Technology Executives Club | Technology Executives Club| About Us | Contact Us |Privacy Policy
Sunday, September 23, 2018 
Home     Join    Online Education    Peer Advisory    Members    Technology Executives Club    
 

Cyber Security & Risk Management for CIOs and Technology Leaders Summit 2018

From Data Breach to the latest in Emerging Tech for CyberSecurity

Online Training Modules

Security & Compliance Unleashed: From Cost Center to Business Enabler

Security and Compliance, are often incorrectly viewed as necessary evils, cost centers and black holes. However, leveraged correctly, they can provide powerful and insightful data about your company, business processes, systems and customers. They can also be key to improving your operational efficiency and reduce cost as well as demonstrate your company’s domain expertise, in addition to providing assurance to your customers.  Yes, believe it not, Security & Compliance are actually business enablers waiting to be discovered.

View webcast
View webcast

Presentor:

Ricardo Johnson, Sr. Director, Security, Risk & Compliance at CrowdStrike--Sponsored by LaSalle Solutions

Ricardo Johnson, Sr. Director of Security, Risk and Compliance for CrowdStrike Inc., has more than 18 years of experience in the fields of privacy, information security and risk. Previously, he served as the Director of Global Compliance for Ryder, where some of his responsibilities included overseeing privacy and security compliance for the company’s inaugural BYOD, mobile marketing, social media and cloud migration programs, along with other regulatory mandates such as export controls and Anti-bribery and PCI. Prior to Ryder, Ricardo served as the Chief Privacy & IT Compliance Officer for Burger King Corporation. Ricardo has also been a guest speaker on privacy, security and risk topics at the Visa PCI Symposium, WorldCompliance Summit, IAPP, Cloud Security Alliance (CSA), Institute of Internal Auditors (IIA) and Compliance Elliance.


Panel Discussion: Managing Cyber Security and Operational Technology Threats for the Digital Enterprise

This panel will discuss and share their practical experiences and real-world strategies in protecting their company from the growing cyber security and operational technology threats.

View webcast
Panelists:

Tom Drez, CIO/CPO/CSO, Christian Brothers Services

Tom Drez, CIO/CPO/CSO, Christian Brothers Services

Tom Drez serves as Chief Information Officer and Managing Director of the Information & Technology Services (ITS) Division of Christian Brothers Services (CBS).  Tom joined CBS in 1987 to lead the division and take on the responsibility to strategically apply information technology to the business as an enabler to achieve desirable results.  The ITS Division provides for operations, software and website design and development, and education.  This includes responsibilities for implementing, supporting, and maintaining all aspects of computer, telephone, and audio/visual systems ensuring that technology usage fully supports organizational goals.  He also has responsibility for information protection including privacy and security.CBS is a nonprofit organization that administers cooperative programs in the areas of health/retirement, property/casualty and consulting/technology to church organizations.  

John Janachowski, Information Security, Disaster Recovery and Business Continuity Leader, Aldi, Inc.

John has 28 years of multidisciplinary experience in IT leadership with an emphasis in information security, systems and network engineering, and business continuity disciplines. Leading IT Security and Business Continuity for ALDI, Inc. in Batavia, IL, John has been involved in establishing information security risk management practices for an organization that includes more than 1700 stores. Formerly, John was an IT Director for OfficeMax leading the Virtualization, Intel platforms, Microsoft Server Technologies, Messaging, and Disaster Recovery teams. He holds several certifications in security, business continuity, and disaster recovery, and has been published numerous times on security, business continuity, and disaster recovery topics. As a Navy Reservist, John is a Senior Chief specializing in cybersecurity and the IT Rating Advisor to the Commander, Naval Information Forces Reserve.

Mark Shipman, Director IT Operations, Vibes Media

Mark Shipman, CISSP, CISM, CRISC, Director IT, Infrastructure, and Security, Vibes Media

Mark Shipman is Director IT, Infrastructure, and Security at Vibes Media, a Software as a Service (SaaS) company that allows brands to interact 1:1 with mobile consumers at scale. Mark began his career building security technology to protect electric power grids and nuclear generation facilities. From there he moved to the financial sector before joining the Internet boom where he built security solutions for large online retailers in the early days of e-commerce. Since then he has brought his experience to online universities, pharmaceutical companies, and HR benefits companies. At Vibes Media he built the security and compliance program from the ground up to enable the company to pursue new customers with detailed security and privacy requirements.

Richard Rushing, CISO, Motorola Mobility

Moderator: Richard Rushing, CISO, Motorola Mobility

Richard Rushing is the Chief Information Security Officer for Motorola Mobility LLC. Richard participates in corporate, community, private, and government security councils and working groups, setting standards, policiesM, and solutions for current and emerging security issues. As Chief Information Security Officer for Motorola Mobility, he has led the organization’s security effort by developing an international team to tackle targeted attacks, cyber-crime, and emerging threats to mobile devices. He has organized, developed, and deployed practices, tools, and techniques to protect the enterprise’s intellectual property worldwide. A much-in-demand international speaker on information security, Richard has spoken at many of the leading security conferences and seminars around the world.


Presentation: Banking on the Cloud - Risk and Security Lessons Learned During the Hypermodernization of a Bank’s Infrastructure.

 

View webcast
View webcast

General Grant, Executive Consultant, U.S. Signal

General Grant, an Executive Consultant for US Signal, specializes in multi speed IT models brought about by disruptive change. General’s work centers primarily on strategies that enable cloud ramp and cloud adoption. As a leading practitioner for IT operating model transformation, he is responsible for consulting to US Signal’s large and strategic account relationships, bringing experience to bear on client transformation programs in areas such as roadmap development, initiative sequencing, capabilities alignment, value stream mapping, compliance and risk, people and culture and multi-source models. General has been an entrepreneur, technology practitioner and consultant for more than 25 years and has led technology and change programs in banking, insurance, healthcare, sports, casino, and manufacturing industries in North America and Europe.


Presentation: The Legal Dos and Don'ts of Incident Response Management

Scot will leverage his years of experience in data breach response to provide you some best practices in managing the legal and reputational risk of such an incident. How well a company survives a data security incident is directly related to how well it prepares for one. With data security incidents, it is not a matter of IF, but WHEN. Learn what to do and what not to do when data breach comes knocking on your company’s door.


View webcast
View webcast

Scot Ganow, Senior Counsel, Taft Stettinius & Hollister LLP

Scot is co-chair of the Taft’s Privacy and Data Security Practice.  As a former chief privacy officer and leveraging more than ten years of management and compliance experience in Fortune 500 companies, Scot brings a diverse business background to his privacy and data security practice. Scot has represented clients in a variety of sectors, including consumer reporting, construction, healthcare, and manufacturing. Scot assists clients in all areas of the data life cycle.
Scot also assists clients in dealing with a variety of data governance regulations, including HIPAA, GLBA, FCRA, and state laws governing personally identifiable information.  has spoken in Washington, D.C., at the Global Summit of the International Association of Privacy Professionals, and the Privacy + Security Conference. Scot was also a speaker at TEDx Dayton 2016 at the Victoria Theater, where he spoke on the “Humanity in Privacy.

 


Minimizing the Detection to Recovery Timeframe- Avoid the potential effects sophisticated threat actors can have on business operations and new breach notification mandates

While recent trends have shown attackers are more frequently using simple tools and tactics to make a big impact to the overall global cost of data breaches, sophisticated threat actors utilizing advanced techniques to avoid detection could potentially have the greatest impact to an organization’s bottom line. Now more than ever is minimizing the detection to response timeframe of utmost importance to ensure an organization is able to not only detect threats but contain and respond in a timeframe that minimizes the risks As organizations begin to address this transition, knowing where to start is a challenge. We we will cover the best path going forward and real-life examples of how advanced detection and response capabilities were able to thwart attackers and satisfy even the most stringent emerging regulatory requirements.

View webcast
View webcast

Sean Blenkhorn, Vice President, Solutions Engineering & Advisory Services

Sean Blenkhorn, Vice President, Solutions Engineering & Advisory Services, eSentire


Sean Blenkhorn spent much of his 20-year career consulting with leading global (FORTUNE 50, 100, 500 and 1000) companies on security and compliance solutions. As Vice President of Solutions Engineering & Advisory Services, Sean leads a global team as they provide guidance, consultation and technical perspective to new customers as they evaluate and adopt eSentire services to address their security and compliance requirements. Sean has an Associate’s Degree in Software Engineering from Georgian College.


Blueprint/Case study of AI and Machine Learning Technologies for Security Threat Management

In this study, Shaoping will share how unsupervised machine learning (ML) based threat detection security technology helped his firm's security architecture and operations. There is much to share about the pros and cons, lessons learned. Major topics include the following: What AI and machine learning is How it is applied to security threat recognition Why it is becoming more and more important to the overall security architecture How to leverage various ML solution in your security operations

View webcast
View webcast

Shaoping Zhou, Vice President, Enterprise Architecture, Information Security Officer Transworld Systems

Shaoping Zhou leads the cyber security and enterprise architecture practices in Transworld Systems Inc (TSI). He has a wealth of experiences and knowledge in design security architecture for highly sensitive data under regulation, all aspects of security controls and operations, and enterprise risk management and governance. He has innovated the development of the cyber security architecture in TSI by introducing machine learning to threat management, significantly leveraging managed security services (MSS), and simplifying security architecture landscape.

 


Panel Discussion #2: Data Breach and Risk Management

It's not whether, it's when.  Join us as key executives describe how they proactively are preparing for data breach and overall risk management strategies.

View webcast

Panelists:

Joy Mizell Cohn, MS, CIPP-US , Director, Risk Management and Privacy Office, American Medical Association

Joy Mizell Cohn MS, CBCP, CIPP-US created and oversees the Risk Management and Privacy Office at the American Medical Association. She reports directly to the Chief Financial Officer and annually reports out to the Audit Committee of Board of Trustees.  Joy is responsible for business continuity management, worksite recovery, emergency management and the association’s privacy office. Joy oversees  the AMA’s incident response process and works with all business units managing reputation risk through a corporate review process for all Association activities that utilize the AMA name and logo with external entities. 
 

Michael Biagioli, CIO, Waukesha County

Michael Biagioli, CIO, Waukesha County, has over 45 years of experience. Under his leadership, technology has moved into alignment with the business needs of the county, with a focus on measured Return on Investment for the implementation of technology improvements. Mr. Biagioli has moved IT away from custom in-house developed application, traditional for government IT, to an organization that functions as a system integrator for Off-the-Shelf software packages.

Shaoping Zhou, Vice President, Enterprise Architecture, Information Security Officer Transworld Systems

Shaoping Zhou leads the cyber security and enterprise architecture practices in Transworld Systems Inc (TSI). He has a wealth of experiences and knowledge in design security architecture for highly sensitive data under regulation, all aspects of security controls and operations, and enterprise risk management and governance. He has innovated the development of the cyber security architecture in TSI by introducing machine learning to threat management, significantly leveraging managed security services (MSS), and simplifying security architecture landscape.

Brian Cleveland, Vice President IT,  Vi Senior Living

Brian Cleveland leads the technology strategy and IT program execution at Vi Senior Living. He is responsible for the management and support of the information technology department which includes enterprise applications, information security, and the underlying networks and systems including the data center.

 


 

   
 

Copyright © 2018 Technology Executives Club, Ltd. All rights reserved | Privacy Policy