Become a CIO Summit Sponsor

If you’re interested in becoming a sponsor of the leading summits for top CIOs across multiple industry verticals, the Strategic Business Summits Group CIO Summits are the platform you’ve been searching for that will provide more than just basic event sponsorship. You’ll have pre-determined one-on-one meetings with technology leaders in your selected vertical(s) throughout three day summits with various opportunities for business networking and dynamic discussions with industry analysts, CIOs and more.

Name
Title
Company
Mailing Address
Email
Phone
Comments
Please select events of interest to learn more about upcoming sponsorship opportunities.
United States
CIO Chicago Roundtable Dinner By Equinix CIO Roundtable Dinner New Jersey By OpenText
CIO San Francisco Roundtable Dinner By OpenText CIO Manufacturing Roundtable Dinner
CIO Chicago Roundtable Dinner By Cloud Craze CXO Think Tank Seattle
CIO San Francisco Roundtable Dinner by Cloud Craze CISO Roundtable Dinner DC By Tenable
CIO Midmarket Roundtable Dinner CISO Digital Transformation Roundtable Dinner
CIO Digital Transformation Summit US East Seattle Mobility Think Tank
CIO Think Tank Dallas By IBM Boston Mobility Think Tank
Charlotte Mobility Think Tank Houston Mobility Think Tank
CISO New York Roundtable Dinner Blockchain Summit
CIO Retail Roundtable Dinner CISO Manufacturing Roundtable Dinner
CISO Retail Roundtable Dinner NYC Mobility Think Tank
Philadelphia Mobility Think Tank CIO Indianapolis Summit
CISO Indianapolis Summit CIO Indianapolis Roundtable Dinner
CISO Indianapolis Roundtable Dinner CIO Philadelphia Think Tank by IBM
CIO Seattle Think Tank by IBM CIO Boston Think Tank by IBM
CISO New Jersey Summit CIO New Jersey Roundtable Dinner
CISO New Jersey Roundtable Dinner CIO New Jersey Summit
CISO Chicago Roundtable Dinner CIO Detroit Thinktank by IBM
Supply Chain Think Tank Chicago by IBM CISO BFSI Roundtable Dinner
CIO Scottsdale Roundtable Dinner CISO Scottsdale Roundtable Dinner
CIO Scottsdale Roundtable Dinner CISO Scottsdale Roundtable Dinner
CISO Atlanta Roundtable Dinner CIO Chicago Roundtable Dinner by Hexaware
CIO Portland Roundtable Dinner by Comcast CIO Los Angeles Think Tank by IBM
CISO New York Roundtable Dinner by Dtex CISO New York Round Table Dinner By IBM
CIO Finance Summit CISO Digital Transformation Summit US East
CIO Roundtable Dinner by Vertica CISO BFSI Roundtable Dinner by Illumio
CIO Insurance Roundtable Dinner CISO Roundtable Dinner by DigiCert
CIO Finance Roundtable Dinner CIO Mexico Roundtable Dinner
CIO Houston Roundtable Dinner by Micro Focus CIO Toronto Think Tank by IBM
CIO Boston Roundtable Dinner by Micro Focus CIO Raleigh Roundtable Dinner by Micro Focus
CIO New York Roundtable Dinner by Solstice CIO Washington D.C. Roundtable Dinner by Micro Focus
CISO Roundtable Dinner Dallas CIO New York Roundtable Dinner
CIO New York Summit CISO New York Roundtable Dinner by Imperva
CISO Chicago Roundtable Dinner by RSA CISO Minneapolis Roundtable Dinner by Imperva
CIO Insurance Summit US AI Summit
CISO Roundtable Dinner Public Sector CIO Public Sector Summit
CISO Public Sector Summit CIO Public Sector Roundtable Dinner
CIO Austin Roundtable Dinner by GitHub CISO Roundtable Dinner DC by Thales
CIO Dallas Roundtable Dinner CIO Roundtable Dinner Houston
CIO Orlando Healthcare Roundtable Dinner by HPE CIO LA Healthcare Roundtable Dinner by HPE
CIO San Francisco Healthcare Roundtable Dinner by HPE CISO Washington DC Summit
CISO Digital Boardroom: Business Continuity In The New Normal CISO Digital Boardroom: Securing Your Journey to the Hybrid Multi-Cloud – From Patchwork to Platform
CISO Digital Boardroom: Combating Business Email Compromise CISO Digital Boardroom: Reducing the Risks of Private Data – Moving from Data Compliance to Data Security
CIO Digital Boardroom: How to expand into Asia in a post-pandemic economy? CISO Digital Boardroom: Securing Your Journey to the Hybrid Multi-Cloud – From Patchwork to Platform
CISO Digital Boardroom: The Must-Haves Of Data Protection CISO Digital Boardroom: The Must-Haves Of Data Protection
CISO Digital Boardroom: The Must-Haves Of Data Protection CIO Digital Boardroom: Defining IT as a Foundation for Growth and Innovation
CIO Manufacturing Summit CISO Manufacturing Summit
Optiv and Palo Alto Networks: The 2020 Cyber Calling of Every Enterprise - Retrospective Management of Rapid Change CIO Healthcare Roundtable Dinner
CISO Digital Boardroom: The Must-Haves Of Data Protection CISO Digital Boardroom: The Must-Haves Of Data Protection
CIO Digital Boardroom: Choice of Clouds at Exabyte Scale CIO Webinar: The New Normal of IT Support: How AI is Transforming the Work-From-Home Enterprise
Top Cybersecurity Challenges Facing Enterprise CISOs - Today and Beyond CISO Digital Boardroom: Third-Party Risk
Top Cybersecurity Challenges Facing Federal CISOs - Today and Beyond Igrafx: CIO Digital Boardroom
Elevate your AppSec Program: How to Get the Board on Board IBM Cloud: The Age of Digital Transformation: Scaling the Value of Data and Accelerating the Journey to AI
IBM Cloud: The Age of Digital Transformation: Scaling the Value of Data and Accelerating the Journey to AI CISO Digital Boardroom: Stop Buying Security Products: Improve Your Security Posture Using What You Have, Better
CISO Digital Boardroom by Blackberry The Journey to a Multi-Cloud World
CISO Digital Boardroom by Blackberry Maintain Security, Compliance and Control for VMware Regulated Workloads in the World’s First Public Cloud for Financial Service
Digital Transformation and the Cloudification of The Enterprise Why Operational Excellence Leads to Better Customer Journeys
CIO Carolinas Summit CISO Carolinas Summit
Securing 2021and Beyond- Preparing For What Lies Ahead Using Data Strategy to Guide Your Cloud Business Transformation
Securing 2021 and Beyond- Preparing For What Lies Ahead Trusted Computing Over Untrusted Networks
Why cloud data visibility and risk assessment is critical to the Energy Sector digitization Cybersecurity in healthcare and the impact on compliance
Architecting a Resilient Financial Services Digital Enterprise Transform to an SRE Operating Model With AIOps
Securing Your Journey to the Hybrid Multi-Cloud Cybersecurity in healthcare and the impact on compliance
Financial Services, Digital Transformation and Data Security in the Cloud Rethinking Digital Transformation: A CIO Summit presented by Red Hat
Increase Speed and Accuracy of Onboarding Third-Party Non-employees While Reducing Risk Digital Transformation and securing data in the cloud
Planning Your IAM Future in the Cloud Digital Transformation and securing data in the cloud
How do you speed up Business & IT Transformation? Why cloud data visibility and risk assessment is critical to your organization's digitization
CIO Illinois and Ohio Summit CISO Illinois and Ohio Summit
Third Party Identity Management - Bring "employee rigor" to Non-employees Securing Your Journey to the Hybrid Multi-Cloud
2020 Mobility Trends - 5G's Role in the "New Normal" Digital Transformation and Data Security in the Cloud
Why organizational resilience depends on an integrated security architecture to reduce risk and dwell time. Digital Transformation and Securing Data in the Cloud
2020 Workforce Mobility Trends - 5G's Role in the "New Normal" Modernize the mainframe application environment to drive digital transformation and integrate into the Cloud
Working from Anywhere - 2021: What to Expect Financial Services, Digital Transformation and Data Security in the Cloud
Cybersecurity in healthcare and the impact on compliance CISO V-Summit - Achieve Cyber Resilience - sponsored by Capgemini for companies in the Financial Services Sector
CISO V-Summit - Achieve Cyber Resilience - sponsored by Capgemini for companies in the Energy, Chemical and Critical Infrastructure Sector What's Your Insider Risk Incident Response Plan?
Trusted Computing Over Untrusted Networks (Pharma CISO) Digital Transformation and securing data in the cloud
CIO Digital Transformation Summit CISO Digital Transformation Summit
Transformation of Financial Services Overcoming Operational Challenges and Future-Proofing Your Organization with Automation and AI
Planning Your IAM Future in the Cloud Improve the Operational Efficiency and Cut the Cost and Risk of Granting Access to Your Supply Chain
Next-Gen Extortion and Ransomware CIO California Summit
Top Cybersecurity Challenges Facing Enterprise CISOs - 2020 and Beyond CIO Pittsburgh Summit
CISO Pittsburgh Summit CIO Philadelphia Summit
CISO V-Summit - Achieve Cyber Resilience - sponsored by Capgemini for executive cyber security management CISO V-Summit - Achieve Cyber Resilience - sponsored by Capgemini for executive cyber security management
Advanced Security and Resilience in Healthcare: How Can the Ransomware Wave be Stopped? Digital Identity Experiences Today 
Defining the Modern Cyber Security Architecture Cloud Strategies to Power Digital Transformation
Best Practices for Automating and Integrating Application Security Testing into DevOps Navigating Your Cloud Journey - Achieve Digital Transformation. Secure Your Infrastructure.
CIO/CISO Financial Services Boardroom on Identity Strategy and Faster Innovation Best Practices for Automating and Integrating Application Security Testing into DevOps
Modernizing Product Security in a DevOps World The Future of Retail #BeyondCOVID
Using Data Strategy to Guide Your Cloud Business Transformation Trusting the hybrid cloud. Before you use it, or how to regain control
IT Innovation: New Rules for the Future Cloud Strategies to Power Digital Transformation
Digital Transformation and The Cloudification of Enterprise Companies The Journey to a Multi-Cloud World
Best Practices for Automating and Integrating Application Security Testing into DevOps Business is booming - Scale your customer service, not your team, with chatbots & messaging
Business is booming - Scale your customer service, not your team, with chatbots & messaging Advancing Security and Resilience in the US Public Sector: Cloud to the Rescue?
Next-Gen Extortion and Ransomware Make the Cloud Work Like a High Performance Data Center
Improve the Operational Efficiency and Cut the Cost and Risk of Granting Access to Your Supply Chain CIO Healthcare Digital Boardroom by IBM
CIO Southeast US Summit CISO Southeast US Summit
Accelerate your journey to AI Cloud Strategies to Power Digital Transformation
AppSec: What Good Looks Like The Change Imperative: fixing the past, creating the future with BPM (Business Process Management)
CIO West Summit CISO West Summit
CIO Pacific Northwest Summit CISO Pacific Northwest Summit
Third Party Identity Management - Bring "employee rigor" to Non-employees AppSec: What Good Looks Like
Integrated Security and Resilience in Financial Services: Collaboration to stop Blended Attacks Trusting the Hybrid Cloud
Cloud Strategies to Power Digital Transformation Maximizing the Power of Cloud-Based Apps: The Role of Event-Driven Architectures
The Evolution of Threat Detection and Response Strategies for Navigating Interoperability: Thinking Beyond the Mandate
Third Party Risk: A Growing Concern Trusting the hybrid cloud. While you use it. Phase 3 - Visibility, control and threat management
Growing Third Party Risk in Healthcare Accelerate your journey to AI
Using Data Strategy to Guide Your Cloud Business Transformation Planning Your IAM Future in the Cloud
At The Heart of Your Digital Transformation and Cloud Migration - Network Visibility, Analytics and Security Viewing Cybersecurity with a New Lens: From Cutting Edge Prevention to Next Level Planning
Viewing Cybersecurity with a New Lens: From Cutting Edge Prevention to Next Level Planning How do you speed up Business & IT Transformation?
Best Practices for Automating and Integrating Application Security Testing into DevOps Cloud & AI Summit
AI Summit AI Security Summit
Understanding Cyberattack Risk in Your Organization: Time to Re-evaluate the Fundamentals? Leveraging Nationwide 5G to support IT digital transformation, the digital divide, and a mobile workforce
Reinventing Cyber Risk Quantification Securing Your Journey to the Hybrid Multi-Cloud
Aware but not prepared: Why Healthcare needs to change the field of cybersecurity. CIO Midwest Summit
CISO Midwest Summit Reinventing Cyber Risk Quantification
Global Macro Trends - Solving Digital Transformation Challenges and Preparing for the Future Building a Better Third-Party Cyber Risk Program
How 5G is Transforming Transportation Services in 2021 and Beyond Game Changing Times - Creating Competitive Differentiation with Fast Data
Securing Your Journey to the Hybrid Multi-Cloud A Moving Target ? ?The Best? is No Longer Good Enough in Identity and Access
Understanding Cyberattack Risk in Your Organization: Time to Re-evaluate the Fundamentals? The Key Questions Every Uncommon Leader is Asking Right NOW!
How is your organization positioned to manage Private Label business? CISO Southwest US Summit
Secure your Everywhere Workplace with the Zero Trust approach CIO Texas Summit
CISO Texas Summit CIO Rockies Summit
CISO Rockies Summit CIO Southwest US Summit
Technology of the Future Delivered Today CIO Finance Summit
CISO Finance Summit CIO North East US Summit
CISO North East US Summit A Human-Centric Approach to Customer Service
Identity Strikes the Balance for Seamless, Secure Digital Customer Experiences Zero Trust: From Strategy to Reality
How to Conquer Transformation and Cultural Changes in the Global Enterprise Drive Accountability with Cyber Risk Governance
Adopting Zero Trust - what's working, what isn't, and where to start Identity Strikes the Balance for Seamless, Secure Digital Customer Experiences
Trusting the hybrid cloud. While you use it. Phase 3 - Visibility, control and threat management Minimizing Supply Chain Disruptions in Uncertain Times
Navigating Today's New Threat Landscape The event driven enterprise, and the changing role of event-driven architecture (EDA)
Adopting Zero Trust - what's working, what isn't, and where to start How AI is Shaping your Organization Today
CIO Chicago Summit If identity is the new perimeter what does that mean for your machines?
CIO Healthcare Summit CISO Healthcare Summit US
Data Observability: Analytic Solutions for Improved Data Operations and Data Governance Datacenter Modernization starts with IT Infrastructure Modernization
Adopting Zero Trust - what's working, what isn't and where to start Adopting Zero Trust - what's working, what isn't and where to start
Driving Value and Innovation Through Process Excellence Using Hybrid Infrastructure Automation to Accelerate Innovation
Cocktails and Conversations Virtual Book Tour with co-author and CPO of Product Jason Garbis - Zero Trust Security, An Enterprise Guide Cocktails and Conversations Virtual Book Tour with co-author and CPO of Product Jason Garbis - Zero Trust Security, An Enterprise Guide
Learn how IBM LinuxONE can positively impact your Environmental Sustainability and Governance (ESG) metrics Building a Secure Future: New Strategies for Managing Machine Identities
Adopting Zero Trust - what's working, what isn't and where to start A Human-Centric Approach to Customer Service
CIO Cloud Summit CISO Cloud Summit
A Human-Centric Approach to Customer Service Modern Identity Governance for the Modern Business
Real-Time Responsiveness as the New Must-Have Capability for IT and Business Understanding Cyberattack Risk in Your Organization: Rethinking Access to Business-Critical Assets
Adopting Zero Trust - what's working, what isn't and where to start Zero Trust Summit US
CIO Identity Management Summit CIO Roundtable Dinner Washington D.C.
CISO Washington D.C. Roundtable Dinner CIO Miami Roundtable Dinner
CIO Silicon Valley Roundtable Dinner CISO Midmarket Summit
CISO Retail Summit CIO Utilities Summit
CISO Utilities Summit
Canada
CISO Digital Transformation Roundtable Dinner Canada CIO Digital Transformation Roundtable Dinner Canada
CIO Digital Transformation Roundtable Dinner Canada CIO Digital Transformation Summit Canada
CISO Digital Transformation Summit - Canada CIO Toronto Roundtable Dinner by Rogers Communications
CIO Toronto Roundtable Dinner by RedHat CIO Calgary and Vancouver Summit
CISO Calgary and Vancouver Summit Rethinking Digital Transformation: A CIO Summit presented by Red Hat
Working from Anywhere - 2021: What to Expect Third Party Identity Management - Bring "employee rigor" to Non-employees
CIO Montreal Summit CISO Montreal Summit
Viewing Cybersecurity with a New Lens: From Cutting Edge Prevention to Next Level Planning Viewing Cybersecurity with a New Lens: From Cutting Edge Prevention to Next Level Planning
AI Summit AI Security Summit
CIO Canada Public Sector Summit CISO Public Sector Summit Canada
CIO Canada Summit CISO Canada Summit
Game Changing Times - Creating Competitive Differentiation with Fast Data Understanding Cyberattack Risk in Your Organization: Time to Re-evaluate the Fundamentals?
How is your organization positioned to manage Private Label business? CIO Finance Summit
CISO Finance Summit Adopting Zero Trust - what's working, what isn't, and where to start
Operationalizing cyber resilience in a risk-filled world Minimizing Supply Chain Disruptions in Uncertain Times
Adopting Zero Trust - what's working, what isn't, and where to start Data Observability: Analytic Solutions for Improved Data Operations and Data Governance
Datacenter Modernization starts with IT Infrastructure Modernization Using Hybrid Infrastructure Automation to Accelerate Innovation
Adopting Zero Trust - what's working, what isn't and where to start Learn how IBM LinuxONE can positively impact your Environmental Sustainability and Governance (ESG) metrics
Building a Secure Future: New Strategies for Managing Machine Identities CIO Cloud Summit
CISO Cloud Summit CIO Toronto Summit
CISO Toronto Summit Understanding Cyberattack Risk in Your Organization: Rethinking Access to Business-Critical Assets
Adopting Zero Trust - what's working, what isn't and where to start Zero Trust Summit US
CIO Identity Management Summit
Latin America
CIO Brazil Summit CISO Brazil Roundtable Dinner
CIO Brazil Roundtable Dinner CISO Brazil Summit
EMEA
CIO Frankfurt Roundtable Dinner CXO Lunch London by Virtustream
CIO Europe Retail Summit CISO Europe Retail Summit
CIO Retail Europe Roundtable Dinner CISO Retail Europe Roundtable Dinner
MobileIron CISO Think Tank Madrid MobileIron CISO Think Tank Frankfurt
CISO Europe Summit CIO Europe Summit
CxO London Dinner by IBM CIO Europe BFSI Summit
CISO London Roundtable Dinner CISO BFSI Europe Roundtable Dinner
CISO BFSI Europe Roundtable Dinner CISO BFSI Summit Europe
CIO London Roundtable Dinner CISO Paris Roundtable Dinner
CISO Think Tank Stockholm by MobileIron CIO London Roundtable Dinner by Nasuni
CIO Digital Boardroom UK Unlock your Analytics Stack with automated Data Integration
CISO/CIO Digital Boardroom: Is Technology Helping Or Hurting BFSI? Fortinet: CISO Digital Boardroom
Digital Transformation, What's The Risk And Why the Urgency? Protecting Users & Data in the Everywhere Enterprise
Mobile Threats in a Remote-Access World Thousands of Apps and Thousands of Threats - How to Secure code at Enterprise Level
CISO Cloud Summit UK CIO Cloud Summit Europe
Are Workers More Productive at Home? Zero Trust Summit UK
Are Workers More Productive At Home? Are Workers More Productive At Home?
Embracing the Cloud and Driving Digital Transformation at Scale Europe AI Summit
Europe AI Security Summit Are Workers More Productive At Home?
Zero Trust Can Be For Everyone Protecting Users and Data in the Everywhere Enterprise
Digital Disruption Summit UK How Can Public Sector Organisations Regain Control of Data to Reduce Costs, Complexity and Improve Governance?
Who Accessed Your Data in the Cloud? Your Boardroom and Auditors Want to Know Wer hat alles auf Ihre Daten zugegriffen? Ihre Vorgesetzten und Auditoren würden das sicher gerne wissen.
Data Driven Modernisation, Digitisation Protecting Users & Data in the Everywhere Enterprise
Protecting Users & Data in the Everywhere Enterprise Key challenges for CIOs in 2020: Transforming through disruption
Reimagining the Corporate Network for Today's Teams The evolving security Leader and overcoming challenges to achieving effective security operations
The Public Sector Roundtable: Rethinking your cybersecurity strategy for the new world Enduring from Home: Reducing Risk for Remote Workers
CIO Nordics Summit CISO Nordics Summit
Preventing Automated Attacks in 2020 Balancing Risk and Trust for a Work-anywhere Workforce
Adopt to Change: How Digital Transformation is Changing Project Management How do you speed up Business & IT Transformation?
Public Sector data management in a complex multi-cloud world The Future of Work: Working in the Next Decade
Driving Digital Transformation with Speed, Agility, Security and Insight (Financial Services) Active Defense for the Enterprise of Things
Complete Endpoint Security: Five Critical Steps Re-Architecting the Enterprise: Why Event Streaming Changes Everything.
Beyond The Buzz Of Zero Trust: Taking Practical Steps To Security Third Party Identity Management - Bring "employee rigor" to Non-employees
CIO France Summit CISO France Summit
How To Balance DevSecOps And Human Intervention Scaling the Internal Customer Journey - From Survive to Thrive
Les Communications Unifiées au Service du Futur du Travail Vital Steps to Zero Trust in an Overly Connected World
IT Innovation: New Rules for the Future Cyber Stress - Addressing Mental Health in the Cybersecurity Industry
Scaling The Internal Customer Journey - From Survive To Thrive The Rise of DDoS Ransom Attacks
CIO Deutschland Summit CISO Deutschland Summit
Cocktails and Conversations Book Launch Event Essentials of Securing Active Directory in a Hybrid Environment
Why Operational Excellence Leads to Better Customer Journeys Avoid the Pitfalls - Why Cloud Adoptions Fail
Essentials of Securing Active Directory in a Hybrid Environment Let's talk SASE - First the Noise, Now the Reality
Secure your Everywhere Workplace with the Zero Trust approach Why Digital Business Growth Depends on Infrastructure Automation
CIO Ireland Summit CISO Ireland Summit
Identity Strikes the Balance for Seamless, Secure Digital Customer Experiences Introducing the future of the corporate network
How to Conquer Transformation and Cultural Changes in the Global Enterprise Identity Strikes the Balance for Seamless, Secure Digital Customer Experiences
How to Address Attacks using Actionable Threat Intelligence Data Observability: Analytic Solutions for Improved Data Operations and Data Governance
Scaling the Internal Customer Journey - From Survive to Thrive Identity Strikes the Balance for Seamless, Secure Digital Customer Experiences
Reinventing Cyber Risk Quantification Zero Trust Network Access for the Hybrid Workforce
Increasing Business Agility with Hybrid Integration, and Accelerating Digital Transformation Are You and Your Business Processes Aligned to Become a Digital First Organization?
Managed Detection and Response: Where is it right now? And where enterprise CISOs/CIOs ultimately need it to be. Identity Strikes The Balance For Seamless, Secure Digital Customer Experiences
The Internet as corporate network: achieving security and reliability Re-Architecting the Enterprise: The Role of Apache Kafka® and Real-Time Data.
How to speed up IT & Business Transformation When a good idea goes bad: scaling Microsoft 365 effortlessly
When a good idea goes bad: scaling Microsoft 365 effortlessly CIO UK Summit
CISO UK Summit Intelligent Automation and Transformation UK Summit
Building a Secure Future: New Strategies for Managing Machine Identities Re-Architecting the Enterprise: The Role of Apache Kafka® and Real-Time Data.
CIO Europe Summit CISO Europe Summit
Moments that Matter: Critical Touchpoints that Make or Break your Customer Experience CIO and CISO Digital Boardroom by Positive Technologies
Essentials of Securing Active Directory in a Hybrid Environment Zero Trust Summit Europe