AIM Monthly Luncheons
AIM Members meet together on the second Thursday of each month – September through May – to network and learn to become better leaders and innovators. In addition to the opportunities to network with peers, we invite industry thought leaders to address us on innovative ideas in technology, business, and leadership. For the next luncheon, please see the Events page.
All luncheons are held in the Joseph Smith Memorial Building (JSMB), 15 E South Temple St, Salt Lake City, UT. Parking validations available.
April 2018 - Emotional Intelligence: Why It Matters and How to Grow Yours
Each one of us is a unique creation. We all have different thoughts, feelings, desires, and goals. However, we also have many of the same patterns – including our habitual emotional patterns. We tend to operate in a reactive mode, merely interpreting incoming information and events, relating them to our previous experiences, and then responding without really being aware of why or how we’re doing it. As leaders, we need to take conscious control of our emotions if we are to respond effectively to the situations and challenges we face.
In “Emotional Intelligence: Why it Matters, and How to Grow Yours,” Kevin investigates the latest research on emotional intelligence and offers methods for incorporating techniques that will help leaders at all levels to become more aware of their own emotional patterns, and to create more resourceful and effective responses to the challenges of their environment.
Participants will be introduced to the processes that drive their emotions – mostly on an unconscious level – and they’ll learn some new tools and strategies to begin to take more control of their “inner world” and respond more effectively even in situations that might otherwise cause anxiety, frustration, anger, or fear. They’ll learn proven strategies for managing their own emotions, and those of the people they work with. These skills are essential to success, and account for 85-90% of the difference between outstanding leaders and their more average peers.
March 2018 - Rising Above It All
During this intriguing conversation, John argues that the reason companies have such short life spans is because they do not understand how to effectively transform themselves. This lecture defines organizational transformation as “evolving to higher levels of sustained performance.” John Lee, the author of “Rising Above it All” has found that most companies are capable of evolving to a given level of performance, which he refers to as the 95 percent level. One of the problems in transformation is that the skill set needed to reach the 95 percent performance level is not the same skill set that is needed to rise above the 95 percent level of performance. Most organizations do not understand this phenomenon, and as a result companies will eventually go extinct as customer expectations rise above the 95 percent level performance levels.
The author argues that most companies skip the personal and cultural transformation and jump right into the tools transformation, which is the reason companies die at such a young age. The fundamental problem is that an organization must have a culture that supports modern-day analytical tools, including tools used in the planning process, or the tools will not effectively work within the borders of the organization.
A copy of John’s book was provided to all participants.
February 2018 - Navigating the Digital Age - Cybersecurity for IT Leaders
The fast-evolving digital economy is stimulating tremendous opportunity and business transformation. Central to this evolution is the emergence of the cloud. While we have every reason to be bullish on the future, we have serious work to do to assure trust in the cloud and, by extension, trust in the digital economy. The very recent Chip vulnerabilities shared publicly in early January known as “Meltdown” and “Spectre”, once again demonstrates that we have much work to do to secure our enterprises and the supporting ecosystem. Yesterday’s security solutions no longer work. Complexity has become our enemy. Fresh thinking and thoughtful action is need … and needed quickly.
Brian Kelly -- Chief Security Officer, Rackspace
January 2018 - Phishing - A Panel Discussion
A panel of security experts discussed why phishing attacks remain the #1 threat vector into an organization.
December 2017 - Machine Learning on Distributed Systems
Most real-world data science workflows require more than multiple cores on a single server to meet scale and speed demands, but there is a general lack of understanding when it comes to what machine learning on distributed systems looks like in practice. Gartner and Forrester do not consider distributed execution when they score advanced analytics software solutions. Many formal machine learning training occurs on single node machines with non-distributed algorithms. In this talk we will discuss why an understanding of distributed architectures is important for anyone in the analytical sciences. We will cover the current distributed machine learning ecosystem. We will review common pitfalls when performing machine learning at scale.
November 2017 - The Second Wave of the Digital Revolution
We are living in a time of great change. In the brief time since the new millennium began, we have experienced the transformative power of the first wave of the Digital Revolution as the Internet has literally changed all the rules for how the world works. Now we find ourselves on the threshold of a second wave that will be fueled by not one, but two engines, resulting in more change in the next decade than we have seen in the past twenty-five years. Discover how the Internet of Things and Blockchain technology will produce new capabilities for improving the quality of life by expanding social collaboration, preventing illness and accidents, spawning new business and product models, generating new ways to create and distribute wealth, ending the threats of hacking and fraud, and eliminating the theft of intellectual property.
October 2017 - The Art of Performing Cyber Security Risk Assessments
What constitutes a thorough and comprehensive risk assessment exercise? What are the compliance & industry mandates? What are the core components of such an exercise? In this brief, step through key areas, that must be addressed within the scope of a risk assessment exercise. Compliance mandates & information security standards always require that a risk analysis exercise be performed on a regular schedule. What should the scope & schedule be for such an exercise? Further, in the brief, understand the importance of performing a technical vulnerability assessment as a component of a risk analysis to identify possible security gaps that can be exploited. ** Click for a copy of the presentation: Luncheon Presentation 2017 10 Pabrai.pdf
Uday Ali Pabrai
September 2017 - People are People
Why do we click with some people and get turned off by others? What causes us to treat some people well and others harshly. How do we overlook our natural biases and see all people as humans like us. Joel will share research on how our brains trick us into liking or hating others and what we can do about it.
Chief Executive Officer, Kuali
May 2017 - Five Top Ten Trends for 2017
5 Top Tech Trends Identified in 2017 and how companies can incorporate them into go forward initiatives
Atilla Tinic, Level3 CIO and Tore Berg Managing Partner at Accenture Technologies will present Accenture Technologies Vision 2017 technology report that predicts the most significant technology trends that people will apply to disrupt business over the next three years. Included in the presentation will be a discussion of the 5 top tech trends identified in the 2017 report and how Level 3’s global IT organization is incorporating these trends into their go forward initiatives.
Atilla Tintic - Chief Information Officer
Level 3 Communications
Tore Berg, Managing Director
April 2017 - Achieving Professional Growth
Technology is great, but people still hold the key. Tony will pose the following questions. How do I grow myself and my team, and can we know if someone will adapt to the fast changing circumstances of today’s world? He will challenge you to examine your own personal growth trajectory and reflect on where and when you learned the most. ** Click for a copy of the presentation: Luncheon Presentation 2017 04 Tony Leng.pptx
March 2017 - Embracing Uncertainty
When starting a new company or launching a new product, we often expect the world to be orderly and predictable. We over-analyze and over-plan, and then wonder why our budgets are over-run and products are overdue. Do we just need better planning and analysis? A better expert to tell us the answers? We need a different approach for extreme uncertainty -- one based on experimentation, innovation and the scientific method. We can replace fear with confidence, making uncertainty something we seek out -- even embrace.
February 2017 - The Storyteller's Secret
How Narrative Intelligence can Transform Your Organization
Transforming an organization’s communications practices, graduating them from clumsy to focused, from random to intentional, from scattered to purposeful, Jason explores the power of narrative design. In this fast-paced, inventive keynote, you’ll be handed tools used by the greatest storytellers of our time, and you’ll build muscle as they have, learning how to aggregate, curate, and amplify your message.
January 2017 - Distributed Ledger Technology
The next generation of blockchain
During this presentation we will visit the kinds of interesting things enabled by Distributed Ledger Technologies and how a person’s account (or identity) can be owned and controlled by that person. One of the most exciting applications of distributed ledger technologies (a general category of database that includes blockchains like Bitcoin) is its ability to provide a global, decentralized source of truth upon which we can build "self-sovereign identity." This is an identity that is 100% owned and controlled by an individual or organization. No one else can read it, use it, turn it off, or take it away without its owner’s explicit consent. This simple form of identity is private, extremely secure, and goes where you go. This will enable trusted interactions to occur between individuals, institutions, and businesses. We will be discussing the many uses of this technology, where it came from, and where it’s moving to.
December 2016 - Not If, But When
Leveraging AI to Jettison the Mantras of the Past.
For decades we in the security profession, have relied on the best technology we had at the time to deflect the onslaught of what we faced daily in the way of virus and malware attacks. The effectiveness of that AV technology was always predicated on having latest signatures on hand, which the adversaries could easily defeat with just the slightest modification of their last iteration. That signature-based paradigm required much in the way of downstream resources and expense and usually at least one “sacrificial lamb” upon which to let each new instance of threat sink its teeth. On a good day the capture and deflection rates rarely rose above 50%, requiring that we labor assiduously to manage leaderships’ expectations. We finally got them to understand and accept what became almost a mantra: “It’s not if but when”--as galling professionally as that admission was to make. However, just as predicted by Thomas Kuhn in his book the Structure of Scientific Revolutions, we’re seeing the dawn of a new day where AI’s machine learning and advance mathematical algorithms now offer validated deflection rates, pre-execution, in the realm of 99%. We will explore this emerging new paradigm and what it portends for the future.
November 2016 - The Art of Business Value
Information technology can and should deliver business value. But the IT community - and in particular the Agile community, which makes a point of organizing all its efforts around the delivery of business value - has paid scant attention to what exactly business value means—and how to know whether or not you are delivering it. This problem becomes ever more critical as you push value delivery toward autonomous teams and away from requirements “tossed over the wall” by business stakeholders. An empowered team needs to understand its goal!
Each attendee received a copy of Mark's book, The Art of Business Value.
CIO, Author, and Entrepreneur
October 2016 - Deep Data for Pragmatic Security
Dr. Tippett created the first AntiVirus (became Norton), NCSA, ICSA, TruSecure, Information Security Magazine, Cybertrust, Verizon’s Security Services and the "Data Breach Investigation Report" (DBIR) which tracks and analyzes the evolution of cyber threats over more than a decade, covering well over 100,000 incidents. Dr. Tippett will engage us with deep knowledge and data in pragmatic discussion around solutions, approaches, compliance, and key empowering capabilities for better security.
Peter Tippett, M.D., Ph.D.
Chairman DataMotion; former Vice President & Chief Medical Officer, Verizon
September 2016 - Addressing the Tech Talent Gap in Utah
As most technology leaders in Utah are keenly aware, Utah technology companies are experiencing a significant workforce shortage. As tightening continues, it will be important to understand and address this growing problem. Our speaker, Jonathan Johnson, will discuss the current state of that shortage, its root causes and propose solutions to address it.
Chairman of the Board, Overstock.com
May 2016 - The State of the Broadband Network in Utah
Utah's broadband landscape in leading to lower costs and increased bandwidth. The commercial telecommunications infrastructure is robust and growing. As one of the most competitive states for broadband, Utah companies are taking advantage of competitive offerings to lower their telecommunications spend and increase their bandwidth. Wesley J. McDougal, President and CEO of FirstDigital will lead a discussion on how your company can take advantage of the competitive landscape and stay on top of the latest offerings. The discussion will include a report of the overall state of broadband in Utah.
Wesley J. McDougal
President and CEO of FirstDigital
April 2016 - DevOps and Automation
Sr. Director Data Center Operations and SaaS at AdvancedMD
March 2016 - Scalability Rules
Mike Fisher and Marty Abbott
February 2016 - Get Hands On with LeanHala Saleh
January 2016 - Change, People, and the Evolution of Security CultureEric Hawley
December 2015 - Adventures in Open Source and Scale Out ComputingJoshua Bernstein
November 2015 - Big Data DemystifiedWalter Maguire
October 2015 - Connectivity to the Cloud and Your WANJohn Grady
September 2015 - A Team of LeadersPaul Gustavson
May 2015 - Private SocialMatt Berg
April 2015 - Getting Alignment RightJeremy Warren
March 2015 - What is SDN and Why Should I Care?Ron Jackson
February 2015 - How To Do Security WrongJason Sabin
January 2015 - Beyond AgileNate Walkingshaw
December 2014 - Use Analytics to Rule the WorldNiel Nickoliasen
November 2014 - Olympic Champion in SkeletonNoelle Picus Pace
September 2014 - Digital Marketing - The Good, the Bad, and the ExpensivePat Partridge
The premier association of IT leaders in the Intermountain Area.
AIM-Utah, Salt Lake City, UT