September 22-23, 2022 | Lake Geneva, WI

Partner Evaluation

Lake Geneva, WI

Dear Partner,
Thank you for your recent participation at our event in Lake Geneva. We want to hear from you.

Please take the Mindfluence Lake Geneva Survey. We value your feedback so please share your opinions below. This evaluation form will take approximately 5-10 minutes.

Thank you in advance for your valuable time and feedback.

Please Rank Each Panel Below from 1 – 6: (6 = High, 1 = Low):

Preventing and Remediating Ransomware Attacks

Why Build a Cybersecurity Culture?

What are the Security and Privacy Challenges in Hosted Environments

The Security Lifecycle of an Employee

How to Measure the Business Impact after an Incident

Staying Safe Without Bankrupting the Enterprise

Please rank each formal 1:1 meeting that took place and comment on which Delegates that you had informal discussions with.

Ron Zochalski
CTO & CISO
Lake County Government

 

Amit Gambhir
Sr. Manager - Enterprise Cyber Security Risk
Allstate Insurance

 

Derek Milroy
Security Architect
US Cellular

 

Richard Rushing
CISO
Motorola Mobility

 

Murad Dikeidek
Head of Information Security
University of Illinois Hospital and Health Sciences System

 

Greg Bee
CISO
Pekin Insurance

 

Eric Kierstead
Chief Technology Officer
Enstructure LLC

 

Frank Yanan
Business Information Security Officer
Bank of America

 

Grant Yost
Sr. Director, Security Architecture
VillageMD

 

Roberto Gutierrez
CISO
OSI Group LLC

 

Michael Fluharty
CISO/Information Technology Manager
Plymouth Tube Company

 

David Droster
Sr. Manager Corporate Security
Generac Power Systems

 

Ricardo LaFosse
CISO
Kraft Heinz

 

Sarah Buerger
CISO
Coyote Logistics, LLC

 

Jack Burback
Chief Security Officer
Wintrust Financial Corporation

 

Salman Rehman
Technology Leader/Scrum Master
U.S. Bank

 

Mohan Putcha
VP, IT
Aon

 

Saira Harcus
Director of IT
Horizon Therapuetics

 

Scot Marcotte
CTO
Buck

 

Victor Hsiang
CISO
GATX

 

Fred Kwong
CISO
DeVry

 

John Kellerhals
Information Security
Foley and Lardner

 

Tellis Williams
VP Risk and Security/Chief Information Security Officer Officer
Dream Exchange

 

Weston Nicholls
Information Security Manager
Fortune Brands Home & Security

 

Amr Abdelrahman
Director of Network Security Transformation
Zurich

 

Mark Ramshaw
Information Security & Risk Manager
Weber Inc.

Please rank each aspect of the Conference (5 = High, 1 = Low).

Lake Geneva Dinner Cruise

Breakfast

Lunch

Venue and Accommodations

Thank you for taking the time to complete this. We strive to make this a positive experience and want to exceed your expectations.

The Mindfluence Team

Agenda

Day 1

Time Activity
1:00 – 2:45 PM
Hotel Check In. Stop by the Registration Desk for goodies and meet the Mindfluence Team
3:00 – 3:05 PM
Welcome and Opening Remarks
3:05 – 3:55 PM
Panel #1. Digital Transformation and what does it mean for Cybersecurity organizations.
3:55 – 4:05 PM
Quickie Break
4:05 – 4:55 PM
Panel #2. Emerging Technologies-AI, IoT and OT, Smart Machines
6:00 – 7:00 PM
Welcome Cocktail Reception. Yes, drinks on us. Get to know your fellow Executives and Solution Providers.
7:00 – 9:00 PM
Gala Dinner. Go make some friends, socialize and indulge.

Day 2

Time Activity
8:00 – 8:45 AM
Networking Breakfast. Kickstart your day with premium java, tea and AM favorites.
8:45 – 8:50 AM
Opening Remarks
8:50 – 9:40 AM
Panel #3: Evolution of a CISO and the Role of a CISO during a Cyber Crisis
9:40 – 10:30 AM
Panel #4: Password Management: Can you have complete control? Smart Practices to reducing Internal Threats.
10:30 – 10:45 AM
Break
10:45 – 11:15 AM
Peer-To-Peer Meeting #1
11:15 – 11:45 AM
Peer-to-Peer Meeting #2
11:30 – 1:00 PM
LUNCH will be available
11:45 – 12:15 PM
Peer-To-Peer Meeting #3
1:00 – 1:50 PM
Panel #5: Not all MFA is created equal. Are we moving to Adaptive Authentication or Biometrics?
1:50 – 2:00 PM
Break
2:00 – 2:50 PM
Panel #6: Cloud Based Security Platforms for the Enterprise OR Implications of Blockchain
2:50 – 3:20 PM
Peer-to-Peer Meeting #4
3:20 – 3:50 PM
Peer-to-Peer Meeting #5
3:50 – 4:20 PM
Peer-to-Peer Meeting #6
4:20 – 4:30 PM
Break
4:30 – 5:10 PM
Panel #7: Understanding the right mobility security approach for your business and the Mobile User Authentication Challenge
5:10 – 5:15 PM
Closing remarks. You did it! Kick off your heels and loosen your ties!