Technology Executives Club | Jobs | Providers | About Us | Contact Us
Tuesday, January 23, 2018 
Home    Join    Events   Peer Advisory    Innovation Institute     Gallery    Blog    Providers

Cybersecurity & Risk Management
Summit: 2018

From Data Breach to the latest in Emerging Tech for CyberSecurity

CyberSecurity, Data Breach and Risk Management are key topics that CIOs and Progressive technology executives must stay current with as they lead their company into the Digital Enterprise.

Join us as we discuss:

  • Key Trends
    * The latest CyberSecurity Threats
    * Preparing for and handling the data breach
    * Legal Primer on Data and Privacy
    * Trends in CyberSecurity Technology
    * Managing Risk for the Digital Enterprise  

Conference note

Be sure to register now to ensure a seat. These Summits sell out.

Registration is to the right.

Subscribe to our newsletter to be updated on the event as faculty is added.


Faculty & Agenda:

Check back for new faculty as they are added

Joy Mizell Cohn, MS, CIPP-US , Director, Risk Management and Privacy Office, American Medical Association

 

Tom Drez, CIO/CPO/CSO, Christian Brothers Services

 

 
Richard Rushing, CISO, Motorola Mobility Richard Rushing, CISO, Motorola Mobility
 
John Janachowski, Information Security, Disaster Recovery and Business Continuity Leader, Aldi, Inc.

 
Shaoping Zhou, Vice President, Enterprise Architecture, Information Security Officer Transworld Systems
 

Jerome Pender, Group CIO and Operating Partner, Z Capital Group, L.L.C.

 

Craig Youngberg, Director Cyber Security , ITW

 

Scot Ganow, Senior Counsel, Taft Stettinius & Hollister LLP

 

General Grant, Executive Consultant, U.S. Signal

   

Event Agenda

Welcome and Introduction:

Session I. Presentation

Session II: Keynote Panel: Managing Cyber Security and Operational Technology Threats for the Digital Enterprise  


This panel will discuss and share their practical experiences and real-world strategies in protecting their company from the growing cyber security and operational technology threats.

    Tom Drez, CIO/CPO/CSO, Christian Brothers Services

    Tom Drez, CIO/CPO/CSO, Christian Brothers Services

    Tom Drez serves as Chief Information Officer and Managing Director of the Information & Technology Services (ITS) Division of Christian Brothers Services (CBS).  Tom joined CBS in 1987 to lead the division and take on the responsibility to strategically apply information technology to the business as an enabler to achieve desirable results.  The ITS Division provides for operations, software and website design and development, and education.  This includes responsibilities for implementing, supporting, and maintaining all aspects of computer, telephone, and audio/visual systems ensuring that technology usage fully supports organizational goals.  He also has responsibility for information protection including privacy and security.CBS is a nonprofit organization that administers cooperative programs in the areas of health/retirement, property/casualty and consulting/technology to church organizations.  

     

    Richard Rushing, CISO, Motorola Mobility

    Richard Rushing, CISO, Motorola Mobility

    Richard Rushing is the Chief Information Security Officer for Motorola Mobility LLC. Richard participates in corporate, community, private, and government security councils and working groups, setting standards, policiesM, and solutions for current and emerging security issues. As Chief Information Security Officer for Motorola Mobility, he has led the organization’s security effort by developing an international team to tackle targeted attacks, cyber-crime, and emerging threats to mobile devices. He has organized, developed, and deployed practices, tools, and techniques to protect the enterprise’s intellectual property worldwide. A much-in-demand international speaker on information security, Richard has spoken at many of the leading security conferences and seminars around the world.

     

    John Janachowski, Information Security, Disaster Recovery and Business Continuity Leader, Aldi, Inc.

    John has 28 years of multidisciplinary experience in IT leadership with an emphasis in information security, systems and network engineering, and business continuity disciplines. Leading IT Security and Business Continuity for ALDI, Inc. in Batavia, IL, John has been involved in establishing information security risk management practices for an organization that includes more than 1700 stores. Formerly, John was an IT Director for OfficeMax leading the Virtualization, Intel platforms, Microsoft Server Technologies, Messaging, and Disaster Recovery teams. He holds several certifications in security, business continuity, and disaster recovery, and has been published numerous times on security, business continuity, and disaster recovery topics. As a Navy Reservist, John is a Senior Chief specializing in cybersecurity and the IT Rating Advisor to the Commander, Naval Information Forces Reserve. He is a graduate of the Senior Enlisted Academy at the Navy War College in Newport, R.I., and graduated Magna Cum Laude, with a B.A. in Interdisciplinary Studies and Technology. John is currently enrolled at Northeastern Illinois University pursuing a M.A. in History.

     

    Craig Youngberg, Director Cyber Security , ITW

    Craig P. Youngberg is the Director of Cyber Security for Illinois Tool Works (ITW) a Glenview based Fortune 200 manufacturer. Craig has had responsibility for IT Project Management, IT End User Services, IT Risk and Security at ITW. Previously Craig was a Risk Management and Internal Audit executive at the public accounting firm Crowe Horwath. He also has extensive experience in manufacturing and distribution ERP implementations Craig has an MBA from the Katholieke Universiteit Leuven, Belgium, Bachelor of Commerce from the University of British Columbia, CIA, CCSA, CPA, CISSP, CISA, CRISC, and PMP.

Session III:  Presentation: The Legal Dos and Don'ts of Incident Response Management

Scot will leverage his years of experience in data breach response to provide you some best practices in managing the legal and reputational risk of such an incident. How well a company survives a data security incident is directly related to how well it prepares for one. With data security incidents, it is not a matter of IF, but WHEN. Learn what to do and what not to do when data breach comes knocking on your company’s door.

    Scot Ganow, Senior Counsel, Taft Stettinius & Hollister LLP

    Scot is co-chair of the Taft’s Privacy and Data Security Practice.  As a former chief privacy officer and leveraging more than ten years of management and compliance experience in Fortune 500 companies, Scot brings a diverse business background to his privacy and data security practice. Scot has represented clients in a variety of sectors, including consumer reporting, construction, healthcare, and manufacturing. Scot assists clients in all areas of the data life cycle.
    Scot also assists clients in dealing with a variety of data governance regulations, including HIPAA, GLBA, FCRA, and state laws governing personally identifiable information.  has spoken in Washington, D.C., at the Global Summit of the International Association of Privacy Professionals, and the Privacy + Security Conference. Scot was also a speaker at TEDx Dayton 2016 at the Victoria Theater, where he spoke on the “Humanity in Privacy.”
     
    In addition to his data privacy and security practice, Scot also has experience with intellectual property matters as a patent attorney. He also counsels clients on general business law matters.
     
    Scot attended the University of Dayton School of Law, where he currently serves as an adjunct professor of law. He clerked for the University of Dayton general counsel's office and the Cincinnati Reds general counsel. Scot is admitted to practice in the state of Ohio, in the U.S. District Court for the Southern District of Ohio and before the United States Patent and Trademark Office.

Session IV: Presentation: Banking on the Cloud - Risk and Security Lessons Learned During the Hypermodernization of a Bank’s Infrastructure.

    General Grant, Executive Consultant, U.S. Signal

    General Grant, an Executive Consultant for US Signal, specializes in multi speed IT models brought about by disruptive change. General’s work centers primarily on strategies that enable cloud ramp and cloud adoption. As a leading practitioner for IT operating model transformation, he is responsible for consulting to US Signal’s large and strategic account relationships, bringing experience to bear on client transformation programs in areas such as roadmap development, initiative sequencing, capabilities alignment, value stream mapping, compliance and risk, people and culture and multi-source models. General has been an entrepreneur, technology practitioner and consultant for more than 25 years and has led technology and change programs in banking, insurance, healthcare, sports, casino, and manufacturing industries in North America and Europe.

Session V: Presentation: ​Esentire

Session VI.  Presentation: Data Breach Blueprint: Learn from a leading Peer how to prepare and handle a data breach.

Session VII:  Keynote Panel: Data Breach and Risk Management.

It's not whether, it's when.  Join us as key executives describe how they proactively are preparing for data breach and overall risk management strategies.

    Shaoping Zhou, Vice President, Enterprise Architecture, Information Security Officer Transworld Systems

    Joy Mizell Cohn, MS, CIPP-US , Director, Risk Management and Privacy Office, American Medical Association

    Joy Mizell Cohn MS, CBCP, CIPP-US created and oversees the Risk Management and Privacy Office at the American Medical Association. She reports directly to the Chief Financial Officer and annually reports out to the Audit Committee of Board of Trustees.  Joy is responsible for business continuity management, worksite recovery, emergency management and the association’s privacy office. She works very closely with Information Technology, the Office of the General Counsel and Internal Audit identifying and establishing strategies, policies and programs to mitigate cyber security and disaster recovery risk.  Joy oversees  the AMA’s incident response process and works with all business units managing reputation risk through a corporate review process for all Association activities that utilize the AMA name and logo with external entities. 
     

    Jerome Pender, Group CIO and Operating Partner, Z Capital Group, L.L.C.

       

YOU MUST QUALIFY TO ATTEND THIS EXCLUSIVE EVENT *

Questions whether you qualify? Please contact Maria Tuthill at (847) 837-3900 x1

Who Should Attend:

  • CIOs
  • CxOs
  • CISOs
  • Chief Risk Officers
  • COOs
  • Chief Innovation Officers
  • VPs & Directors responsible for driving change

=====================


ATTEND THIS EVENT

LOGISTICS

Lake Forest, IL
Feb 22, 2018,
8AM to 5:30PM

Lake Forest Graduate School of Management
Conway Park
1905 W. Field Court, Lake Forest, IL 60045

8:00 am Continental Breakfast
8:30 am Program begins




How to Register
1. Member Registration

2.

Nonmembers*: $299

If you have a promo code enter it on the payment screen

*This event is only open to CIOs, Senior Technology Executives, Chief Innovation Officers, CxOs and their senior team members Director and above.

CIOs, CTOs, and CxOs from established Technology Consulting Firms and Solution Providers may attend and add to the conversation as long as they are NOT in a field sales position.  An established firm is defined as 50 million in revenue or above.

Technology consulting firms, solution providers and other industry service organizations must be sponsors to participate.

Questions? Call Maria Tuthill 847-837-3900 x 1

Sponsorship Questions? Contact Alex Jarett at 847-837-3900 x 2 for information

==================================
Pre-registration required. Must be Qualified.

Professional business-casual attire required.

Final speakers and topics are subject to change.



What Participants Say About Our Summits

"The Summit was a great day's investment for any CIO/IT leader to heighten knowledge of technology trends and IT leadership insight."
Tom Hupp, VP of IT Young Innovations, Inc.

"I was so inspired I couldn't wait to get back into the office and start changing the world!"
Julie Garnter, Director of Information Systems & Technology, Kenall

"Amazing how Tec pulls in such high quality presenters and panels.  Great job Alex & Maria!"

"I was so engrossed and interested in the program I didn't check my phone or email all day."  

"The depth and breadth of information shared is priceless"

"Mind and career expanding, thank you!" “Very informative"

"Informative and inspiring!"  "Excellent!"  

"Strong content, topics, participants"  "Great education"

"Great, thought provoking session”    "Fantastic leadership insights "

"Good insights and examples of management approaches"

"Good event!  Thought provoking.  I'll attend the next one."

"Outstanding examples and use cases to clarify points" 

 

Earn Continuing Educational Credits


Earn certification credits while you learn!

We will provide each attendee with a certificate toward continuing education.

 

Event Sponsors
Judge








 

 

LEARN HOW TO BECOME A SPEAKER / SPONSOR FOR THIS SUMMIT:
Contact Alex Jarett at 1-847-837-3900 x 2


 

Hotel Accommodations

Hilton Garden Inn Lake Forest Mettawa
26225 Riverwoods Blvd, Mettawa, IL 60045
(847) 735-8374


Holiday Inn Express-Vernon Hills
975 Lakeview Pkwy, Vernon Hills, IL 60061
(847) 367-8031


Hotel Indigo Chicago-Vernon Hills
450 N Milwaukee Ave, Vernon Hills, IL 60061
(847) 918-1400

`
Free Weekly  |   Events  |   About Us  |   Join  |   Vendor Area  |   Get Leads   |   Staff

Copyright © 2018 Technology Executives Club, Ltd. All rights reserved | Privacy Policy