BEGIN:VCALENDAR
VERSION:2.0
PRODID:-//ChamberMaster//Event Calendar 2.0//EN
METHOD:PUBLISH
X-PUBLISHED-TTL:P3D
REFRESH-INTERVAL:P3D
CALSCALE:GREGORIAN
BEGIN:VEVENT
DTSTART:20171005T200000Z
DTEND:20171005T220000Z
X-MICROSOFT-CDO-ALLDAYEVENT:FALSE
SUMMARY:Cyber-security Town Hall: Protecting Your Business Against the Growing Threat
DESCRIPTION:NOTE: Walk-ins welcome at the door.\n\n\n\nWith cyber-crime damage costs predicted to hit $6 trillion annually by 2021\, the Quad Cities Chamber is proud to bring together industry\, business\, and community leaders in a panel format to discuss the growing importance of cyber security to our region's businesses and their operations.\n\n \n\nThe town hall will include an hour-long panel conversation led by regional subject matter experts to help area businesses understand the growing cyber-security threat to industry supply chains.  The panel will cover what's important on the cyber-security landscape now\, why businesses should care\, what steps they should take to assess their cyber-security readiness and how to move toward implementation. \n\n \n\nAdditionally\, the town hall will address new Department of Defense (DoD) guidelines surrounding cyber-security going into place at the end of the year that will significantly impact any company that does business with the DoD. Through the new guidelines\, companies that either do direct business with the DoD\, or provide a product or service to a company that does business with the DoD\, will be required to meet new cyber-security standards. Those that don't will potentially incur major fines or lose contracts with the DoD.\n\n \n\nAfter the panel discussion\, attendees will continue the conversation at one of five different small-group discussions led by individual moderators.  Topics will appeal to a broad range of cyber security experience from novice to IT professionals.\n\n \n\nPanelists scheduled for the event are:\n\n	Special Agent Steve Telisak\, FBI\n	Beth Tinsman\, CEO & Founder\, Twinstate Technical Services\n	Paul Ricciuti\, Serco Inc./Rock Island Arsenal\n	Greg Price\, Vice President of Defense Programs\, Trowbridge & Trowbridge\, LLC\n	Josh McIntyre\, Associate\, Lane & Waterman Attorneys At Law (moderator)\n\n\nConcurrent breakout sessions (choose one)\n\n\n	Creating cyber-security culture and talent\n	DoD DFARS compliance \n	Getting a cyber-security program started\n	Internet of Things and advanced cyber issues\n\n\nLocation sponsor:\n\n\n\n Schedule of events:\n\n3-4 p.m.           Panel discussion\n\n4-5 p.m.           Breakout sessions\n\n\n\nAbout our panelists:\n\n\n\nSpecial Agent Steven Telisak   FBI\n\nSpringfield Division   Quad Cities Resident Agency (RA)\, Moline\, Ill.\n\nSpecial Agent Steven Telisak is a graduate of the University of Wisconsin   Eau Claire. In late 2003\, Steve began his career in federal law enforcement when he was employed by the United States Border Patrol.  There he served as a community liaison and field training officer for new agents at the Eagle Pass\, Texas\, Station\, and as the Border Patrol Union President for the Del Rio\, Texas\, Border Patrol Sector. Steve also served approximately 2 1/2 years as a task force officer with the Drug Enforcement Administration in Eagle Pass.\n\n \n\nSteve was hired by the FBI in August 2014 and was assigned to the Springfield Division - Quad Cities Resident Agency (RA) in Moline.  Steve had his initial exposure to computer-assisted crime\, social media exploitation and the double-edged sword of data encryption while working cases involving violent crimes against children.  He has received training from the FBI in peer-to-peer file-sharing systems and online undercover operations\, as well as Cellular Analysis Surveillance Training (CAST). Steve also has undergone training in the extraction\, imaging\, review and preservation of digital evidence to aid investigations as computer use in criminal activity increases.\n\n \n\nSince receiving that training\, Steve has performed on-scene digital forensics at many search sites\, imaged dozens of HDDs (hard disk drives) and SSDs (solid state drives)\, and extracted evidence from countless cellular phones.  Steve has enhanced many investigations by finding evidence and digital artifacts in digital device and media evidence.\n\n \n\nIn an effort to further advance his investigations\, Steve applied for and was selected by the FBI to attend SANS basic network security training in July of this year. Steve is presently working Springfield Division's Counter Intelligence program but hopes to be assigned to Cyber Crime in the coming years.\n\n \n\nBeth Tinsman   CEO and Founder\, Twin State Technical Services \n\nTwin State Tech is an information systems and software development company founded by Beth Tinsman.  Twin State applies strategic and technical planning to business strategy and work processes. Cyber-security and protection of the 200-plus mid-market customers served by Twin State is a fundamental objective and responsibility of her company.  \n\n \n\nBeth earned her B.A. at Northwestern University and spent ten years with IBM. She holds an M.S. in Information Technology Management from St. Ambrose University\, where she teaches the Senior Capstone in Networks & Systems Administration.\n\n \n\nGreg Price   Vice President of Defense Programs\, Trowbridge & Trowbridge\, LLC\n\nGreg has over 10 years of experience working with defense and government contracting for the US military. He is an agile leader leveraging a diverse background in strategy and business within dynamic environments to meet national security requirements while supporting the highest levels of leadership within the Department of Defense. Greg engages his team to understand and support a culture of fiscal responsibility.\n\n \n\nJosh McIntyre\, moderator   Associate\, Lane & Waterman \n\nAttorney Josh McIntyre joined Lane & Waterman in 2012 and practices primarily in the areas of intellectual property\, information technology\, and professional malpractice\, including computer fraud\, data privacy and retention practices\, matters concerning domain names\, trademarks and trade secrets\, and legal malpractice defense.\n\n \n\n\n	\n		\n			This program is presented by the Quad Cities Chamber's Quad Cities Manufacturing Innovation Hub and the Defense Industry Adjustment Program. \n		\n	\n\n\n \n\nLeading Organizations:\n\n\n\n\n\n \n\nAcknowledgment:This content was prepared as part of the Illinois Defense Industry Adjustment Program\, a partnership between the University of Illinois System\, the Quad Cities Chamber of Commerce\, and the Voorhees Center at the University of Illinois Chicago (UIC)\, with financial support from the U.S. Department of Defense\, Office of Economic Adjustment (OEA).  It reflects the views of the Quad Cities Chamber of Commerce and does not necessarily reflect the views of the OEA. For more information\, please visit www.IllinoisDIA.org.
X-ALT-DESC;FMTTYPE=text/html:<span style="font-size:14px\;"><span style="color:#333333\;"><span style="font-family:arial\,sans-serif\;">NOTE: Walk-ins welcome at the door.<br />\n<br />\nWith cyber-crime </span></span><span style="background:white\;"><span style="color:#273238\;"><span style="font-family:arial\,sans-serif\;">damage costs predicted to hit $6 trillion annually by&nbsp\;</span></span></span><a href="http://www.csoonline.com/article/3153707/security/top-5-cybersecurity-facts-figures-and-statistics-for-2017.html" target="_blank"><span style="background:white\;"><span style="color:#448ACA\;"><span style="font-family:arial\,sans-serif\;">2021</span></span></span></a><span style="color:#333333\;"><span style="font-family:arial\,sans-serif\;">\, the Quad Cities Chamber is proud to bring together industry\, business\, and community leaders in a panel format to discuss the growing importance of cyber security to our region&#39\;s businesses and their operations.</span></span><br />\n&nbsp\;<br />\n<span style="color:#333333\;"><span style="font-family:arial\,sans-serif\;">The town hall will include an hour-long panel conversation led by regional subject matter experts to help area businesses understand the growing cyber-security threat to industry supply chains.&nbsp\; The panel will cover what&rsquo\;s important on the cyber-security landscape now\, why businesses should care\, what steps they should take to assess their cyber-security readiness and how to move toward implementation. </span></span><br />\n&nbsp\;<br />\n<span style="color:#333333\;"><span style="font-family:arial\,sans-serif\;">Additionally\, the town hall will address new Department of Defense (DoD) guidelines surrounding cyber-security going into place at the end of the year that will significantly impact any company that does business with the DoD. Through the new guidelines\, companies that either do direct business with the DoD\, or provide a product or service to a company that does business with the DoD\, will be required to meet new cyber-security standards. Those that don&rsquo\;t will potentially incur major fines or lose contracts with the DoD.</span></span><br />\n&nbsp\;<br />\n<span style="color:#333333\;"><span style="font-family:arial\,sans-serif\;">After the panel discussion\, attendees will continue the conversation at one of five different small-group discussions led by individual moderators.&nbsp\; Topics will appeal to a broad range of cyber security experience from novice to IT professionals.</span></span></span><br />\n&nbsp\;<br />\n<span style="font-size:14px\;"><span style="color:#333333\;"><span style="font-family:arial\,sans-serif\;">Panelists scheduled for the event are:</span></span></span>\n<ul>\n	<li><span style="font-size:14px\;"><span style="color:#333333\;"><span style="font-family:arial\,sans-serif\;">Special Agent Steve Telisak\, FBI</span></span></span></li>\n	<li><span style="font-size:14px\;"><span style="color:#333333\;"><span style="font-family:arial\,sans-serif\;">Beth Tinsman\, CEO &amp\; Founder\, Twinstate Technical Services</span></span></span></li>\n	<li><span style="font-size:14px\;"><span style="color:#333333\;"><span style="font-family:arial\,sans-serif\;">Paul Ricciuti\, Serco Inc./Rock Island Arsenal</span></span></span></li>\n	<li><span style="font-size:14px\;"><span style="color:#333333\;"><span style="font-family:arial\,sans-serif\;">Greg Price\, Vice President of Defense Programs\, Trowbridge &amp\; Trowbridge\, LLC</span></span></span></li>\n	<li><span style="font-size:14px\;"><span style="color:#333333\;"><span style="font-family:arial\,sans-serif\;">Josh McIntyre\, Associate\, Lane &amp\; Waterman Attorneys At Law (moderator)</span></span></span></li>\n</ul>\n\n<div><span style="font-size:14px\;"><strong><u><span style="color:#333333\;"><span style="font-family:arial\,sans-serif\;">Concurrent breakout sessions (choose one)</span></span></u></strong></span></div>\n\n<ul>\n	<li><span style="font-size:14px\;"><span style="font-family:arial\,sans-serif\;">Creating cyber-security culture and talent</span></span></li>\n	<li><span style="font-size:14px\;"><span style="font-family:arial\,sans-serif\;">DoD DFARS compliance </span></span></li>\n	<li><span style="font-size:14px\;"><span style="font-family:arial\,sans-serif\;">Getting a cyber-security program started</span></span></li>\n	<li><span style="font-size:14px\;"><span style="font-family:arial\,sans-serif\;">Internet of Things and advanced cyber issues</span></span></li>\n</ul>\n\n<div><u><strong><span style="font-size:14px\;">Location sponsor:</span></strong></u><br />\n<img alt="" height="80" src="https://chambermaster.blob.core.windows.net/userfiles/UserFiles/chambers/2843/Image/TheCurrent_hq.png" style="width: 553px\; height: 80px\;" width="553" /><br />\n&#8203\;<span style="font-size:14px\;"><strong><u><span style="color:#333333\;"><span style="font-family:arial\,sans-serif\;">Schedule of events:</span></span></u></strong><br />\n<span style="color:#333333\;"><span style="font-family:arial\,sans-serif\;">3-4 p.m.&nbsp\;&nbsp\;&nbsp\;&nbsp\;&nbsp\;&nbsp\;&nbsp\;&nbsp\;&nbsp\;&nbsp\; Panel discussion</span></span><br />\n<span style="color:#333333\;"><span style="font-family:arial\,sans-serif\;">4-5 p.m.&nbsp\; &nbsp\;&nbsp\;&nbsp\;&nbsp\;&nbsp\;&nbsp\;&nbsp\;&nbsp\; Breakout sessions</span></span></span><br />\n<br />\n<span style="font-size:14px\;"><u><strong>About our panelists:</strong></u></span><br style="font-size: 14px\;" />\n<br style="font-size: 14px\;" />\n<strong style="font-size: 14px\;">Special Agent Steven Telisak &ndash\; FBI</strong><br style="font-size: 14px\;" />\n<strong style="font-size: 14px\;">Springfield Division &ndash\; Quad Cities Resident Agency (RA)\, Moline\, Ill.</strong><br style="font-size: 14px\;" />\n<span style="font-size: 14px\;">Special Agent Steven Telisak is a graduate of the University of Wisconsin &ndash\; Eau Claire. In late 2003\, Steve began his career in federal law enforcement when he was employed by the United States Border Patrol.&nbsp\; There he served as a community liaison and field training officer for new agents at the Eagle Pass\, Texas\, Station\, and as the Border Patrol Union President for the Del Rio\, Texas\, Border Patrol Sector. Steve also served approximately 2 1/2 years as a task force officer with the Drug Enforcement Administration in Eagle Pass.</span><br style="font-size: 14px\;" />\n<span style="font-size: 14px\;">&nbsp\;</span><br style="font-size: 14px\;" />\n<span style="font-size:14px\;">Steve was hired by the FBI in August 2014 and was assigned to the Springfield Division - Quad Cities Resident Agency (RA) in Moline.&nbsp\; Steve had his initial exposure to computer-assisted crime\, social media exploitation and the double-edged sword of data encryption while working cases involving violent crimes against children.&nbsp\; He has received training from the FBI in peer-to-peer file-sharing systems and online undercover operations\, as well as Cellular Analysis Surveillance Training (CAST). Steve also has undergone training in the extraction\, imaging\, review and preservation of digital evidence to aid investigations as computer use in criminal activity increases.<br />\n&nbsp\;<br />\nSince receiving that training\, Steve has performed on-scene digital forensics at many search sites\, imaged dozens of HDDs (hard disk drives) and SSDs (solid state drives)\, and extracted evidence from countless cellular phones. &nbsp\;Steve has enhanced many investigations by finding evidence and digital artifacts in digital device and media evidence.<br />\n&nbsp\;<br />\nIn an effort to further advance his investigations\, Steve applied for and was selected by the FBI to attend SANS basic network security training in July of this year. Steve is presently working Springfield Division&rsquo\;s Counter Intelligence program but hopes to be assigned to Cyber Crime in the coming years.<br />\n&nbsp\;<br />\n<strong><span style="background:white\;">Beth Tinsman &ndash\; CEO and Founder\, Twin State Technical Services </span></strong><br />\nTwin State Tech is an information systems and software development company founded by Beth Tinsman.&nbsp\; Twin State applies strategic and technical planning to business strategy and work processes. Cyber-security and protection of the 200-plus mid-market customers served by Twin State is a fundamental objective and responsibility of her company.&nbsp\;&nbsp\;<br />\n&nbsp\;<br />\nBeth earned her B.A. at Northwestern University and spent ten years with IBM. She holds an M.S. in Information Technology Management from St. Ambrose University\, where she teaches the Senior Capstone in Networks &amp\; Systems Administration.<br />\n&nbsp\;<br />\n<strong>Greg Price &ndash\; Vice President of Defense Programs\, Trowbridge &amp\; Trowbridge\, LLC</strong><br />\nGreg has over 10 years of experience working with defense and government contracting for the US military. He is an agile leader leveraging a diverse background in strategy and business within dynamic environments to meet national security requirements while supporting the highest levels of leadership within the Department of Defense. Greg engages his team to understand and support a culture of fiscal responsibility.<br />\n&nbsp\;<br />\n<strong><span style="background:white\;">Josh McIntyre\, moderator &ndash\; Associate</span></strong><strong><span style="background:white\;">\, </span></strong><strong><span style="background:white\;">Lane &amp\; Waterman </span></strong><br />\n<span style="background:white\;">Attorney </span><span style="background:white\;">Josh McIntyre joined Lane &amp\; Waterman in 2012 and practices primarily in the areas of intellectual property\, information technology\, and professional malpractice\, including computer fraud\, data privacy and retention practices\, matters concerning domain names\, trademarks and trade secrets\, and legal malpractice defense.</span></span><br />\n&nbsp\;</div>\n\n<table border="0" cellpadding="0" cellspacing="0" id="content_LETTER.BLOCK74" style="background-image: initial\; background-position: initial\; background-size: initial\; background-repeat: initial\; background-attachment: initial\; background-origin: initial\; background-clip: initial\; box-sizing: inherit\; border-collapse: collapse\; border-spacing: 0px\; color: rgb(0\, 0\, 0)\; font-family: Arial\, sans-serif\; font-size: 14.6667px\; width: 650px\;" width="100%">\n	<tbody style="box-sizing: inherit\;">\n		<tr style="box-sizing: inherit\;">\n			<td style="border-width: initial\; border-style: initial\; box-sizing: inherit\; padding: 3.75pt\;"><span style="font-family: arial\;">This program is presented by the Quad Cities Chamber&#39\;s Quad Cities Manufacturing Innovation Hub and the Defense Industry Adjustment Program.&nbsp\;</span></td>\n		</tr>\n	</tbody>\n</table>\n\n<div>&nbsp\;</div>\n\n<div><strong style="box-sizing: inherit\; font-family: Arial\, sans-serif\; font-size: small\;"><u style="box-sizing: inherit\;"><span style="font-size: 14px\;"><span style="font-family: arial\;">Leading&nbsp\;Organizations</span></span></u></strong><span style="font-family: arial\;"><strong style="box-sizing: inherit\; font-family: Arial\, sans-serif\; font-size: small\;">:<br />\n<br />\n<img alt="" height="81" src="https://chambermaster.blob.core.windows.net/userfiles/UserFiles/chambers/2843/Image/DIA_Banner_Blue1.jpg" style="width: 607px\; height: 81px\;" width="607" /></strong></span></div>\n\n<div>&nbsp\;</div>\n\n<div><span style="font-size: 9px\;"><span style="font-family: arial\;"><span style="box-sizing: inherit\; color: rgb(0\, 0\, 0)\; text-align: justify\;"><font style="box-sizing: inherit\;">Acknowledgment:</font></span>This content was prepared as part of the Illinois Defense Industry Adjustment Program\, a partnership between the University of Illinois System\, the Quad Cities Chamber of Commerce\, and the Voorhees Center at the University of Illinois Chicago (UIC)\, with financial support from the U.S. Department of Defense\, Office of Economic Adjustment (OEA).&nbsp\; It reflects the views of the Quad Cities Chamber of Commerce and does not necessarily reflect the views of the OEA. For more information\, please visit&nbsp\;<a href="http://www.illinoisdia.org/">www.IllinoisDIA.org</a>.<span style="box-sizing: inherit\; text-align: justify\; color: rgb(89\, 89\, 89)\;">&nbsp\; &nbsp\; &nbsp\;</span></span></span></div>\n<br />\n&nbsp\;
LOCATION:The Current Iowa 215 N. Main St. Davenport\, IA 52801
UID:e.2843.6400
SEQUENCE:3
DTSTAMP:20260501T224405Z
URL:https://member.quadcitieschamber.com/events/details/cyber-security-town-hall-protecting-your-business-against-the-growing-threat-6400
END:VEVENT

END:VCALENDAR
