2020 Annual Information Technology Conference

2020 Annual Information Technology Conference

Hershey Country Club
1000 E Derry Rd | Hershey, PA 17033-1244
Thursday, February 20, 2020 | 8:30 am to 3 pm
(Registration begins at 8:00am)

Member Price: $350 | Non-Member Price: $400


View Agenda

Sponsor | Exhibit

Promotional opportunities for this event have sold out. Please contact MaryEllen Galuska, 717.720.5557 |

Learn More +

Thank you to our sponsors

Platinum Sponsor



Gold Sponsor



2020 Annual Information Technology Conference presents Microsoft, Cisco and Verizon as they join other top systems security specialists and consultants to cover some of the most wide-reaching tech advances and their impact on businesses, as well as the most significant and wide-spread threats facing IT today.

With case studies that walk you through how attackers leverage tools and techniques to discover vulnerabilities, strategies to set up your company’s tactical cyber security plan, as well as tips on how to assess your company’s overall risk factors, you’ll gain real solutions illustrating the steps and precautions you need to stay out front of current and emerging threats:

  • Microsoft: Security Landscape Threat Overview—to help prepare you to protect your company from threats that have the most potential to do harm, Microsoft will present a global and national overview of the security landscape businesses are facing—where the current biggest threats are and which threats are impacting businesses the most. They will describe best practices to have in place to prevent these threats, and case studies that show how companies were attacked and how they recovered.
  • Cisco Systems: Security Offerings and Protections – Looking at Traffic Patterns—understanding vulnerabilities is critical for companies to correctly identify the right security protections. Cisco Systems will show how to assess and evaluate traffic patterns to determine potential vulnerabilities, and will provide examples of some of the best security protections available and how they work based on the type of vulnerability.
  • Verizon: How 5G Technology is Changing the Business Landscape—the remarkable potential of 5G (fifth Generation of mobile internet connectivity) networks includes much higher data rates, enabling the download of content more quickly; much less delay when requesting data; and increased capacity as the network expands, providing the infrastructure needed to carry huge amounts of data and allowing for an even smarter, more connected world with billions of new connections with speed and security. Verizon will discuss how this technology will impact companies – faster speed, more capacity, supporting AI (artificial intelligence), powering a large increase in innovations related to IoT (Internet of Things) including devices such as drones, wearable and security cameras; what IT needs to do to embrace 5G; and new security issues IT must watch for when adopting 5G.
  • Assessing Your Cyber Security Risk—assessing the security risks for your company is one of the most important tasks facing IT professionals, and often includes evaluating vulnerabilities with the CEO, the Chief Financial Officer and the HR department. We’ll cover what you should include in your initial risk assessment, how to weigh what risks your business is willing to accept, determining what needs to be protected immediately, and best practices on policies and procedures to limit the risk of data exposure.
  • Building a Strategic & Tactical Cyber Security Plan with the CIS Top 20—many organizations struggle with where to start when building a cyber security program. We will show how to use the Center for Internet Security Top 20 security controls to build a Cyber Security roadmap: how all the parts—people, processes and technology—play a major role in shaping the Cyber Security program, and the paramount need to change an organization’s culture for effective security.
  • How Hackers Hack: An Overview —now that you’ve laid the foundation for your IT security program, it is essential to understand an adversary’s methods of attack to ensure you can take the specific steps to properly defend against them. We’ll discuss common tools most hackers use to break into systems, exploring the Social Engineering Toolkit (SET), Metasploit, Armitage, and more. The “how” and “why” in cyber security defense are not enough, here’s the "what" you should be doing.

Network with your peers from across the state who are facing similar issues, and visit with exhibitors offering an exciting array of technologies.

Continuing Education Credits

Certification group type of credits No. of credits
Pennsylvania State Board of Accountancy CPEs(PX177225) - Group Study 5
Continuing Legal Education Board CLEs 5
(ISC)2 Americas Continuing Professional Education (CPE) 5

For questions on Continuing Education credit certifications for this event, please contact Susan Smith, 717.720.5457 |

Event Venue

Hershey Country Club

1000 E Derry Rd | Hershey, PA 17033-1244

Please note that The Hershey Country Club does not have overnight sleeping rooms, so overnight room reservations can be made at the Hotel Hershey, which is located approximately 2 – 3 miles from the Country Club.  The Hotel Hershey has blocked rooms at a special rate of $179 for conference attendees for the evening of February 19, 2020. This room block will be held until January 20, 2020, then it will be released and the hotel may or may not have availability.  Guests can call reservations at 855.729.3108 and ask for the room block for PA Chamber of Business & Industry - IT Conference, or reserve a room on-line at  

View Map and Directions