BEGIN:VCALENDAR
VERSION:2.0
PRODID:-//ChamberMaster//Event Calendar 2.0//EN
METHOD:PUBLISH
X-PUBLISHED-TTL:P3D
REFRESH-INTERVAL:P3D
CALSCALE:GREGORIAN
BEGIN:VEVENT
DTSTART:20190117T173000Z
DTEND:20190117T190000Z
X-MICROSOFT-CDO-ALLDAYEVENT:FALSE
SUMMARY:Professional Development Networking Lunch
DESCRIPTION:Cyber Security for Small Business\n\nGuest Speaker\, Ted Giesler\, Cypress Consulting Group\, Ltd. will speak on Cyber Security for Small Business Ted Geisler is Industry certified in cybersecurity (CompTIA Security+) \n\n\n\nHow much would it cost to recover from a security breach?\n\nWhat mobile devices are connected to your network?\n\nWho is accessing your network?\n\nWhat are your back up procedures and policies?\n\nWhat if you have a breach and what is Illinois law?\n\n\n\nTed is the president of Cypress Consulting Group\, Ltd. He has worked in the Information Technology field for over 20 years as either a consultant or in management. Ted has spent most of his time in the industry working with communications and various communication networks. Additionally he designed and implemented a number of systems over the years including the control system for a major international heavy equipment manufacturer's " Factory of the Future" in France. He was one of the authors of the first totally electronic stock exchange in the US. He spent over a year on a USAID project providing technical design support and was responsible for the operational implementation of an Over-The-Counter stock exchange in Poland. He studied computer science at the University of Illinois Chicago\, received a BA from Roosevelt University and an MBA from the Lake Forest Graduate School of Business.
X-ALT-DESC;FMTTYPE=text/html:Cyber Security for Small Business
\nGuest Speaker\, Ted Giesler\, Cypress Consulting Group\, Ltd. will speak on Cyber Security for Small Business \; Ted Geisler is \;Industry certified in cybersecurity (CompTIA Security+) \; \;
\n
\nHow much would it cost to recover from a security breach?
\nWhat mobile devices are connected to your network?
\nWho is accessing your network?
\nWhat are your back up procedures and policies?
\nWhat if you have a breach and what is Illinois law?
\n
\nTed is the president of Cypress Consulting Group\, Ltd. He has worked in the Information Technology field for over 20 years as either a consultant or in management. Ted has spent most of his time in the industry working with communications and various communication networks. Additionally he designed and implemented a number of systems over the years including the control system for a major international heavy equipment manufacturer'\;s "\; Factory of the Future"\; in France. He was one of the authors of the first totally electronic stock exchange in the US. He spent over a year on a USAID project providing technical design support and was responsible for the operational implementation of an Over-The-Counter stock exchange in Poland. He studied computer science at the University of Illinois Chicago\, received a BA from Roosevelt University and an MBA from the Lake Forest Graduate School of Business.
LOCATION:Marriott Suites Deerfield 2 Parkway North Deerfield\, Il 60015
UID:e.247.4982
SEQUENCE:3
DTSTAMP:20240328T213546Z
URL:https://www.dbrchamber.com/events/details/professional-development-networking-lunch-4982
END:VEVENT
END:VCALENDAR