KEYNOTE SPEAKERS SPONSORS PAID - Leading Business...Lifeline Data Centers; and Brooke Pyne, Midwest...

6
REGISTER TODAY! www.indianachamber.com/event/cyber2019 PRESENTED BY JANUARY 8-9, 2019 | CONRAD AND HYATT REGENCY INDIANAPOLIS • The Human Factor in Cyber • Executive Responsibilities in the Digital Age • Recent Trends in Cybercrimes and Steps To Protect Your Business and Data • Workforce Development/Attracting Talent • How MISO Uses Threat Hunting To Protect Business Operations • GDPR Update • Managing Risk With a Proactive Cybersecurity Posture • Mobility • Cloud Computing • Artificial Intelligence • Social Media Risk DON’T MISS THIS OPPORTUNITY FOR A SOLUTIONS- BASED, EDUCATION-FOCUSED EVENT COVERING:

Transcript of KEYNOTE SPEAKERS SPONSORS PAID - Leading Business...Lifeline Data Centers; and Brooke Pyne, Midwest...

Page 1: KEYNOTE SPEAKERS SPONSORS PAID - Leading Business...Lifeline Data Centers; and Brooke Pyne, Midwest Regional Coordinator, Federal Laboratories Consortium (invited) 10:30 a.m. Innovation

JANUARY 8-9, 2019 | CONRAD AND HYATT REGENCY INDIANAPOLIS

STRENGTHENING YOUR

CYBERSECURITY IS ESSENTIAL

FOR THE SUCCESS OF YOUR

ORGANIZATION!

PRSRT STDU.S. POSTAGE

PAIDIndianapolis, INPermit No. 159

115 W. Washington St., Ste. 850SIndianapolis, IN 46204www.indianachamber.com

REGISTER TODAY! www.indianachamber.com/event/cyber2019

PRESENTED BY

JANUARY 8-9, 2019 | CONRAD AND HYATT REGENCY INDIANAPOLIS

PRESENTED BY

• The Human Factor in Cyber• Executive Responsibilities in the Digital Age• Recent Trends in Cybercrimes and Steps To Protect Your Business

and Data• Workforce Development/Attracting Talent• How MISO Uses Threat Hunting To Protect Business Operations• GDPR Update• Managing Risk With a Proactive Cybersecurity Posture• Mobility• Cloud Computing• Artificial Intelligence• Social Media Risk

DON’T MISS THIS OPPORTUNITY FOR A SOLUTIONS-BASED, EDUCATION-FOCUSED EVENT COVERING:

Darshan ShahChief Data Officer, Management Performance Hub

Big Data in Action: Success and Possibilities

John McDonaldChair, Indiana Chamber Tech Policy Committee and CEO, ClearObject

Indiana Chamber Tech Policy Update

Thomas Wheeler, JDSenior Adviser, Office of the Secretary, U.S. Department of Education

Cybersecurity: Federal Efforts

Sujit Raman, JDAssociate Deputy Attorney Gen-eral, U.S. Department of Justice

Gene PriceRear Admiral, United States Navy

KEYNOTE SPEAKERS

PRESENTED BY

GOLD SPONSORS

SILVER SPONSORS

PLATINUM SPONSOR

SPONSORS

Page 2: KEYNOTE SPEAKERS SPONSORS PAID - Leading Business...Lifeline Data Centers; and Brooke Pyne, Midwest Regional Coordinator, Federal Laboratories Consortium (invited) 10:30 a.m. Innovation

JANUARY 8-9, 2019 | CONRAD AND HYATT REGENCY INDIANAPOLIS

STRENGTHENING YOUR

CYBERSECURITY IS ESSENTIAL

FOR THE SUCCESS OF YOUR

ORGANIZATION!

PRSRT STDU.S. POSTAGE

PAIDIndianapolis, INPermit No. 159

115 W. Washington St., Ste. 850SIndianapolis, IN 46204www.indianachamber.com

REGISTER TODAY! www.indianachamber.com/event/cyber2019

PRESENTED BY

JANUARY 8-9, 2019 | CONRAD AND HYATT REGENCY INDIANAPOLIS

PRESENTED BY

• The Human Factor in Cyber• Executive Responsibilities in the Digital Age• Recent Trends in Cybercrimes and Steps To Protect Your Business

and Data• Workforce Development/Attracting Talent• How MISO Uses Threat Hunting To Protect Business Operations• GDPR Update• Managing Risk With a Proactive Cybersecurity Posture• Mobility• Cloud Computing• Artificial Intelligence• Social Media Risk

DON’T MISS THIS OPPORTUNITY FOR A SOLUTIONS-BASED, EDUCATION-FOCUSED EVENT COVERING:

Darshan ShahChief Data Officer, Management Performance Hub

Big Data in Action: Success and Possibilities

John McDonaldChair, Indiana Chamber Tech Policy Committee and CEO, ClearObject

Indiana Chamber Tech Policy Update

Thomas Wheeler, JDSenior Adviser, Office of the Secretary, U.S. Department of Education

Cybersecurity: Federal Efforts

Sujit Raman, JDAssociate Deputy Attorney Gen-eral, U.S. Department of Justice

Gene PriceRear Admiral, United States Navy

KEYNOTE SPEAKERS

PRESENTED BY

GOLD SPONSORS

SILVER SPONSORS

PLATINUM SPONSOR

SPONSORS

Page 3: KEYNOTE SPEAKERS SPONSORS PAID - Leading Business...Lifeline Data Centers; and Brooke Pyne, Midwest Regional Coordinator, Federal Laboratories Consortium (invited) 10:30 a.m. Innovation

January 8, 2019, Conrad Indianapolis11:30 a.m. Registration

12:00 p.m. Welcome and Opening CommentsLunch Keynote: Big Data in Action: Success and Possibilities Darshan Shah, Chief Data Officer, Management Performance Hub

1:00 p.m. Indiana Chamber Tech Policy UpdateJohn McDonald, Chair, Indiana Chamber Tech Policy Committee and CEO, ClearObject

1:45 p.m. Break

2:00 p.m. Workforce Challenges and Successes• Chris Belli, Vice President, Marketing and Business

Development, Studio Science • John Leschorn, Co-Founder and Chief Operations Officer, Lucd• Drew Klacik, IU Public Policy Institute

Panel: Attracting TalentSusan Marshall, Torchlite (invited); Christopher Day, DemandJump; and Kristen Nunnery, MyCOI

3:00 p.m. Challenges and Successes of Raising Capital• Don Aquilano, Managing Director, Allos Ventures • Bryan Ritchie, Associate Provost, Innovation, University of

Notre Dame• Chris LaMothe, Chairman and CEO, Elevate Ventures and

Mark Gramelspacher, Managing Director, Evergreen Global Advisors, LLC

4:00 – 6:00 p.m. Innovation Expo/Reception (Hyatt Regency Indianapolis)

January 9, 2019, Hyatt Regency Indianapolis8:00 a.m. Continental Breakfast and Registration

8:30 a.m. Concurrent Session One

A. Internet of Things PanelMat Gangwer, Chief Technology Officer, Rook Security; Stephen Reynolds, CISSP, CIPP/US, Partner and Nick Merker, CISSP, CIPT, Partner, Ice Miller LLP

B. False Sense of Security: What AWS, Azure and Google Cloud Aren’t Telling You• The difference between security of the cloud and security in

the cloud• The value of your data in the cloud• Strategies to secure your data in and outside your environmentNick Lumsden, CSP, Vice President Technology & Product Strategy, Online Tech

C. Did I Do That?: The Human Factor in Cyber• You are a target – so what do you do to secure not just

yourself but your company?• When a cyber awareness program is maturing, expect a

roller-coaster of results• Cyber changes every day, expect your program to change

and evolve over timeCarla Donev, CISSP, CRISC, CISA, Chief Information Security Officer, NiSource

9:15 a.m. Innovation Expo Break

9:45 a.m. Concurrent Session Two

D. Security in the Digital Age: What are Your Executive Responsibilities?• What to do when a data breach happens• Your legal obligations and responsibilities for protecting your

company • Steps you should take to get prepared for an incident as well

as ways to keep your business going if an incident does occurDan Resnick, CISSP, CISA, CISM, Cybersecurity and Risk Management Practice Director, KSM Consulting and Bryan Langley, Executive Director, Indiana Dept. of Homeland Security

E. The Security Evolution of Payments: From EMV and Tokenization to Digital Wallets and Beyond• Understanding the current payments landscape and how

those technologies are shaping the industry• Examining which new payment alternatives offer the most

opportunity – for security and overall customer experience• Looking ahead to card fraud issues and payment alternatives

that will continue to redefine the payments experience over the next decade

Matt Herren, Director of Payment Analytics, CSI

F. Federal Agency Perspectives PanelRobert Templeman, Ph.D. / SSTM, Distinguished Engineer for Cybersecurity, U.S. Navy, NSWC Crane; Eugene Jones, Manufacturing Business Development Consultant, Purdue Manufacturing Extension Partnership; Rich Banta, Partner, Lifeline Data Centers; and Brooke Pyne, Midwest Regional Coordinator, Federal Laboratories Consortium (invited)

10:30 a.m. Innovation Expo Break

10:45 a.m. Concurrent Session Three

G. Recent Trends in Cybercrimes and Steps To Protect Your Business and Data• Recent trends in cybercrimes, threat vectors and

cryptocurrency fraud• Simple and inexpensive methods to protect your valauble data• Real-world examples of cyber attacks, phishing schemes and

ransomwareJohn McCauley, Esq., CIPP(US)(E), Partner, Bingham Greenebaum Doll LLP

H. Workforce Development/Attracting Talent PanelMatthew Etchison, Vice President of Information Technology - Workforce Alignment, Ivy Tech Community College; John Doyle, Ph.D., PE, Associate Professor, Computer Science, Indiana University Southeast; David Greer, Sr. Vice President and Chief Programs Officer, Project Lead The Way; other speaker TBD

I. AI-Easy vs. AI-Hard: Machine Learning and its Impact on the Development of AI Systems• AI and singularity• Opportunities for machine learning applications• Open challenges of AI/ML systemsJennifer Neville, Professor, Purdue University

11:30 a.m. Lunch (provided)

Governor’s Cybersecurity CouncilChetrice L. Mosley, Cybersecurity Program Director, Indiana Office of Technology, Indiana Department of Homeland Security

Keynote Presentation: Cybersecurity: Federal Efforts• Countering malign foreign influence operations (elections)• Countering sophisticated cyber schemes (justice)• Countering hostile foreign states’ theft of technology (military)Thomas Wheeler, JD, Senior Adviser, Office of the Secretary, U.S. Department of Education; Sujit Raman, JD, Associate Deputy Attorney General, U.S. Department of Justice; and Gene Price, Rear Admiral, United States Navy

1:15 p.m. Concurrent Session Four

J. The Inversion of Truth• The 4th Industrial Revolution• The Internet of Things• Change in workforce develppmentJohn McDonald, CEO, ClearObject

K. How MISO Uses Threat Hunting To Protect Business Operations• What is threat hunting and how does it differ from traditional

information security activities?• The Hunting Maturity Model• Hypothesis-based hunting examplesJamie Buening, Manager, Cyber Threat Hunting, MISO

L. Decrypting the Code: GDPR, CaCPA, Managing Personally Identifiable Data and the Specter of Customer Privacy• Will these laws hold? What’s next and what issues will it bring?• Will we see something federal that overrides individual state laws?• Contextualize emerging data privacy trends and technologies • Understand implications of new privacy laws and their

associated risks• Third vendor management for customers and vendors with

you in the middle

• Practical applications as well as an actionable strategy for legal compliance

Brian McGinnis, CIPP/US, Partner, Barnes & Thornburg LLP and Leon Ravenna, CIPM, CIPP/C, CIPP/E, CIPP/G, CIPP/US, Chief Information Security Officer, KAR Auction Services, Inc.

2:00 p.m. Break

2:15 p.m. Concurrent Session Five

M. Managing Risk With a Proactive Cybersecurity Posture• Proactively hunt for threats to systems and devices• Respond rapidly and effectively to a breach• Harmonize cybersecurity complianceJason Ortiz, Senior Integration Engineer, Pondurance

N. Taming Mobility• Evolving use of mobility by the enterprise• How mobility can be managed to maximize its potential• The hidded direct and indirect costs associated with mobilityChris Koeneman, Senior Vice President, MOBI

O. Cloud Computing PanelDavid Speicher, Chief Technology Officer, Aspire Indiana, Inc.; Josh von Schaumburg, Customer Solutions Lead, Trek10; and other speaker TBD

3:00 p.m. Break

3:15 p.m. Concurrent Session Six

P. Cybersecurity and Legal – A Winning Combination• Cybersecurity in education• Legal and cybersecurity collaboration• Scaling your program up from a small organization to a

midsize organizationEric Eliason, CIPM, FIP, HCISPP, Director of Information Security and Compliance and Michelle Gough, J.D., Ph.D., Senior Vice President and Chief Legal and Assessment Officer, Project Lead The Way

Q. Artificial Intelligence – A Collaborative Discussion• Interactively learn the basics of AI• A fun, interactive experience creating a simple AI algorithm• Demonstrate why AI is necessary for advanced applications

such as cancer research and interactive voice conversationsMatt MacBeth

R. Wait … You Tweeted What? Social Media’s Risk and Reward• Social media security best practices• Common social media security risks• Human error/policy discussionDrew Markel, Owner, Full Auto Marketing

4:00 p.m. Adjourn

AGENDA

According to a 2017 IBM-sponsored study, the average data breach for a company carries a global cost of $3.2 million. These breaches are a result of cyberattacks that occur daily and repeatedly. The Indiana Chamber is pleased to announce the expansion of the 2019 Cyber Technology Conference and Policy Summit. Cyber threats are the number one problem facing business today. This two-day conference will provide lessons on cybersecurity from leaders in the data privacy field focused on hot-button topics such as cloud computing, artificial intelligence, how to prevent human error and more. A big addition this year is the focus on the future of cyber policies in the modern political landscape for Indiana organizations. Don’t miss this must-attend event!

WHY YOU SHOULD ATTEND

This program should appeal to anyone who has a role regarding personal or confidential information – whether the information is that of a customer, employee, patient, student, job applicant or it is a trade secret or other proprietary information. Highly recommended for:

• Board members• CEOs• CIOs• CFOs• HR• PR/communications departments• In-house and general counsels• Insurance and risk managers• IT professionals

WHO SHOULD ATTEND

4 Easy Ways to RegisterOnline: www.indianachamber.com/events/cyber2019Phone: (800) 824-6885Email: [email protected]: PO Box 44926, Indianapolis, IN 46244-0926

RegistrationFull Conference – January 8-9Indiana Chamber member: $399 | List price: $499 January 8 OnlyIndiana Chamber member: $149 | List price: $199 January 9 OnlyIndiana Chamber member: $325 | List price: $375

Group Discounts Available! Use promo code GROUPSend two or more and get a 20% discount.

Available online or email [email protected] to register your group.

Location and Hotel InformationConrad and Hyatt RegencyThe conference will be held at the Conrad Indianapolis and Hyatt Regency in downtown Indianapolis. To receive the Indiana Chamber discount hotel room rate, visit the Hyatt Regency Indianapolis at www.hyatt.com or call (317) 632-1234 and enter group code: 55737. Subject to availability.

Cancellations/Substitutions: All cancellations must be received in writing. A $25 processing fee per person will be charged for all cancellations. Cancellations received within two weeks of the conference date will be issued a credit certificate, less the $25 processing fee. Credits can be used toward any future Indiana Chamber conference(s) for up to one year. Credit is fully transferable. Substitutions are welcome at any time, but are requested in advance of the conference.

REGISTRATION AND LODGING INFORMATION

Expo and reception (Hyatt Regency)January 8 | 4:00 - 6:00 p.m.

Expo (Hyatt Regency)January 9 | 8:00 a.m. - 1:15 p.m.

INNOVATION EXPO

Page 4: KEYNOTE SPEAKERS SPONSORS PAID - Leading Business...Lifeline Data Centers; and Brooke Pyne, Midwest Regional Coordinator, Federal Laboratories Consortium (invited) 10:30 a.m. Innovation

January 8, 2019, Conrad Indianapolis11:30 a.m. Registration

12:00 p.m. Welcome and Opening CommentsLunch Keynote: Big Data in Action: Success and Possibilities Darshan Shah, Chief Data Officer, Management Performance Hub

1:00 p.m. Indiana Chamber Tech Policy UpdateJohn McDonald, Chair, Indiana Chamber Tech Policy Committee and CEO, ClearObject

1:45 p.m. Break

2:00 p.m. Workforce Challenges and Successes• Chris Belli, Vice President, Marketing and Business

Development, Studio Science • John Leschorn, Co-Founder and Chief Operations Officer, Lucd• Drew Klacik, IU Public Policy Institute

Panel: Attracting TalentSusan Marshall, Torchlite (invited); Christopher Day, DemandJump; and Kristen Nunnery, MyCOI

3:00 p.m. Challenges and Successes of Raising Capital• Don Aquilano, Managing Director, Allos Ventures • Bryan Ritchie, Associate Provost, Innovation, University of

Notre Dame• Chris LaMothe, Chairman and CEO, Elevate Ventures and

Mark Gramelspacher, Managing Director, Evergreen Global Advisors, LLC

4:00 – 6:00 p.m. Innovation Expo/Reception (Hyatt Regency Indianapolis)

January 9, 2019, Hyatt Regency Indianapolis8:00 a.m. Continental Breakfast and Registration

8:30 a.m. Concurrent Session One

A. Internet of Things PanelMat Gangwer, Chief Technology Officer, Rook Security; Stephen Reynolds, CISSP, CIPP/US, Partner and Nick Merker, CISSP, CIPT, Partner, Ice Miller LLP

B. False Sense of Security: What AWS, Azure and Google Cloud Aren’t Telling You• The difference between security of the cloud and security in

the cloud• The value of your data in the cloud• Strategies to secure your data in and outside your environmentNick Lumsden, CSP, Vice President Technology & Product Strategy, Online Tech

C. Did I Do That?: The Human Factor in Cyber• You are a target – so what do you do to secure not just

yourself but your company?• When a cyber awareness program is maturing, expect a

roller-coaster of results• Cyber changes every day, expect your program to change

and evolve over timeCarla Donev, CISSP, CRISC, CISA, Chief Information Security Officer, NiSource

9:15 a.m. Innovation Expo Break

9:45 a.m. Concurrent Session Two

D. Security in the Digital Age: What are Your Executive Responsibilities?• What to do when a data breach happens• Your legal obligations and responsibilities for protecting your

company • Steps you should take to get prepared for an incident as well

as ways to keep your business going if an incident does occurDan Resnick, CISSP, CISA, CISM, Cybersecurity and Risk Management Practice Director, KSM Consulting and Bryan Langley, Executive Director, Indiana Dept. of Homeland Security

E. The Security Evolution of Payments: From EMV and Tokenization to Digital Wallets and Beyond• Understanding the current payments landscape and how

those technologies are shaping the industry• Examining which new payment alternatives offer the most

opportunity – for security and overall customer experience• Looking ahead to card fraud issues and payment alternatives

that will continue to redefine the payments experience over the next decade

Matt Herren, Director of Payment Analytics, CSI

F. Federal Agency Perspectives PanelRobert Templeman, Ph.D. / SSTM, Distinguished Engineer for Cybersecurity, U.S. Navy, NSWC Crane; Eugene Jones, Manufacturing Business Development Consultant, Purdue Manufacturing Extension Partnership; Rich Banta, Partner, Lifeline Data Centers; and Brooke Pyne, Midwest Regional Coordinator, Federal Laboratories Consortium (invited)

10:30 a.m. Innovation Expo Break

10:45 a.m. Concurrent Session Three

G. Recent Trends in Cybercrimes and Steps To Protect Your Business and Data• Recent trends in cybercrimes, threat vectors and

cryptocurrency fraud• Simple and inexpensive methods to protect your valauble data• Real-world examples of cyber attacks, phishing schemes and

ransomwareJohn McCauley, Esq., CIPP(US)(E), Partner, Bingham Greenebaum Doll LLP

H. Workforce Development/Attracting Talent PanelMatthew Etchison, Vice President of Information Technology - Workforce Alignment, Ivy Tech Community College; John Doyle, Ph.D., PE, Associate Professor, Computer Science, Indiana University Southeast; David Greer, Sr. Vice President and Chief Programs Officer, Project Lead The Way; other speaker TBD

I. AI-Easy vs. AI-Hard: Machine Learning and its Impact on the Development of AI Systems• AI and singularity• Opportunities for machine learning applications• Open challenges of AI/ML systemsJennifer Neville, Professor, Purdue University

11:30 a.m. Lunch (provided)

Governor’s Cybersecurity CouncilChetrice L. Mosley, Cybersecurity Program Director, Indiana Office of Technology, Indiana Department of Homeland Security

Keynote Presentation: Cybersecurity: Federal Efforts• Countering malign foreign influence operations (elections)• Countering sophisticated cyber schemes (justice)• Countering hostile foreign states’ theft of technology (military)Thomas Wheeler, JD, Senior Adviser, Office of the Secretary, U.S. Department of Education; Sujit Raman, JD, Associate Deputy Attorney General, U.S. Department of Justice; and Gene Price, Rear Admiral, United States Navy

1:15 p.m. Concurrent Session Four

J. The Inversion of Truth• The 4th Industrial Revolution• The Internet of Things• Change in workforce develppmentJohn McDonald, CEO, ClearObject

K. How MISO Uses Threat Hunting To Protect Business Operations• What is threat hunting and how does it differ from traditional

information security activities?• The Hunting Maturity Model• Hypothesis-based hunting examplesJamie Buening, Manager, Cyber Threat Hunting, MISO

L. Decrypting the Code: GDPR, CaCPA, Managing Personally Identifiable Data and the Specter of Customer Privacy• Will these laws hold? What’s next and what issues will it bring?• Will we see something federal that overrides individual state laws?• Contextualize emerging data privacy trends and technologies • Understand implications of new privacy laws and their

associated risks• Third vendor management for customers and vendors with

you in the middle

• Practical applications as well as an actionable strategy for legal compliance

Brian McGinnis, CIPP/US, Partner, Barnes & Thornburg LLP and Leon Ravenna, CIPM, CIPP/C, CIPP/E, CIPP/G, CIPP/US, Chief Information Security Officer, KAR Auction Services, Inc.

2:00 p.m. Break

2:15 p.m. Concurrent Session Five

M. Managing Risk With a Proactive Cybersecurity Posture• Proactively hunt for threats to systems and devices• Respond rapidly and effectively to a breach• Harmonize cybersecurity complianceJason Ortiz, Senior Integration Engineer, Pondurance

N. Taming Mobility• Evolving use of mobility by the enterprise• How mobility can be managed to maximize its potential• The hidded direct and indirect costs associated with mobilityChris Koeneman, Senior Vice President, MOBI

O. Cloud Computing PanelDavid Speicher, Chief Technology Officer, Aspire Indiana, Inc.; Josh von Schaumburg, Customer Solutions Lead, Trek10; and other speaker TBD

3:00 p.m. Break

3:15 p.m. Concurrent Session Six

P. Cybersecurity and Legal – A Winning Combination• Cybersecurity in education• Legal and cybersecurity collaboration• Scaling your program up from a small organization to a

midsize organizationEric Eliason, CIPM, FIP, HCISPP, Director of Information Security and Compliance and Michelle Gough, J.D., Ph.D., Senior Vice President and Chief Legal and Assessment Officer, Project Lead The Way

Q. Artificial Intelligence – A Collaborative Discussion• Interactively learn the basics of AI• A fun, interactive experience creating a simple AI algorithm• Demonstrate why AI is necessary for advanced applications

such as cancer research and interactive voice conversationsMatt MacBeth

R. Wait … You Tweeted What? Social Media’s Risk and Reward• Social media security best practices• Common social media security risks• Human error/policy discussionDrew Markel, Owner, Full Auto Marketing

4:00 p.m. Adjourn

AGENDA

According to a 2017 IBM-sponsored study, the average data breach for a company carries a global cost of $3.2 million. These breaches are a result of cyberattacks that occur daily and repeatedly. The Indiana Chamber is pleased to announce the expansion of the 2019 Cyber Technology Conference and Policy Summit. Cyber threats are the number one problem facing business today. This two-day conference will provide lessons on cybersecurity from leaders in the data privacy field focused on hot-button topics such as cloud computing, artificial intelligence, how to prevent human error and more. A big addition this year is the focus on the future of cyber policies in the modern political landscape for Indiana organizations. Don’t miss this must-attend event!

WHY YOU SHOULD ATTEND

This program should appeal to anyone who has a role regarding personal or confidential information – whether the information is that of a customer, employee, patient, student, job applicant or it is a trade secret or other proprietary information. Highly recommended for:

• Board members• CEOs• CIOs• CFOs• HR• PR/communications departments• In-house and general counsels• Insurance and risk managers• IT professionals

WHO SHOULD ATTEND

4 Easy Ways to RegisterOnline: www.indianachamber.com/events/cyber2019Phone: (800) 824-6885Email: [email protected]: PO Box 44926, Indianapolis, IN 46244-0926

RegistrationFull Conference – January 8-9Indiana Chamber member: $399 | List price: $499 January 8 OnlyIndiana Chamber member: $149 | List price: $199 January 9 OnlyIndiana Chamber member: $325 | List price: $375

Group Discounts Available! Use promo code GROUPSend two or more and get a 20% discount.

Available online or email [email protected] to register your group.

Location and Hotel InformationConrad and Hyatt RegencyThe conference will be held at the Conrad Indianapolis and Hyatt Regency in downtown Indianapolis. To receive the Indiana Chamber discount hotel room rate, visit the Hyatt Regency Indianapolis at www.hyatt.com or call (317) 632-1234 and enter group code: 55737. Subject to availability.

Cancellations/Substitutions: All cancellations must be received in writing. A $25 processing fee per person will be charged for all cancellations. Cancellations received within two weeks of the conference date will be issued a credit certificate, less the $25 processing fee. Credits can be used toward any future Indiana Chamber conference(s) for up to one year. Credit is fully transferable. Substitutions are welcome at any time, but are requested in advance of the conference.

REGISTRATION AND LODGING INFORMATION

Expo and reception (Hyatt Regency)January 8 | 4:00 - 6:00 p.m.

Expo (Hyatt Regency)January 9 | 8:00 a.m. - 1:15 p.m.

INNOVATION EXPO

Page 5: KEYNOTE SPEAKERS SPONSORS PAID - Leading Business...Lifeline Data Centers; and Brooke Pyne, Midwest Regional Coordinator, Federal Laboratories Consortium (invited) 10:30 a.m. Innovation

January 8, 2019, Conrad Indianapolis11:30 a.m. Registration

12:00 p.m. Welcome and Opening CommentsLunch Keynote: Big Data in Action: Success and Possibilities Darshan Shah, Chief Data Officer, Management Performance Hub

1:00 p.m. Indiana Chamber Tech Policy UpdateJohn McDonald, Chair, Indiana Chamber Tech Policy Committee and CEO, ClearObject

1:45 p.m. Break

2:00 p.m. Workforce Challenges and Successes• Chris Belli, Vice President, Marketing and Business

Development, Studio Science • John Leschorn, Co-Founder and Chief Operations Officer, Lucd• Drew Klacik, IU Public Policy Institute

Panel: Attracting TalentSusan Marshall, Torchlite (invited); Christopher Day, DemandJump; and Kristen Nunnery, MyCOI

3:00 p.m. Challenges and Successes of Raising Capital• Don Aquilano, Managing Director, Allos Ventures • Bryan Ritchie, Associate Provost, Innovation, University of

Notre Dame• Chris LaMothe, Chairman and CEO, Elevate Ventures and

Mark Gramelspacher, Managing Director, Evergreen Global Advisors, LLC

4:00 – 6:00 p.m. Innovation Expo/Reception (Hyatt Regency Indianapolis)

January 9, 2019, Hyatt Regency Indianapolis8:00 a.m. Continental Breakfast and Registration

8:30 a.m. Concurrent Session One

A. Internet of Things PanelMat Gangwer, Chief Technology Officer, Rook Security; Stephen Reynolds, CISSP, CIPP/US, Partner and Nick Merker, CISSP, CIPT, Partner, Ice Miller LLP

B. False Sense of Security: What AWS, Azure and Google Cloud Aren’t Telling You• The difference between security of the cloud and security in

the cloud• The value of your data in the cloud• Strategies to secure your data in and outside your environmentNick Lumsden, CSP, Vice President Technology & Product Strategy, Online Tech

C. Did I Do That?: The Human Factor in Cyber• You are a target – so what do you do to secure not just

yourself but your company?• When a cyber awareness program is maturing, expect a

roller-coaster of results• Cyber changes every day, expect your program to change

and evolve over timeCarla Donev, CISSP, CRISC, CISA, Chief Information Security Officer, NiSource

9:15 a.m. Innovation Expo Break

9:45 a.m. Concurrent Session Two

D. Security in the Digital Age: What are Your Executive Responsibilities?• What to do when a data breach happens• Your legal obligations and responsibilities for protecting your

company • Steps you should take to get prepared for an incident as well

as ways to keep your business going if an incident does occurDan Resnick, CISSP, CISA, CISM, Cybersecurity and Risk Management Practice Director, KSM Consulting and Bryan Langley, Executive Director, Indiana Dept. of Homeland Security

E. The Security Evolution of Payments: From EMV and Tokenization to Digital Wallets and Beyond• Understanding the current payments landscape and how

those technologies are shaping the industry• Examining which new payment alternatives offer the most

opportunity – for security and overall customer experience• Looking ahead to card fraud issues and payment alternatives

that will continue to redefine the payments experience over the next decade

Matt Herren, Director of Payment Analytics, CSI

F. Federal Agency Perspectives PanelRobert Templeman, Ph.D. / SSTM, Distinguished Engineer for Cybersecurity, U.S. Navy, NSWC Crane; Eugene Jones, Manufacturing Business Development Consultant, Purdue Manufacturing Extension Partnership; Rich Banta, Partner, Lifeline Data Centers; and Brooke Pyne, Midwest Regional Coordinator, Federal Laboratories Consortium (invited)

10:30 a.m. Innovation Expo Break

10:45 a.m. Concurrent Session Three

G. Recent Trends in Cybercrimes and Steps To Protect Your Business and Data• Recent trends in cybercrimes, threat vectors and

cryptocurrency fraud• Simple and inexpensive methods to protect your valauble data• Real-world examples of cyber attacks, phishing schemes and

ransomwareJohn McCauley, Esq., CIPP(US)(E), Partner, Bingham Greenebaum Doll LLP

H. Workforce Development/Attracting Talent PanelMatthew Etchison, Vice President of Information Technology - Workforce Alignment, Ivy Tech Community College; John Doyle, Ph.D., PE, Associate Professor, Computer Science, Indiana University Southeast; David Greer, Sr. Vice President and Chief Programs Officer, Project Lead The Way; other speaker TBD

I. AI-Easy vs. AI-Hard: Machine Learning and its Impact on the Development of AI Systems• AI and singularity• Opportunities for machine learning applications• Open challenges of AI/ML systemsJennifer Neville, Professor, Purdue University

11:30 a.m. Lunch (provided)

Governor’s Cybersecurity CouncilChetrice L. Mosley, Cybersecurity Program Director, Indiana Office of Technology, Indiana Department of Homeland Security

Keynote Presentation: Cybersecurity: Federal Efforts• Countering malign foreign influence operations (elections)• Countering sophisticated cyber schemes (justice)• Countering hostile foreign states’ theft of technology (military)Thomas Wheeler, JD, Senior Adviser, Office of the Secretary, U.S. Department of Education; Sujit Raman, JD, Associate Deputy Attorney General, U.S. Department of Justice; and Gene Price, Rear Admiral, United States Navy

1:15 p.m. Concurrent Session Four

J. The Inversion of Truth• The 4th Industrial Revolution• The Internet of Things• Change in workforce develppmentJohn McDonald, CEO, ClearObject

K. How MISO Uses Threat Hunting To Protect Business Operations• What is threat hunting and how does it differ from traditional

information security activities?• The Hunting Maturity Model• Hypothesis-based hunting examplesJamie Buening, Manager, Cyber Threat Hunting, MISO

L. Decrypting the Code: GDPR, CaCPA, Managing Personally Identifiable Data and the Specter of Customer Privacy• Will these laws hold? What’s next and what issues will it bring?• Will we see something federal that overrides individual state laws?• Contextualize emerging data privacy trends and technologies • Understand implications of new privacy laws and their

associated risks• Third vendor management for customers and vendors with

you in the middle

• Practical applications as well as an actionable strategy for legal compliance

Brian McGinnis, CIPP/US, Partner, Barnes & Thornburg LLP and Leon Ravenna, CIPM, CIPP/C, CIPP/E, CIPP/G, CIPP/US, Chief Information Security Officer, KAR Auction Services, Inc.

2:00 p.m. Break

2:15 p.m. Concurrent Session Five

M. Managing Risk With a Proactive Cybersecurity Posture• Proactively hunt for threats to systems and devices• Respond rapidly and effectively to a breach• Harmonize cybersecurity complianceJason Ortiz, Senior Integration Engineer, Pondurance

N. Taming Mobility• Evolving use of mobility by the enterprise• How mobility can be managed to maximize its potential• The hidded direct and indirect costs associated with mobilityChris Koeneman, Senior Vice President, MOBI

O. Cloud Computing PanelDavid Speicher, Chief Technology Officer, Aspire Indiana, Inc.; Josh von Schaumburg, Customer Solutions Lead, Trek10; and other speaker TBD

3:00 p.m. Break

3:15 p.m. Concurrent Session Six

P. Cybersecurity and Legal – A Winning Combination• Cybersecurity in education• Legal and cybersecurity collaboration• Scaling your program up from a small organization to a

midsize organizationEric Eliason, CIPM, FIP, HCISPP, Director of Information Security and Compliance and Michelle Gough, J.D., Ph.D., Senior Vice President and Chief Legal and Assessment Officer, Project Lead The Way

Q. Artificial Intelligence – A Collaborative Discussion• Interactively learn the basics of AI• A fun, interactive experience creating a simple AI algorithm• Demonstrate why AI is necessary for advanced applications

such as cancer research and interactive voice conversationsMatt MacBeth

R. Wait … You Tweeted What? Social Media’s Risk and Reward• Social media security best practices• Common social media security risks• Human error/policy discussionDrew Markel, Owner, Full Auto Marketing

4:00 p.m. Adjourn

AGENDA

According to a 2017 IBM-sponsored study, the average data breach for a company carries a global cost of $3.2 million. These breaches are a result of cyberattacks that occur daily and repeatedly. The Indiana Chamber is pleased to announce the expansion of the 2019 Cyber Technology Conference and Policy Summit. Cyber threats are the number one problem facing business today. This two-day conference will provide lessons on cybersecurity from leaders in the data privacy field focused on hot-button topics such as cloud computing, artificial intelligence, how to prevent human error and more. A big addition this year is the focus on the future of cyber policies in the modern political landscape for Indiana organizations. Don’t miss this must-attend event!

WHY YOU SHOULD ATTEND

This program should appeal to anyone who has a role regarding personal or confidential information – whether the information is that of a customer, employee, patient, student, job applicant or it is a trade secret or other proprietary information. Highly recommended for:

• Board members• CEOs• CIOs• CFOs• HR• PR/communications departments• In-house and general counsels• Insurance and risk managers• IT professionals

WHO SHOULD ATTEND

4 Easy Ways to RegisterOnline: www.indianachamber.com/events/cyber2019Phone: (800) 824-6885Email: [email protected]: PO Box 44926, Indianapolis, IN 46244-0926

RegistrationFull Conference – January 8-9Indiana Chamber member: $399 | List price: $499 January 8 OnlyIndiana Chamber member: $149 | List price: $199 January 9 OnlyIndiana Chamber member: $325 | List price: $375

Group Discounts Available! Use promo code GROUPSend two or more and get a 20% discount.

Available online or email [email protected] to register your group.

Location and Hotel InformationConrad and Hyatt RegencyThe conference will be held at the Conrad Indianapolis and Hyatt Regency in downtown Indianapolis. To receive the Indiana Chamber discount hotel room rate, visit the Hyatt Regency Indianapolis at www.hyatt.com or call (317) 632-1234 and enter group code: 55737. Subject to availability.

Cancellations/Substitutions: All cancellations must be received in writing. A $25 processing fee per person will be charged for all cancellations. Cancellations received within two weeks of the conference date will be issued a credit certificate, less the $25 processing fee. Credits can be used toward any future Indiana Chamber conference(s) for up to one year. Credit is fully transferable. Substitutions are welcome at any time, but are requested in advance of the conference.

REGISTRATION AND LODGING INFORMATION

Expo and reception (Hyatt Regency)January 8 | 4:00 - 6:00 p.m.

Expo (Hyatt Regency)January 9 | 8:00 a.m. - 1:15 p.m.

INNOVATION EXPO

Page 6: KEYNOTE SPEAKERS SPONSORS PAID - Leading Business...Lifeline Data Centers; and Brooke Pyne, Midwest Regional Coordinator, Federal Laboratories Consortium (invited) 10:30 a.m. Innovation

JANUARY 8-9, 2019 | CONRAD AND HYATT REGENCY INDIANAPOLIS

STRENGTHENING YOUR

CYBERSECURITY IS ESSENTIAL

FOR THE SUCCESS OF YOUR

ORGANIZATION!

PRSRT STDU.S. POSTAGE

PAIDIndianapolis, INPermit No. 159

115 W. Washington St., Ste. 850SIndianapolis, IN 46204www.indianachamber.com

REGISTER TODAY! www.indianachamber.com/event/cyber2019

PRESENTED BY

JANUARY 8-9, 2019 | CONRAD AND HYATT REGENCY INDIANAPOLIS

PRESENTED BY

• The Human Factor in Cyber• Executive Responsibilities in the Digital Age• Recent Trends in Cybercrimes and Steps To Protect Your Business

and Data• Workforce Development/Attracting Talent• How MISO Uses Threat Hunting To Protect Business Operations• GDPR Update• Managing Risk With a Proactive Cybersecurity Posture• Mobility• Cloud Computing• Artificial Intelligence• Social Media Risk

DON’T MISS THIS OPPORTUNITY FOR A SOLUTIONS-BASED, EDUCATION-FOCUSED EVENT COVERING:

Darshan ShahChief Data Officer, Management Performance Hub

Big Data in Action: Success and Possibilities

John McDonaldChair, Indiana Chamber Tech Policy Committee and CEO, ClearObject

Indiana Chamber Tech Policy Update

Thomas Wheeler, JDSenior Adviser, Office of the Secretary, U.S. Department of Education

Cybersecurity: Federal Efforts

Sujit Raman, JDAssociate Deputy Attorney Gen-eral, U.S. Department of Justice

Gene PriceRear Admiral, United States Navy

KEYNOTE SPEAKERS

PRESENTED BY

GOLD SPONSORS

SILVER SPONSORS

PLATINUM SPONSOR

SPONSORS