Become a CIO Summit Sponsor

If you’re interested in becoming a sponsor of the leading summits for top CIOs across multiple industry verticals, the Strategic Business Summits Group CIO Summits are the platform you’ve been searching for that will provide more than just basic event sponsorship. You’ll have pre-determined one-on-one meetings with technology leaders in your selected vertical(s) throughout three day summits with various opportunities for business networking and dynamic discussions with industry analysts, CIOs and more.

Name
Title
Company
Mailing Address
Email
Phone
Comments
Please select events of interest to learn more about upcoming sponsorship opportunities.
United States
CIO Chicago Roundtable Dinner By Equinix CIO Roundtable Dinner New Jersey By OpenText
CIO San Francisco Roundtable Dinner By OpenText CIO Manufacturing Roundtable Dinner
CIO Chicago Roundtable Dinner By Cloud Craze CXO Think Tank Seattle
CIO San Francisco Roundtable Dinner by Cloud Craze CISO Roundtable Dinner DC By Tenable
CIO Midmarket Roundtable Dinner CISO Digital Transformation Roundtable Dinner
CIO Digital Transformation Summit US East Seattle Mobility Think Tank
CIO Think Tank Dallas By IBM Boston Mobility Think Tank
Charlotte Mobility Think Tank Houston Mobility Think Tank
CISO Retail Roundtable Dinner CISO New York Roundtable Dinner
Blockchain Summit CIO Retail Roundtable Dinner
CISO Manufacturing Roundtable Dinner NYC Mobility Think Tank
Philadelphia Mobility Think Tank CIO Indianapolis Summit
CISO Indianapolis Summit CIO Indianapolis Roundtable Dinner
CISO Indianapolis Roundtable Dinner CIO Philadelphia Think Tank by IBM
CIO Seattle Think Tank by IBM CIO Boston Think Tank by IBM
CISO New Jersey Summit CIO New Jersey Roundtable Dinner
CISO New Jersey Roundtable Dinner CIO New Jersey Summit
CISO Chicago Roundtable Dinner CIO Detroit Thinktank by IBM
Supply Chain Think Tank Chicago by IBM CISO BFSI Roundtable Dinner
CIO Scottsdale Roundtable Dinner CISO Scottsdale Roundtable Dinner
CIO Scottsdale Roundtable Dinner CISO Scottsdale Roundtable Dinner
CIO Atlanta Roundtable Dinner CISO Atlanta Roundtable Dinner
CIO Chicago Roundtable Dinner by Hexaware CIO Portland Roundtable Dinner by Comcast
CIO Los Angeles Think Tank by IBM CISO New York Roundtable Dinner by Dtex
CISO New York Round Table Dinner By IBM CIO Finance Summit
CISO Digital Transformation Summit US East CISO Roundtable Dinner by DigiCert
CIO Roundtable Dinner by Vertica CIO Insurance Roundtable Dinner
CISO BFSI Roundtable Dinner by Illumio CIO Finance Roundtable Dinner
CIO Mexico Roundtable Dinner CIO Houston Roundtable Dinner by Micro Focus
CIO Toronto Think Tank by IBM CIO Boston Roundtable Dinner by Micro Focus
CIO Raleigh Roundtable Dinner by Micro Focus CIO New York Roundtable Dinner by Solstice
CIO Washington D.C. Roundtable Dinner by Micro Focus CISO Roundtable Dinner Dallas
CIO New York Roundtable Dinner CIO New York Summit
CISO New York Roundtable Dinner by Imperva CISO Chicago Roundtable Dinner by RSA
CISO Minneapolis Roundtable Dinner by Imperva CIO Insurance Summit
US AI Summit CISO Roundtable Dinner Public Sector
CIO Public Sector Summit CISO Public Sector Summit
CIO Public Sector Roundtable Dinner CIO Austin Roundtable Dinner by GitHub
CISO Roundtable Dinner DC by Thales CIO Dallas Roundtable Dinner
CIO Roundtable Dinner Houston CIO Orlando Healthcare Roundtable Dinner by HPE
CIO LA Healthcare Roundtable Dinner by HPE CIO San Francisco Healthcare Roundtable Dinner by HPE
CISO Washington DC Summit CISO Digital Boardroom: Business Continuity In The New Normal
CISO Digital Boardroom: Securing Your Journey to the Hybrid Multi-Cloud – From Patchwork to Platform CISO Digital Boardroom: Combating Business Email Compromise
CIO Digital Boardroom: How to expand into Asia in a post-pandemic economy? CISO Digital Boardroom: Reducing the Risks of Private Data – Moving from Data Compliance to Data Security
CISO Digital Boardroom: Securing Your Journey to the Hybrid Multi-Cloud – From Patchwork to Platform CISO Digital Boardroom: The Must-Haves Of Data Protection
CISO Digital Boardroom: The Must-Haves Of Data Protection CIO Digital Boardroom: Defining IT as a Foundation for Growth and Innovation
CISO Digital Boardroom: The Must-Haves Of Data Protection Optiv and Palo Alto Networks: The 2020 Cyber Calling of Every Enterprise - Retrospective Management of Rapid Change
CIO Manufacturing Summit CISO Manufacturing Summit
CIO Healthcare Roundtable Dinner CISO Digital Boardroom: The Must-Haves Of Data Protection
CISO Digital Boardroom: The Must-Haves Of Data Protection CIO Webinar: The New Normal of IT Support: How AI is Transforming the Work-From-Home Enterprise
CIO Digital Boardroom: Choice of Clouds at Exabyte Scale Top Cybersecurity Challenges Facing Enterprise CISOs - Today and Beyond
CISO Digital Boardroom: Third-Party Risk Top Cybersecurity Challenges Facing Federal CISOs - Today and Beyond
Igrafx: CIO Digital Boardroom Elevate your AppSec Program: How to Get the Board on Board
IBM Cloud: The Age of Digital Transformation: Scaling the Value of Data and Accelerating the Journey to AI IBM Cloud: The Age of Digital Transformation: Scaling the Value of Data and Accelerating the Journey to AI
CISO Digital Boardroom: Stop Buying Security Products: Improve Your Security Posture Using What You Have, Better CISO Digital Boardroom by Blackberry
The Journey to a Multi-Cloud World CISO Digital Boardroom by Blackberry
Maintain Security, Compliance and Control for VMware Regulated Workloads in the World’s First Public Cloud for Financial Service Digital Transformation and the Cloudification of The Enterprise
Why Operational Excellence Leads to Better Customer Journeys CIO Carolinas Summit
CISO Carolinas Summit Securing 2021and Beyond- Preparing For What Lies Ahead
Using Data Strategy to Guide Your Cloud Business Transformation Securing 2021 and Beyond- Preparing For What Lies Ahead
Trusted Computing Over Untrusted Networks Why cloud data visibility and risk assessment is critical to the Energy Sector digitization
Architecting a Resilient Financial Services Digital Enterprise Cybersecurity in healthcare and the impact on compliance
Transform to an SRE Operating Model With AIOps Securing Your Journey to the Hybrid Multi-Cloud
Cybersecurity in healthcare and the impact on compliance Financial Services, Digital Transformation and Data Security in the Cloud
Rethinking Digital Transformation: A CIO Summit presented by Red Hat Planning Your IAM Future in the Cloud
Increase Speed and Accuracy of Onboarding Third-Party Non-employees While Reducing Risk Digital Transformation and securing data in the cloud
Digital Transformation and securing data in the cloud How do you speed up Business & IT Transformation?
Why cloud data visibility and risk assessment is critical to your organization's digitization CIO Illinois and Ohio Summit
CISO Illinois and Ohio Summit Third Party Identity Management - Bring "employee rigor" to Non-employees
Securing Your Journey to the Hybrid Multi-Cloud 2020 Mobility Trends - 5G's Role in the "New Normal"
Digital Transformation and Data Security in the Cloud Why organizational resilience depends on an integrated security architecture to reduce risk and dwell time.
Digital Transformation and Securing Data in the Cloud 2020 Workforce Mobility Trends - 5G's Role in the "New Normal"
Financial Services, Digital Transformation and Data Security in the Cloud Working from Anywhere - 2021: What to Expect
Modernize the mainframe application environment to drive digital transformation and integrate into the Cloud Cybersecurity in healthcare and the impact on compliance
CISO V-Summit - Achieve Cyber Resilience - sponsored by Capgemini for companies in the Financial Services Sector CISO V-Summit - Achieve Cyber Resilience - sponsored by Capgemini for companies in the Energy, Chemical and Critical Infrastructure Sector
What's Your Insider Risk Incident Response Plan? Trusted Computing Over Untrusted Networks (Pharma CISO)
Digital Transformation and securing data in the cloud CIO Digital Transformation Summit
CISO Digital Transformation Summit Overcoming Operational Challenges and Future-Proofing Your Organization with Automation and AI
Transformation of Financial Services Planning Your IAM Future in the Cloud
Improve the Operational Efficiency and Cut the Cost and Risk of Granting Access to Your Supply Chain Next-Gen Extortion and Ransomware
CIO California Summit Top Cybersecurity Challenges Facing Enterprise CISOs - 2020 and Beyond
CIO Pittsburgh Summit CISO Pittsburgh Summit
CIO Philadelphia Summit CIO New York Summit
CISO New York Summit CISO V-Summit - Achieve Cyber Resilience - sponsored by Capgemini for executive cyber security management
CISO V-Summit - Achieve Cyber Resilience - sponsored by Capgemini for executive cyber security management Digital Identity Experiences Today 
Advanced Security and Resilience in Healthcare: How Can the Ransomware Wave be Stopped? Defining the Modern Cyber Security Architecture
Cloud Strategies to Power Digital Transformation Best Practices for Automating and Integrating Application Security Testing into DevOps
Navigating Your Cloud Journey - Achieve Digital Transformation. Secure Your Infrastructure. CIO/CISO Financial Services Boardroom on Identity Strategy and Faster Innovation
Best Practices for Automating and Integrating Application Security Testing into DevOps Modernizing Product Security in a DevOps World
The Future of Retail #BeyondCOVID Using Data Strategy to Guide Your Cloud Business Transformation
Trusting the hybrid cloud. Before you use it, or how to regain control Cloud Strategies to Power Digital Transformation
IT Innovation: New Rules for the Future Digital Transformation and The Cloudification of Enterprise Companies
The Journey to a Multi-Cloud World Best Practices for Automating and Integrating Application Security Testing into DevOps
Business is booming - Scale your customer service, not your team, with chatbots & messaging Business is booming - Scale your customer service, not your team, with chatbots & messaging
Advancing Security and Resilience in the US Public Sector: Cloud to the Rescue? Next-Gen Extortion and Ransomware
Make the Cloud Work Like a High Performance Data Center Improve the Operational Efficiency and Cut the Cost and Risk of Granting Access to Your Supply Chain
CISO Southeast US Summit CIO Healthcare Digital Boardroom by IBM
CIO Southeast US Summit Accelerate your journey to AI
Cloud Strategies to Power Digital Transformation AppSec: What Good Looks Like
The Change Imperative: fixing the past, creating the future with BPM (Business Process Management) CIO West Summit
CISO West Summit CIO Pacific Northwest Summit
CISO Pacific Northwest Summit Third Party Identity Management - Bring "employee rigor" to Non-employees
AppSec: What Good Looks Like Integrated Security and Resilience in Financial Services: Collaboration to stop Blended Attacks
Trusting the Hybrid Cloud Cloud Strategies to Power Digital Transformation
Maximizing the Power of Cloud-Based Apps: The Role of Event-Driven Architectures The Evolution of Threat Detection and Response
Strategies for Navigating Interoperability: Thinking Beyond the Mandate Third Party Risk: A Growing Concern
Trusting the hybrid cloud. While you use it. Phase 3 - Visibility, control and threat management Growing Third Party Risk in Healthcare
Accelerate your journey to AI Using Data Strategy to Guide Your Cloud Business Transformation
Planning Your IAM Future in the Cloud Viewing Cybersecurity with a New Lens: From Cutting Edge Prevention to Next Level Planning
At The Heart of Your Digital Transformation and Cloud Migration - Network Visibility, Analytics and Security Viewing Cybersecurity with a New Lens: From Cutting Edge Prevention to Next Level Planning
How do you speed up Business & IT Transformation? Best Practices for Automating and Integrating Application Security Testing into DevOps
Cloud & AI Summit AI Summit
AI Security Summit Understanding Cyberattack Risk in Your Organization: Time to Re-evaluate the Fundamentals?
Leveraging Nationwide 5G to support IT digital transformation, the digital divide, and a mobile workforce Reinventing Cyber Risk Quantification
Securing Your Journey to the Hybrid Multi-Cloud Aware but not prepared: Why Healthcare needs to change the field of cybersecurity.
CIO Midwest Summit CISO Midwest Summit
Reinventing Cyber Risk Quantification Global Macro Trends - Solving Digital Transformation Challenges and Preparing for the Future
Building a Better Third-Party Cyber Risk Program How 5G is Transforming Transportation Services in 2021 and Beyond
Game Changing Times - Creating Competitive Differentiation with Fast Data Securing Your Journey to the Hybrid Multi-Cloud
A Moving Target ? ?The Best? is No Longer Good Enough in Identity and Access Understanding Cyberattack Risk in Your Organization: Time to Re-evaluate the Fundamentals?
The Key Questions Every Uncommon Leader is Asking Right NOW! How is your organization positioned to manage Private Label business?
CIO Southwest US Summit Secure your Everywhere Workplace with the Zero Trust approach
CISO Southwest US Summit CIO Texas Summit
CISO Texas Summit CIO Rockies Summit
CISO Rockies Summit Technology of the Future Delivered Today
CIO Finance Summit CISO Finance Summit
CIO North East US Summit CISO North East US Summit
A Human-Centric Approach to Customer Service Identity Strikes the Balance for Seamless, Secure Digital Customer Experiences
Zero Trust: From Strategy to Reality How to Conquer Transformation and Cultural Changes in the Global Enterprise
Drive Accountability with Cyber Risk Governance Adopting Zero Trust - what's working, what isn't, and where to start
Identity Strikes the Balance for Seamless, Secure Digital Customer Experiences Planning Your IAM Future in the Cloud
Trusting the hybrid cloud. While you use it. Phase 3 - Visibility, control and threat management Minimizing Supply Chain Disruptions in Uncertain Times
Navigating Today's New Threat Landscape The event driven enterprise, and the changing role of event-driven architecture (EDA)
Adopting Zero Trust - what's working, what isn't, and where to start How AI is Shaping your Organization Today
If identity is the new perimeter what does that mean for your machines? CIO Chicago Summit
CIO Healthcare Summit CISO Healthcare Summit US
Data Observability: Analytic Solutions for Improved Data Operations and Data Governance A Human-Centric Approach to Customer Service
CISO Cloud Summit CIO Cloud Summit
Intelligent Automation and Transformation Summit CIO Global Summit
CISO Global Summit CIO Identity Management Summit
Zero Trust Summit US CIO Roundtable Dinner Washington D.C.
CISO Washington D.C. Roundtable Dinner CIO Miami Roundtable Dinner
CIO Silicon Valley Roundtable Dinner CIO Healthcare Summit
CISO Utilities Summit CIO Midmarket Summit
CISO Midmarket Summit CISO Retail Summit
CIO Utilities Summit
Canada
CISO Digital Transformation Roundtable Dinner Canada CIO Digital Transformation Roundtable Dinner Canada
CIO Digital Transformation Roundtable Dinner Canada CIO Digital Transformation Summit Canada
CISO Digital Transformation Summit - Canada CIO Toronto Roundtable Dinner by Rogers Communications
CIO Toronto Roundtable Dinner by RedHat CIO Calgary and Vancouver Summit
CISO Calgary and Vancouver Summit Rethinking Digital Transformation: A CIO Summit presented by Red Hat
Working from Anywhere - 2021: What to Expect Third Party Identity Management - Bring "employee rigor" to Non-employees
CIO Montreal Summit CISO Montreal Summit
Viewing Cybersecurity with a New Lens: From Cutting Edge Prevention to Next Level Planning Viewing Cybersecurity with a New Lens: From Cutting Edge Prevention to Next Level Planning
AI Summit AI Security Summit
CIO Canada Public Sector Summit CISO Public Sector Summit Canada
CIO Canada Summit CISO Canada Summit
Game Changing Times - Creating Competitive Differentiation with Fast Data Understanding Cyberattack Risk in Your Organization: Time to Re-evaluate the Fundamentals?
How is your organization positioned to manage Private Label business? CIO Finance Summit
CISO Finance Summit Adopting Zero Trust - what's working, what isn't, and where to start
Operationalizing cyber resilience in a risk-filled world Minimizing Supply Chain Disruptions in Uncertain Times
Adopting Zero Trust - what's working, what isn't, and where to start Data Observability: Analytic Solutions for Improved Data Operations and Data Governance
CIO Cloud Summit CISO Cloud Summit
CIO Toronto Summit CISO Toronto Summit
CIO Global Summit CISO Global Summit
Intelligent Automation and Transformation Summit Zero Trust Summit US
CIO Identity Management Summit
Latin America
CIO Brazil Summit CISO Brazil Roundtable Dinner
CIO Brazil Roundtable Dinner CISO Brazil Summit
EMEA
CIO Frankfurt Roundtable Dinner CXO Lunch London by Virtustream
CISO Europe Retail Summit CIO Retail Europe Roundtable Dinner
CISO Retail Europe Roundtable Dinner CIO Europe Retail Summit
MobileIron CISO Think Tank Madrid MobileIron CISO Think Tank Frankfurt
CISO Europe Summit CIO Europe Summit
CxO London Dinner by IBM CIO Europe BFSI Summit
CISO London Roundtable Dinner CISO BFSI Europe Roundtable Dinner
CISO BFSI Europe Roundtable Dinner CISO BFSI Summit Europe
CIO London Roundtable Dinner CISO Paris Roundtable Dinner
CISO Think Tank Stockholm by MobileIron CIO London Roundtable Dinner by Nasuni
CIO Digital Boardroom UK Unlock your Analytics Stack with automated Data Integration
CISO/CIO Digital Boardroom: Is Technology Helping Or Hurting BFSI? Fortinet: CISO Digital Boardroom
Digital Transformation, What's The Risk And Why the Urgency? Protecting Users & Data in the Everywhere Enterprise
Mobile Threats in a Remote-Access World Thousands of Apps and Thousands of Threats - How to Secure code at Enterprise Level
CISO Cloud Summit UK CIO Cloud Summit Europe
Are Workers More Productive at Home? Zero Trust Summit UK
Are Workers More Productive At Home? Are Workers More Productive At Home?
Embracing the Cloud and Driving Digital Transformation at Scale Europe AI Summit
Europe AI Security Summit Are Workers More Productive At Home?
Zero Trust Can Be For Everyone Protecting Users and Data in the Everywhere Enterprise
Digital Disruption Summit UK How Can Public Sector Organisations Regain Control of Data to Reduce Costs, Complexity and Improve Governance?
Who Accessed Your Data in the Cloud? Your Boardroom and Auditors Want to Know Wer hat alles auf Ihre Daten zugegriffen? Ihre Vorgesetzten und Auditoren würden das sicher gerne wissen.
Data Driven Modernisation, Digitisation Protecting Users & Data in the Everywhere Enterprise
Protecting Users & Data in the Everywhere Enterprise Key challenges for CIOs in 2020: Transforming through disruption
Reimagining the Corporate Network for Today's Teams The evolving security Leader and overcoming challenges to achieving effective security operations
The Public Sector Roundtable: Rethinking your cybersecurity strategy for the new world Enduring from Home: Reducing Risk for Remote Workers
Preventing Automated Attacks in 2020 CIO Nordics Summit
CISO Nordics Summit Balancing Risk and Trust for a Work-anywhere Workforce
Adopt to Change: How Digital Transformation is Changing Project Management How do you speed up Business & IT Transformation?
Public Sector data management in a complex multi-cloud world The Future of Work: Working in the Next Decade
Driving Digital Transformation with Speed, Agility, Security and Insight (Financial Services) Active Defense for the Enterprise of Things
Complete Endpoint Security: Five Critical Steps Re-Architecting the Enterprise: Why Event Streaming Changes Everything.
Beyond The Buzz Of Zero Trust: Taking Practical Steps To Security Third Party Identity Management - Bring "employee rigor" to Non-employees
CIO France Summit CISO France Summit
How To Balance DevSecOps And Human Intervention Scaling the Internal Customer Journey - From Survive to Thrive
Les Communications Unifiées au Service du Futur du Travail Vital Steps to Zero Trust in an Overly Connected World
IT Innovation: New Rules for the Future Cyber Stress - Addressing Mental Health in the Cybersecurity Industry
Scaling The Internal Customer Journey - From Survive To Thrive The Rise of DDoS Ransom Attacks
CIO Deutschland Summit CISO Deutschland Summit
Cocktails and Conversations Book Launch Event Essentials of Securing Active Directory in a Hybrid Environment
Why Operational Excellence Leads to Better Customer Journeys Avoid the Pitfalls - Why Cloud Adoptions Fail
Essentials of Securing Active Directory in a Hybrid Environment Let's talk SASE - First the Noise, Now the Reality
Secure your Everywhere Workplace with the Zero Trust approach Why Digital Business Growth Depends on Infrastructure Automation
CIO Ireland Summit CISO Ireland Summit
Identity Strikes the Balance for Seamless, Secure Digital Customer Experiences Introducing the future of the corporate network
How to Conquer Transformation and Cultural Changes in the Global Enterprise Identity Strikes the Balance for Seamless, Secure Digital Customer Experiences
CIO Iberia Summit CISO Iberia Summit
How to speed up IT & Business Transformation Data Observability: Analytic Solutions for Improved Data Operations and Data Governance
How to Address Attacks using Actionable Threat Intelligence When a good idea goes bad: scaling Microsoft 365 effortlessly
When a good idea goes bad: scaling Microsoft 365 effortlessly Scaling the Internal Customer Journey - From Survive to Thrive
Identity Strikes the Balance for Seamless, Secure Digital Customer Experiences CIO UK Summit
CISO UK Summit Intelligent Automation and Transformation UK Summit
CIO Europe Summit CISO Europe Summit
CIO and CISO Digital Boardroom by Positive Technologies CIO Nordics Summit
CISO Nordics Summit CIO DACH Summit
CISO DACH Summit CIO Benelux Summit
CISO Benelux Summit Zero Trust Summit Europe