Speaker First Name Speaker Last Name About the Speaker
Chris Beasley
David Beauchemin
William BrantleyAlexandra Brisky Cunningham Hunton & Williams LLP
Todd Brown
Travis Bryan Security Analyst at Santee Cooper in Moncks Corners, SC
RIM Consultant that has works with Federal Agencies to provides RaaS (Records as a Service) solutions. Chris hosts a free monthly seminar series about Info Mgt.
David Beauchemin, Information Governance Product Manager for InOutsource, provides project management and information governance consulting services to law firms. He supports firms in designing and documenting business processes to maximize efficiency and compliance, creates custom-tailored software training documentation and leads training sessions for staff members.
Training Administrator at US Patent and Trademark Office's Global Intellectual Property Academy. Also is an Adjunct Professor at the University of Maryland's Project Mgt Center for Excellence.
Todd Brown joined Access Sciences in 2010 and brings over 30 years of management experience in professional services, technology, and human resources. His background includes international company expansion into new markets, implementing growth strategies, and successful business start-ups in the U.S. He has architected client solutions for Fortune 100 and 500 companies in retail, service, utilities, oil and gas, government, insurance, and information technology markets. Todd currently serves on the Board of Directors for ARMA Houston, as Executive Vice President.
Reynolds Cahoon
Tom Corey
Jeffrey Cox
Julie Colgan Past and Current ARMA International Presidents / Records ManagersLawyer / CRM - Consultant with Consilio (formally Huron Legal)
I’m a information technology, business technology and process consultant with high accolades for being an amazing people person – being able to understand the business needs then being able to translate it to the technical people. These amazing conversations turn into amazing solutions for clients as well as long term, valued relationships for close to 30 years.
For over 15 of those years, I've brought records management into the mix, being a program manager for a RIM Software company and a RIM consultant for a consulting company in the west - always with the goal of using my unique perspective to help clients find a better way.
I’m a loving husband, married to an amazing wife I adoringly refer to as Beautiful. I’m a father to two daughters in college and one son in the cradle. I’m a man of newly found Faith.
When I get time, I like to focus on photography.
Brett Creasy
Charlene Cunniffe
George Darnell
Ken Dickey
Maura Dunn
Mr. Brett Creasy is the Vice-President and Director of Digital Forensics at bit-x-bit, LLC. He is responsible for leading bit-x-bit’s team of forensic examiners and technicians in the preservation and analysis of electronic evidence. Mr. Creasy has conducted hundreds of examinations on a wide variety of systems including laptops, desktops, servers, cell phones, and external devices such as USB hard drives and optical media. He has testified as an expert witness numerous times in both state and federal courts. Mr. Creasy is a Certified Computer Examiner (CCE) and a member of the International Society of Forensic Computer Examiners. He has a B.S. in Information Technology with a specialization in Information Security and Assurance and an A.S. in computer network security and forensics. He also holds multiple other certificates and certifications in the areas of project management and information security, including being a Certified Information Systems Security Professional (CISSP ®).
Charlene Cunniffe, MS, CRM, CIP is an experienced information and records management professional and project manager with degrees from Harvard and Simmons, as well as years of experience in law, engineering, government, biotech/pharma, and academia. As Associate Director, Governance & Operational Support in Information & Records Management, well as a Lean Leader and Continuous Improvement coach in the Shared Business Services group at Sanofi, Charlene facilitates transversal and departmental process improvement.
Independent Contractor. Former ARMA Mid Atlantic Region Coordinator and Past President of ARMA NOVA Chapter.
Ken Dickey heads the Business Development department at Cadre. With over 29 years of experience in information technology, Mr. Dickey has established himself as a leading expert on IT security architecture design and deployment in both the commercial and government environments.
President of TrailBlazer Consulting, LLC A records management professional with over 25 years of experience consulting to federal government and commercial organizations.
Audrey Gaines
Paul Giles
Brian Haskin Identity theft victim
Mark Henriques Lawyer / Sedona Conference Member
Eric Hiltz
Nancy Hunn Records Officer and Deputy Chief Privacy Officer for GAO.
Mack Jackson
Virgina Jones City of Newport News (VA) Water Works Department
John Krysa CRM - Records Consultant for
Ladner
Mary Laverdure CRM and Operational Risk Consultant for Wells Fargo
Albert "Al" Minnick US Food and Drug Administration
Federal Director at Gimmal. Has more than 20 years experience in ECM and RM market. He is Gimmal's Microsoft Azure RaaS solution development director for the Public Sector
Wildlife Biologist at the South Carolina Department of Natural Resources
Mack Jackson Jr. is an expert on Internet security systems and compliance. He brings increased security awareness to his audiences and communicates the importance of security measures in protecting your business. Mack will show you how to improve your security plan, data breaches and avoid legal hassles. His passion and personality will energize and inspire you to protect your information and his ability to make complicated information clear and understandable. He will help you keep your personal information safe online.
Since 1984, Mack Jackson Jr. has been a technology consultant, author, business owner, software programmer and a project manager. He has consulted with leading software manufacturers and Fortune 500 companies. Mack is the owner of MJ Computer Concepts Inc., a consulting firm that coaches businesses on Internet security and business management.
As a software programmer, Mack has designed business processes and procedures to protect company’s sensitive information and accounting software consulting. Mack comprehends how computer systems can be breached and vulnerable to hackers and cybercriminals.
TeraPast and Current ARMA International Presidents / Records Managers
Pat Nobel PF Noble Associates
Tom O'Rourke
Linda PaceMeghan Podolny Hunton & Williams LLP
Peter Ransome FileSolve President
Gary Rauchfuss
Shuler Rita
William Saffady
Mark Santangelo
Chris Whitaker
Executive Director of the Charleston County Parks and Recreation Commission
Director, Policy Standards and Training in Enterprise Business Continuation Management (EBCM) for a large finance company.
Director, National Records Management Traning Program at NARA. Possess more than 15 years experience as a learning professional.
Supervisory Special Agent of the Forensic Photography Dept of SLED (South Carolina State Law Enforcement Division), Author
An experience records management consultant and author over over three dozen books on records management.
Chief Librarian and Archivist, National Library for the Study of George Washington
Chris Whitaker, PhD, MBA is a Senior Advisor in Iron Mountain’s Professional Services organization. He has been in Document Management/Records and Information Management for over 20 years working for companies such as Iron Mountain Consulting and Xerox Corporation. He has partnered with numerous global organizations to mitigate risk and reduce costs for managing information through the development and implementation of best practice RIM programs. His work in this area spans multiple industries, including Financial Services, Insurance, Manufacturing, Retail and Life Sciences. Chris holds an MBA from Mercer University in Atlanta and a PhD from Northcentral University. He is a current member of ARMA in the Virginia area.
Thomas White
Jesse Wilkins
Chris Witaker Iron Mountain
Lorri Yarborough Team IA
Jane Zhang
Thomas White is the university archivist and curator of special collections in the Gumberg Library at Duquesne University. He is also an adjunct lecturer in Duquesne’s History Department and an adjunct professor of history at La Roche College. Tom received a master’s degree in public history from Duquesne University. Besides the folklore and history of Pennsylvania, his areas of interest include public history and American cultural history. He is the award-winning author of nine books, including Legends and Lore of Western Pennsylvania, Forgotten Tales of Pennsylvania, Ghosts of Southwestern Pennsylvania, Forgotten Tales of Pittsburgh Forgotten Tales of Philadelphia (co-authored with Edward White), Gangs and Outlaws of Western Pennsylvania (co-authored with Michael Hassett), A Higher Perspective: 100 Years of Business Education at Duquesne University, Witches of Pennsylvania: Occult History and Lore, and Supernatural Lore of Pennsylvania: Ghosts, Monsters, and Miracles (editor).
Jesse Wilkins, CIP, CRM, IGP, is the Director, Research & Development for AIIMInternational. He has worked in the information management industry for 20 yearsas an end user, vendor, consultant, and trainer. His areas of expertise includeenterprise content management, electronic records management, emailmanagement, document imaging, digital preservation, and social mediatechnologies and governance processes.Jesse is an internationally recognized speaker and author on informationmanagement topics and has presented numerous keynotes and educationalsessions at AIIM, ARMA, ARMA Canada, InterDoc, MER, and other industryconferences since 2002.
Assistant Professor at the Dept of Library and Information Science, Catholic University of America. Teaches archives and electronic records management.
Chapter Name, City, State Speaker Fees/Travel Expenses
ARMA Metro, Gaithersburg, MD
Pittsburgh,Pittsburgh, PA N/A
ARMA Metro, Gaithersburg, MDTidewater, Newport News, VA
Houston, TX
SC Coastal, Charleston, SC None for Local - Unknown for outside area
Travel expenses only for presentation. If workshop desired please inquire for fee.
Boyds Negotiable
Charlotte Piedmont, Charlotte, NC
Charlotte Piedmont, Charlotte, NC
Asheville, NC Travel Required / Speaker Fees Nego
Pittsburgh,Pittsburgh, PA N/A
Somerville, MA cost of travel, lodging, meals
Tidewater, Newport News, VA
Pittsburgh,Pittsburgh, PA N/A
NOVA, Northern VA NA
Philadelphia, PA Travel Expenses as warranted
ARMA Metro, Gaithersburg, MD
Charlotte Piedmont, Charlotte, NC
Charlotte Piedmont, Charlotte, NC
SC Coastal, Charleston, SC None for Local - Unknown for outside area
ARMA Metro, Gaithersburg, MD
Las Vegas, NV Negotiable
Tidewater, Newport News, VA
Charlotte Piedmont, Charlotte, NC
Charlotte Piedmont, Charlotte, NC
Charlotte Piedmont, Charlotte, NC
Tidewater, Newport News, VA
Tidewater, Newport News, VA
SC Coastal, Charleston, SC None for Local - Unknown for outside area
ARMA Metro, Gaithersburg, MDTidewater, Newport News, VA
Charlotte Piedmont, Charlotte, NC
ARMA Metro, Gaithersburg, MD
Columbia, Columbia SC
Brooklyn, NY Price quoted based on chapter requirements and location
NOVA, Northern VA
Pittsburgh,Pittsburgh, PA N/A
Pittsburgh,Pittsburgh, PA N/A
Pittsburgh,Pittsburgh, PA
Charlotte Piedmont, Charlotte, NC
SC Coastal, Charleston, SC None for Local - Unknown for outside area
ARMA Metro, Gaithersburg, MD
These fees were waived as a memorium to a deceased AIIM member who was also once part of the ARMA - Pittsburgh Chapter.
Program Presented
Records as a Service
Mergers & Acquisitions
Protecting Your Records From Cyber Attacks
Proactive Steps to Enact Your Retention Policy — a joint ARMA/ILTA session
Enhance Your Professional Value with Project Mgt Certification. A presentation included in Spring Seminar "Sharpening Your Tools: Essentional Education, Certifications, and Training for Information Professionals"
Data Governance: Leveraging Your Data Assets and Optimizing Operations
CIO's Perspective on RIM and Information Governance
Record Management Certifications: IGP, CRM, or None?
January Roundtable
RIM Advice – Forging Stronger Relationships with IT
Using Lean Methods to Improve RIM Practices
Best Practices in a Transforming World
How can Computer Forensics, E-Discovery and Defensible Disposal Inform your Information Governance Program?
Orchestrating RIM - Working Collaboratively: IT, Legal, Security and RIM
Mobile Device Security – Mapping the Mobile Device Risk Model to Products Which Help Mitigate Those Risks
Building Technology Partnerships
Fishery Dependent Data at SCDNR
Records, Privacy and Information Governance
Information Governance - Cyber Security
Managing Information Risk & Compliance in the IG System
Ethics & Professionalism in Our Industry
Record Management Certifications: IGP, CRM, or None?
January Roundtable
Vital Records
Party of One! Are you ready for your Records Management Meal
Living through real identity theft. Convincing the world you are or are not youThe Relationship Between Legal Counsel & a Records Manager During a Legal Hold & eDiscovery Process
Auditing the Records Management Program
Managing the Boss-Employee Relationship
Mergers & Acquisitions
Technology Solutions
Truth or Dare: Can You Prove Compliance?
Critical Skills for Every Leader. A presentation included in Spring Seminar "Sharpening Your Tools: Essentional Education, Certifications, and Training for Information Professionals"
New Directions in Records Management Training: NARA training and RM Certificate Program. A presentation included in Spring Seminar "Sharpening Your Tools: Essentional Education, Certifications, and Training for Information Professionals"
"Forensic Evidence Case Studies", a scientific presentation showing the role of physical evidence in the investigation of criminal cases. Included are several cases documented in her books.
Fundamentals of RIM, Managing Electronic Records, Information Governance, other topics possible
American History in Modern Times - Going from a Basement to an Archival Presidential Library
Ghosts and Legends of Western Pennsylvania
Truth or Dare: Can You Prove Compliance?
A Social on Social Media Governance: The Do’s and Don’t of Managing Social Media
South Caroline Law Enforcement Division Presents their Automation Project with Team IA.
Thinking Ahead - Directions in certifying and educational resources. A presentation included in Spring Seminar "Sharpening Your Tools: Essentional Education, Certifications, and Training for Information Professionals"
Short Description of Program
Introduction to mergers and acquisitions and management of these records.
Achieveing a records mgt platform internallis very slow going. Funding, requirements gathering, etc is difficult. Presentaiton discusses universal requirements and best practices as well as describes an option for agencies to have a RIM solution wihtout a 500 page service agreement.
Most Law Firms have adopted Information Governance policies that outline retention plans for physical and electronic information. Very few firms have actually enacted retention on any of their physical or electronic content. A large part of the reason for this is that their systems and processes for managing information are not configured around the retention process. This session offered some practical suggestions on how to change business process and software configuration to efficiently enact retention.
RIM and PM are complememtary and will make you a more desirable candidate to your organization. Enhance your RIM certification with a Project Management certification.
Data Governance: Leveraging Your Data Assets and Optimizing Operations:
Almost every aspect of the work day involves handling data of some type. Good things happen for an organization when it manages data efficiently, quickly, and in a way that makes sense for the way its employees work. Ensuring data integrity, designing processes to align with decision making, and leveraging data as an asset to optimize operations are each critical components in a successful data governance program. Ultimately, successful data governance isn’t simply establishing a program, process, or policy…it’s about the people.
In this interactive webinar, we will share real world examples and review the value of managing your data and the components of a successful data governance program. • How data governance can help your organization• Benefits and risks • Real world examples• Components of an effective program
This webinar will introduce the 5 Characteristics of a Data-Driven Culture and a 7-Point Data Governance Model that can be utilized to design and develop a scalable, fit-for-purpose Data Governance Program for your organization.Discussed the various issues around data storage and data protection as it relats to records management.
The differences and purposes of various records management certifications
Discussion of Records Management Issues based on the five CRM exams
What a CIO needs from RIM professionals and what they can accomplish working together.
20 Minute talk45-60 Minutes Lecture/discussion3 Hour workshop
Subtext: Advice from a 30 year IT veteran on how RIM Professionals can win the hearts of and work with the IT department.
Topic Abstract: Let’s face it; IT get’s all the Glory. Records? Unfortunately, many times it’s “Meh; Records? Who are they.” But, it doesn’t have to be that way. In this presentation, Jeffrey Cox, a 30 year IT veteran, who also loves and has worked in Records Management, will give you actionable tools and ideas on how to make IT love RIM, winning over their hearts and making them a true partner.
Presentation Time:
One Hour (45 minutes with 15 minutes for questions.)Alternative Presentation: 30 Minutes (25 minutes with 5 minutes for questions.)
We received an overview of computer forensic practices, e-discovery data collections and the role records management policies and processes have in defensible deletion. We learned secrets that that may give insights to improving your records program.
Continuous improvement is a method for identifying opportunities for streamlining work and reducing waste. The practice was formalized by the popularity of Lean / Kaizen in manufacturing and business, and it is now being used by thousands of companies all over the world to identify savings opportunities. This presentation will give an overview of Lean concepts and discuss the use of Lean events at Sanofi in the Information and Records Management department, as well as across functions, to improve internal processes.
Enterprises are trying to understand the mobile security landscape, they are also in the process of understanding their own mobile risk appetite, as well as trying to address different pockets of populations with different use cases requiring different solutions. During this presentation we will map out the risks of storing sensitive data on mobile devices then break down what is required to secure enterprise mobility into a series of smaller problems, addressed by different technologies.
ARMA’s Information Governance Maturity Model (IGMM) . This presentation provides real-world examples of the IGMM assessment tool at work, including lessons learned on everything from the mechanics of using the tool, to reviewing and interpreting results, to identifying potential uses of the assessment results to build your program. In this presentation, we will:• Explore ARMA’s IGMM, including the Principles® of sound information governance that support it • Discuss how to utilize the IGMM assessment tool and its maturity levels to gain insight into information governance processes across your organization • Plan the development of an executable roadmap for improving information governance practices within your organization using the results of an IGMM assessment
Identity theft victim tells his story.
How lawyers work with rocords managers during a legal hold
Ethical issues facing records managers
The differences and purposes of various records management certifications
Discussion of Records Management Issues based on the five CRM exams
Presentation and discussion regarding the management of vital records.
Records Management may not be a fine wine or succinctly tasting meal; however there are tools available to provide you with support enabling you to have a similar satisfying experience. Learn the appetizer to dessert of a records management program when you a party of one. The sessions includes IG, Privacy, Security, and working with C-suite
Technology partnerships are critical to any successful RIM program. Presentation discusses how to leverage each type of partnershp to move RIM programs forward for all to benefit.
Discussed the databse utilized for tracking fishing activities in the Charleston area, commercial and private.
Topics covered included how records and privacy fit together; the increasing need for IG strategies and awareness in the demanding RIM portfolio; and privacy program foundational components.
The greatest threat to business in the 21st century is identity theft and fraud. There are 10 million new victims every year. Over 500 million records were stolen from businesses since 2005. Over 55% of the U.S. population has now been affected by these crimes. Crooks are more sophisticated than ever. Confidential information is the new currency for thieves. The new threats we face are devastating. The unprepared and complacent are being victimized. Cybercrime will be a bigger problem than illegal drug trafficking.
Attend Mack's program to find out Why you should be concerned.Presentation and discussion of an holistic approach to risk management, compliance and information governance.
Introduction to mergers and acquisitions and management of these records.
What software solutions are available for electronic records management
The speaker discussed requirements to manage forensic evidence and criminal case files.
Discussed the manner in which bosses must relate to their employees and how employees can work with their superiors.
Presentation provides the tools to move you forward and remain relevant in an ever-changing environment. Leadership skill development
Presentation examines how education, certification and training combine to create a learning landscape for the development of expertise. Learn how the knowledge and skills of each component can be combined to help professionals thrive in a variety of performance settings.
Program content will be customized to meet chapter requirements. I will provide chapter with a list of topics or outline, which they can review and modify. Duration: half-day only.
Recent research shows that while 87 percent of organizations have formal RIM programs, only 8 percent measure compliance, and only a paltry 7 percent of total employees are engaged in these RIM systems. A framework of basic RIM risk controls (that is, anticipated activities based on policy) can help set expectations across your enterprise and provide a means by which you and your business units can evaluate performance and plan for remediation. Once measured, performance can be benchmarked against your business’s goals or even against the performance of other organizations. The old adage of “what gets measured is what gets done” holds especially true when considering the financial, legal and security risks of the explosive volumes of information being created each and every day across your enterprise. As a result, controlling and managing information has become more complex and requires more than a standard RIM staff to police compliance activities in accordance with the needs of your customers, regulators and shareholders. This session provided a blueprint for managing such a complicated web of information.
Back by popular demand is local author and historian Thomas White. Tom turned his love of history and his profession as an archivist into several award winning books. You joined us as he explored the history and cultural meaning behind some of our region’s supernatural legends. You heard the story of whispering dead beneath the Black Cross, the ghostly woman of Summit Cut Bridge, the phantoms of Pittsburgh’s steel mills, and the ghosts and cults that stalk Blue Mist Road. You learned the truth about the curse at the old Quaker Church, Judge Reddick’s contest with the Devil, and many other spooky tales.
As organizations continue to incorporate social media into their business processes, there is an ever-increasing need to manage social content effectively. We learned why we need to take action now. This session detailed the steps required to manage social media to support business objectives and information management requirements. Common pitfalls to avoid were discussed.Joint presentaiton. Chris presented from the Raleigh facility, and the Charlotte group watched remotely
A member of the South Carolina Law Enforcement Division discussed the manner in which Team IA assisted in addressing a new law requiring gun owners to have their mental health status added to their background check. This included digitization and data tracking methods that were developed.
Recent research on RIM and ERM education in the US and Canada Library and Information Science and Archives Programs was shared.
Past Speaking Engagements Speaker Requirements
Please contact speaker directly. Please contact speaker directly.
ARMA Houston and American Marketing Association
Unknown Unknown
Presentation: Internet, projector, microphone. Note that workshop requires more than one person to present information.
ARMA 2015 Live - Global Management Risks
Projector
A sampling:ARMA Metro Maryland (2)AFCEA - Big Data ConferenceManaging Electronic Records (MER) ConferenceJohns Hopkins Colloquium - Applied Physics LabFuture of Text Conference - London 2nd Northumbria Witness Seminar Conference 24–25th Oct 2007, Newcastle upon TyneNational Technology Information Service Workshops (8 different topics)Kodak Global Directions ConferenceGIMMAL Group Webinars (2)UK Central Government Records Managers ConferenceNational Association of County Recorders and Election OfficialsSociety of American Archivists (2)AIIM Conferences (4)Digital Government Institute EDiscovery and RIM Conference (4)INFO 360 Conference
ProjectorWireless lavalier mic prefered
Tech Talent South1 Million Cups of Coffee / AshevilleARMA Rio Grande - Monthly Chapter Meeting (RIM Advice – Forging Stronger Relationships with IT)ARMA Rio Grande - Monthly Meeting (What is a Repository Anyway?)ARMA Denver - Monthly Meeting (Information Explosion)ARMA Midland/Permian Basin - Monthly Meeting (Information Explosion)AMRA Rio Grande - Spring Seminar (Information Explosion)
Please contact speaker directly. Please contact speaker directly.
Boston Chapter, April 2016 internet, mic
Please contact speaker directly. Please contact speaker directly.
Depends on the venue
Unknown Unknown
Varies depending on desired program
Organizing the FBI's records management system
ARMA 2015 Live - Global Management Risks
ARMA Liberty Bell Chapter monthly meetings and annual seminar
Silver State Chapter quarterly membership meetingJoint ARMA/AIIM event panel speaker
Unknown Unknown
Projector, microphone.
Please contact speaker directly. Please contact speaker directly.
I have presented seminars for many ARMA chapters and other groups. These seminars have been attended by more than 15,000 since the mid-1970s.
Please contact speaker directly. Please contact speaker directly.
Please contact speaker directly. Please contact speaker directly.
Unknown Unknown
Learning Objectives
RIM
Retention Legal
RIM, BusinessRIM, Legal
Records & Information Management
IT
Education Track IT, RIM, Business, Audit, Legal, Compliance
Agenda and Objectives:• How Data Affects the Way You Work Today• The Power of Good Data Management• Bad Data Warning Signs• Characteristics of a Data-Driven Culture• Components of an Effective Data Governance Program• Understand Your Culture• Gauge Level of Governance• Prioritize Areas of Need• Determine Future State• Gaining Support and Adoption• Creating a Governance Team
Records & Information Management
RIM
RIM
Information Technology
Depends on topic and audience. Learning objectives will be designed jointly with event organizer.
Walk away with three actionable ideas they can take back and start using in their RIM program immediately.
Data Forensics Forensics
Records & Information Management
RIM, Business
Security, BYOD Security
RIM
Understand Lean and continuous improvement principlesIdentify tools and techniques for Lean continuous improvementUnderstand the potential value of Lean facilitation for RIM improvement
Records & Information Management
RIM, Business
RIM
RIM, Privacy, Compliance
Information Technology
RIM, Compliance
RIM
RIM
RIM, Business
The objectives of this session are to learn how to develop, implement, and manage a program that is legally defensible with success when you are a party of one.
Learn about the fastest growing crime of the 21st centuryHow and why businesses are targetedWhy it directly affects you, your customers, and your employeesNew federal, state and industry regulation that require you to take actionFinancial damage and legal falloutImproving your security planGain trust and loyalty of customersSave time and money with affordable solutions
RIM, Audit
Business
BusinessRIM, Legal
RIM, IT
RIM, Business
RIM, Legal
Records & Information Management
RIM
Compliance Compliance
I will provide chapters with a description of the topic that includes learning objectives.
Local history Historical
Social media, IG, Governance Compliance
RIM, Compliance
RIM, Compliance
RIM
Advanced Face-to-Face
Advanced Face-To-Face
Beginning Face-to-FaceFace-to-Face
Strategic
Beginning To Intermediate Face-to-Face
Skill LevelBeginning, Intermediate, Advanced
Delivery MethodFace to Face (F2F), Virtual, Pre-recorded Virtual, Conference Call, Other
Lecture with Discussion, Case Study, Problem Solving, Small Group Discussion, This can be presented as a 45 minute presentation or a workshop (4 hours)
Strategic
PowerPoint
Roundtable Discussion / Polling
Management Lecture with Discussion
Lecture with Discussion, Case Study, Demonstration, Problem Solving, Small Group Discussion, Panel Discussion, Demonstration, Rapid Fire, Workshop
Advanced Face-To-Face
Core Lecture with Discussion
Face-To-Face
Advanced Face-To-Face
Advanced Face-to-Face
Core Lecture with Discussion
Intermediate Face-to-Face
PowerPoint / Personal Story
PowerPoint
Beginning To Intermediate Face-to-Face
Intermediate Face-to-Face
Strategic
Face-to-Face
PowerPoint
PowerPoint
Roundtable Discussion / Polling
Face-to-Face
Lecture with Discussion, Problem Solving, Small Group Discussion, Panel Discussion
Face-to-Face
Beginning To Intermediate Face-to-Face
Beginning To Intermediate Face-to-FaceFace-to-Face
TBD - presentation in April
Beginning Face-to-Face
Beginning To Intermediate Face-to-Face
Core Lecture with Discussion
Beginning Face-to-Face
Advanced Face-To-Face
Advanced Face-To-Face
Advanced Face-To-Face
PowerPoint
Beginning To Intermediate Face-to-Face
Beginning To Intermediate Face-to-Face
Designations Held
Please contact speaker directly.
CISSP
Speaker Contact InformationEmail, Telephone, Physical Mailing Address
David BeaucheminInformation Governance Product ManagerInOutsource1518 Walnut StreetSuite 1800Philadelphia, PA [email protected]
CONTACT MICHELLE VAN ALLEN, [email protected]
Atlanta, GeorgiaJulie Colgan: 404-790-7900 / [email protected]
Charlotte North Carolina (312) 288-1713 / [email protected]
CISSP
Please contact speaker directly.
Brett Creasy, CCE, CISSP Vice President and Director of Digital Forensics [email protected] Grant StreetSuite 1250Pittsburgh, PA, 15219
Ken DickeyAVP – Business DevelopmentCadre Information Security – Simplifying the Business of Security201 E. 5th Street, Suite 1800 Cincinnati, OH 45202 E: [email protected] O: (513) 762-6669 F: (513) 762-6502 W: www.cadre.net
Unknown
[email protected] Negotiable
CRM, FAI
John C. Krysa, CRM117 Beech CourtLittleton NC 27850252-586-7560 home officeAtlanta, GeorgiaTera Ladner: [email protected] North Carolina336.773.522 / [email protected]@gmail.com; [email protected]; (240) 839-0817
PhD, MBA
CONTACT SHANTE ELLIS, EXECUTIVE ASSISTANT, [email protected]
Charlotte, North Carolinacontacted through Lena Chamra908.418.3152 / [email protected]
[email protected], https://sites.google.com/site/ritashulerforensics/
[email protected] http://www.mountvernon.org/library/about-the-library/contact-the-library-staff/
Chris Whitaker, PhD, MBASenior AdvisorIron Mountain Professional Services(804) [email protected]
Please contact speaker directly.
CIP, CRM, IGP
Raleigh, NC
Jesse Wilkins, CIP, CRM, IGPDirector of Professional DevelopmentAIIM - The Global Community of Information Professionals1100 Wayne Ave., Suite 1100Silver Spring, MD [email protected](720) 232-9638 direct
CONTACT PATTIE BEERMAN AT TEAM IA, [email protected]
Unknown
Please contact speaker directly.
Unknown
Unknown
Ability to Present VirtuallyYes or No. Can Face to Face (F2F) content be recorded for online delivery method? Who will create the virtual content? Chapter or speaker?
Yes, presentation format can be done via WebEx. If workshop is desired then in-person only.
Please contact speaker directly.
MS, CRM, CIP Yes. Would need host chapter to make arrangements
Please contact speaker directly.
Unknown
IGP Yes. WebEx
Unknown
Unkown
Unknown
Unknown
Unknown
Possibly. Contact speaker for details.
Unknown
Unknown
No