| Members| TechnologyExecutivesU™| About Us | Contact Us
Wednesday, May 12, 2021 
Home    Join Insiders    Programs    Webinars    Workshops   Research    Summits    Gallery    Sponsors    Members

CyberSecurity Virtual Seminar

CyberSecurity and the Growing Attack Surface

The "Internet of Everything" including IOT devices, combined with the pandemic has exponentially increased the Attack Surface, causing a corresponding increase in Cyber Security threats.

In this important virtual seminar we'll provide an update on new types of threats, how emerging technologies in cybersecurity are helping to reduce the overal risk, and the key strategies progressive CIOs and CISOs are taking now.

Join us as we discuss:

  • Practical Implications of the SolarWinds Breach;

  • The risk associatied with the Internet of Everything, IOT and other technologies essential to digital transformation.

  • The impact of the pandemic on corporate vulnerabilities and how bad actors are taking advantage.

  • How emerging technologies (including A/I based) are being used to both proactively protect and quickly respond to attacks on a real time, and automatic basis.  Both defensive and offensive approaches will be discussed.

  • How companies are adapting their employee behaviors to minimize social engineering.

  • The top changes CIOs and CISOs are making today to minimize the overall risk.

Faculty & Agenda:

Tom Drez, CIO/CPO/CSO/Managing Director CIPP, Christian Brothers Services



Marcin Budzik, Director IT Infrastructure, Methode Electronics


Brian Johnston, CISO, The Glenmede Trust Co.

Snehal Antani, CEO & Cofounder, Horizon3.ai

Richard K. Peters (Rick), CISO, Operational Technology North America, Fortinet
Gary Sockrider, Director, Security Technologist, NETSCOUT
Session One: Panel

Tom Drez, CIO/CPO/CSO/Managing Director CIPP, Christian Brothers Services

Tom Drez serves as Chief Information Officer and Managing Director of the Information & Technology Services (ITS) Division of Christian Brothers Services (CBS). Tom joined CBS in 1987 to lead the division and take on the responsibility to strategically apply information technology to the business as an enabler to achieve desirable results. The ITS Division provides for operations, software and website design and development, and education. This includes responsibilities for implementing, supporting, and maintaining all aspects of computer, telephone, and audio/visual systems ensuring that technology usage fully supports organizational goals. He also has responsibility for information protection including privacy and security. CBS is a nonprofit organization that administers cooperative programs in the areas of health/retirement, property/casualty and consulting/technology to church organizations.


Marcin Budzik, Director IT Infrastructure, Methode Electronics

Marcin Budzik is IT Infrastructure & Security Director for Methode Electronics - A publicly traded global dveloper and manufacturer of electronic components for the automotive industry.    His IT leadership career spans over 20 years of supporting and leading IT functions for various organizations ranging from $100M to $2B in revenue.  He has led a wide range of initiatives including implementation of ERP, CRM, BI systems.  Marcin is particularly passionate about growing  maturity of an organization by institutionalizing best practices and sound processes, especially around risk and security. 

In his current role, he is focused on efforts to consolidate and standardize on a secure and robust IT infrastructure that would scale and meet the demands of a company that has rapidly grown from a mid-size organization to a large enterprise.  Recent projects include roll-out of SSO and MFA, enabling telecommuting capabilities for knowledge workers, implementing vulnerability management,  cyber-security awareness solutions.  Prior to this role, Marcin was IT Director with Fort Dearborn Company.  He holds a Master's Degree in Information Technology Management from Roosevelt University.

Brian Johnson, CISO, The Glenmede Trust Co.

Session: Attackers don't "hack in", they log in

Organizations need to more *effectively* use their existing security tools:

  • SOC's use products from different vendors that weren't designed to work together
  • Key security experts spend time integrating products with duct tape & bubblegum, not detecting & remediating advanced threats
  • Organizations don't have time to "train like they fight" to build the muscle memory required to detect & respond faster

A strong security foundation is key:

  • Continuously assess your posture to identify verified attack paths & high-threat indicators of compromise
  • Continuously identify ineffective tools, processes, policies, & training by exercising your SOC
  • Following a breach, quickly conduct an initial damage assessment to identify likely compromised credentials & data alongside threat hunting & forensics

Snehal Antani, CEO & Cofounder, Horizon3.ai

Snehal Antani is an entrepreneur, technologist, and investor. He is CEO & Co-Founder of Horizon3.ai, a cyber security company using AI to deliver Red Teaming & Penetration Testing as a Service. He also serves as a Highly Qualified Expert (HQE) for the US Department of Defense, driving digital transformation and data initiatives in support of Special Operations. Prior to his current roles, Snehal was CTO & SVP at Splunk, held multiple CIO roles at GE Capital, and started his career as a Software Engineer at IBM. He has a Masters in Computer Science from Rensselaer Polytechnic University (RPI), a BS in Computer Science from Purdue University, and holds 16 patents.

Session: Beyond Visibility: Why Old Networks Need to Learn New Tricks

Cybercriminals are maximizing their opportunity to impact organizations by exploiting an expanding attack surface.  In light of recent attacks like SolarWinds, the impact to organizations can be significant as bad actors orchestrate offensive cyber activity employing techniques that most defenders are unable to detect.

Gaining greater visibility into network activity, while a great starting point, is only the first step for organizations converging legacy and modern environments.  During this session, we will explore common security challenges in this digital age and why it requires more than visibility to secure (or successfully defend) an enterprise. 

We will explore security considerations beyond visibility including integrated control and situational awareness which support a proactive cybersecurity strategy.   From this session, you’ll

•Discover how recycled threats indicate that some fundamentals still need attention
•Understand the need for integrated control providing enforcement points to segment and inspect network traffic
•Recognize the value of automated awareness, informing timely and appropriate response, to protect the converged environment
By employing a cybersecurity framework that enables broad visibility, integrated control and automated situational awareness, organizations can confidently move forward in a digitally transformed business while sustaining safe and continuous operations.

Richard K. Peters (Rick), CISO, Operational Technology North America, Fortinet

Rick brings the Fortinet OT-CI team more than 37 years of cybersecurity and global partnering experience working across foreign, domestic, and commercial industry sectors at the National Security Agency (NSA). As Fortinet’s Operational Technology North American CISO, he delivers cybersecurity defense solutions and insights for the OT/ICS/SCADA critical infrastructure environments. Prior to Fortinet, Rick led development of cyber capability across Endpoint, Infrastructure, and Industrial Control System technologies at the agency. Previously, Rick also served as an executive leader supporting the Information Assurance Directorate at the NSA. Earlier in his career, he served in a broad range of leadership and Engineering roles including Chief of Staff for the NSA Cyber Task Force and a 5-year forward liaison charged with directing integration of cyber and cryptologic solutions for U.S. Air Force Europe, Ramstein AFB, Germany.

Session: Latest Threats to Infrastructure

Threat actors have been busy in the past year and new challenges face enterprise security teams. Further, the global pandemic has dramatically altered the threat surface as we’ve shifted so many workers to remote environments. Learn in this session about the latest threats to your infrastructure that can deny availability of critical resources like remote access VPNs, Virtual Desktop Infrastructure, customer facing applications and services. Topics include DDoS trends and defenses, Sunburst vulnerability, Lazarus Bear Armada extortion campaign, plus effective detection and mitigation techniques.

Gary Sockrider, Director, Security Technologist, NETSCOUT

Gary is an industry veteran bringing over 20 years of broad technology experience including routing and switching, data center, wireless, mobility and collaboration but always with a focus on security. His previous roles include security SME, consultancy, product management, IT and customer support. Gary seeks to understand and convey the constantly evolving threat landscape, as well as the techniques and solutions that address the challenges they present. Prior to joining NETSCOUT in 2012, he spent 12 years at Cisco Systems and held previous positions with Avaya and Cable & Wireless.






Questions whether you qualify? Please contact Maria Tuthill at (847) 837-3900 x1


Who Should Attend:

  • CIOs
  • CxOs
  • Chief Innovation Officers
  • Chief Technology Officers
  • Chief Marketing Officers
  • Digital Officers
  • VPs & Directors responsible for driving change


Watch On-Demand


This Webinar will be available ON-Demand 2/1

This "Virtual Seminar" Webinar is Complimentary


Event Sponsors



Contact Alex Jarett at 1-847-837-3900 x2.

Free Weekly  |   Events  |   About Us  |   Subscribe  |   Vendor Area  |   Get Leads   |   Staff

Copyright © 2021 Technology Executives Club, Ltd. All rights reserved | Privacy Policy