September 19, 2018
San Diego, CA

Mission Possible: IT Security Best Practices For The Midmarket

MES is the Midmarket IT executive event of the year. We are excited to add this half-day workshop focusing on IT Security in the midmarket to the conference.  Security is consistently ranked in the top three challenges facing midmarket organizations today, and often takes the number one spot.  

Build the Ultimate IT Security Strategy

Take a Holistic Approach to Your Security Plans

Understand the "Human Factor" of Security

Mitigate the Damage of Security Breaches

Evaluate Your Options and Prioritize Your Security Initiatives

The IT professionals charged with leading their organization’s IT security strategy know they will never have enough budget or staff to ward off the biggest threats to their data assets. Given the heightened state of alert, business leaders think they may need the latest security technology in order to protect the company’s network and assets from sophisticated attacks. However, what IT security leaders really need to do is go back to basics and put into place security best practices that not only minimize business risk, but enable business success. For those professionals who must now demonstrate accountability to the Board and senior leaders, they need a practical IT security playbook that focuses not only the fundamentals, but also the right mix of partners and tech suppliers.


Top Reasons to Attend


Peer advice. Find out which security vendors your colleagues are using. How are they protecting themselves against internal and external risks?

Network. Engage with IT midmarket peers and vendors - all of whom have IT security top of mind.

Award-winning vendors. Meet with top-rated security vendors, with solutions tailored to midmarket organizations. 

Innovation. Hear about the latest products and solutions to protect your data against constantly evolving threats.

New technology. View products and services and meet one-on-one with top and emerging vendors.

Maximize Your ROI.   Make the most of your time out of the office. This security focused half-day workshop is the ideal way to wrap up  your MES experience.



What Our Attendees Say

This summit was the best conference I've been to in a long while.  In less than three days I was able to find information that would have normally taken 6 months of web searching.  The best part was it put me face-to-face with the vendors I wanted to hear from and it wasn't all a sales ploy..”
― Michael Grosse, CTO, Sullivan University System
 I have never been to an event that offered such great networking as well as group feedback on current products and trends. I would highly recommend MES events to anyone that is thinking about going.” 
― Dane Holman, IT Director, McGowan & Co.
"MES IT Security was a great opportunity to hear from security professionals on actionable steps that I can bring back to my team to implement. Great job!"
IT Group Leader, Landscape Forms, Inc.
MES provides me with exposure to technology solutions that I would not otherwise have access to or may have considered. I get a chance to validate strategy with my peers while learning about their challenges and approaches.  Having direct access to Gartner industry insights is awesome.
 Brian Celardo, IT Director, Birch Family Services
At first, I wasn't sure if my company and my situation would translate well to MES. Once I started networking with my peers at the summit, I found many others in almost identical business situations and facing the same issues I deal with - getting proper IT budget, how to efficiently manage a small IT workforce - and exchanging knowledge with them was invaluable..”
 Robert Vinagray, CIO, Burma Bibas, Inc.

MES IT Security University 2018 Premier Sponsors


All Covered




Liberty Technology

Liberty Technology
All Covered

The Format

MES Advisory Board

John Regula
SVP/CIO, Woods
Ellen Christy, Commonwealth of Massachusetts
Ellen Christy
SCIO - Housing & Economic Development, Commonwealth of Massachusetts
Henry Chace
CIO, Burns & Levinson LLP
Tammy Barr
Tammy Barr
VP IS/CIO, Continental Mills
Derek Christopher, CIO, Hines & Associates
Derek Christopher
CIO, Hines & Associates
James Fielder
Vice President of Information Systems, Farm Credit Services of Illinois
Jeff Lutes
Jeff Lutes
VP of Technology, Orlando Magic
Leslie Cothren, IT Director, Universal Mental Health Services
Leslie Cothren
IT Director, Universal Mental Health Services
Ed Freed
IT Manager, Summit Polymers
Vennard Wright, WSSC
Vennard Wright
CIO, Washington Suburban Sanitary Commission (WSSC)
Paul  Furtado
Paul Furtado
Vice President of Information Technology, Lone Wolf Real Estate Technologies
Jason Mason, SVP, IT, Winsight Media
Jason Mason
SVP, IT, Winsight Media
Aaron Geiger, CTO, Alberici Group
Aaron Geiger
Chief Technology Officer, Alberici Group
Doug Pontious
BI Analytics Executive, Amerisure Insurance
Chance Irvine
Chance Irvine
VP, IT Operations and Infrastructure, Proxibid, Inc
Mary Wyderski
Senior Director of Information Technology, DSC Logistics
Glenn Leatherwood
Glenn Leatherwood
Manager of Internet and Portal Technologies, Valmont Industries
Jesse Crum
Director of IT and CSO, Knoxville Hospital & Clinics

MES IT Security Speakers

Candy Alexander, Virtual CISO, Cybersecurity Consultant, CISSP, CISM
Candy Alexander
Virtual CISO, Cybersecurity Consultant, CISSP, CISM
Bryan Cunningham
Executive Director, Cybersecurity Policy & Research Institute, UC Irvine
Ben Johnson
CEO, Liberty Technology
Jeremy Whittkop
Chief Technology Officer, InteliSecure