Technology Executives Club | Technology Executives Club| About Us | Contact Us |Privacy Policy
Tuesday, June 19, 2018 
Home     Join    Blog    Members    Peer Advisory    Technology Executives Club    
 

Cyber Security and Risk Management for
CIOs and Technology Leaders

This is the Members Only area with Premium Online Training for your team focused on Cyber Security. For information on joining the Technology Innovation Institute, please visit the Join page.

Online Training Modules

Summit 2018

From Data Breach to the Latest in Emerging Tech for CyberSecurity

Security & Compliance Unleashed: From Cost Center to Business Enabler

Security and Compliance, are often incorrectly viewed as necessary evils, cost centers and black holes. However, leveraged correctly, they can provide powerful and insightful data about your company, business processes, systems and customers. They can also be key to improving your operational efficiency and reduce cost as well as demonstrate your company’s domain expertise, in addition to providing assurance to your customers.  Yes, believe it not, Security & Compliance are actually business enablers waiting to be discovered.

View webcast
View webcast

Presentor:

Ricardo Johnson, Sr. Director, Security, Risk & Compliance at CrowdStrike--Sponsored by LaSalle Solutions

Ricardo Johnson, Sr. Director of Security, Risk and Compliance for CrowdStrike Inc., has more than 18 years of experience in the fields of privacy, information security and risk. Previously, he served as the Director of Global Compliance for Ryder, where some of his responsibilities included overseeing privacy and security compliance for the company’s inaugural BYOD, mobile marketing, social media and cloud migration programs, along with other regulatory mandates such as export controls and Anti-bribery and PCI. Prior to Ryder, Ricardo served as the Chief Privacy & IT Compliance Officer for Burger King Corporation. Ricardo has also been a guest speaker on privacy, security and risk topics at the Visa PCI Symposium, WorldCompliance Summit, IAPP, Cloud Security Alliance (CSA), Institute of Internal Auditors (IIA) and Compliance Elliance.


Panel Discussion: Managing Cyber Security and Operational Technology Threats for the Digital Enterprise

This panel will discuss and share their practical experiences and real-world strategies in protecting their company from the growing cyber security and operational technology threats.

View webcast
Panelists:

Tom Drez, CIO/CPO/CSO, Christian Brothers Services

Tom Drez, CIO/CPO/CSO, Christian Brothers Services

Tom Drez serves as Chief Information Officer and Managing Director of the Information & Technology Services (ITS) Division of Christian Brothers Services (CBS).  Tom joined CBS in 1987 to lead the division and take on the responsibility to strategically apply information technology to the business as an enabler to achieve desirable results.  The ITS Division provides for operations, software and website design and development, and education.  This includes responsibilities for implementing, supporting, and maintaining all aspects of computer, telephone, and audio/visual systems ensuring that technology usage fully supports organizational goals.  He also has responsibility for information protection including privacy and security.CBS is a nonprofit organization that administers cooperative programs in the areas of health/retirement, property/casualty and consulting/technology to church organizations.  

John Janachowski, Information Security, Disaster Recovery and Business Continuity Leader, Aldi, Inc.

John has 28 years of multidisciplinary experience in IT leadership with an emphasis in information security, systems and network engineering, and business continuity disciplines. Leading IT Security and Business Continuity for ALDI, Inc. in Batavia, IL, John has been involved in establishing information security risk management practices for an organization that includes more than 1700 stores. Formerly, John was an IT Director for OfficeMax leading the Virtualization, Intel platforms, Microsoft Server Technologies, Messaging, and Disaster Recovery teams. He holds several certifications in security, business continuity, and disaster recovery, and has been published numerous times on security, business continuity, and disaster recovery topics. As a Navy Reservist, John is a Senior Chief specializing in cybersecurity and the IT Rating Advisor to the Commander, Naval Information Forces Reserve.

Mark Shipman, Director IT Operations, Vibes Media

Mark Shipman, CISSP, CISM, CRISC, Director IT, Infrastructure, and Security, Vibes Media

Mark Shipman is Director IT, Infrastructure, and Security at Vibes Media, a Software as a Service (SaaS) company that allows brands to interact 1:1 with mobile consumers at scale. Mark began his career building security technology to protect electric power grids and nuclear generation facilities. From there he moved to the financial sector before joining the Internet boom where he built security solutions for large online retailers in the early days of e-commerce. Since then he has brought his experience to online universities, pharmaceutical companies, and HR benefits companies. At Vibes Media he built the security and compliance program from the ground up to enable the company to pursue new customers with detailed security and privacy requirements.

Richard Rushing, CISO, Motorola Mobility

Moderator: Richard Rushing, CISO, Motorola Mobility

Richard Rushing is the Chief Information Security Officer for Motorola Mobility LLC. Richard participates in corporate, community, private, and government security councils and working groups, setting standards, policiesM, and solutions for current and emerging security issues. As Chief Information Security Officer for Motorola Mobility, he has led the organization’s security effort by developing an international team to tackle targeted attacks, cyber-crime, and emerging threats to mobile devices. He has organized, developed, and deployed practices, tools, and techniques to protect the enterprise’s intellectual property worldwide. A much-in-demand international speaker on information security, Richard has spoken at many of the leading security conferences and seminars around the world.


Presentation: Banking on the Cloud - Risk and Security Lessons Learned During the Hypermodernization of a Bank’s Infrastructure.

 

View webcast
View webcast

General Grant, Executive Consultant, U.S. Signal

General Grant, an Executive Consultant for US Signal, specializes in multi speed IT models brought about by disruptive change. General’s work centers primarily on strategies that enable cloud ramp and cloud adoption. As a leading practitioner for IT operating model transformation, he is responsible for consulting to US Signal’s large and strategic account relationships, bringing experience to bear on client transformation programs in areas such as roadmap development, initiative sequencing, capabilities alignment, value stream mapping, compliance and risk, people and culture and multi-source models. General has been an entrepreneur, technology practitioner and consultant for more than 25 years and has led technology and change programs in banking, insurance, healthcare, sports, casino, and manufacturing industries in North America and Europe.


Presentation: The Legal Dos and Don'ts of Incident Response Management

Scot will leverage his years of experience in data breach response to provide you some best practices in managing the legal and reputational risk of such an incident. How well a company survives a data security incident is directly related to how well it prepares for one. With data security incidents, it is not a matter of IF, but WHEN. Learn what to do and what not to do when data breach comes knocking on your company’s door.


View webcast
View webcast

Scot Ganow, Senior Counsel, Taft Stettinius & Hollister LLP

Scot is co-chair of the Taft’s Privacy and Data Security Practice.  As a former chief privacy officer and leveraging more than ten years of management and compliance experience in Fortune 500 companies, Scot brings a diverse business background to his privacy and data security practice. Scot has represented clients in a variety of sectors, including consumer reporting, construction, healthcare, and manufacturing. Scot assists clients in all areas of the data life cycle.
Scot also assists clients in dealing with a variety of data governance regulations, including HIPAA, GLBA, FCRA, and state laws governing personally identifiable information.  has spoken in Washington, D.C., at the Global Summit of the International Association of Privacy Professionals, and the Privacy + Security Conference. Scot was also a speaker at TEDx Dayton 2016 at the Victoria Theater, where he spoke on the “Humanity in Privacy.

 


Minimizing the Detection to Recovery Timeframe- Avoid the potential effects sophisticated threat actors can have on business operations and new breach notification mandates

While recent trends have shown attackers are more frequently using simple tools and tactics to make a big impact to the overall global cost of data breaches, sophisticated threat actors utilizing advanced techniques to avoid detection could potentially have the greatest impact to an organization’s bottom line. Now more than ever is minimizing the detection to response timeframe of utmost importance to ensure an organization is able to not only detect threats but contain and respond in a timeframe that minimizes the risks As organizations begin to address this transition, knowing where to start is a challenge. We we will cover the best path going forward and real-life examples of how advanced detection and response capabilities were able to thwart attackers and satisfy even the most stringent emerging regulatory requirements.

View webcast
View webcast

Sean Blenkhorn, Vice President, Solutions Engineering & Advisory Services

Sean Blenkhorn, Vice President, Solutions Engineering & Advisory Services, eSentire


Sean Blenkhorn spent much of his 20-year career consulting with leading global (FORTUNE 50, 100, 500 and 1000) companies on security and compliance solutions. As Vice President of Solutions Engineering & Advisory Services, Sean leads a global team as they provide guidance, consultation and technical perspective to new customers as they evaluate and adopt eSentire services to address their security and compliance requirements. Sean has an Associate’s Degree in Software Engineering from Georgian College.


Blueprint/Case study of AI and Machine Learning Technologies for Security Threat Management

In this study, Shaoping will share how unsupervised machine learning (ML) based threat detection security technology helped his firm's security architecture and operations. There is much to share about the pros and cons, lessons learned. Major topics include the following: What AI and machine learning is How it is applied to security threat recognition Why it is becoming more and more important to the overall security architecture How to leverage various ML solution in your security operations

View webcast
View webcast

Shaoping Zhou, Vice President, Enterprise Architecture, Information Security Officer Transworld Systems

Shaoping Zhou leads the cyber security and enterprise architecture practices in Transworld Systems Inc (TSI). He has a wealth of experiences and knowledge in design security architecture for highly sensitive data under regulation, all aspects of security controls and operations, and enterprise risk management and governance. He has innovated the development of the cyber security architecture in TSI by introducing machine learning to threat management, significantly leveraging managed security services (MSS), and simplifying security architecture landscape.

 


Panel Discussion #2: Data Breach and Risk Management

It's not whether, it's when.  Join us as key executives describe how they proactively are preparing for data breach and overall risk management strategies.

View webcast

Panelists:

Joy Mizell Cohn, MS, CIPP-US , Director, Risk Management and Privacy Office, American Medical Association

Joy Mizell Cohn MS, CBCP, CIPP-US created and oversees the Risk Management and Privacy Office at the American Medical Association. She reports directly to the Chief Financial Officer and annually reports out to the Audit Committee of Board of Trustees.  Joy is responsible for business continuity management, worksite recovery, emergency management and the association’s privacy office. Joy oversees  the AMA’s incident response process and works with all business units managing reputation risk through a corporate review process for all Association activities that utilize the AMA name and logo with external entities. 
 

Michael Biagioli, CIO, Waukesha County

Michael Biagioli, CIO, Waukesha County, has over 45 years of experience. Under his leadership, technology has moved into alignment with the business needs of the county, with a focus on measured Return on Investment for the implementation of technology improvements. Mr. Biagioli has moved IT away from custom in-house developed application, traditional for government IT, to an organization that functions as a system integrator for Off-the-Shelf software packages.

Shaoping Zhou, Vice President, Enterprise Architecture, Information Security Officer Transworld Systems

Shaoping Zhou leads the cyber security and enterprise architecture practices in Transworld Systems Inc (TSI). He has a wealth of experiences and knowledge in design security architecture for highly sensitive data under regulation, all aspects of security controls and operations, and enterprise risk management and governance. He has innovated the development of the cyber security architecture in TSI by introducing machine learning to threat management, significantly leveraging managed security services (MSS), and simplifying security architecture landscape.

Brian Cleveland, Vice President IT,  Vi Senior Living

Brian Cleveland leads the technology strategy and IT program execution at Vi Senior Living. He is responsible for the management and support of the information technology department which includes enterprise applications, information security, and the underlying networks and systems including the data center.

 


Summit 2017

Practical Strategies and Frameworks for Balancing Risk &
Innovation in the Digital Enterprise

Addressing the Nation-State & Black Hat Cyber Terror Frontier

Jack will address three new cyber security areas for protecting critical infrastructure and Internet threat mitigation:

  • Threat Isolation
  • Scada Control Security
  • EMP

Jack has over 35 years of experience in developing advanced high-availability IT platforms including the design, build, commission and operation of mission critical global IT facilities

 

View webcast
View webcast

Presentor:

Jack Pressman, CTO, Cyber Innovation Labs

Jack Pressman, CTO, Cyber Innovation Labs

Jack Pressman has over 35 years of experience in developing advanced high-availability IT platforms including the design, build, commission and operation of mission critical global IT facilities. 

Mr. Pressman has become an industry leader in the master technology planning, financial modeling, design, build and turn-key implementation of Threat Isolation Platforms hardened for Cyber Ransom/Mal/Terror Ware, EMP, HEMP, IEMI and Geomagnetic Storm protected critical enterprise infrastructure. 

Mr. Pressman is currently managing the global deployment of 20 ultra-resilient shielded facilities that each can operate a minimum of 30 days without external refueling. This will represent the most advanced max-resilient infrastructure portfolio in the commercial mission critical enterprise data center and private cloud computing market space.


Panel Discussion: Cyber Security, Cyber Warfare and Operational Technology Threats for the Digital Enterprise

Join a panel of CIOs, CISOs as they share both their experiences and strategies in protecting their company from the growing cyber security and cyber warfare threat

View webcast
Panelists:

 

Joe Slone, CISO, 1WorldSync

Joe Slone, CISO, 1WorldSync

Joe Slone is the CISO at 1WorldSync, the worlds largest GDSN Data Pool and Product Information Cloud solution, which provides global product information management solutions to suppliers and retailers. He has over 16 years of security experience from startups to mature global companies.


Karla Thomas, Director IT, Global Security and Audit, Tower International

Karla's IT career began as a trainer and for over twenty years has focused on the end user and business community. In her twelve plus years at Tower International she has had responsibility globally for support and IT audit.

 

Michael Biagioli, CIO, Waukesha County

Michael Biagioli, CIO, Waukesha County, has over 45 years of experience. Under his leadership, technology has moved into alignment with the business needs of the county, with a focus on measured Return on Investment for the implementation of technology improvements.

 

Tim Walter, CIO, The Packaging Wholesalers

Tim Walter is the Chief Information\Digital Officer of The Packaging Wholesalers.  He is responsible for all technology of the B2B distributor network, all digital marketing for various distributor e-commerce platforms, and hosting for customer websites.  

 

Jack Pressman, CTO, Cyber Innovation Labs

Moderator: Jack Pressman, CTO, Cyber Innovation Labs

Jack Pressman has over 35 years of experience in developing advanced high-availability IT platforms including the design, build, commission and operation of mission critical global IT facilities. 

Mr. Pressman has become an industry leader in the

 


Presentation: Global Security Trends & Technology Prospects

In this important session we will discuss emerging trends in cyber security and new types of attacks. These attacks are getting past traditional defenses- it is time to find innovative new approaches to help humans fight these threats. We will review examples of the new types of attacks that are out there and a new approach to cyber defense

View webcast
View webcast

Justin Fier, Director for Cyber Intelligence and Analysis, Darktrace

Justin Fier joined Darktrace in 2015 as a Director for Cyber Intelligence and Analytics. As a contractor for over 10 years, Mr. Fier supported various elements in the US intelligence community with a focus on cyber operations and counter terrorism.   Having worked in both offensive and defensive cyber arenas, the move to Darktrace’s next generation machine learning seemed like a natural progression.  



Presentation: Control the Creep: Streamline Data Security and Compliance by Sharing the Work Load.

IT professionals are struggling to adapt to the ever-changing data security landscape. Bolt-on technologies, the lack of required skill-sets and shifting compliance requirements make it nearly impossible for many organizations to secure their technical assets. Learn how new approaches in IT security services can ensure you have all your bases covered through the adoption of a proven, comprehensive security apparatus.


View webcast

Aaron Shaver, Vice President & Chief Technology Officer, US Signal Company

Aaron Shaver, vice president and chief technology officer, leads US Signal’s long-term technology vision, and is responsible for strategic customer partnerships, university collaboration, industry thought leadership, and advanced technical solutions.

Prior to joining US Signal, Aaron served as the Executive Director of Information Management for Spectrum Pennock Health Services. He has also lead research and development for US Signal, establishing the MPLS, Carrier Ethernet and Cloud practices.  Aaron has a 20-year background in telecommunications, data center design and information security.

Aaron holds a doctorate in information assurance and computer science and a Master of Science in information security.  His research focused on enterprise disaster recovery and mitigation.

 

 

Panel Discussion #2: Risk Management Strategies for the Digital Enterprise

Join a panel of CIOs and Senior Risk Management as they discuss how their overall risk management framework is adjusted due to the shift to the digital enterprise

View webcast

Panelists:

Jacob Springer, Global Privacy Officer, Abbott

Jacob Springer, Global Privacy Officer, Abbott

As the Global Privacy Leader and Division Counsel at Abbott Laboratories, Jacob leads the company's privacy program and supports Abbott's global businesses as Chief Privacy Counsel.Jacob has 15 years of experience in leading global privacy programs for Fortune 100 companies.

   

Brian Cleveland, Vice President IT,  Vi Senior Living

Brian Cleveland leads the technology strategy and IT program execution at Vi Senior Living. He is responsible for the management and support of the information technology department which includes enterprise applications, information security, and the underlying networks and systems including the data center. 

   
Tom Kaczmarek, Director, Center for Cyber Security Awareness and Cyber Defense, Marquette University

Tom Kaczmarek, Director, Center for Cyber Security Awareness and Cyber Defense, Marquette University

Tom Kaczmarek leads the newly created Center for Cyber Security Awareness and Cyber Defense and the MS in Computing program at Marquette University. He has a background as an executive in IT and computing with an emphasis on manufacturing.

   

Christine Watts, Chief Enterprise Architect, The University of Chicago Medicine

Christine is a 29 year IT professional with experience in many industries, most recently as a Chief Enterprise Architect at the University of Chicago Medicine, responsible for governing IT architecture including principles, strategy & roadmaps, and alignment of IT spending with business strategy, goals & objectives.

   
Biff L. Myre, Director, Onx

Moderator: Biff L. Myre, Director, Onx

Biff is a thought leader in the realm of availability, resiliency, and disaster recovery and business continuity. A consummate professional who works within many regulated industries including financial, insurance, transportation, utilities, and healthcare.

 

 

 

 
 

Copyright © 2018 Technology Executives Club, Ltd. All rights reserved | Privacy Policy