Boston 2017

Speakers and Presentations
Register NowSponsor ICMC
Keynote Speaker
ICMC

Title of Presentation

Overcoming Impossible Odds- A Story of Survival and Perseverance

Presentation Synopsis

In this session, Jessica Buchanan will share her personal story of being taken at gunpoint while on a field mission with the NGO she was working for in October 2011. She will detail her subsequent 93 day ordeal being held hostage by Somali pirates, as well as explain the measures that her husband, Erik Landemalm, together with the FBI, went to, to ensure her successful recovery, eventually carried out by the elite Special Forces Unit, SEAL Team VI. Jessica shares a unique perspective on the ever increasing issues related to personal security while working abroad, as well as a message of hope about defying the most impossible of odds in order to survive.

Director, Preparedness and Crisis Management
Raytheon

Title of Presentation

Major Challenges in Global Crisis Management Response

Presentation Synopsis

Threats are growing in scale, frequency and consequence and globalization is putting more people and operations at risk. This session will cover some of the top challenges in managing crises around the world and some strategies to be better positioned to prepare for and rapidly respond/recover from catastrophic events..

Vice President, Business Continuity & Data Privacy
SSGA

Title of Presentation

Navigating Crisis Management In An Ever Changing Landscape

Presentation Synopsis

The world that we live in today is becoming increasingly challenging on many levels and how we deal with events is crucial to our business and maintaining customer satisfaction no matter what industry you are in. This session will provide insights into the challenges and lessons learned in working for a global organization and effectively managing the landscape of business change while simultaneously managing multiple and dynamic events that are occurring daily around the world.

Special Advisor to the CEO
Centrallo

Title of Presentation

The Evolution of Crisis Management Through Technology

Presentation Synopsis

From manual processes to technical advances which enable us to effectively collect information, communicate, and collaborate, how today's technology has helped us avoid things "falling through the cracks."

Security Systems Sr. Manager
SecureWorks

Title of Presentation

When Good Security Tech ‘Breaks Bad’

Presentation Synopsis

You have spent significant financial and human resources to configure and protect your network and digital assets, purchased several new security tools and software, and now you’re wondering if those technologies will be able to protect your organization against potential cyber intrusions.
Join this webcast and hear from Daniel Gortze, Delivery Manager for the SecureWorks Incident Response & Forensics Consulting Team, who will examine real-life scenarios in which security technologies failed, and even worst cases where threat actors used an organizations' own security technologies against them. Dan will not focus on the pros and cons of particular technologies, but rather examine the need for proper security architecture and the residual risk posed by the required pervasive visibility of many security technologies. He will also share experience and insights from the field.

Key Topics Covered Include:

• Examples of Threat Actor Abuse of Security Technology in real-world Incidents
• Anti-Virus Abuse
• Exploiting Whitelisting Misconfiguration
• The Human Weak link
• Lessons learned and actionable insights

Chief Security Officer
Janus Global Operations

Title of Presentation

Managing a Crisis at Multiple Locations

Presentation Synopsis

Senior leaders, crisis and security managers, as well as state, local, and federal officials, all play an important part in managing critical incidents, especially those that are prolonged or occur at multiple venues. In most cases, crisis plans are prepared for single locations. In today’s environment, corporations must be prepared to manage incidents which could occur simultaneously, over a period of weeks, or at multiple locations. This presentation will discuss how you can build a plan which will: build relationships before an event occurs, integrate information systems, determine who your spokesperson will be, decide where the incident(s) will be managed from, how to prepare the company message to the public and your employees, and most importantly, understand your limitations and identify the resources you will need to succeed.

Principal
Kalson Communications, LLC

Title of Presentation

The Internet, Social Media and Crisis Communications

Presentation Synopsis

What do a self-styled humorist, an angry customer, an influential blogger, a defective product and a CEO practicing sexist behavior have in common? They all can bring great harm to your organization largely through social media. This presentation will show how your organization can prepare for and manage a crisis in the Internet Age, particularly crises caused by social media. A solid reputation and strong branding are two prerequisites to social media crisis management success.

Associate Director
Mead Johnson Nutrition

Title of Presentation

Implementing a Global Business Continuity Program

Presentation Synopsis

How do you implement a global business continuity program in a new 100 year old Company? We'll discuss how to develop, align and launch a program.

Global Resiliency Crisis Lead
eBay

Title of Presentation

Building a Successful Resiliency Program

Presentation Synopsis

The objective of this presentation is to provide insight to those that are tasked with developing their businesses Crisis Management programs. We will discuss some of the common barriers that are experienced during the programs development and implementation phase and more importantly, cover some tactics and techniques that have proven successful in overcoming these barriers.

Title of Presentation

The Future of Economic Espionage: Preparing for the Worst

Presentation Synopsis

Emergency response planning is not only for purposes of physical disruption of operations. Economic and industrial espionage, insider threats and intellectual property theft cost American corporations over $600 billion per year. In fact, the problem has doubled in just the past five years. Is your company aware of - and prepared for - these "invisible" threats, which could cripple your business?

Managing Director
Security Management International, LLC.

Title of Presentation

The Future of Economic and Industrial Espionage

Director of Global Security & Crisis Management
McGraw-Hill Education

Title of Presentation

Response Ahead & During the Storm: True Incident Lifecycle

Consultant
Emergency Preparedness and Logistics Consulting Ltd. (EPLC Ltd.)

Title of Presentation

Resilience Preparedness as a Foundation of Crisis Management

Presentation Synopsis

Resilience - I define it as the ability to maintain vital functions in the face of abnormal stresses. This presentation provides an overview of the preparedness elements necessary for individual resilience, as a basis for building resilient communities. Every group or organization we encounter is part of and contributes to a larger functioning system. individual people are the structural elements of society. Resilient individuals - those who are capable of adapting their skill sets to maintain their basic necessities of health, nutrition, communication, shelter, transportation and security - will contribute more effectively to larger recovery efforts in their neighbourhoods, with their employers and the community at large.

Manager - HSE Global Services, Crisis Management & Security
Murphy Oil

Title of Presentation

Harvey Tested: Enterprise Endurance and Continuity

Presentation Synopsis

Hurricane Harvey was a powerful Category 4 storm that impacted the entire Southeast Texas Region. In a four-day period, many areas received more than 40 inches of rain as the system meandered over eastern Texas and the Texas Gulf Coast, causing catastrophic flooding. With peak accumulations of more than 50 inches, Harvey is the wettest tropical hurricane on record in the United States. Good business continuity plans will keep your company up and running through interruptions of any kind: power failures, IT system crashes, natural disasters, operational incidents and more; however, it is not often that a company faces all of those potential interruptions in one single incident. For Murphy Oil, Hurricane Harvey was that incident. Jessica Jackson will discuss the Business Continuity Plan that was in place and how it passed the test of Harvey.

Senior Advisor

Title of Presentation

Crisis Management – Need for Speed, Why and How to Get It

President/ CEO
Institute for Crisis Management
Cyber Security Analyst/Threat Hunter/IT Compliance
Boston Children's Hospital

Title of Presentation

Resilience by the 1's and 0's

Presentation Synopsis

Cyber Attacks happen on a daily basis to many companies throughout the world. But when the world is watching a cyber attack go global, what is your organization doing to brace for impact? Resilience is not based around "if," but "when" your organization is impacted and how it recovers. Building upon basic security practices, this presentation plans to take you "by the numbers" on how to rethink cyber-resilience in your organization.

Managing Partner
SIGMA Threat Management Associates

Title of Presentation

Preventing Mass Shootings: Best Practices in Threat Assessment

Presentation Synopsis

In the wake of targeted attacks like the mass shootings in Las Vegas, at Emanuel AME Church in Charleston, the assassination attempt on Representative Gabrielle Giffords in Tucson, the Aurora, Colorado movie theater shooting, the Newtown elementary school shooting, and the Virginia Tech campus shooting, people often look to law enforcement professionals forwhat can be done to prevent such attacks. Historically, law enforcement personnel have been trained to operate in a reactive mode – responding when a crime is already in progress and investigating crimes that have already occurred. But law enforcement professionals, mental health professionals, and others can play a critical role in preventing assassinations, stalking, and other types targeted attacks. Law enforcement professionals can work with workplaces, schools, colleges, and communities to develop threat assessment programs that can respond to and evaluate threatening and disturbing behavior and prevent targeted attacks. Behavioral threat assessment is a fact-finding process that identifies, investigates, evaluates, and manages threats, stalking, harassment, and other disturbing behaviors. Threat assessment is now considered to be best practice for preventing violence in the workplace, at schools and colleges, in the military, in healthcare settings, and in houses of worship. This presentation will provide an overview of best practices in behavioral threat assessment, elements of effective threat assessment programs, and case studies of attacks and averted incidents.

Managing Partner
Anesis Consulting Group, Inc.

Title of Presentation

How to Get the Most From Your Business Impact Analysis

Presentation Synopsis

Most of us conduct Business Impact Analyses (BIAs) regularly, but what do we do with all of that data?
Mark shares some ideas that will help you fully utilize the treasure-trove of information that you've collected.

CEO
Edward Davis, LLC

Title of Presentation

Managing Crisis

Presentation Synopsis

We all train for bad days, but what happens when the crisis is exponentially larger than ever thought of before.

Coordinating federal, state, and local resources, as well as the media.

Pin It on Pinterest

Share This
Yes No