Untitled Document
BREAKOUT SESSIONS #2 | 10:35 AM - 11:20 AM
ROOM 1 TITLE Financial Fraud 101: Occupational Fraud & Abuse This session will describe the rampant fraud in today’s business climate. We will explore the sobering facts, statistics and challenges many business owners face. Focusing on the technology world and its unique risks, this session will discuss best practices for increased fraud awareness and detection.
PRESENTER William Belvedere
COMPANY PWB CPAS & Advisors

ROOM 2 TITLE Tackling the Talent Shortage Problem It’s a fact, there aren’t enough of us to go around. The unemployment rate is already at 0%, and the future looks bleak for people in need of information security talent. Industry experts predict as many as 3.5 million empty seats by the year 2022. These are the facts, unless we’re willing to do something about it. The good news, is that we are willing and able to do something! There are solutions for finding and retaining information security talent. What does this mean for you, and what should you do about it? In this session, Evan Francen, CEO and founder of FRSecure will put the problem into context, provide three options to solve the problem for yourself, and provide strategies that work.
PRESENTER Evan Francen
COMPANY FR Secure

ROOM 3 TITLE Connecting, Organizing & Collaborating with Your Team The way people work together is evolving, and unique projects, work styles, functional roles and workforce diversity call for a complete set of collaboration tools. Join us to explore new ways of communicating and collaborating in ways that were previously not possible using Microsoft Teams.
PRESENTER Doug Splinter
COMPANY Microsoft

ROOM 4 TITLE Protecting Networks and USERS from Today’s Evolving & Sophisticated Threats You hear about breaches and threats every day. Cybercriminals are looking for new ways of compromising your data. Now more than ever, you need to protect more than just the computer. Join Webroot in exploring today’s evolving threats and how different security layers are needed to help keep the bad guys out. We’ll explore the ways they compromise your data and how Webroot’s uniquely designed technology solutions are able to keep you and your data safe. We’ll then explore how to protect your network and the most important vulnerability…the user.
PRESENTER Shane Cooper
COMPANY Webroot

ROOM 5 TITLE Why Constraints Dictate Profitability and How Managing to the Constraint Yields Incredible Profit Growth This session demonstrates the Five Rules of Theory of Constraints and their highly focused and leveraged impact on the profit of a business. Learn why the constraint dictates most, if not all, of the financial performance of a company. With this insight, learn how the Five Rules provide guidance in quickly improving all operations of the business, yielding multiple times increase in profitability (vs % increase). As a side benefit, this demonstration will highlight how traditional thinking around concepts such as gross margin, lean, and Six Sigma may be working against us. Walk away with a methodology (e.g. follow the Five Rules) that you can bring to your respective enterprises and start the journey toward dramatic improvements in your organization.
PRESENTER Bruce Lach
COMPANY SUCCESS Computer Consulting

ROOM 6 TITLE Tired of Security Scare Tactics? SecureWorker™ Utilizes 5 Ways To Empowers & Protects your team! Scare tactic – blah, blah, blah, security thing and that other whatsit. If you feel that this is the message you hear every time some new security headline hits the news about the latest breach or vulnerability fear factor, then breakout session is for you! We feel like the Small & Medium Business community is looking for ANSWERS, not just more of the same security noise that inundates us in news articles and our inboxes. We will discuss some of the new methods hackers are attempting to deploy against your organization, the overall increased volume of security threats, AND provide answers regarding how you can protect your organization, meet compliance requirements, and achieve peace of mind! One surprise twist is that some of the answers include providing MORE convenience to your staff, and MORE security, which is extremely rare in technology.
PRESENTER Jerel Howland
COMPANY Mytech Partners, Inc.

ROOM 7 TITLE Intro to Online Marketing Learn how customers find your business online and how to promote your online presence with search engine optimization (SEO) and online advertising. We also introduce tools to help you run your business online, including Google Analytics This session will cover three things you can do right now to market your business and connect with customers online.


Be found by local customers, We’ll show you how to connect with local searchers using Google My Business, a free local business listing that can help your business appear across Google Search and Maps.

Be found everywhere, on all devices. We’ll talk about optimizing your website for the organic search results, focusing on making your site mobile-friendly.

Be found with online advertising, We’ll show you how to promote your products and services on Google and partner websites.
PRESENTER Dave Meyer
COMPANY Google Get Your Business Online

ROOM 8 TITLE Building your audience online and off Learn how Minnesota Business magazine and Irish Titan have teamed up to engage audiences online and in person. During this session you’ll learn how to leverage media like Minnesota Business to get your message to the right audience using the right channels, and how to build a digital strategy that creates conversations that matters to your brand.
PRESENTER Megan Effertz and Darin Lynch
COMPANY Minnesota Business Magazine

ROOM 9 TITLE Is Your Cloud Data Really Safe? Rethink Backup Think you're safe just because you in the cloud? Do you know Microsoft's and Google's backup and data retention policies? Can you restore your cloud data after a Ransomware attack? Confused? "I thought moving to the cloud was all I had to do?!" Rethink Backup. Whether you need to secure your cloud data to meet standards and regulations or want to prepare your business in case of data loss or a ransomware attack, SaaS Cloud-to-Cloud backup reduces risk and avoids a devastating IT crisis. Datto is the leader in Cloud-to-Cloud Backup. Over 3.5 million users around the world have realized that Cloud backup is critical to the integrity of their business operations. Datto SaaS protection offers fast backups of all your O365 or G-Suite data with secure cloud storage and granular restore. Come learn the about vulnerabilities and threats to your cloud data and how to protect your most important assets.
PRESENTER Miguel Caban
COMPANY Datto