security_university_banner_mes_fall_2017_png.png
Date
September 20, 2017
Location
San Antonio, TX

Meeting the Security Needs of the Midmarket

MES is the Midmarket IT executive event of the year. We are excited to add this half-day workshop focusing on IT Security in the midmarket to the event.  Security is consistently ranked in the top three challenges facing midmarket organizations today, and often takes the number one spot.  

Build the Ultimate IT Security Strategy

Take a Holistic Approach to Your Security Plans

Understand the "Human Factor" of Security

Mitigate the Damage of Security Breaches

Evaluate Your OPtions and Prioritise Your Security Initiatives

For CIOs, choosing the right IT security strategy is no easy task. After all, IT leaders are the ones on the front lines trying to protect their organization from a continuous onslaught of cyberthreats and attacks — coming from inside and outside their organizations. IT leaders also are under siege from every partner and tech supplier professing to have the latest and greatest security solution that will save the day. The only thing that can truly save the day amid all the chaos is a well-thought-out and bullet-proof strategy. That plan must demonstrate to the board and senior leaders that security is not just an “IT problem,” but something that must permeate the corporate culture. This strategy must serve to blanket the entire organization with resources and trusted partners who can assist both strategically and tactically. For sure, today’s IT leaders must have a strategy for email security and archiving, unified threat management, mobile device management, identity access management, disaster recovery, endpoint protection and software-defined networking. Those are all important components of a next-gen security architecture. But the starting point is the critical thinking CIOs need to build the ultimate strategy. It is here at the MES University: IT Security where attendees will learn best practices, industry trends, and the latest security solutions for cloud, mobility, IoT and much more.

Peer advice. Find out which security vendors your colleagues are using. How are they protecting themselves against internal and external risks?

Network. Engage with IT midmarket peers and vendors - all of whom have IT security top of mind.

Award-winning vendors. Meet with top-rated security vendors, with solutions tailored to midmarket organizations. 

Innovation. Hear about the latest products and solutions to protect your data against constantly evolving threats.

New technology. View products and services and meet one-on-one with top and emerging vendors.

Maximize Your ROI.   Make the most of your time out of the office. This security focused half-day workshop is the ideal way to wrap up  your MES experience.

 

 

Top Reasons to Attend

 

Peer advice. Find out which security vendors your colleagues are using. How are they protecting themselves against internal and external risks?

Network. Engage with IT midmarket peers and vendors - all of whom have IT security top of mind.

Award-winning vendors. Meet with top-rated security vendors, with solutions tailored to midmarket organizations. 

Innovation. Hear about the latest products and solutions to protect your data against constantly evolving threats.

New technology. View products and services and meet one-on-one with top and emerging vendors.

Maximize Your ROI.   Make the most of your time out of the office. This security focused half-day workshop is the ideal way to wrap up  your MES experience.

 

 

What Our Attendees Say

This summit was the best conference I've been to in a long while.  In less than three days I was able to find information that would have normally taken 6 months of web searching.  The best part was it put me face-to-face with the vendors I wanted to hear from and it wasn't all a sales ploy..”
      
― Michael Grosse, CTO, Sullivan University System
 
 I have never been to an event that offered such great networking as well as group feedback on current products and trends. I would highly recommend MES events to anyone that is thinking about going.” 
 
― Dane Holman, IT Director, McGowan & Co.
"MES University was a great opportunity to hear from security professionals on actionable steps that I can bring back to my team to implement. Great job!"
 
IT Group Leader, Landscape Forms, Inc.
MES provides me with exposure to technology solutions that I would not otherwise have access to or may have considered. I get a chance to validate strategy with my peers while learning about their challenges and approaches.  Having direct access to Gartner industry insights is awesome.
 
 Brian Celardo, IT Director, Birch Family Services
At first, I wasn't sure if my company and my situation would translate well to MES. Once I started networking with my peers at the summit, I found many others in almost identical business situations and facing the same issues I deal with - getting proper IT budget, how to efficiently manage a small IT workforce - and exchanging knowledge with them was invaluable..”
 
 Robert Vinagray, CIO, Burma Bibas, Inc.

MES University: IT Security Sponsors

Gold

Gold

Fortinet

Gold

WatchGuard

Silver

Informatica

The Format

The Format

MES Advisory Board

Henry Chace
CIO, Burns & Levinson LLP
Fielder
James Fielder
Vice President of Information Systems, Farm Credit Services of Illinois
Freed
Ed Freed
IT Director, Service Express, Inc.
Paul  Furtado
Paul Furtado
Vice President of Information Technology, Lone Wolf Real Estate Technologies
Aaron Geiger
Aaron Geiger
Chief Technology Officer, ARCO NATIONAL CONSTRUCTION
Chance Irvine
Chance Irvine
VP, IT Operations and Infrastructure, Proxibid, Inc
Glenn Leatherwood
Glenn Leatherwood
Manager of Internet and Portal Technologies, Valmont Industries
John Regula
VP/CIO, Allied Services
Michael  Skaff
Michael Skaff
VP of Technology, Masons of California
Tammy Barr
Tammy Barr
VP IS/CIO, Continental Mills
Jeff Lutes
Jeff Lutes
VP of Technology, Orlando Magic
Vennard Wright, WSSC
Vennard Wright
CIO, Washington Suburban Sanitary Commission (WSSC)
Melquist
Brian Melquist
IT Manager, Truck-Lite
Pontious
Doug Pontious
BI Analytics Executive, Amerisure Insurance
Wyderski
Mary Wyderski
VP of Technology, Professional Service Industries, Inc.
Crum
Jesse Crum
Director of IT and CSO, Knoxville Hospital & Clinics
Ellen Christy, Commonwealth of Massachusetts
Ellen Christy
SCIO - Housing & Economic Development, Commonwealth of Massachusetts

MES University: Past Security Speakers

Scott Borg
Scott Borg
Director and Chief Economist, U.S. Cyber Consequences Unit
David Carter, Encore Technology Group
David Carter
Director - Technical Solutions, Encore Technology Group
Mike Gentile
Author, CISO Handbook

Channel@Work

Keep Me Informed

Sign up to receive email updates about the event.  Subscribers will receive the latest information.