Technology Executives Club | Jobs | Providers | About Us | Contact Us
Tuesday, February 20, 2018 
Home    Join    Events   Peer Advisory    Innovation Institute     Gallery    Blog    Providers

Cybersecurity & Risk Management
Summit: 2018

From Data Breach to the latest in Emerging Tech for CyberSecurity

CyberSecurity, Data Breach and Risk Management are key topics that CIOs and Progressive technology executives must stay current with as they lead their company into the Digital Enterprise.

The shift to the digital enterprise increases cyber security, operational and enterprise risk.  Not just another CISO event, this Summit is geared towards CIOs and Senior Technology executives who want a strategic overview of both the risks and frameworks necessary to protect their organization while they drive change.

Join us as we examine Key Trends:

  • The latest CyberSecurity Threats
  • Preparing for and handling the data breach
  • Legal Primer on Data and Privacy
  • Trends in CyberSecurity Technology
  • Managing Risk for the Digital Enterprise

Conference note

Be sure to register now to ensure a seat. These Summits sell out.

Registration is to the right.

Subscribe to our newsletter to be updated on the event as faculty is added.


Faculty & Agenda:

Joy Mizell Cohn, MS, CIPP-US , Director, Risk Management and Privacy Office, American Medical Association

 

Tom Drez, CIO/CPO/CSO, Christian Brothers Services

 

 
Richard Rushing, CISO, Motorola Mobility Richard Rushing, CISO, Motorola Mobility
 
John Janachowski, Information Security, Disaster Recovery and Business Continuity Leader, Aldi, Inc.

 
Shaoping Zhou, Vice President, Enterprise Architecture, Information Security Officer Transworld Systems
 
Mark Shipman, Director IT Operations, Vibes Media

Mark Shipman, CISSP, CISM, CRISC, Director IT, Infrastructure, and Security, Vibes Media

 

 
Michael Biagioli, CIO, Waukesha County

Michael Biagioli, CIO, Waukesha County

 

Brian Cleveland, Vice President IT,  Vi Senior Living

 

 

Scot Ganow, Senior Counsel, Taft Stettinius & Hollister LLP

 

General Grant, Executive Consultant, U.S. Signal

 
Sean Blenkhorn, Vice President, Solutions Engineering & Advisory Services

Sean Blenkhorn, Vice President, Solutions Engineering & Advisory Services, eSentire

 

Ricardo Johnson, Sr. Director, Security, Risk & Compliance at CrowdStrike--Sponsored by LaSalle Solutions

   

Event Agenda

Welcome and Introduction

Session I. Presentation: Security & Compliance Unleashed: From Cost Center to Business Enabler

Security and Compliance, are often incorrectly viewed as necessary evils, cost centers and black holes. However, leveraged correctly, they can provide powerful and insightful data about your company, business processes, systems and customers. They can also be key to improving your operational efficiency and reduce cost as well as demonstrate your company’s domain expertise, in addition to providing assurance to your customers.  Yes, believe it not, Security & Compliance are actually business enablers waiting to be discovered.

    Ricardo Johnson, Sr. Director, Security, Risk & Compliance at CrowdStrike--Sponsored by LaSalle Solutions

    Ricardo Johnson, Sr. Director of Security, Risk and Compliance for CrowdStrike Inc., has more than 18 years of experience in the fields of privacy, information security and risk. Previously, he served as the Director of Global Compliance for Ryder, where some of his responsibilities included overseeing privacy and security compliance for the company’s inaugural BYOD, mobile marketing, social media and cloud migration programs, along with other regulatory mandates such as export controls and Anti-bribery and PCI. Prior to Ryder, Ricardo served as the Chief Privacy & IT Compliance Officer for Burger King Corporation. Ricardo has also been a guest speaker on privacy, security and risk topics at the Visa PCI Symposium, WorldCompliance Summit, IAPP, Cloud Security Alliance (CSA), Institute of Internal Auditors (IIA) and Compliance Elliance.

Session II: Keynote Panel: Managing Cyber Security and Operational Technology Threats for the Digital Enterprise  


This panel will discuss and share their practical experiences and real-world strategies in protecting their company from the growing cyber security and operational technology threats.

    Tom Drez, CIO/CPO/CSO, Christian Brothers Services

    Tom Drez, CIO/CPO/CSO, Christian Brothers Services

    Tom Drez serves as Chief Information Officer and Managing Director of the Information & Technology Services (ITS) Division of Christian Brothers Services (CBS).  Tom joined CBS in 1987 to lead the division and take on the responsibility to strategically apply information technology to the business as an enabler to achieve desirable results.  The ITS Division provides for operations, software and website design and development, and education.  This includes responsibilities for implementing, supporting, and maintaining all aspects of computer, telephone, and audio/visual systems ensuring that technology usage fully supports organizational goals.  He also has responsibility for information protection including privacy and security.CBS is a nonprofit organization that administers cooperative programs in the areas of health/retirement, property/casualty and consulting/technology to church organizations.  

     

    John Janachowski, Information Security, Disaster Recovery and Business Continuity Leader, Aldi, Inc.

    John has 28 years of multidisciplinary experience in IT leadership with an emphasis in information security, systems and network engineering, and business continuity disciplines. Leading IT Security and Business Continuity for ALDI, Inc. in Batavia, IL, John has been involved in establishing information security risk management practices for an organization that includes more than 1700 stores. Formerly, John was an IT Director for OfficeMax leading the Virtualization, Intel platforms, Microsoft Server Technologies, Messaging, and Disaster Recovery teams. He holds several certifications in security, business continuity, and disaster recovery, and has been published numerous times on security, business continuity, and disaster recovery topics. As a Navy Reservist, John is a Senior Chief specializing in cybersecurity and the IT Rating Advisor to the Commander, Naval Information Forces Reserve. He is a graduate of the Senior Enlisted Academy at the Navy War College in Newport, R.I., and graduated Magna Cum Laude, with a B.A. in Interdisciplinary Studies and Technology. John is currently enrolled at Northeastern Illinois University pursuing a M.A. in History.

     

    Mark Shipman, Director IT Operations, Vibes Media

    Mark Shipman, CISSP, CISM, CRISC, Director IT, Infrastructure, and Security, Vibes Media

    Mark Shipman is Director IT, Infrastructure, and Security at Vibes Media, a Software as a Service (SaaS) company that allows brands to interact 1:1 with mobile consumers at scale. Mark began his career building security technology to protect electric power grids and nuclear generation facilities. From there he moved to the financial sector before joining the Internet boom where he built security solutions for large online retailers in the early days of e-commerce. Since then he has brought his experience to online universities, pharmaceutical companies, and HR benefits companies. At Vibes Media he built the security and compliance program from the ground up to enable the company to pursue new customers with detailed security and privacy requirements.

     

    Richard Rushing, CISO, Motorola Mobility

    Moderator: Richard Rushing, CISO, Motorola Mobility

    Richard Rushing is the Chief Information Security Officer for Motorola Mobility LLC. Richard participates in corporate, community, private, and government security councils and working groups, setting standards, policiesM, and solutions for current and emerging security issues. As Chief Information Security Officer for Motorola Mobility, he has led the organization’s security effort by developing an international team to tackle targeted attacks, cyber-crime, and emerging threats to mobile devices. He has organized, developed, and deployed practices, tools, and techniques to protect the enterprise’s intellectual property worldwide. A much-in-demand international speaker on information security, Richard has spoken at many of the leading security conferences and seminars around the world.

     

Session III: Presentation: Banking on the Cloud - Risk and Security Lessons Learned During the Hypermodernization of a Bank’s Infrastructure.

    General Grant, Executive Consultant, U.S. Signal

    General Grant, an Executive Consultant for US Signal, specializes in multi speed IT models brought about by disruptive change. General’s work centers primarily on strategies that enable cloud ramp and cloud adoption. As a leading practitioner for IT operating model transformation, he is responsible for consulting to US Signal’s large and strategic account relationships, bringing experience to bear on client transformation programs in areas such as roadmap development, initiative sequencing, capabilities alignment, value stream mapping, compliance and risk, people and culture and multi-source models. General has been an entrepreneur, technology practitioner and consultant for more than 25 years and has led technology and change programs in banking, insurance, healthcare, sports, casino, and manufacturing industries in North America and Europe.

Session IV:  Presentation: The Legal Dos and Don'ts of Incident Response Management

Scot will leverage his years of experience in data breach response to provide you some best practices in managing the legal and reputational risk of such an incident. How well a company survives a data security incident is directly related to how well it prepares for one. With data security incidents, it is not a matter of IF, but WHEN. Learn what to do and what not to do when data breach comes knocking on your company’s door.

    Scot Ganow, Senior Counsel, Taft Stettinius & Hollister LLP

    Scot is co-chair of the Taft’s Privacy and Data Security Practice.  As a former chief privacy officer and leveraging more than ten years of management and compliance experience in Fortune 500 companies, Scot brings a diverse business background to his privacy and data security practice. Scot has represented clients in a variety of sectors, including consumer reporting, construction, healthcare, and manufacturing. Scot assists clients in all areas of the data life cycle.
    Scot also assists clients in dealing with a variety of data governance regulations, including HIPAA, GLBA, FCRA, and state laws governing personally identifiable information.  has spoken in Washington, D.C., at the Global Summit of the International Association of Privacy Professionals, and the Privacy + Security Conference. Scot was also a speaker at TEDx Dayton 2016 at the Victoria Theater, where he spoke on the “Humanity in Privacy.”
     
    In addition to his data privacy and security practice, Scot also has experience with intellectual property matters as a patent attorney. He also counsels clients on general business law matters.
     
    Scot attended the University of Dayton School of Law, where he currently serves as an adjunct professor of law. He clerked for the University of Dayton general counsel's office and the Cincinnati Reds general counsel. Scot is admitted to practice in the state of Ohio, in the U.S. District Court for the Southern District of Ohio and before the United States Patent and Trademark Office.

Session V: Presentation: ​Minimizing the Detection to Recovery Timeframe- Avoid the potential effects sophisticated threat actors can have on business operations and new breach notification mandates

While recent trends have shown attackers are more frequently using simple tools and tactics to make a big impact to the overall global cost of data breaches, sophisticated threat actors utilizing advanced techniques to avoid detection could potentially have the greatest impact to an organization’s bottom line. Now more than ever is minimizing the detection to response timeframe of utmost importance to ensure an organization is able to not only detect threats but contain and respond in a timeframe that minimizes the risks As organizations begin to address this transition, knowing where to start is a challenge. We we will cover the best path going forward and real-life examples of how advanced detection and response capabilities were able to thwart attackers and satisfy even the most stringent emerging regulatory requirements.

    Sean Blenkhorn, Vice President, Solutions Engineering & Advisory Services

    Sean Blenkhorn, Vice President, Solutions Engineering & Advisory Services, eSentire


    Sean Blenkhorn spent much of his 20-year career consulting with leading global (FORTUNE 50, 100, 500 and 1000) companies on security and compliance solutions. As Vice President of Solutions Engineering & Advisory Services, Sean leads a global team as they provide guidance, consultation and technical perspective to new customers as they evaluate and adopt eSentire services to address their security and compliance requirements. Sean has an Associate’s Degree in Software Engineering from Georgian College.

Session VI. Blueprint/Case study of AI and Machine Learning Technologies for Security Threat Management

In this study, Shaoping will share how unsupervised machine learning (ML) based threat detection security technology helped his firm's security architecture and operations. There is much to share about the pros and cons, lessons learned. Major topics include the following:

  • What AI and machine learning is
  • How it is applied to security threat recognition
  • Why it is becoming more and more important to the overall security architecture
  • How to leverage various ML solution in your security operations

    Shaoping Zhou, Vice President, Enterprise Architecture, Information Security Officer Transworld Systems

    Shaoping Zhou leads the cyber security and enterprise architecture practices in Transworld Systems Inc (TSI). He has a wealth of experiences and knowledge in design security architecture for highly sensitive data under regulation, all aspects of security controls and operations, and enterprise risk management and governance. He has innovated the development of the cyber security architecture in TSI by introducing machine learning to threat management, significantly leveraging managed security services (MSS), and simplifying security architecture landscape.

Session VII:  Keynote Panel: Data Breach and Risk Management.

It's not whether, it's when.  Join us as key executives describe how they proactively are preparing for data breach and overall risk management strategies.

    Joy Mizell Cohn, MS, CIPP-US , Director, Risk Management and Privacy Office, American Medical Association

    Joy Mizell Cohn MS, CBCP, CIPP-US created and oversees the Risk Management and Privacy Office at the American Medical Association. She reports directly to the Chief Financial Officer and annually reports out to the Audit Committee of Board of Trustees.  Joy is responsible for business continuity management, worksite recovery, emergency management and the association’s privacy office. She works very closely with Information Technology, the Office of the General Counsel and Internal Audit identifying and establishing strategies, policies and programs to mitigate cyber security and disaster recovery risk.  Joy oversees  the AMA’s incident response process and works with all business units managing reputation risk through a corporate review process for all Association activities that utilize the AMA name and logo with external entities. 
     

    Michael Biagioli, CIO, Waukesha County

    Michael Biagioli, CIO, Waukesha County, has over 45 years of experience. Under his leadership, technology has moved into alignment with the business needs of the county, with a focus on measured Return on Investment for the implementation of technology improvements. Mr. Biagioli has moved IT away from custom in-house developed application, traditional for government IT, to an organization that functions as a system integrator for Off-the-Shelf software packages.

     

    Shaoping Zhou, Vice President, Enterprise Architecture, Information Security Officer Transworld Systems

    Shaoping Zhou leads the cyber security and enterprise architecture practices in Transworld Systems Inc (TSI). He has a wealth of experiences and knowledge in design security architecture for highly sensitive data under regulation, all aspects of security controls and operations, and enterprise risk management and governance. He has innovated the development of the cyber security architecture in TSI by introducing machine learning to threat management, significantly leveraging managed security services (MSS), and simplifying security architecture landscape.

     

    Brian Cleveland, Vice President IT,  Vi Senior Living

    Brian Cleveland leads the technology strategy and IT program execution at Vi Senior Living. He is responsible for the management and support of the information technology department which includes enterprise applications, information security, and the underlying networks and systems including the data center.

     

    Moderator: General Grant, Executive Consultant, U.S. Signal

    General Grant, an Executive Consultant for US Signal, specializes in multi speed IT models brought about by disruptive change. General’s work centers primarily on strategies that enable cloud ramp and cloud adoption. As a leading practitioner for IT operating model transformation, he is responsible for consulting to US Signal’s large and strategic account relationships, bringing experience to bear on client transformation programs in areas such as roadmap development, initiative sequencing, capabilities alignment, value stream mapping, compliance and risk, people and culture and multi-source models. General has been an entrepreneur, technology practitioner and consultant for more than 25 years and has led technology and change programs in banking, insurance, healthcare, sports, casino, and manufacturing industries in North America and Europe.


YOU MUST QUALIFY TO ATTEND THIS EXCLUSIVE EVENT *

Questions whether you qualify? Please contact Maria Tuthill at (847) 837-3900 x1

Who Should Attend:

  • CIOs
  • CxOs
  • CISOs
  • Chief Risk Officers
  • COOs
  • Chief Innovation Officers
  • VPs & Directors responsible for driving change

=====================


ATTEND THIS EVENT

LOGISTICS

Lake Forest, IL
Feb 22, 2018,
8AM to 5:30PM

Lake Forest Graduate School of Management
Conway Park
1905 W. Field Court, Lake Forest, IL 60045

8:00 am Continental Breakfast
8:30 am Program begins




How to Register
1. Member Registration

2.

Nonmembers*: $299

If you have a promo code enter it on the payment screen

*This event is only open to CIOs, Senior Technology Executives, Chief Innovation Officers, CxOs, Digital Officers and their senior team members Director and above.

CIOs, CTOs, and CxOs from established Technology Consulting Firms and Solution Providers may attend and add to the conversation as long as they are NOT in a field sales position.  An established firm is defined as 50 million in revenue or above.

Technology consulting firms, solution providers and other industry service organizations must be sponsors to participate.

Questions? Call Maria Tuthill 847-837-3900 x 1

Sponsorship Questions? Contact Alex Jarett at 847-837-3900 x 2 for information

==================================
Pre-registration required. Must be Qualified.

Professional business-casual attire required.

Final speakers and topics are subject to change.



What Participants Say About Our Summits

"The Summit was a great day's investment for any CIO/IT leader to heighten knowledge of technology trends and IT leadership insight."
Tom Hupp, VP of IT Young Innovations, Inc.

"I was so inspired I couldn't wait to get back into the office and start changing the world!"
Julie Garnter, Director of Information Systems & Technology, Kenall

"Amazing how Tec pulls in such high quality presenters and panels.  Great job Alex & Maria!"

"I was so engrossed and interested in the program I didn't check my phone or email all day."  

"The depth and breadth of information shared is priceless"

"Mind and career expanding, thank you!" “Very informative"

"Informative and inspiring!"  "Excellent!"  

"Strong content, topics, participants"  "Great education"

"Great, thought provoking session”    "Fantastic leadership insights "

"Good insights and examples of management approaches"

"Good event!  Thought provoking.  I'll attend the next one."

"Outstanding examples and use cases to clarify points" 

 

Earn Continuing Educational Credits


Earn certification credits while you learn!

We will provide each attendee with a certificate toward continuing education.

 

Event Sponsors
Judge








 

 

 

LEARN HOW TO BECOME A SPEAKER / SPONSOR FOR THIS SUMMIT:
Contact Alex Jarett at 1-847-837-3900 x 2


 

Hotel Accommodations

Hilton Garden Inn Lake Forest Mettawa
26225 Riverwoods Blvd, Mettawa, IL 60045
(847) 735-8374


Holiday Inn Express-Vernon Hills
975 Lakeview Pkwy, Vernon Hills, IL 60061
(847) 367-8031


Hotel Indigo Chicago-Vernon Hills
450 N Milwaukee Ave, Vernon Hills, IL 60061
(847) 918-1400

`
Free Weekly  |   Events  |   About Us  |   Join  |   Vendor Area  |   Get Leads   |   Staff

Copyright © 2018 Technology Executives Club, Ltd. All rights reserved | Privacy Policy