+ All Categories
Home > Documents > sf.arma.orgsf.arma.org/prodleadership/Files/Speaker Database/Spea… · XLS file · Web...

sf.arma.orgsf.arma.org/prodleadership/Files/Speaker Database/Spea… · XLS file · Web...

Date post: 01-Sep-2018
Category:
Upload: vunguyet
View: 228 times
Download: 0 times
Share this document with a friend
70
About the Speaker Chris Beasley David Beauchemin William Brantley Alexandra Hunton & Williams LLP Todd Brown Travis Bryan Speaker First Name Speaker Last Name Agencies to provides RaaS (Records as a Service) solutions. Chris hosts a free monthly seminar series about Info Mgt. David Beauchemin, Information Governance Product Manager for InOutsource, provides project management and information governance consulting services to law firms. He supports firms in designing and documenting business processes to maximize efficiency and compliance, creates custom-tailored software training documentation and leads training sessions for staff members. Trademark Office's Global Intellectual Property Academy. Also is an Adjunct Professor at the University of Maryland's Project Mgt Center for Excellence. Cunningham Todd Brown joined Access Sciences in 2010 and brings over 30 years of management experience in professional services, technology, and human resources. His background includes international company expansion into new markets, implementing growth strategies, and successful business start-ups in the U.S. He has architected client solutions for Fortune 100 and 500 companies in retail, service, utilities, oil and gas, government, insurance, and information technology markets. Todd currently serves on the Board of Directors for ARMA Houston, as Executive Vice President. Security Analyst at Santee Cooper in Moncks Corners, SC
Transcript

Speaker First Name Speaker Last Name About the Speaker

Chris Beasley

David Beauchemin

William BrantleyAlexandra Brisky Cunningham Hunton & Williams LLP

Todd Brown

Travis Bryan Security Analyst at Santee Cooper in Moncks Corners, SC

RIM Consultant that has works with Federal Agencies to provides RaaS (Records as a Service) solutions. Chris hosts a free monthly seminar series about Info Mgt.

David Beauchemin, Information Governance Product Manager for InOutsource, provides project management and information governance consulting services to law firms. He supports firms in designing and documenting business processes to maximize efficiency and compliance, creates custom-tailored software training documentation and leads training sessions for staff members.

Training Administrator at US Patent and Trademark Office's Global Intellectual Property Academy. Also is an Adjunct Professor at the University of Maryland's Project Mgt Center for Excellence.

Todd Brown joined Access Sciences in 2010 and brings over 30 years of management experience in professional services, technology, and human resources. His background includes international company expansion into new markets, implementing growth strategies, and successful business start-ups in the U.S. He has architected client solutions for Fortune 100 and 500 companies in retail, service, utilities, oil and gas, government, insurance, and information technology markets. Todd currently serves on the Board of Directors for ARMA Houston, as Executive Vice President.

Reynolds Cahoon

Tom Corey

Jeffrey Cox

Julie Colgan Past and Current ARMA International Presidents / Records ManagersLawyer / CRM - Consultant with Consilio (formally Huron Legal)

I’m a information technology, business technology and process consultant with high accolades for being an amazing people person – being able to understand the business needs then being able to translate it to the technical people. These amazing conversations turn into amazing solutions for clients as well as long term, valued relationships for close to 30 years.

For over 15 of those years, I've brought records management into the mix, being a program manager for a RIM Software company and a RIM consultant for a consulting company in the west - always with the goal of using my unique perspective to help clients find a better way.

I’m a loving husband, married to an amazing wife I adoringly refer to as Beautiful. I’m a father to two daughters in college and one son in the cradle. I’m a man of newly found Faith.

When I get time, I like to focus on photography.

Brett Creasy

Charlene Cunniffe

George Darnell

Ken Dickey

Maura Dunn

Mr. Brett Creasy is the Vice-President and Director of Digital Forensics at bit-x-bit, LLC. He is responsible for leading bit-x-bit’s team of forensic examiners and technicians in the preservation and analysis of electronic evidence. Mr. Creasy has conducted hundreds of examinations on a wide variety of systems including laptops, desktops, servers, cell phones, and external devices such as USB hard drives and optical media. He has testified as an expert witness numerous times in both state and federal courts. Mr. Creasy is a Certified Computer Examiner (CCE) and a member of the International Society of Forensic Computer Examiners. He has a B.S. in Information Technology with a specialization in Information Security and Assurance and an A.S. in computer network security and forensics. He also holds multiple other certificates and certifications in the areas of project management and information security, including being a Certified Information Systems Security Professional (CISSP ®).

Charlene Cunniffe, MS, CRM, CIP is an experienced information and records management professional and project manager with degrees from Harvard and Simmons, as well as years of experience in law, engineering, government, biotech/pharma, and academia. As Associate Director, Governance & Operational Support in Information & Records Management, well as a Lean Leader and Continuous Improvement coach in the Shared Business Services group at Sanofi, Charlene facilitates transversal and departmental process improvement.

Independent Contractor. Former ARMA Mid Atlantic Region Coordinator and Past President of ARMA NOVA Chapter.

Ken Dickey heads the Business Development department at Cadre. With over 29 years of experience in information technology, Mr. Dickey has established himself as a leading expert on IT security architecture design and deployment in both the commercial and government environments.

President of TrailBlazer Consulting, LLC A records management professional with over 25 years of experience consulting to federal government and commercial organizations.

Audrey Gaines

Paul Giles

Brian Haskin Identity theft victim

Mark Henriques Lawyer / Sedona Conference Member

Eric Hiltz

Nancy Hunn Records Officer and Deputy Chief Privacy Officer for GAO.

Mack Jackson

Virgina Jones City of Newport News (VA) Water Works Department

John Krysa CRM - Records Consultant for

Ladner

Mary Laverdure CRM and Operational Risk Consultant for Wells Fargo

Albert "Al" Minnick US Food and Drug Administration

Federal Director at Gimmal. Has more than 20 years experience in ECM and RM market. He is Gimmal's Microsoft Azure RaaS solution development director for the Public Sector

Wildlife Biologist at the South Carolina Department of Natural Resources

Mack Jackson Jr. is an expert on Internet security systems and compliance. He brings increased security awareness to his audiences and communicates the importance of security measures in protecting your business. Mack will show you how to improve your security plan, data breaches and avoid legal hassles. His passion and personality will energize and inspire you to protect your information and his ability to make complicated information clear and understandable. He will help you keep your personal information safe online.

Since 1984, Mack Jackson Jr. has been a technology consultant, author, business owner, software programmer and a project manager. He has consulted with leading software manufacturers and Fortune 500 companies. Mack is the owner of MJ Computer Concepts Inc., a consulting firm that coaches businesses on Internet security and business management.

As a software programmer, Mack has designed business processes and procedures to protect company’s sensitive information and accounting software consulting. Mack comprehends how computer systems can be breached and vulnerable to hackers and cybercriminals.

TeraPast and Current ARMA International Presidents / Records Managers

Pat Nobel PF Noble Associates

Tom O'Rourke

Linda PaceMeghan Podolny Hunton & Williams LLP

Peter Ransome FileSolve President

Gary Rauchfuss

Shuler Rita

William Saffady

Mark Santangelo

Chris Whitaker

Executive Director of the Charleston County Parks and Recreation Commission

Director, Policy Standards and Training in Enterprise Business Continuation Management (EBCM) for a large finance company.

Director, National Records Management Traning Program at NARA. Possess more than 15 years experience as a learning professional.

Supervisory Special Agent of the Forensic Photography Dept of SLED (South Carolina State Law Enforcement Division), Author

An experience records management consultant and author over over three dozen books on records management.

Chief Librarian and Archivist, National Library for the Study of George Washington

Chris Whitaker, PhD, MBA is a Senior Advisor in Iron Mountain’s Professional Services organization. He has been in Document Management/Records and Information Management for over 20 years working for companies such as Iron Mountain Consulting and Xerox Corporation. He has partnered with numerous global organizations to mitigate risk and reduce costs for managing information through the development and implementation of best practice RIM programs. His work in this area spans multiple industries, including Financial Services, Insurance, Manufacturing, Retail and Life Sciences. Chris holds an MBA from Mercer University in Atlanta and a PhD from Northcentral University. He is a current member of ARMA in the Virginia area.

Thomas White

Jesse Wilkins

Chris Witaker Iron Mountain

Lorri Yarborough Team IA

Jane Zhang

Thomas White is the university archivist and curator of special collections in the Gumberg Library at Duquesne University. He is also an adjunct lecturer in Duquesne’s History Department and an adjunct professor of history at La Roche College. Tom received a master’s degree in public history from Duquesne University. Besides the folklore and history of Pennsylvania, his areas of interest include public history and American cultural history. He is the award-winning author of nine books, including Legends and Lore of Western Pennsylvania, Forgotten Tales of Pennsylvania, Ghosts of Southwestern Pennsylvania, Forgotten Tales of Pittsburgh Forgotten Tales of Philadelphia (co-authored with Edward White), Gangs and Outlaws of Western Pennsylvania (co-authored with Michael Hassett), A Higher Perspective: 100 Years of Business Education at Duquesne University, Witches of Pennsylvania: Occult History and Lore, and Supernatural Lore of Pennsylvania: Ghosts, Monsters, and Miracles (editor).

Jesse Wilkins, CIP, CRM, IGP, is the Director, Research & Development for AIIMInternational. He has worked in the information management industry for 20 yearsas an end user, vendor, consultant, and trainer. His areas of expertise includeenterprise content management, electronic records management, emailmanagement, document imaging, digital preservation, and social mediatechnologies and governance processes.Jesse is an internationally recognized speaker and author on informationmanagement topics and has presented numerous keynotes and educationalsessions at AIIM, ARMA, ARMA Canada, InterDoc, MER, and other industryconferences since 2002.

Assistant Professor at the Dept of Library and Information Science, Catholic University of America. Teaches archives and electronic records management.

Chapter Name, City, State Speaker Fees/Travel Expenses

ARMA Metro, Gaithersburg, MD

Pittsburgh,Pittsburgh, PA N/A

ARMA Metro, Gaithersburg, MDTidewater, Newport News, VA

Houston, TX

SC Coastal, Charleston, SC None for Local - Unknown for outside area

Travel expenses only for presentation. If workshop desired please inquire for fee.

Boyds Negotiable

Charlotte Piedmont, Charlotte, NC

Charlotte Piedmont, Charlotte, NC

Asheville, NC Travel Required / Speaker Fees Nego

Pittsburgh,Pittsburgh, PA N/A

Somerville, MA cost of travel, lodging, meals

Tidewater, Newport News, VA

Pittsburgh,Pittsburgh, PA N/A

NOVA, Northern VA NA

Philadelphia, PA Travel Expenses as warranted

ARMA Metro, Gaithersburg, MD

Charlotte Piedmont, Charlotte, NC

Charlotte Piedmont, Charlotte, NC

SC Coastal, Charleston, SC None for Local - Unknown for outside area

ARMA Metro, Gaithersburg, MD

Las Vegas, NV Negotiable

Tidewater, Newport News, VA

Charlotte Piedmont, Charlotte, NC

Charlotte Piedmont, Charlotte, NC

Charlotte Piedmont, Charlotte, NC

Tidewater, Newport News, VA

Tidewater, Newport News, VA

SC Coastal, Charleston, SC None for Local - Unknown for outside area

ARMA Metro, Gaithersburg, MDTidewater, Newport News, VA

Charlotte Piedmont, Charlotte, NC

ARMA Metro, Gaithersburg, MD

Columbia, Columbia SC

Brooklyn, NY Price quoted based on chapter requirements and location

NOVA, Northern VA

Pittsburgh,Pittsburgh, PA N/A

Pittsburgh,Pittsburgh, PA N/A

Pittsburgh,Pittsburgh, PA

Charlotte Piedmont, Charlotte, NC

SC Coastal, Charleston, SC None for Local - Unknown for outside area

ARMA Metro, Gaithersburg, MD

These fees were waived as a memorium to a deceased AIIM member who was also once part of the ARMA - Pittsburgh Chapter.

Program Presented

Records as a Service

Mergers & Acquisitions

Protecting Your Records From Cyber Attacks

Proactive Steps to Enact Your Retention Policy — a joint ARMA/ILTA session

Enhance Your Professional Value with Project Mgt Certification. A presentation included in Spring Seminar "Sharpening Your Tools: Essentional Education, Certifications, and Training for Information Professionals"

Data Governance: Leveraging Your Data Assets and Optimizing Operations

CIO's Perspective on RIM and Information Governance

Record Management Certifications: IGP, CRM, or None?

January Roundtable

RIM Advice – Forging Stronger Relationships with IT

Using Lean Methods to Improve RIM Practices

Best Practices in a Transforming World

How can Computer Forensics, E-Discovery and Defensible Disposal Inform your Information Governance Program?

Orchestrating RIM - Working Collaboratively: IT, Legal, Security and RIM

Mobile Device Security – Mapping the Mobile Device Risk Model to Products Which Help Mitigate Those Risks

Building Technology Partnerships

Fishery Dependent Data at SCDNR

Records, Privacy and Information Governance

Information Governance - Cyber Security

Managing Information Risk & Compliance in the IG System

Ethics & Professionalism in Our Industry

Record Management Certifications: IGP, CRM, or None?

January Roundtable

Vital Records

Party of One! Are you ready for your Records Management Meal

Living through real identity theft. Convincing the world you are or are not youThe Relationship Between Legal Counsel & a Records Manager During a Legal Hold & eDiscovery Process

Auditing the Records Management Program

Managing the Boss-Employee Relationship

Mergers & Acquisitions

Technology Solutions

Truth or Dare: Can You Prove Compliance?

Critical Skills for Every Leader. A presentation included in Spring Seminar "Sharpening Your Tools: Essentional Education, Certifications, and Training for Information Professionals"

New Directions in Records Management Training: NARA training and RM Certificate Program. A presentation included in Spring Seminar "Sharpening Your Tools: Essentional Education, Certifications, and Training for Information Professionals"

"Forensic Evidence Case Studies", a scientific presentation showing the role of physical evidence in the investigation of criminal cases. Included are several cases documented in her books.      

Fundamentals of RIM, Managing Electronic Records, Information Governance, other topics possible

American History in Modern Times - Going from a Basement to an Archival Presidential Library

Ghosts and Legends of Western Pennsylvania

Truth or Dare: Can You Prove Compliance?

A Social on Social Media Governance: The Do’s and Don’t of Managing Social Media

South Caroline Law Enforcement Division Presents their Automation Project with Team IA.

Thinking Ahead - Directions in certifying and educational resources. A presentation included in Spring Seminar "Sharpening Your Tools: Essentional Education, Certifications, and Training for Information Professionals"

Short Description of Program

Introduction to mergers and acquisitions and management of these records.

Achieveing a records mgt platform internallis very slow going. Funding, requirements gathering, etc is difficult. Presentaiton discusses universal requirements and best practices as well as describes an option for agencies to have a RIM solution wihtout a 500 page service agreement.

Most Law Firms have adopted Information Governance policies that outline retention plans for physical and electronic information. Very few firms have actually enacted retention on any of their physical or electronic content. A large part of the reason for this is that their systems and processes for managing information are not configured around the retention process. This session offered some practical suggestions on how to change business process and software configuration to efficiently enact retention.

RIM and PM are complememtary and will make you a more desirable candidate to your organization. Enhance your RIM certification with a Project Management certification.

Data Governance: Leveraging Your Data Assets and Optimizing Operations:

Almost every aspect of the work day involves handling data of some type. Good things happen for an organization when it manages data efficiently, quickly, and in a way that makes sense for the way its employees work. Ensuring data integrity, designing processes to align with decision making, and leveraging data as an asset to optimize operations are each critical components in a successful data governance program. Ultimately, successful data governance isn’t simply establishing a program, process, or policy…it’s about the people.

In this interactive webinar, we will share real world examples and review the value of managing your data and the components of a successful data governance program. • How data governance can help your organization• Benefits and risks • Real world examples• Components of an effective program

This webinar will introduce the 5 Characteristics of a Data-Driven Culture and a 7-Point Data Governance Model that can be utilized to design and develop a scalable, fit-for-purpose Data Governance Program for your organization.Discussed the various issues around data storage and data protection as it relats to records management.

The differences and purposes of various records management certifications

Discussion of Records Management Issues based on the five CRM exams

What a CIO needs from RIM professionals and what they can accomplish working together.

20 Minute talk45-60 Minutes Lecture/discussion3 Hour workshop

Subtext: Advice from a 30 year IT veteran on how RIM Professionals can win the hearts of and work with the IT department.

Topic Abstract: Let’s face it; IT get’s all the Glory. Records? Unfortunately, many times it’s “Meh; Records? Who are they.” But, it doesn’t have to be that way. In this presentation, Jeffrey Cox, a 30 year IT veteran, who also loves and has worked in Records Management, will give you actionable tools and ideas on how to make IT love RIM, winning over their hearts and making them a true partner.

Presentation Time:

One Hour (45 minutes with 15 minutes for questions.)Alternative Presentation: 30 Minutes (25 minutes with 5 minutes for questions.)

We received an overview of computer forensic practices, e-discovery data collections and the role records management policies and processes have in defensible deletion. We learned secrets that that may give insights to improving your records program.

Continuous improvement is a method for identifying opportunities for streamlining work and reducing waste. The practice was formalized by the popularity of Lean / Kaizen in manufacturing and business, and it is now being used by thousands of companies all over the world to identify savings opportunities. This presentation will give an overview of Lean concepts and discuss the use of Lean events at Sanofi in the Information and Records Management department, as well as across functions, to improve internal processes.

Enterprises are trying to understand the mobile security landscape, they are also in the process of understanding their own mobile risk appetite, as well as trying to address different pockets of populations with different use cases requiring different solutions. During this presentation we will map out the risks of storing sensitive data on mobile devices then break down what is required to secure enterprise mobility into a series of smaller problems, addressed by different technologies.

ARMA’s Information Governance Maturity Model (IGMM) . This presentation provides real-world examples of the IGMM assessment tool at work, including lessons learned on everything from the mechanics of using the tool, to reviewing and interpreting results, to identifying potential uses of the assessment results to build your program. In this presentation, we will:• Explore ARMA’s IGMM, including the Principles® of sound information governance that support it • Discuss how to utilize the IGMM assessment tool and its maturity levels to gain insight into information governance processes across your organization • Plan the development of an executable roadmap for improving information governance practices within your organization using the results of an IGMM assessment

Identity theft victim tells his story.

How lawyers work with rocords managers during a legal hold

Ethical issues facing records managers

The differences and purposes of various records management certifications

Discussion of Records Management Issues based on the five CRM exams

Presentation and discussion regarding the management of vital records.

Records Management may not be a fine wine or succinctly tasting meal; however there are tools available to provide you with support enabling you to have a similar satisfying experience. Learn the appetizer to dessert of a records management program when you a party of one. The sessions includes IG, Privacy, Security, and working with C-suite

Technology partnerships are critical to any successful RIM program. Presentation discusses how to leverage each type of partnershp to move RIM programs forward for all to benefit.

Discussed the databse utilized for tracking fishing activities in the Charleston area, commercial and private.

Topics covered included how records and privacy fit together; the increasing need for IG strategies and awareness in the demanding RIM portfolio; and privacy program foundational components.

The greatest threat to business in the 21st century is identity theft and fraud. There are 10 million new victims every year. Over 500 million records were stolen from businesses since 2005. Over 55% of the U.S. population has now been affected by these crimes. Crooks are more sophisticated than ever. Confidential information is the new currency for thieves. The new threats we face are devastating. The unprepared and complacent are being victimized. Cybercrime will be a bigger problem than illegal drug trafficking.

Attend Mack's program to find out Why you should be concerned.Presentation and discussion of an holistic approach to risk management, compliance and information governance.

Introduction to mergers and acquisitions and management of these records.

What software solutions are available for electronic records management

The speaker discussed requirements to manage forensic evidence and criminal case files.

Discussed the manner in which bosses must relate to their employees and how employees can work with their superiors.

Presentation provides the tools to move you forward and remain relevant in an ever-changing environment. Leadership skill development

Presentation examines how education, certification and training combine to create a learning landscape for the development of expertise. Learn how the knowledge and skills of each component can be combined to help professionals thrive in a variety of performance settings.

Program content will be customized to meet chapter requirements. I will provide chapter with a list of topics or outline, which they can review and modify. Duration: half-day only.

Recent research shows that while 87 percent of organizations have formal RIM programs, only 8 percent measure compliance, and only a paltry 7 percent of total employees are engaged in these RIM systems. A framework of basic RIM risk controls (that is, anticipated activities based on policy) can help set expectations across your enterprise and provide a means by which you and your business units can evaluate performance and plan for remediation. Once measured, performance can be benchmarked against your business’s goals or even against the performance of other organizations. The old adage of “what gets measured is what gets done” holds especially true when considering the financial, legal and security risks of the explosive volumes of information being created each and every day across your enterprise. As a result, controlling and managing information has become more complex and requires more than a standard RIM staff to police compliance activities in accordance with the needs of your customers, regulators and shareholders. This session provided a blueprint for managing such a complicated web of information.

Back by popular demand is local author and historian Thomas White. Tom turned his love of history and his profession as an archivist into several award winning books. You joined us as he explored the history and cultural meaning behind some of our region’s supernatural legends. You heard the story of whispering dead beneath the Black Cross, the ghostly woman of Summit Cut Bridge, the phantoms of Pittsburgh’s steel mills, and the ghosts and cults that stalk Blue Mist Road. You learned the truth about the curse at the old Quaker Church, Judge Reddick’s contest with the Devil, and many other spooky tales.

As organizations continue to incorporate social media into their business processes, there is an ever-increasing need to manage social content effectively. We learned why we need to take action now. This session detailed the steps required to manage social media to support business objectives and information management requirements. Common pitfalls to avoid were discussed.Joint presentaiton. Chris presented from the Raleigh facility, and the Charlotte group watched remotely

A member of the South Carolina Law Enforcement Division discussed the manner in which Team IA assisted in addressing a new law requiring gun owners to have their mental health status added to their background check. This included digitization and data tracking methods that were developed.

Recent research on RIM and ERM education in the US and Canada Library and Information Science and Archives Programs was shared.

Past Speaking Engagements Speaker Requirements

Please contact speaker directly. Please contact speaker directly.

ARMA Houston and American Marketing Association

Unknown Unknown

Presentation: Internet, projector, microphone. Note that workshop requires more than one person to present information.

ARMA 2015 Live - Global Management Risks

Projector

A sampling:ARMA Metro Maryland (2)AFCEA - Big Data ConferenceManaging Electronic Records (MER) ConferenceJohns Hopkins Colloquium - Applied Physics LabFuture of Text Conference - London 2nd Northumbria Witness Seminar Conference 24–25th Oct 2007, Newcastle upon TyneNational Technology Information Service Workshops (8 different topics)Kodak Global Directions ConferenceGIMMAL Group Webinars (2)UK Central Government Records Managers ConferenceNational Association of County Recorders and Election OfficialsSociety of American Archivists (2)AIIM Conferences (4)Digital Government Institute EDiscovery and RIM Conference (4)INFO 360 Conference

ProjectorWireless lavalier mic prefered

Tech Talent South1 Million Cups of Coffee / AshevilleARMA Rio Grande - Monthly Chapter Meeting (RIM Advice – Forging Stronger Relationships with IT)ARMA Rio Grande - Monthly Meeting (What is a Repository Anyway?)ARMA Denver - Monthly Meeting (Information Explosion)ARMA Midland/Permian Basin - Monthly Meeting (Information Explosion)AMRA Rio Grande - Spring Seminar (Information Explosion)

Please contact speaker directly. Please contact speaker directly.

Boston Chapter, April 2016 internet, mic

Please contact speaker directly. Please contact speaker directly.

Depends on the venue

Unknown Unknown

Varies depending on desired program

Organizing the FBI's records management system

ARMA 2015 Live - Global Management Risks

ARMA Liberty Bell Chapter monthly meetings and annual seminar

Silver State Chapter quarterly membership meetingJoint ARMA/AIIM event panel speaker

Unknown Unknown

Projector, microphone.

Please contact speaker directly. Please contact speaker directly.

I have presented seminars for many ARMA chapters and other groups. These seminars have been attended by more than 15,000 since the mid-1970s.

Please contact speaker directly. Please contact speaker directly.

Please contact speaker directly. Please contact speaker directly.

Unknown Unknown

Learning Objectives

RIM

Retention Legal

RIM, BusinessRIM, Legal

Records & Information Management

IT

Education Track IT, RIM, Business, Audit, Legal, Compliance

Agenda and Objectives:• How Data Affects the Way You Work Today• The Power of Good Data Management• Bad Data Warning Signs• Characteristics of a Data-Driven Culture• Components of an Effective Data Governance Program• Understand Your Culture• Gauge Level of Governance• Prioritize Areas of Need• Determine Future State• Gaining Support and Adoption• Creating a Governance Team

Records & Information Management

RIM

RIM

Information Technology

Depends on topic and audience. Learning objectives will be designed jointly with event organizer.

Walk away with three actionable ideas they can take back and start using in their RIM program immediately.

Data Forensics Forensics

Records & Information Management

RIM, Business

Security, BYOD Security

RIM

Understand Lean and continuous improvement principlesIdentify tools and techniques for Lean continuous improvementUnderstand the potential value of Lean facilitation for RIM improvement

Records & Information Management

RIM, Business

RIM

RIM, Privacy, Compliance

Information Technology

RIM, Compliance

RIM

RIM

RIM, Business

The objectives of this session are to learn how to develop, implement, and manage a program that is legally defensible with success when you are a party of one.

Learn about the fastest growing crime of the 21st centuryHow and why businesses are targetedWhy it directly affects you, your customers, and your employeesNew federal, state and industry regulation that require you to take actionFinancial damage and legal falloutImproving your security planGain trust and loyalty of customersSave time and money with affordable solutions

RIM, Audit

Business

BusinessRIM, Legal

RIM, IT

RIM, Business

RIM, Legal

Records & Information Management

RIM

Compliance Compliance

I will provide chapters with a description of the topic that includes learning objectives.

Local history Historical

Social media, IG, Governance Compliance

RIM, Compliance

RIM, Compliance

RIM

Advanced Face-to-Face

Advanced Face-To-Face

Beginning Face-to-FaceFace-to-Face

Strategic

Beginning To Intermediate Face-to-Face

Skill LevelBeginning, Intermediate, Advanced

Delivery MethodFace to Face (F2F), Virtual, Pre-recorded Virtual, Conference Call, Other

Lecture with Discussion, Case Study, Problem Solving, Small Group Discussion, This can be presented as a 45 minute presentation or a workshop (4 hours)

Strategic

PowerPoint

Roundtable Discussion / Polling

Management Lecture with Discussion

Lecture with Discussion, Case Study, Demonstration, Problem Solving, Small Group Discussion, Panel Discussion, Demonstration, Rapid Fire, Workshop

Advanced Face-To-Face

Core Lecture with Discussion

Face-To-Face

Advanced Face-To-Face

Advanced Face-to-Face

Core Lecture with Discussion

Intermediate Face-to-Face

PowerPoint / Personal Story

PowerPoint

Beginning To Intermediate Face-to-Face

Intermediate Face-to-Face

Strategic

Face-to-Face

PowerPoint

PowerPoint

Roundtable Discussion / Polling

Face-to-Face

Lecture with Discussion, Problem Solving, Small Group Discussion, Panel Discussion

Face-to-Face

Beginning To Intermediate Face-to-Face

Beginning To Intermediate Face-to-FaceFace-to-Face

TBD - presentation in April

Beginning Face-to-Face

Beginning To Intermediate Face-to-Face

Core Lecture with Discussion

Beginning Face-to-Face

Advanced Face-To-Face

Advanced Face-To-Face

Advanced Face-To-Face

PowerPoint

Beginning To Intermediate Face-to-Face

Beginning To Intermediate Face-to-Face

Designations Held

Please contact speaker directly.

[email protected]

CISSP

Speaker Contact InformationEmail, Telephone, Physical Mailing Address

 [email protected]

David BeaucheminInformation Governance Product ManagerInOutsource1518 Walnut StreetSuite 1800Philadelphia, PA [email protected]

[email protected]

CONTACT MICHELLE VAN ALLEN, [email protected]

[email protected] Yes

[email protected]

Atlanta, GeorgiaJulie Colgan: 404-790-7900 / [email protected]

Charlotte North Carolina (312) 288-1713 / [email protected]

CISSP

[email protected] Yes

[email protected]

Please contact speaker directly.

Brett Creasy, CCE, CISSP Vice President and Director of Digital Forensics [email protected] Grant StreetSuite 1250Pittsburgh, PA, 15219

Ken DickeyAVP – Business DevelopmentCadre Information Security – Simplifying the Business of Security201 E. 5th Street, Suite 1800 Cincinnati, OH 45202 E: [email protected] O: (513) 762-6669 F: (513) 762-6502 W: www.cadre.net

[email protected] Yes

Unknown

[email protected]

[email protected] Negotiable

CRM, FAI

[email protected]

[email protected]

[email protected]

John C. Krysa, CRM117 Beech CourtLittleton NC 27850252-586-7560 home officeAtlanta, GeorgiaTera Ladner: [email protected] North Carolina336.773.522 / [email protected]@gmail.com; [email protected]; (240) 839-0817

[email protected] Yes

PhD, MBA

CONTACT SHANTE ELLIS, EXECUTIVE ASSISTANT, [email protected]

[email protected]

Charlotte, North Carolinacontacted through Lena Chamra908.418.3152 / [email protected]

[email protected]

[email protected], https://sites.google.com/site/ritashulerforensics/

[email protected] http://www.mountvernon.org/library/about-the-library/contact-the-library-staff/

Chris Whitaker, PhD, MBASenior AdvisorIron Mountain Professional Services(804) [email protected]

Please contact speaker directly.

CIP, CRM, IGP

Raleigh, NC

[email protected]

Jesse Wilkins, CIP, CRM, IGPDirector of Professional DevelopmentAIIM - The Global Community of Information Professionals1100 Wayne Ave., Suite 1100Silver Spring, MD [email protected](720) 232-9638 direct

CONTACT PATTIE BEERMAN AT TEAM IA, [email protected]

[email protected]

Unknown

Please contact speaker directly.

Unknown

Unknown

Ability to Present VirtuallyYes or No. Can Face to Face (F2F) content be recorded for online delivery method? Who will create the virtual content? Chapter or speaker?

Yes, presentation format can be done via WebEx. If workshop is desired then in-person only.

Unknown

No

Yes - GoToMeeting

YesPlatform negotiable

Please contact speaker directly.

MS, CRM, CIP Yes. Would need host chapter to make arrangements

Please contact speaker directly.

Unknown

IGP Yes. WebEx

Unknown

Unkown

Unknown

Unknown

Unknown

Possibly. Contact speaker for details.

Unknown

Unknown

No

Unknown

Unknown

Unknown

Unknown

No

Please contact speaker directly.

Please contact speaker directly.

Please contact speaker directly.

Unknown

It was presented virtually to the Charlotte group from Raleigh


Recommended