Technology Executives Club | Jobs | Providers | About Us | Contact Us
Thursday, May 25, 2017 
Home    Join    Summits   Peer Advisory  Innovation Institute     Gallery    Blog    Providers
 

IT Security & Compliance: 2013

Mobile, cloud & persistent threats are escalating. Are YOU ready?

Expertise in IT security, compliance and digial asset protection -- especially in the mobile, social media and cloud arenas -- is ranked the NUMBER ONE skill CIOs need to succeed in the rapidly expanding IT landscape, according to a 2012 SearchCIO.com survey.

This seminar is designed to help YOU prepare, as well as give you strategies to prevent data breaches and non-compliance incidents that damage customer trust and cost your organization big bucks.

Top IT executives from leading Chicago companies will share insights to help you succeed:

  • Get strategies for successfully managing Bring-You-Own-Device (BYOD) security risks without crimping collaboration and productivity
  • Learn how other organizations are protecting their digital assets and identify in the cloud
  • Gain insights to ensure the security, privacy and regulatory compliance of all systems, including mobile and portable technology
  • Explore ongoing compliance concerns, trends in IT security, the top cyber attacks, where you might be vulnerable, and more!

KEYNOTE PANEL

An Industry expert leads this interactive discussion

David Gochenaur, Director, Global Information Security, Aon Corporation David Gochenaur, Director, Global Information Security, Aon Corporation
is responsible for driving security of Aon’s Cloud-based service offerings and its Cloud-based vendors. He's active in the Cloud Security Alliance and was one of the authors of the Consensus Assessments Initiative document, designed to help organizations assess their Cloud vendors. Dave also is an active member of the Information Systems Security Association and Information Systems Audit and Control Association.
Drake Cody, Director of Information Security, CNA Insurance Drake Cody, Director of Information Security, CNA Insurance is responsible for the overall management and direction of CNA’s Information Security program including; Vulnerability Management, Data Leakage Protection Application Security, Electronic Discovery (eDiscovery), Forensic Investigations and Vendor Risk Management. Each practice area is designed to manage risk and protect corporate data and assets through effective people, process and technical leadership.

Adam Diab, Director of Contracts & Solution Delivery for SIRVA Adam Diab, Director of Contracts & Solution Delivery for SIRVA directs technology planning, budgeting, PMO, vendor management, and support of all technology assets at SIRVA. Previously, he was a Principal / Senior Consultant at Affiliated Computer Services and Analysts International for 20 years, assisting JP Morgan Chase, Motorola, McDonalds, US Bank, and ConAgra in technology planning and assimilation.

Paul Kunas, Director of IT Security, Sidley Austin LLP Paul Kunas, Director of IT Security, Sidley Austin LLP is currently the Director of IT Security at Sidley Austin, a global law firm. Prior to Sidley, Mr. Kunas was the IT Security Governance and Strategy Manager for Exelon Corporation, one of the nation's leading power utility companies, and a Senior Manager with Accenture, Information Security Consulting. Mr. Kunas is a CISSP with over 15 years of information security experience consulting and implementing leading edge solutions.

J.D. Butt , VP Solutions, Nexum
Moderator: J.D. Butt , VP Solutions, Nexum
J.D. Butt is a network security technologist with over 10 years' experience designing, testing, and implementing secure architectures for networks, application deployments, and software. J.D. is Nexum's Vice President of Solutions and principal architect; performing system and application security assessments, remediation planning, secure communication architecture and general WAN design. .


EXECUTIVE BRIEFINGS

Terry Kurzynski, Managing Partner at Halock Security Labs Why is Risk Management the Keystone to Security Programs?
Terry Kurzynski, Managing Partner at Halock Security Labs will present case histories of organizations that initially avoided risk management but who eventually found a surprising payoff: Managing information security and compliance through risk management aligns the interests of the executive team, operations, IT, legal, sales, compliance and audit. As a result, information security became easier to implement and maintain.

View webcast
Jeff Clayton, Senior Solutions Architect, Radiant Logic Building an Identity Bridge from Your Enterprise to the Cloud
Jeff Clayton, Senior Solutions Architect, Radiant Logic
Explore how virtualizing identities into a Federated Identity Service helps the enterprise streamline security for SSO and fine-grained authorization in the cloud, and meet evolving business demands.

View webcast
Richard Boyer Senior Architect, Integralis Layman’s Guide to Finding and Managing Information Security Risk-- Basics of managing risk, so lack of risk budget is not managing you
Richard Boyer Senior Architect, Integralis
Organizations are struggling with addressing risk, and the formal methods to find and address risk are expensive and time consuming. Hence, many organizations lack even informal processes to attack ongoing risk management. This presentation outlines strategies and practices that can practically deliver ongoing risk management when it is impractical to address risk management through formal processes.
View webcast


Who Should Attend:

  • CIOs, CISOs
  • Senior IT and LOB Executives
  • VPs & Directors responsible for IT Security and Compliance
  • Any IT Executives and Managers who provide security and compliance direction and support to LOB functions

=====================


ATTEND THIS EVENT

LOGISTICS

Chicago, IL
Feb 21, 2013
, 12:30 PM to 5:00 PM
Union League Club, Main Lounge
65 W. Jackson Blvd. Chicago IL 60604

Questions? Call Maria Tuthill in our Chicago office
847-837-3900 x 1

HOW TO REGISTER

IT Executives & Staff Members

1.Members: Register Here to Use Your Ticket package or Contact Member Services at 847-837-3900 x1

2. Nonmembers: Learn how to attend this event with
a complimentary VIP Pass

Providers (Hardware, Software, Consultants)

1.Members: Who have a ticket package, Register here.

2.Nonmembers: There are a limited number of seats available at the Nonmember rate of $250. Please call Maria at 847-837-3900 X 1

==================================
Pre-registration required.

Professional business-casual attire required.

Final speakers and topics are subject to change.

Event Sponsors

LEARN HOW TO BECOME A SPEAKER / SPONSOR FOR THIS SEMINAR:
Contact Alex Jarett at 1-847-837-3900 x3.











NetScout

 

 

 

`  
Free Weekly  |   Events  |   About Us  |   Join  |   Vendor Area  |   Get Leads   |   Staff

Copyright © 2017 Technology Executives Club, Ltd. All rights reserved | Privacy Policy