Technology Executives Club | Jobs | Providers | About Us | Contact Us
Saturday, November 18, 2017 
Home    Join    Events   Peer Advisory    Innovation Institute     Gallery    Blog    Providers
 

IT and Cyber Security Strategies for the new, Digital Enterprise

The shift to the Digital Enterprise increases the Security Risk.

Are YOU ready?

The Shift to the Digital Enterprise is happening for all size companies. And the rate of persistent threats is increasing. In a recent Leaders Circle luncheon, a senior IT executive suggested that is isn't "whether" you get breached, but "when."

Enterprise mobility, consumer apps used in the business, new core technologies, hybrid cloud environments, shadow IT and SAAS environments, Internet of Things and Big Data.

All of these technologies bring about both opportunity and risk.

This seminar is designed to help YOU prepare, as well as give you strategies to both prevent data breaches and non-compliance incidents and what to do if and when the worst happens.

Top IT executives from leading Midwest companies will share insights to help you succeed:

  • How to Prepare for Massive Data Breaches and what to do if/when the worst case happens.
  • How to deal with shadow IT and the business.
  • Strategies for data protection in a mobile environment
  • How the Internet of Things is increasing risk, and how to minimize it.
  • Is the cloud a necessary evil? How to protect your organization from itself and make sure you choose and maintain the RIGHT cloud environment for your organization.
  • Learn how other organizations are protecting their digital assets and identify in the cloud
  • Explore ongoing compliance concerns, trends in IT security, the top cyber attacks, where you might be vulnerable, and more!

KEYNOTE PANEL

Kevin B. Boyd, Chief Information Officer, Information Technology, The University of Chicago, Booth School of Business

Kevin B. Boyd, Chief Information Officer, Information Technology, The University of Chicago, Booth School of Business

Kevin B. Boyd is the Chief Information Officer at the University of Chicago Booth School of Business. He has responsibility for the technology at Chicago Booth’s campuses in Chicago, London, Singapore and Hong Kong. Prior to coming to Booth, he was the Vice President of Product Management for Tribune Company. Boyd previously served first as a PMO Director and then as Director of Quality Assurance and Testing for CNA Financial in Chicago. Boyd previously worked for United Airlines as Director of Ecommerce Systems. He was also an adjunct professor at Northwestern University for nine years, teaching classes in ecommerce and working with students on entrepreneurship related independent study projects. Boyd holds a bachelor’s degree in Broadcast and Electronic Communication from Marquette University in Milwaukee, WI, and a master’s degree in Communication Systems, Strategy and Management from Northwestern University in Evanston, IL.

Michael D. Boucher, Director, Information Risk Management, FTD

Michael D. Boucher, Director, Information Risk Management, FTD

Mike has twenty years of experience working in the information security industry and is a Certified Information Systems Security Professional (CISSP). Mike is the Director of Information Risk Management for FTD Companies.

Mike joined FTD in 2013 to build the information risk and security functions after FTD was spun off as an independent company.

Prior to FTD, Mike worked in information security leadership roles at PwC and Xerox where he was responsible for advising clients and delivering information security solutions. Mike’s industry experience includes financial services, retail, manufacturing, pharmaceutical and bio-tech.

Mike holds a bachelor of arts degree from Lewis University and an MBA from the University of Notre Dame.

Stephen W. Locke, CISSP Director of Security Technology & Controls Enterprise Enablement, Northern Trust

Stephen W. Locke, CISSP Director of Security Technology & Controls Enterprise Enablement, Northern Trust

Stephen (Steve) W. Locke is a Senior Vice President at The Northern Trust Company, Chicago. He is the Director of Security Technology and reports to the Chief Technology Officer and Chief Information Security Officer. Steve is responsible for all physical and logical security technology globally and advises clients, boards and executives on cyber security. Prior to joining Northern Trust in September, 1996, he was the head of corporate IT strategy at Baxter International and a financial analyst at Time Warner Inc. Stephen received a B.A. degree in information technology management from DePaul University. He is a member of the Department of Homeland Security ‘s Electronic Crimes Taskforce, and the FBI Infragard Program with secret clearance. He is also a member of The Technology Policy Division of The Financial Services Roundtable and The Financial Services Information Sharing and Analysis Center.

Karl Scott Executive Consultant W. Capra Consulting Group

Moderator: Karl Scott Executive Consultant W. Capra Consulting Group

Karl Scott is an Executive Consultant with W. Capra Consulting and a key contributor to the TEC Security Roundtable. He is an accomplished IT leader and trusted advisor with a proven track record of development and implementation of IT strategies, future state architectures, and security programs. He has developed strong IT architecture teams and demonstrated success partnering with C-level leadership across the organization to address business needs. He is recognized for the ability to take on the most complex challenges, achieve simplicity and deliver positive results. Karl is a recognized leader in cloud computing and a tireless advocate for effective security.

 

   

EXECUTIVE BRIEFINGS

Chris Camejo, Director of Threat and Vulnerability Analysis, NTT Com Security

Security 101: Staying Out of the News
-Chris Camejo, Director of Threat and Vulnerability Analysis, NTT Com Security

Despite the recent increased reporting of security breaches at well-known retail chains and companies, most managers remain uninformed about their own network vulnerabilities and the nature of the threats they face. This session will alert participants about the most common current weaknesses and how easily they can be exploited, then provide clear, actionable steps that will improve the security posture of every organization. Every manager will benefit, coding expertise not required.

Carlos Munoz, Cyber Security Executive, Darktrace

The Enterprise Immune System: A new approach to Cyber Defense
- Carlos Munoz, Cyber Security Executive, Darktrace

Fast-evolving cyber-threats call for a change in the way we protect our most critical information assets, in a digital world more connected than ever. Learn how new self-learning technology, known as the Enterprise Immune System, marks a fundamental transition in cyber defense, allowing organizations to gain indispensable visibility into their network, and detect emerging cyber-threats that bypass traditional security controls. Thanks to major advances in mathematics and unsupervised machine learning developed at the University of Cambridge, UK, Darktrace's fundamentally new and innovative technology is capable of learning what is normal and abnormal within an organization, detecting even the most subtle behavioral anomalies in real time, without the use of rules or signatures.

Michael Gabriel ,Director, Information Security Consulting, Mercury Consulting

Aligning your Security Program to a Security Control Framework
- Michael Gabriel ,Director, Information Security Consulting, Mercury Consulting


Organizations are increasingly pushing requirements down to their business partners in an effort at performing due diligence for protecting the sensitive information they share. Security Control Frameworks (such as ISO 27001) allow you to use a recognized language for communicating risk. Aligning your information security program to a Security Control Framework will help you to communicate your security control environment to your partners to address their concerns about security. Learn what is involved in aligning your security program to a Security Control Framework, and how you can use this process to improve your security controls.



Navigating the Gauntlet: Security, Compliance and Chain of Custody for Deployment of an Enterprise Cloud Computing Platform
- Jack Pressman, CTO, Cyber Innovation Labs

 

Who Should Attend:

  • CIOs, CISOs
  • Senior IT and LOB Executives
  • VPs & Directors responsible for IT Security and Compliance
  • Any IT Executives and Managers who provide security and compliance direction and support to LOB functions

=====================

ATTEND THIS EVENT

LOGISTICS

Chicago, IL
Feb 25, 2016
, 12:30 PM to 5:00 PM
Union League Club, French Room
65 W. Jackson Blvd. Chicago IL 60604

Questions? Call Maria Tuthill
847-837-3900 x 1

HOW TO REGISTER

IT Executives & Staff Members

1. Members: Register Here to Use Your Ticket package or Contact Member Services at 847-837-3900 x1

2. Nonmembers: Learn how to attend this event with a complimentary VIP Pass

Providers (Hardware, Software, Consultants)

1.Members: Who have a ticket package, Register here.

==================================
Pre-registration required.

Professional business-casual attire required.

Final speakers and topics are subject to change.

Event Sponsors
IIT
Interested in Sponsorship of
this Event?

Questions? Contact Alex Jarett at 847-837-3900 x 2 for information

 

 

 

`  
Free Weekly  |   Events  |   About Us  |   Join  |   Vendor Area  |   Get Leads   |   Staff

Copyright © 2017 Technology Executives Club, Ltd. All rights reserved | Privacy Policy