Technology Executives Club | Jobs | Providers | About Us | Contact Us
Tuesday, September 17, 2019 
Home    VIP Club    Events    Webinars    Peer Advisory   Members   Innovation Institute     Gallery       Providers

IT Security & Compliance: 2015

IT Security & Compliance in a Mobile/Social/Connected World

Massive Data Breach, Mobile, Cloud & Persistent Threats are escalating.
Are YOU ready?

Expertise in IT security, compliance and digial asset protection -- especially in the mobile, social media and cloud arenas -- is ranked the NUMBER ONE skill CIOs need to succeed in the rapidly expanding IT landscape, according to a 2012 survey.

This seminar is designed to help YOU prepare, as well as give you strategies to prevent data breaches and non-compliance incidents that damage customer trust and cost your organization big bucks.

Top IT executives from leading Midwest companies will share insights to help you succeed:

  • How to Prepare for Massive Data Breaches
  • Get strategies for successfully managing Bring-You-Own-Device (BYOD) security risks without crimping collaboration and productivity
  • Learn how other organizations are protecting their digital assets and identify in the cloud
  • Gain insights to ensure the security, privacy and regulatory compliance of all systems, including mobile and portable technology
  • Explore ongoing compliance concerns, trends in IT security, the top cyber attacks, where you might be vulnerable, and more!


An Industry expert leads this interactive discussion

Tim Walter, CIO, The Packaging Wholesalers

Tim Walter, The Packaging Wholesalers - recently joined as the Chief Information Officer. Tim's experience spans over two decades in e-commerce and distribution. He is responsible for day-to-day planning and development of both internal and external client technology. He manages development and hosting for distributor B2B and B2C websites and order fulfillment


Sonny Garg Senior Vice President, Chief Information and Innovation Officer Exelon Corporation

Sonny leads the transformation of Exelon’s $1B IT department to one that can more rapidly adapt to emerging technologies, as well as to increased cyber threats.  Previously, Sonny was the President of Exelon Power, where he oversaw the operations of 8,500 MW of generation, and during the 2008 financial crisis, Sonny designed and executed Exelon’s $350M cost management initiative.

Sonny has also served in the public sector, including serving as an Assistant to Chicago Mayor Daley and being appointed a White House Fellow by President Clinton.  Sonny is an Aspen Institute Henry Crown Leadership Fellow and currently co-chairs Chicago Mayor Emanuel’s Chicago NEXT Committee on Clean Tech.

He earned a M.B.A. and a B.A. at the University of Chicago, and a M.P.P. from Harvard.


Paul Bivian, CISO & HIPAA Security Officer, City of Chicago

Paul Bivian, CISO & HIPAA Security Officer, City of Chicago

Paul has a nineteen year track record of delivering IT and Information Security  solutions around people, process and technology to provide business value while mitigating risk.  Among other career achievements, he has optimized team resources and improved productivity through automation, sourcing, process improvements, definition of services and self service capabilities, led sourcing engagement for an Information Security department, and delivered a strategy for the Information Security department to leverage a managed security service model for their operational capabilities to expand and enhance their services.

At the City of Chicago, he is responsible for evaluating and responding to cyber risks to the City of Chicago assets.  He leads the Information Security Office (ISO) in delivering and enforcing key objectives around strategy, framework, policy and procedures that align to the City’s needs as well as legislative, regulatory and industry best practices. 


Moderator: Nicholas Carr is Vice President of Sales, Central Region, Avepoint and works from the company's Chicago, IL office. Having worked for many years with enterprise-level Microsoft SharePoint deployments, Nick has a long record of ensuring seamless integration of AvePoint's solutions into complex, large-scale environments. His knowledge of SharePoint backup and management strategies has earned him multiple speaking opportunities within the SharePoint community and at technical tradeshows and events.


Securing Business Critical Data in a BYOD Environment
- Kevin Morton, Sr. Sales Engineer, NetScout Systems, Inc.

BYOD has been talked up by the IT industry for years as a cure-all for myriad IT issues. Everyone seems happier when they can pick and choose whichever devices they want to do their job with. But is it equally as secure as an internal IT designed solution? Many of my customers are in the middle of rolling out BYOD right now. Even if you have zero plans for implementing BYOD, you still have non IT controlled devices on your network whether you know it or not. In this session, we'll explore some of the security related challenges to embracing BYOD, and discuss options for mitigating them.



Your Data Has Left the Building. How Do You Protect It?
- Amir Kader, Enterprise Systems Engineer, Code42

In today's mobile world, data has shifted to the edge, where work is conducted on endpoints—laptops, phones and tablets—and out of your control. This information shift presents businesses with unique challenges regarding security, access, connectivity and scale. Join Code42 to learn about business drivers for developing an endpoint data management strategy as well as considerations and options for cloud adoption.


Silos to Seamless: Creating a Comprehensive Security Program
- Jeremy Wittkop, CISSP Director of Sales Engineeering, InteliSecure

The evolving complexity and increasing number of persistent threats continues to challenge security programs worldwide. These threats, a BYOD culture and other fast-paced changes, are forcing organizations to adapt to protect their critical assets. A well-designed critical asset protection program focuses on information assets most important to the organization and the infrastructure assets that protect them. Key technologies in a critical asset program include: data loss prevention, web gateway, email gateway, SIEM and traditional security products such as encryption, firewalls and IDS/IPS. While these technologies were traditionally siloed, a critical asset program seamlessly integrates them to provide comprehensive protection. Join InteliSecure to learn about the changing threat landscape and the tools and approach that successfully prevent data exfiltration.



Cloud Data Security Best Practices... How to Protect Your Stuff - In Someone Else's House
-Sol Cates, Chief Security Officer, Vormetric
will explore the different Cloud models that you may be using, contemplating, or resisting, and their different security challenges.  We will discuss some frameworks for managing the risks inherent with each, and share some success stories about how you can control your cloud journey, securely.


Who Should Attend:

  • CIOs, CISOs
  • Senior IT and LOB Executives
  • VPs & Directors responsible for IT Security and Compliance
  • Any IT Executives and Managers who provide security and compliance direction and support to LOB functions




Chicago, IL
Feb 26, 2015
, 12:30 PM to 5:00 PM
Union League Club, French Room
65 W. Jackson Blvd. Chicago IL 60604

Questions? Call Maria Tuthill
847-837-3900 x 1


IT Executives & Staff Members

1. Members: Register Here to Use Your Ticket package or Contact Member Services at 847-837-3900 x1

2. Nonmembers: Learn how to attend this event with a complimentary VIP Pass

Providers (Hardware, Software, Consultants)

1.Members: Who have a ticket package, Register here.

Pre-registration required.

Professional business-casual attire required.

Final speakers and topics are subject to change.

Event Sponsors
The Judge Group
Code 42
Interested in Sponsorship of
this Event?

Questions? Contact Alex Jarett at 847-837-3900 x 2 for information




Free Weekly  |   Events  |   About Us  |   Join  |   Vendor Area  |   Get Leads   |   Staff

Copyright © 2019 Technology Executives Club, Ltd. All rights reserved | Privacy Policy