Deals

John Gonzalez and Elgin Ward

As your company does more and more Cloud deals, is it buying Software? No! Hardware? No! What then? If all goes well (and that may be a big “if”), the Customer gets its Data back in usable form at the end of a Cloud deal. Until then, what does the Customer actually get? Service Levels – that’s it! Whether SaaS, Platform as a Service or Infrastructure as a Service, the Customer of Cloud Services is buying Service Levels. If the SLAs are poor or non-existent, or if they are not backed up by appropriate, enforceable remedies, the Customer will pay a lot of money without getting its requirements met. Having Meaningful SLAs is an absolute MUST for a successful Cloud Deal!

For meaningful SLAs, a Customer must have no less than:

· Clear, detailed, results-based requirements

· The right number and type of SLAs focused on those requirements

· Remedies that focus Provider attention laser-sharp on specific outcomes

· Remedies crafted to change behavior of the Provider to ensure the desired results

In this Class each attendee will experience the creation and benefits of such meaningful SLAs.

Mergers, Acquisitions, & Reorganizations –

a winning strategy for all Companies, Nonprofits, & Governments

John Gonzalez and Elgin Ward

Whether you work for local, state, or the federal government, or for a profit or nonprofit corporation, large or small, your employer has likely already been involved in one or more reorganizations, mergers, or divestitures. More importantly, it is almost certain that additional reorganizations, mergers or acquisitions are on their way and will be part of your near-term future. Why do Vendors of Software and Cloud Services look forward to such reorganizations with so much anticipation? The reorganization, merger, divestiture or acquisition of an unprepared Customer is a major, money-making, bonanza for the Vendors! The unanticipated spike in the need to purchase or re-purchase Software Licenses and Cloud Services can be financially crippling for the unprepared Customer. Skillful preparation before and knowledgeable negotiations during such reorganizations can literally save millions of dollars and can spare the Customer a massive loss of time. What does your organization need to do now to prepare for the coming reorganization? Or, if already in the throws of such changes, what strategies will save the Customer the most money and time?

In this Class, participants will come away with winning strategies like:

· Structuring Software Licenses and Cloud Services for increased transferability

· Wording contracts to maximize Customer rights to use Software and Cloud Services

· Avoiding the need to buy additional Software Licenses in reorganization situations

· Getting prior permission and commitment for transition support in mergers or acquisitions

· Addressing confidentiality issues in advance to allow for reorganizational activities

· Building negotiation leverage internally and with Vendors for upcoming reorganizations

This Class will help attendees prepare themselves and their organizations for the big changes that are coming!

The Neuroscience of Better Negotiations

Jonathan Jordan

In this workshop, presented by a member of the prestigious Society for Neuroscience, you will discover simple but proven brain-based methods to greatly enhance your negotiation skills and outcomes. You will receive strategies and techniques to significantly improve your brain’s performance and learn how to influence the brains of others to get the results you really want.

In this workshop you will discover:

· The Two Brain Circuits That Most Influence Negotiations

· What to Do When You First Meet the Other Party

· How to Quickly Boost Your Brain Before a Negotiation

· Body Language That’s Good for Brains and Negotiations

· How to Lead and Not Be Led

The Supplier's View of the Procurement Process

Michael Zazaian

National Education Association

An overview of the business cycle and negotiation process from the Supplier's perspective. As I was the Director of Contracts at Oracle Software for five years, supporting the Sales team, I know first-hand what the strategy and tactics are!

Key benefit will be:

Help the IT Purchasing Professional prepare for negotiations and achieve the best deal possible by understanding the thought process, tactics, and approach of the sellers.

Litigation and Pre-Litigation Strategies for Resolving Vendor Disputes

Dylan Steinberg

Hangley Aronchick Segal Pudlin & Schiller

This session will discuss approaches to navigating and resolving disputes that may arise with vendors. It will focus on steps to take immediately when a dispute arises, how to work with in-house legal and outside counsel, and particular contractual provisions that may be important in addressing the dispute. Particular attention will be paid to how to maintain negotiating leverage as the dispute progresses.

· Key steps to take as soon as a dispute arises

· Tips for managing both internal and external communications

· Key contract provisions that may affect the resolution of the dispute

· Advice for working successfully with legal counsel

The Human Side of IT Acquisitions

David Adler

Adler Law Group

A well-executed IT procurement strategy will invariably include acquisition of human talent. Learn legal tips and tricks affecting everything from onboarding and credentialing employees and consultants, to protecting confidential information and securing ownership of work product and innovations, to preventing exiting employees from poaching customers, vendors and coworkers.

· New state and federal laws to protect trade secrets

· Current trends in contract and intellectual property law enforcement

· Key legal risks and “gotcha’s” in IT employment contracts

· Best practices to develop enforceable policies and guidelines in these areas

Can't We All Get Along: Understanding The Tech Company Perspective

Leonard Ferber

Katten Muchin Rosenman LLP

Too many negotiations over IT contracts get bogged down in large measure because the tech vendors and their prospective customers fail to fully understand each other concerns, motivations and constraints. This session will explore the tech company perspective in IT contracts in an attempt to find more paths to compromise and quicker deal closings.

· Learn the primary business concerns that drive vendor behavior

· Understand the vendor perspective in key contract terms

· Find appropriate compromises in "allocation of risk" provisions

· Explore some of the “wording games” vendors play

· Learn how to streamline negotiations to reach agreement faster

Tiered Vendor Engagement Model

Allyson Walter

Mosaic

In today's day of technology, will IT contracting jump on this "digital highway"? Blockchains could become the norm for data records sooner than we think. Blockchain technology could be added to Smart Contracts as more secure way to manage our contracts. Learn what Blockchain is and how it could impact the contracting world.

· Not all vendors should be treated the same

· Tier your vendor classifications to enrich vendor engagements

· Value is a two way street

· Formal reviews often yield optimization opportunities

Measuring Your Contracting Process for Success

Ivie Lilly

Liberty University

Learn business process re-engineering principles to apply to your procurement processes. Build SLAs for your supported business units by completing time tracking and task duration information. Use reporting to support employee reviews and requests for additional staffing, Use views, filters, and canned reports from an IT service management system to focus your efforts in the right places to provide the best service. Track business value for contract reviews in the ITIL framework (Supplier Management).

· Learn business process re-engineering principles to apply to your procurement processes.

· Build SLAs for your supported business units by completing time tracking and task duration information. Use reporting to support employee reviews and requests for additional staffing,

· Use views, filters, and canned reports from an IT service management system to focus your efforts in the right places to provide the best service.

· Track business value for contract reviews in the ITIL framework (Supplier Management).

Negotiating Enterprise Agreements with Microsoft

Robert Scott

Scott & Scott, LLP

As Microsoft and other major vendors emphasize their cloud offerings, the legal issues in enterprise agreements have shifted dramatically. The key issues in modern enterprise agreements are driven by privacy, security and regulatory compliance. Robert J. Scott will discuss traditional and newly developed Microsoft licensing models, principal concerns about current licensing models, types of license agreements, and primary causes of exposure in enterprise-level Microsoft software audits. Robert will explain how he helps clients define their requirements up front, builds term sheets for negotiation, and how he approaches negotiating the key issues in Enterprise deals with Microsoft’s legal and business teams.

· Learn about Microsoft Licensing Models

· See Different Agreement Types

· Get Key Legal Issues

· Understand Regulatory Compliance

Vulnerability Management is NOT Dead (Despite our Best Efforts to Kill It)

Nathan Wenzler

AsTech Consulting

Whether it's for network infrastructure devices, servers, workstations or applications, Vulnerability Management is a key component to a successful security program. We’ll highlight issues that lead companies to ignore their VM programs and provide real-world examples and case studies to resurrect one of the best tools in your security arsenal.

· Why companies shouldn't let their Vulnerability Management (VM) programs become ineffective

· Highlight the issues that lead companies to ignore their VM programs

· Provide real-world examples and case studies of solutions companies can use

· Outline steps to implement a successful VM program

Business Need for Speed: Building a Global Culture of Innovation

Stefana Saxton

Learn how Business Excellence (BEx) combines disciplined innovation methods with elements of venture capitalism, crowdsourcing and collaborative leadership to deliver rapid and sustainable business improvements and innovations in any industry.

· Key Points

· Understanding the keys to success by incorporating innovation, collaboration and leadership in your work life.

· Learn how to drive more effective and sustainable change.

Cloud Computing Contracts: Six Common Mistakes

David Tollen

Sycamore Legal, P.C.

This program will explore how to draft and negotiate software-as-a-service (SaaS) and other cloud computing agreements. It will explain the difference between software licensing and cloud computing contracts and focus on six central clauses contract-drafters tend to misunderstand: • Effective date vs. go-live: start dates for maintenance and other services • IP indemnities and their deadly exceptions • Data breach indemnities (and related confusion) • Data security clauses (which does not involve NDA's) • SaaS escrows • The central role of specifications

· Cloud computing agreements do not involve copyright licenses.

· SaaS escrows are generally useless.

· Indemnities are often misdrafted, rendering them close to useless.

· The exceptions to IP indemnities are confusing and, if mishandled, can cost the customer protection.

· Data security clauses are entirely separate from NDA's, and using one for the other is a mistake.

Blockchain - Is it right for your Organization?

Tamra Pawloski

Chubb Group

In today's day of technology, will IT contracting jump on this "digital highway"? Blockchains could become the norm for data records sooner than we think. Blockchain technology could be added to Smart Contracts as more secure way to manage our contracts. Learn what Blockchain is and how it could impact the contracting world.

Need take-away bullets

Demystify Oracle Licensing and Optimize Spend

Scott Bickley

Info-Tech Research Group

Oracle’s multiple contract types, informal policies regarding acceptable license usage, and rigid and complex support policies make understanding Oracle licensing incredibly difficult. Don’t be one of the many organizations that are found noncompliant – take a proactive approach to mitigate risk.

· Understanding of Oracle's business model and where there is flexibility

· Key tenets of Oracle's software licensing model and how to effectively navigate compliance issues

· Learn how to negotiate with Oracle to obtain the best price and contract terms

· Key issues to consider for ongoing management of the Oracle estate

Truly understanding "or equal" and Technology Value

Carrie Goetz

This presentation will help procurement officers identify and manage the legal risks associated with the Internet of Things (IoT). As companies deploy IoT service offerings, the purchase of IoT components (such as software, hardware and services) and integration of those components into an IoT offering raise significant legal issues. Among these are issues related to IP ownership, data privacy and security and product liability. Attendees of this session will receive a check-list of legal items to consider when negotiating transactions for IoT offerings.

· Identify unique risks arising from IoT procurements deals.

· Understand the legal relationship among multiple vendors in an IoT ecosystem.

· Learn the priority of use rights in data gathered by multiple parties in an IoT network.

· Receive a checklist of legal considerations for negotiating an IoT procurement deal.