McLeod Information Technology Security Summit 

Most of us are inundated these days with dire warnings about cyber security risks and real horror stories of what has happened to companies. We get a mountain of “expert advice” from many sources dispensed through the media about what we should be doing, and how we should protect ourselves. The difficulty is separating what is actually important in terms of cyber security preparations for your company from the things that are of less importance.

The goal of the McLeod Software Information Technology Security Summit is to expose trucking and logistics companies to the state of cyber security technology and current best practices that can be used in formulating a security strategy. Join us on October 23rd to gain a deeper understanding, and decide for yourself what is actually important in the context of your systems, your budget, and your business.

Space is limited. Register today!
Cost to attend: $195

Register Now

Featured Speakers

We have pulled together experts in different fields of the larger cyber security community for this one-day educational event to help you formulate or adjust your own plan based on a deeper understanding of the risks, best practices and strategy you can put in place at your company. Our featured speakers include:

  • A Supervisory Special Agent (SSA) for the FBI
  • Ben Barnes, CISO for McLeod Software
  • Jackie Groak, CISO for Veristor
  • Alan Jones, Director of Security Services for Layer3 Communications
  • David Forrestall, Managing Partner for SecurIT360
  • Tyler O’Conner, Cyber Insurance Broker for CRC Insurance Services




 5:30 - 7:30 PM - Welcome Reception



7:00 - 8:00 AM - Breakfast

8:00 - 8:45 AM - The Cyber Security State of Affairs: What is Actually Happening Now

  • Presented by a Supervisory Special Agent of the FBI

    In this session, our experts will share their insight on the most prevalent threats, the damage being done, and what they believe will be the greatest threats to businesses like yours over the next year.

8:45 - 9:30 AM - What Constitutes a Cyber Security Strategy?

  • Presented by Ben Barnes, CISO for McLeod Software

    Ben Barnes, McLeod’s Chief Information Security Officer, will discuss what a comprehensive strategy looks like, including the concept of “protection in depth,” a layered approach to manage risks within the real constraints of your budget and the practical implications for your business and your systems users. Ben will describe the key elements of any strategy and set the stage for how we will dive into each of those elements as the day progresses.

9:30 - 9:45 AM - Break

9:45 - 10:45 AM - Prevention

  • Presented by Jackie Groak, CISO for Veristor

    Learn some of the current best practices, and the range of options you have for working to prevent criminal cyber-attacks by putting in place the right measures, both human and systems.

10:45 - 11:45 AM - Stopping an Attack

  • Presented by Alan Jones, Director of Security Services for Layer3 Communications

    Closing your eyes and saying “tell me when it’s over” is the wrong approach to an active attack. We will educate you about the most successful approaches to detecting and stopping a cyber-attack once it has started.

11:45 - 12:30 PM - Lunch

12:30 - 1:30 PM - Recovery

  • Presented by David Forrestall, Managing Partner for SecurIT360

    This session will focus on the best paths to quick and reliable recovery after a cyber-attack, and explain the range of performance and costs associated with different options for your recovery plan.

1:30 - 2:30 PM - Insurance & Aftermath

  • Presented by Tyler O’Conner, Cyber Insurance Broker for CRC Insurance Services

    If you or your customers suffer financial damages as a result of a cyber-attack, having the best insurance options in place will certainly help mitigate the financial losses that result, but not all insurance is equal. It is also a good idea to plan for a forensics investigation after an attack to determine the root cause, and/or the criminals responsible. Our subject matter experts will help you understand more about both of these subjects.

2:30 - 2:45 PM - Break

2:45 - 3:45 PM - How to Build Your Cyber Security Strategy and Justify the ROI

  • Presented by Ben Barnes, CISO for McLeod Software

    We will wrap up the day with a review of how you can formulate real, concrete plans for each of the crucial elements discussed to put your cyber security strategy into place. The worst time to address any of these subjects is when an incident has occurred. Having a comprehensive strategy, and being in a position to execute it, is critical to protecting your business. At the same time, you must be able to articulate the value your strategy brings to the business, especially for the people in your organization who approve the funding.


McLeod Conference Center
100 Corporate Parkway
Birmingham, AL 35242

Birmingham is centrally located in the Southeast, and our corporate office is convenient to the interstate system, with quality hotel space nearby.

Hotel Options

There are several great hotel options to choose from, conveniently close. Mention you are with the McLeod Group to get a discounted rate.

  • Homewood Suites by Hilton - Distance 1.7 miles
  • Birmingham Marriott - Distance 3 miles
  • Doubletree by Hilton Perimeter Park - Distance 4 miles

Accommodations are not included in conference fee.

Contact McLeod Software Today