Technology Executives Club | Jobs | Providers | About Us | Contact Us
Tuesday, September 17, 2019 
Home    VIP Club    Events    Webinars    Peer Advisory   Members   Innovation Institute     Gallery       Providers

Top IT Trends Seminar:

IT Security - Mobile, Data, Persistent Threats

Expertise in IT security, compliance and digital asset protection -- especially in the mobile, social media and cloud arenas -- is ranked the NUMBER ONE skill CIOs need to succeed in the rapidly expanding IT landscape, according to a 2012 survey.

This seminar is designed to help YOU prepare, as well as give you strategies to prevent data breaches and non-compliance incidents that damage customer trust and cost your organization big bucks.

Top IT executives from leading Midwest companies will share insights to help you succeed:

  • Get strategies for successfully managing Bring-You-Own-Device (BYOD) security risks without crimping collaboration and productivity
  • Learn how other organizations are protecting their digital assets and identify in the cloud
  • Gain insights to ensure the security, privacy and regulatory compliance of all systems, including mobile and portable technology
  • Explore ongoing compliance concerns, trends in IT security, the top cyber attacks, where you might be vulnerable, and more!





Eric Maher, Information Security Manager, Foley & Lardner LLP

Eric has fifteen years of experience in information security as an administrator, auditor, architect, and manager. In his current role as Information Security Manager at Foley & Lardner LLP, Eric manages the Firm's and client's regulatory, contractual, and ethical security requirements in an increasingly mobile and decentralized environment. Foley has embraced the BYOD model and uses third party cloud vendors to house and process critical applications and data. He has worked across many industries including manufacturing, financial services, the federal government, and the Department of Defense.

Mike Block, VP Technology Officer, The Equitable Bank

Mike Block, VP Technology Officer, The Equitable Bank has been with Equitable Bank for 20 years. A graduate of UW-Milwaukee, Mike holds a professional certification from the International Information Systems Security Certification Consortium (ISC2), a a Certified Information Systems Security Professional (CISSP), and serves on the Board of the Milwaukee Chapter of the Information Systems Security Association (ISSA). He is also a member of the Milwaukee Chapter of Infragard. At Equitable we are moving forward with Mobility and Social Media to enhance production and competitiveness. Maintaining a secure infrastructure with these new avenues for doing business is challenging, but interesting, and requires us to measure risk carefully and apply security measures that will be effective under the scrutiny of our regulators, but not get in the way of doing business.

Prescott Balch, SVP Technology & Operations Services, U.S. Bank has been with U.S. Bank for 8 years. He serves as the head of technology for U.S. Bank's credit, prepaid, and corporate card issuing businesses, and is presently guiding those businesses through the payment industry's most significant period of technological change in decades. Card data breaches are at an all-time high while the industry also shifts rapidly toward mobile and cloud-based payments. Today's challenge is achieving the delicate balance of payment convenience and payment security, while also ensuring regulatory compliance. Prescott has spent the last twenty years in the financial services industry. He is a graduate of Lehigh University.
Moderator: Alex jarett, Founder and President, Technology Executives Club Moderator :
Alex Jarett, Founder and President, Technology Executives Club


Cloud Data Security Best Practices... How to Protect Your Stuff - In Someone else's House -Sol Cates, Chief Security Officer, Vormetric
will explore the different Cloud models that you may be using, contemplating, or resisting, and their different security challenges.  We will discuss some frameworks for managing the risks inherent with each, and share some success stories about how you can control your cloud journey, securely.

BYOD and Mobile Security
-Dirk Recker, Network Specialist, Avaya

Mobile computing and the use of consumer devices are a fact of life, with enterprise deployments increasing. In fact, more than half of CIOs surveyed for 2013's "State of the CIO" expect to complete one or more major mobility initiatives within the next year. These will include projects to better connect remote and mobile workers to company resources in an always-on environment; projects to enable more meaningful collaboration among geographically dispersed employees and teams; and, increasingly, efforts to extend and deepen the relationship between the business and its smartphone-dependent, tablet-toting customers and suppliers. 


Who Should Attend:

  • CIOs
  • Senior IT and LOB Executives
  • VPs & Directors responsible for Infrastructure, Security and Mobile Computing
  • Any IT Executives and Managers who provide IT and mobile communications support to LOB functions




Milwaukee, WI
Dec 12, 2014
, 7:30 AM to 11:30AM
Milwaukee Athletic Club
758 N. Broadway, Milwaukee WI 53202

Attendance questions?
Call Maria Tuthill in our Chicago office
at 847-837-3900 x 1


IT Executives & Staff Members

Register Here to attend with a Complimentary VIP Pass

Providers (Hardware, Software, Consultants) Providers should register early - limited provider tickets available.
Register Here

Nonmember Price: $99.95

Pre-registration required.

Professional business-casual attire required.

Final speakers and topics are subject to change.

Event Sponsors
Code 42
The Judge Group
The Judge Group
The Judge Group

Contact Alex Jarett at 1-847-837-3900 x3.





Free Weekly  |   Events  |   About Us  |   Join  |   Vendor Area  |   Get Leads   |   Staff

Copyright © 2019 Technology Executives Club, Ltd. All rights reserved | Privacy Policy