September 22-23, 2022 | Lake Geneva, WI

Delegate Evaluation

Lake Geneva, WI

Dear Delegate,
Thank you for your recent participation at our event in Lake Geneva. We want to hear from you.

Please take the Mindfluence Lake Geneva Survey. We value your feedback so please share your opinions below. This evaluation form will take approximately 5-10 minutes.

Thank you in advance for your valuable time and feedback.

Please Rank Each Panel Below from 1 – 6: (6 = High, 1 = Low):

Preventing and Remediating Ransomware Attacks

Why Build a Cybersecurity Culture?

What are the Security and Privacy Challenges in Hosted Environments

The Security Lifecycle of an Employee

How to Measure the Business Impact after an Incident

Staying Safe Without Bankrupting the Enterprise

Please rank your one-on-one meetings with our Partners from 1 – 6: (6 = High, 1 = Low) & comment on which partners that you had informal discussions with.

Beyond Trust – beyondtrust.com

Cloudflare – cloudflare.com

Red Canary – redcanary.com

Fortinet - fortinet.com

Illumio – illumio.com

Semperis – semperis.com

Please rank each aspect of the Conference (5 = High, 1 = Low).

Lake Geneva Dinner Cruise

Breakfast

Lunch

Venue and Accommodations

Our success is dependent on awesome Delegates like yourself! If you’d be so kind to refer a couple of colleagues, that would be wonderful.

Thank you for taking the time to complete this. We strive to make this a positive experience and want to exceed your expectations.

The Mindfluence Team

Agenda

Day 1

Time Activity
1:00 – 2:45 PM
Hotel Check In. Stop by the Registration Desk for goodies and meet the Mindfluence Team
3:00 – 3:05 PM
Welcome and Opening Remarks
3:05 – 3:55 PM
Panel #1. Digital Transformation and what does it mean for Cybersecurity organizations.
3:55 – 4:05 PM
Quickie Break
4:05 – 4:55 PM
Panel #2. Emerging Technologies-AI, IoT and OT, Smart Machines
6:00 – 7:00 PM
Welcome Cocktail Reception. Yes, drinks on us. Get to know your fellow Executives and Solution Providers.
7:00 – 9:00 PM
Gala Dinner. Go make some friends, socialize and indulge.

Day 2

Time Activity
8:00 – 8:45 AM
Networking Breakfast. Kickstart your day with premium java, tea and AM favorites.
8:45 – 8:50 AM
Opening Remarks
8:50 – 9:40 AM
Panel #3: Evolution of a CISO and the Role of a CISO during a Cyber Crisis
9:40 – 10:30 AM
Panel #4: Password Management: Can you have complete control? Smart Practices to reducing Internal Threats.
10:30 – 10:45 AM
Break
10:45 – 11:15 AM
Peer-To-Peer Meeting #1
11:15 – 11:45 AM
Peer-to-Peer Meeting #2
11:30 – 1:00 PM
LUNCH will be available
11:45 – 12:15 PM
Peer-To-Peer Meeting #3
1:00 – 1:50 PM
Panel #5: Not all MFA is created equal. Are we moving to Adaptive Authentication or Biometrics?
1:50 – 2:00 PM
Break
2:00 – 2:50 PM
Panel #6: Cloud Based Security Platforms for the Enterprise OR Implications of Blockchain
2:50 – 3:20 PM
Peer-to-Peer Meeting #4
3:20 – 3:50 PM
Peer-to-Peer Meeting #5
3:50 – 4:20 PM
Peer-to-Peer Meeting #6
4:20 – 4:30 PM
Break
4:30 – 5:10 PM
Panel #7: Understanding the right mobility security approach for your business and the Mobile User Authentication Challenge
5:10 – 5:15 PM
Closing remarks. You did it! Kick off your heels and loosen your ties!