2019 Cyber Technology Conference and Policy Summit Materials2019-01-08T13:04:29+00:00
Conferences
Special Events
Employment Posters
Certificate Programs
Publications / ePubs
Sponsorship / Advertising Opportunities

Membership
Join Now!

FEATURED PRODUCTS

Health Care Savings
Employment Posters
Office Solutions

2019 Cyber Technology Conference and Policy Summit

January 8-9, 2019

Below are the materials for the 2019 Cyber Technology Conference and Policy Summit. Click on the session title to access the materials for that session. If the session title is not linked, the materials have not yet been received from the speaker(s), unless otherwise indicated. Materials will be added as they are received.

January 8, 2019

Lunch Keynote: Big Data in Action: Success and Possibilities
Darshan Shah, Chief Data Officer, Management Performance Hub

Indiana Chamber Tech Policy Update
John McDonald, Chair, Indiana Chamber Tech Policy Committee and CEO, ClearObject

Workforce Challenges and Successes

Panel Discussion: Attracting Talent
Christopher Day, CEO and Co-Founder, DemandJump; Kristen Nunery, CEO, MyCOI; and David Deram, CEO, Greenlight Guru

Venture Capital and Other Financing
Don Aquilano, Managing Director, Allos Ventures; Phil Lodato, General Counsel, Elevate Ventures; and Aaron Gillum, Private Equity, 50 South Capital

January 9, 2019

Concurrent Session One

A. Internet of Things Panel
Mat Gangwer, Chief Technology Officer, Rook Security; Stephen Reynolds, CISSP, CIPP/US, Partner and Nick Merker, CISSP, CIPT, Partner, Ice Miller LLP

B. False Sense of Security: What AWS, Azure and Google Cloud Aren’t Telling You
Nick Lumsden, CSP, Vice President Technology & Product Strategy, Online Tech

C. Did I Do That?: The Human Factor in Cyber
Carla Donev, CISSP, CRISC, CISA, Chief Information Security Officer, NiSource

Concurrent Session Two

D. Security in the Digital Age: What are Your Executive Responsibilities?
Bryan Langley, Executive Director, Indiana Dept. of Homeland Security

E. The Security Evolution of Payments: From EMV and Tokenization to Digital Wallets and Beyond
Matt Herren, Director of Payment Analytics, CSI

F. Federal Agency Perspectives Panel
Dr. Nathaniel Husted, Cyber-Electronic Warfare SME, NSWC Crane; Eugene Jones, Manufacturing Business Development Consultant, Purdue Manufacturing Extension Partnership; Rich Banta, Partner, Lifeline Data Centers; and Brooke Pyne, Midwest Regional Coordinator, Federal Laboratories Consortium

Concurrent Session Three

G. Recent Trends in Cybercrimes and Steps To Protect Your Business and Data
John McCauley, Esq., CIPP(US)(E), Partner, Bingham Greenebaum Doll LLP

H. Workforce Development/Attracting Talent Panel
Matthew Etchison, Vice President of Information Technology – Workforce Alignment, Ivy Tech Community College; John Doyle, Ph.D., PE, Associate Professor, Computer Science, Indiana University Southeast; and David Greer, Sr. Vice President and Chief Programs Officer, Project Lead The Way

I. AI-Easy vs. AI-Hard: Machine Learning and Its Impact on the Development of AI Systems
Jennifer Neville, Professor, Purdue University

Lunch Keynote

Governor’s Cybersecurity Council Update
Chetrice L. Mosley, Cybersecurity Program Director, Indiana Office of Technology, Indiana Department of Homeland Security

Keynote Presentation: Cybersecurity: Federal Efforts
Thomas Wheeler, JD, Senior Adviser, Office of the Secretary, U.S. Department of Education; Sujit Raman, JD, Associate Deputy Attorney General, U.S. Department of Justice; and Gene Price, Rear Admiral, United States Navy

Concurrent Session Four

J. The Inverse of Truth
John McDonald, CEO, ClearObject

K. How MISO Uses Threat Hunting To Protect Business Operations
Jamie Buening, Manager, Cyber Threat Hunting, MISO

L. Decrypting the Code: GDPR, CaCPA, Managing Personally Identifiable Data and the Specter of Customer Privacy
Brian McGinnis, CIPP/US, Partner, Barnes & Thornburg LLP and Leon Ravenna, CIPM, CIPP/C, CIPP/E, CIPP/G, CIPP/US, Chief Information Security Officer, KAR Auction Services, Inc.

Concurrent Session Five

M. Managing Risk With a Proactive Cybersecurity Posture
Jason Ortiz, Senior Integration Engineer, Pondurance

N. Taming Mobility
Chris Koeneman, Senior Vice President, Tangoe

O. Cloud Computing
David Speicher, Chief Technology Officer, Aspire Indiana, Inc. and Josh von Schaumburg, Customer Solutions Lead, Trek10

Concurrent Session Six

P. Cybersecurity and Legal – A Winning Combination
Eric Eliason, CIPM, FIP, HCISPP, Director of Information Security and Compliance and Michelle Gough, J.D., Ph.D., Senior Vice President and Chief Legal and Assessment Officer, Project Lead The Way

Q. Artificial Intelligence – A Collaborative Discussion
Matt MacBeth

R. Wait … You Tweeted What? Social Media’s Risk and Reward
Drew Markel, Owner, Full Auto Marketing