The IT Executive Exchange (ITEE) is a forum for IT Executives and College of Business Administration professors at The University of Akron. Meetings take place every six to eight weeks to discuss pressing and leading edge issues.

The purpose of this forum is to have a healthy exchange of ideas that will be useful to all attendees. It is sponsored by the Center for Information Technologies and eBusiness (CITe) of the University of Akron’s College of Business Administration.

ITEE Meeting

IT Security on Center Stage

Date
November 8, 2019

Location
Goodyear Classroom in the new Professional Development Center, CBA, UA, Akron, OH

Time
Networking: 2:0 0pm to 2:30 pm
Presentation, Discussion & Interaction: 2:30 pm to 4:30 pm

Sponsor: Center for IT & eBusiness (CITe)

Topic Description:

A few months ago TheVerge ran a headline: "AI deepfakes are now as simple as typing whatever you want your subject to say." On Oct. 15, 2019, vice.com reported: "Malware That Spits Cash Out of ATMs Has Spread Across the World."* We could cite dozens of similar headlines as the breadth, depth, and scale of hacking/cybercrime techniques continues to grow. Sophisticated practitioners make these techniques available to even casual users; small and large enterprises face more threats than ever. Please join us to discuss your most pressing security concerns, and to get updates on the latest from our guest speaker, Michael Buckwell.

*"[This is called jackpotting, … a technique where cybercriminals use malware or a piece of hardware to trick an ATM into ejecting all of its cash, no stolen credit card required. Hackers typically install the malware onto an ATM by physically opening a panel on the machine to reveal a USB port."

Guest Speaker:
Michael Buckwell CISSP, GCIH, GCFA, GWAPT, GPEN, GAWN, GSEC

Michael Buckwell is the IT Security & Compliance Manager for Squire Patton Boggs, an international law firm with 44 offices in 19 countries. Michael has over 10 years of IT security experience with multiple Fortune 1000 companies and holds the GSEC, GAWN, GCIH, GPEN, GCFA and GWAPT certifications from GIAC. Michael has worked with the SANS Community group and has been a SANS Mentor. In 2008, Michael was awarded the "@Work Mentor of the Year" by the SANS Institute for his work in the mentor program.Previously, Michael served as a Business Information Security Officer for Windstream Communications responsible for vulnerability assessment and penetration testing, security monitoring and incident response. Before that, Michael was a senior data center engineer at SecureData 365 where he was responsible for network infrastructure and security within a multi-tenanted data center.Before that, Michael worked as an enterprise security architect for Diebold Nixdorf as well as a Security Analyst at Progressive Insurance, where he had been involved in several key security initiatives. Along the way, he has helped organizations develop an internal penetration testing teams and lead the effort on completing web application penetration tests.Michael is also Adjunct Faculty at the University Of Akron College Of Business, where he teaches the Network and Security course in both that graduate and undergraduate levels. He is a graduate from Case Western Reserve University with a degree in Computer Engineering and holds a Master’s Degree in Information Systems from the College of Business Administration at The University of Akron .

If you are interested in attending the meeting, please register through RSVP link.


May 10, 2019 How Will New Consumer Privacy Regulations Impact Your Business?
March 22, 2019 Business Models and IT Support in the Age of Disruption
February 1, 2019 Aligning Business Strategy and Information Systems in Changing Times

September 28, 2018 Cognitive Computing – the next great leap forward for business analytics?
May 11, 2018 Blockchain Technology: Critical Business Disruption, or Foolish Distraction?
March 2018 Preparing the next generation of IT leadership: Is there a gap?
February 2018 Collaboration and the Complexity Paradox

November 2017 Deploying Visualization and Analytics Technology to the Desktop: Breaking the Stranglehold of Excel
September 2017 Industry 4.0: What happens when everything has intelligence?
May 2017 Your Biggest Threat is Not Who You Think It Is (or is it?)
March 2017 Is It Time to Blow Up the IT Org Chart?
January 2017 Are "Lean" and "Agile" a crash diet for IT? How to Get Long-Term Results and Drive Costs from IT and Other Business Processes.

November 2016 We, Robot? How are we shaped by technology?
September 2016 The Future is on Cloud Nine
May 2016 IT Talent Lifecycle Management in an Age of Rapid Change
April 2016 Chief Digital Officer: What is the Reality?
January 2016 Is Your Business About to be Disrupted?

November 2015 New Challenges with Mobile Technologies
September 2015 Reconsidering Outsourcing Decisions
May 2015 Are you ready for a Data Scientist?
March 2015 Security: Who will get hacked next?
January 2015 Do you know where your business rules are?

November 2014 Cybercrime – Are the criminals winning?
September 2014 Cloudy with a Chance of Services
May 2014 Disaster Recovery Revisited
March 2014 Windows 8 Deployment
January 2014 BYOD

November 2013 IT Portfolio Management
September 2013 Does CIO Still Mean "Career Is Over"?
May 2013 The Internet of Things
March 2013 Mobile Software Development
January 2013 Help and Service Desks

November 2012 Business Analytics
September 2012 Using Social Media
June 2012 IT/IS Talent Management Report Card: Where are we, and where do we need to go
March 2012 RAPM: Rapid Analysis Portfolio Management
January 2012 Striking the Right Balance: “Hard” and “Soft” Skills in IT and the Careers

November 2011 Going Rogue IT Style
September 2011 Delivering and Promoting Innovative Business Value
June 2011 Virtualization: Performance and Prospects
April 2011 The Consumerization of IT and Implications for the Organization
February 2011 The Collaboration Challenge

November 2010 Assimilating Mobile and Consumer Devices into the IT Infrastructure
September 2010 Is Your Company Ready for Windows 7 and Office 2010 Deployment?
May 2010 ITIL and COBIT
March 2010 Learning From Our Best and Worst IT Practices
January 2010 Managing IT Innovation (Summary will be available soon)

November 2009 Security
September 2009 New Communication Methods
June 2009 Leveraging Cloud Computing
March 2009 Open Source Software
January 2009 Effective benchmarks IT can use to gauge success

November 2008 What do new graduates expect from employers?
September 2008 Telecommuting
July 2008 Business Intelligence
May 2008 Mobility and Mobile Computing
April 2008 Social Networks
February 2008 Strategic Outsourcing

November 2007 Virtualization
September 2007 Disaster Recovery and Business Continuity: What have we learned?
May 2007 E-discovery: IT's responsibility for Information Retention and Destruction
March 2007 Collaboration Tools in Microsoft Office 2007
January 2007 Plans for Vista and Office 2007

October 2006 Strategies & Techniques for Making the IT Dollar Go Farther
August 2006 How to Market IT to Internal Business/Organization
June 2006 IT Skills and IT Education
April 2006 Data Modeling, Quality & Security
March 2006 Service Oriented Architecture
January 2006 Emerging Technologies

November 2005 IT Recruiting and Retention
September 2005 New Programming Methodologies
April 2005 Business Continuity Planning
July 2005 Project Management Office
February 2005 Portfolio Management

December 2004 Vendor Management
October 2004 IT Governance, Business Alignment and IT Vision
August 2004 Security