2018 Conference

Connecting the Dots: Governance, Risk Management, and Compliance for the C Suite 

WHEN: Friday, April 27, 2018
8:00 a.m. to 5:00 p.m.

WHERE: The Embassy Suites South
1440 E. Imperial Avenue, El Segundo, CA 90245
NEED A ROOM? Click here to learn about our special room rates!

Join us for our expanded Annual Spring Conference at the Embassy Suites! This year, we will feature four tracks:

Security & Privacy  |  InfoGov  |  Risk & Compliance  |  Change Management

The conference is geared for the CSO, CIO, CEO, Risk Officer, and the Information Governance and Records Managers tasked with bringing all of these moving parts together and keeping their organizations on the forefront of Information Governance, whether that organization's industry be law, finance, government, insurance, education, service, manufacturing, etc.

Helping us connect the dots will be our first Keynote speaker Jeff Barnes, bestselling author of "The Wisdom of Walt: Leadership Lessons from the Happiest Place on Earth." During lunch he will be available to sign copies of his book!

We also have attorney Joe Rogoway presenting our second Keynote, "Compliance in the Cannabis Industry: Manaing Risk in teh Midst of the Green Rush."

JUST ADDED - ASK THE PRESIDENT!! ARMA International incoming President-Elect Bill Bradford will be joining us to let us know what is knew at ARMA. Along with chapter president Jeff Lewis, they will host the "Ask the President" table and answer any questions you may have! 

ASK AN EXPERT!! All registrants (at the time of online registration) have the opportunity to pose a question, and we will align you with an expert to help you answer it (from the ARMA ranks, speakers, sponsors, or other). We will connect you with your expert prior to the conference to either arrange a time to meet at the conference or at another time and location.  

THIS CONFERENCE IS PRE-APPROVED FOR THE FOLLOWING CE CREDITS:

CRM/CRA: 5.5 (4.5 general, 1 IT)
IGP: 5.5

MORE CONTINUING EDUCATION CREDITS COMING SOON!

SEE SESSIONS AND SCHEDULE BELOW! 

REGISTRATION FEES AND DATES: 

Through March 31st GLA Members   $90
Through March 31st Non-Members $99
April 1st - April 26th GLA Members $125
April 1st - April 26th Non-Members $150
April 27th (Day of Event)      Walk-In for Everybody   $175


Everyone who registers and pays before April 1st will receive a free copy of "The Wisdom of Walt: Leadership Lessons from the Happiest Place on Earth"!

FAQs

  • REFUND POLICY:  Full Refund if cancelled on or before April 20.  After April 20, $40 cancellation fee will apply.
  • TRANSFER POLICY:  Transfers can be made anytime. 
  • PARKING:  Free!
  • CONFERENCE CHAIRS:   Julia Mewbourne, J Pearson Administrative Services, programs@arma-gla.org, and Lorrie DeCoursey, Foley & Mansfield, vicepresident@arma-gla.org

 

Schedule

7:30 – 8:25

Check-in, Breakfast, Exhibit Hall, and Networking

8:25 – 8:55

Opening Jump Starter: Information Governance: It's Not Just for Breakfast Anymore!
Reed Irvin, Executive Vice President, Viewpointe; and Brent Gatewood, CTO and Director of Information Governance, consultIG

 

TRACK 1
Privacy & Security

TRACK 2
Compliance & Risk

TRACK 3
Information Governance

TRACK 4
Change Management

9:00 – 9:45

The Cybersecurity Landscape: a Shift in Cybersecurity Strategy
Quincey Collins, Chief Security Officer
Sheppard Mullin

Expressing Cyber Risk: A Survey of Public Company Disclosures
Mikhael Felker, Director of Info Security & Risk Mgmt.
Farmers Insurance

The Ethical Custodian: New Challenges in Law Firm RIM and IG
Julie J. Colgan, CRM, IGP, Senior Director, Strategy & Innovation
Epiq

Change Only Happens with Effective Communication
Maurice DiMino, Toastmaster Champion
Million Dollar Message

9:45 - 10:00

Exhibit Hall and Networking

10:00 – 11:00

Practical Security Controls Discussion
Quincy Collins, Chief Security Officer
Sheppard Mullin

GDPR Journey: A Discussion of Key Regulation Scope, Requirements, & Practice Strategy
Jeff Sanchez
Protiviti

How to Optimize Your Paper Records Modernization Efforts
Sandra Serkes, President, CEO, & Co-Founder
Valora Technologies

Change Management vs. Change Leadership
D. Madrid
PG&E

11:15 – 12:15

Key Note 1: “The Wisdom of Walt: Leadership Lessons from the Happiest Place on Earth” with bestselling author Jeffrey A. Barnes

12:15 – 1:15

Lunch and Exhibit Hall 
Our first Key Note speaker, Jeff Barnes, will be available to sign his book, "The Wisdom of Walt"

ARMA International President-Elect Bill Bradford will host an "Ask the President" table and answer your questions! 

1:15 - 1:30

Sponsor Spotlight: BlackBerry Empowers the Securely Connected Workforce
Faron Lyons

 

   

1:45 – 2:45

A False Sense of (Cyber) Security
Rich Rodney
IFI Consulting

New Kids on the Blockchain: RIM Applications Today and Tomorrow
Scott Kaye and John IsazaRimon Law

Autoclassification 101
Julie Colgan & Sandra Serkes

The Modern Records Manager
Kurt Thies
TAB

2:45 - 3:00

Exhibit Hall and Networking

3:00 – 4:00

Key Note 2: Compliance in the Cannabis Industry: Managing Risk in the Midst of the Green Rush
Joe Rogoway, Founder & Principle
Rogoway Law Group, Cannabis Law Practice

 

 

   

**Sessions presenters, topics, and schedule are subject to change.

Presentation Summaries

 8:25 - 8:55, Opening Session

Information Governance: It's Not Just for Breakfast Anymore!

This session is a sequel to last year’s successful 2017 ARMA Orlando presentation.  We will discuss the IG headlines of the day and talk about the hot topics and trends we all need to consider as information professionals.  There will be live interactive polling so bring your smart devices with you.  We will also bring the polling results from Orlando so the audience can compare.  This session will cover key emerging trends that are shaping information governance and how you can take steps to develop more proactive and strategic information governance practices. 

 
9:00 - 9:45, Track 1

The Cybersecurity Landscape: A Shift in Cybersecurity Strategy

The Cybersecurity landscape is changing. Attackers are using automated, pre-built toolsets to attack your organization. Attackers organized and have the means to launch sustained attacks against your organization. How can we shift our strategy to increase our odds of survival? How do we ensure that our security controls are applied appropriately for the industry type, size, and goals of the organization?  

Privacy, compliance, vendor management, professional development, policy development, and defense-in-depth all play a role in in the Cybersecurity landscape. What is your plan? What is your strategy? Is aligning with a security compliance framework a good idea for your organization?

 
9:00 - 9:45, Track 2

Expressing Cyber Risk: A Survey of Public Company Disclosures

Public companies are required to disclose business risks before IPO and in their annual disclosures.  Private companies with ambition to go public or be acquired are more recently going through rigorous cybersecurity assessments in M&A due diligence.  There is increased scrutiny of public company cybersecurity disclosures from both regulators and investors, to ensure equity owners are aware of any material risks that could impact a company’s earnings and future value.  This session will review recent guidance on cyber related SEC disclosures, analyze how businesses describe cyber risks in their annual reports and provide examples cybersecurity material impacts to company investors (i.e., breach related costs, derivative lawsuits, discounted acquisition value, etc.).

 
9:00 - 9:45, Track 3

The Ethical Custodian – New Challenges in Law Firm RIM and IG

Law firms are in the information business. Information is a critical operational asset, and is effectively the primary product.  And because law firms are custodians of client-owned information, it puts both firms and their clients at risk if proper governance controls and associated practices aren’t in place and consistently followed.  Keeping “everything, forever, just in case”, is no longer an acceptable approach to records management.  This session will explore the unique relationship law firms have with their clients and the information generated during representation, and offer some tips for establishing and maturing an effective records and information management program. 

 
9:00 - 9:45, Track 4

Change Only Happens with Effective Communication

You have been asked to make a presentation on the information you have been gathering. The data is in. The metrics have been measured. The solutions have been analyzed.  Now…You want to be clear, concise and coherent when you stand in front of your audience. Is that possible with today’s avalanche of information?

Will your audience be interested? Will they comprehend? And will they walk away with the message you want them to receive? In this informative and fun session, you will understand how to put to together a presentation that will be effective and understood by all. The tips and techniques to use when you present to any audience so they will walk away with your message.

 
10:00 - 11:00, Track 1

Practical Security Controls Discussion

This discussion will contain practical security control ideas that you can use to further strengthen your environment. Including: Patching, Malware Analysis, SIEM, SIEM 2.0, Endpoint Security, Privilege Management, Phishing Response, Multi Factor Authentication, Account Management, File Blocking, Best Practices and more…

We are more than just the sum of our security controls. Our controls must complement each other and enable the organization to meet its objectives while maintaining an adequate level of confidentiality, integrity, and availability.  

 
10:00 - 11:00, Track 2

The GDPR Journey: Discussion of Key Regulation Scope, Requirements, and Practical Strategy

This session will provide an overview of the GDPR and how it may affect your organization.  Jeff will discuss fundamental GDRP concepts, scope, implementation requirements and timeline for compliance.  Discussion will focus on practical scenarios and provide guidance for how your organization may effectively continue its journey to GDPR compliance.

Key takeaways from this presentation:

  • GDPR Overview (Timeline, Scope, Key Requirements)
  • "Personal Data" as defined by the GDPR
  • GDPR Practical Scenario
  • Practical Guidance - Building a GDPR Compliance Plan
 
10:00 - 11:00, Track 3

How to Optimize Your Paper Records Modernization Efforts

An in-depth discussion of modern-day paper records solutions.  Learn the new technologies that help paper records today enjoy every advantage that electronic records have:  metadata, searchability, image previews, and full rules-based retention, to name a few. Hear real-world success stories, plus practical solutions you can implement today at your organization. Three takeaways from this session are:

  • How to implement an up-to-date Paper Records Modernization effort at your organization
  • Understanding the tight interplay between file AutoClassification and Records & Information Governance
  • What the Machine Learning vendor and technology  landscape looks like for paper records and beyond
 
10:00 - 11:00, Track 4

Change Management vs. Change Leadership

There is a difference between leading change and managing change. Knowing the difference will impact your implementation of Information Governance. Join D. Madrid, one of the trailblazers of the Information Governance profession, for this informative session and change your perspective on change.

 
11:15 - 12:15, Keynote 1
The Wisdom of Walt - Leadership Lessons from the Happiest Place on Earth
 
1:15 - 1:40, Sponsor Spotlight - BlackBerry

BlackBerry Empowers the Securely Connected Workforce

One of the most significant productivity enhancements of modern time, the mobile workforce, unleashes endless opportunities across applications, devices and IoT endpoints. Organizations must enable the workforce to share data—confidentially and reliably—across a growing number of endpoints.

With so much at stake, key questions remain:

  • How can organizations leverage unmanaged devices while mitigating risks?
  • How are security platforms evolving to safeguard mobile access to Microsoft® apps?
  • What technologies will ensure mobile-enabled workflows , IoT endpoints and shared files are used securely?
  • How do we protect our workers in times of crisis and get back to business quickly?
  • How do organizations ensure product designs and operations are secure?


BlackBerry phone not required.

 
1:45 - 2:45, Track 1

A False Sense of (Cyber) Security

In the age of multiple security breaches in many organizations of all sizes and functions Cyber Security has become the catch phrase of the day. While data security has always been at the forefront of protecting digital information, adherence to security policies have almost always been viewed as nuisance by the end users downstream. With the proliferation of mobile devices and public access to wifi internet that feeling of a nuisance is still pervasive while access to data from multiple points is expanding. This feeling is manifested in an expectation that the software/hardware developers and infrastructure designers are responsible for making data access difficult and the end user should just have as much access as needed or allowed at all times. This creates a sense that the end user has limited responsibility or capability to impact the security of the data they access.

 
1:45 - 2:45, Track 2

New Kids on the Blockchain: RIM Blockchain Applications Today and Tomorrow

In this presentation, the audience will explore the basics of blockchain technology, coupled with the specific implications for records and information governance professions. Specifically, the presentation will cover:

  • A primer on blockchain technology, including how and whether blockchain is a reliable way of confirming that the party submitting a record to the blockchain, the time and date of its submission, and the contents of the record at the time of submission actually result in a valid transaction;
  • How a blockchain is basically an electronic ledger (register) of digital records, events, or transactions akin to a financial ledger except authenticated and maintained through a “distributed” or “shared” network of participants using a group consensus protocol (multiple users);
  • How blockchain is already in use in the private sector through virtual currency known as Bitcoin;
  • The costs and challenges associated with the use of blockchain technology for recordkeeping purposes.
 
1:45 - 2:45, Track 3

AutoClassification 101

This session will cover the history and evolution of AutoClassification as an indispensable tool for Enterprise Content Management (ECM) and Information Governance (IG).

Learn how and why:

  • AutoClassification is a game-changer for understanding and managing content
  • What types of structured and unstructured data are good candidates for AutoClassification
  • What types of rich metadata result from an AutoClassification process
  • AutoClassification drives automated business rules for retention, legal hold, remediation, migration and more
  • AutoClassification integrates with your Information Governance and Records programs to ensure compliance
  • Identification, redaction, and remediation of sensitive data and Personally Identifiable Information (PII) / Protected Health Information (PHI) are easily handled with AutoClassification
  • Strategies for choosing a good place to start a content assessment project.
  • Tips, tricks, and pitfalls learned from the field when conducting content assessment projects.
  • Selling the rest of your organization on file remediation or migration project
 
1:45 - 2:45, Track 4
 

The Modern Records Manager

TAB's Kurt Thies shares several TAB customer stories that demonstrate how modern RIM professionals can continue to stay relevant. You will learn about the different ways that RIM methodologies, tools and technologies can help you deliver bottom-line business value throughout the information lifecycle. The presentation includes real-world examples from customers in finance, energy and other industries, providing lessons and practical approaches that you can bring to your own organization.

Key takeaways from this presentation:

  • The importance of adding value throughout the entire information lifecycle
  • The four different kinds of business value your RIM colleagues are currently providing
  • The tools and skills you will need to stay relevant in the coming decade
 
 3:00 - 4:00, Keynote 2

Compliance in the Cannabis Industry, Managing Risk in the Midst of the Green Rush  --Joe Rogoway, Founder & Principal of Rogoway Law Group, Cannabis Law Practice  

California’s cannabis industry presents a mix of both opportunities and liabilities for anyone wishing to become involved. From a regulatory perspective, California law requires strict adherence to the METRC Track and Trace system which regulates licensing, inspections, audits, and enforcement while collecting industry wide data. In terms of consumer protection, this means that both the State, and potential plaintiff's attorneys, will have insight into the entire supply chain and know the path of each cannabis product sold. For operators, strict adherence to METRC is compulsory and failure to meet those regulatory obligations could lead to loss or denial of licensure. With so much information being transmitted both internally and externally, there is a significant amount of risk associated with a potential data breach. Attendees will learn about California’s cannabis laws and regulations in the context of risk management in the legal market.

 

Presenter Bios

Jeffrey A. Barnes is the best-selling author of The Wisdom of Walt: Leadership Lessons from the Happiest Place on Earth and Beyond the Wisdom of Walt: Life Lessons from the Most Magical Place on Earth. He is an international motivational speaker, higher education administrator, university professor, and leadership/success coach. He has more than 35 years of professional speaking experience and nearly 25 years' experience leading teams in higher education.

William Bradford has been a member of ARMA since 2004 and is now the incoming President-Elect.  Like many information management professionals, he was thrust into the world of RIM because, as they say in sports, he was the next man up.  He began working in law firms back in the late 80’s early 90’s. At the first firm he worked with, he started as a legal messenger.  Shortly after starting he was asked to work with the firm librarian who was in charge of the “file room“ at the time.  He was tasked with indexing all of the inactive client records and working with the librarian and one of the attorneys on something called a “retention schedule”. He was now in the world of records and hasn’t looked back since.  After more than 20 years of working in RIM, he was approached with the opportunity to make the change to the business partner side of records management, where he has been able to use his RIM background to help clients with records & information management issues and challenges within their organizations. He currently works for Access Information as a Sales Executive.  He is very excited about being a team member at Access because of their commitment and dedication to the RIM industry through their partnership with the AIEF to provide scholarships to RIM professionals wanting to advance their careers, and their continued support of ARMA International, and ARMA chapters across the country.

Julie J. Colgan, CRM, IGP is the Senior Director of Strategy and Innovation at Epiq. Julie joined Epiq in 2016 to lead the Management Solutions strategic pathway as well as oversee and lead our RIM, IG and Technology areas.  Prior to joining DTI, Julie has served as the Head of IG Solutions for Nuix where she led the Information Governance business line, including the development and oversight of market and product strategy. Julie’s stellar background also includes being the past president of ARMA International and serving as the Chair of the Board of Directors for ARMA. 

 

Quincey Collins (CISSP, CISA, CEH) has over 17 years of combined experience in the information technology and information security field. He brings a multi-dimensional perspective with an emphasis on information security operations, security controls assessments, auditing, compliance, vendor risk management, and IT operational risk management. Quincey spent almost 9 years working for the United States Air Force and spent an additional 5 years supporting different commands and agencies within the Department of Defense in Europe. In his role as the Chief Security Officer for Sheppard Mullin Richter and Hampton LLP, Quincey is responsible for the firm’s information security and risk management strategy. He places a high emphasis on cybersecurity training for employees and specialized training and continuing education for the information security department. Quincey recently led his firm to an ISO 27001 certification. Quincey holds a B.S. in Cybersecurity, and a M.S. in Information Technology with a specialization in Information Assurance from University of Maryland University College.

Maurice DiMino is an award winning international speaker, Number #1 Best Selling Author, and Mentor. He trains executives and entrepreneurs how to create their “Million Dollar Message.” In 2004, Los Angeles Toastmasters voted him “Best Speaker.”  The TED Organization recognized him as an outstanding speaker and in April 2013 he became a TEDx speaker at San Diego State University. His clients include Microsoft, US Navy, Chinook Group, IBM, Los Angeles Food Bank along with other corporations and organizations.   Whether you are speaking to 5, 50 or 500 people...in someone’s living room, board room or convention center – you are going to be asked to talk about your product or service.  Maurice’s easy to use template shows you how to create a Clear, Concise, and Call-to-Action message every time.

Mikhael Felker is Director of Information Security and Risk Management at Farmers Insurance. Previously, he was the first information security (IS) hire at The Honest Company to build the IS program and team for this LA based organization. During his tenure he developed the first IS policies, implemented key security technologies, executed risk assessments, hired security engineers and contractors, developed program metrics, and provided C-level program reporting. During his decade career across a number of industries, he has implemented technologies for vulnerability management, identity & access management, intrusion prevention, wireless security, eDiscovery, remote access, application security, two factor, security awareness training, eSignature, encryption platforms, endpoint security and many others. Felker received his M.S. in IS policy and management from Carnegie Mellon University and B.S. in computer science from UCLA. He holds industry credentials in security, privacy and project management including CISSP, CRISC, PMP, CIPP/US, CISM, CISA, ITIL and CGEIT. Mikhael's written work of 50+ publications has been featured in 10+ publications including Forbes, ACM, IEEE Security & Privacy, ISACA Journal, ISSA Journal, case studies and a number of online magazines.

Brent Gatewood is the Chief Technology Officer and Director of Information Governance at consultIG. Brent, an internationally recognized expert in the field of information governance, has spent more than 20 years playing key roles in helping organizations with their Big Data, RIM and IG strategies and implementations. Brent has worked with organizations of all sizes across multiple vertical industries, including legal, energy and commercial on multiple continents. He is also a prolific writer and sought-after speaker on subjects related to Information Governance and associated strategies.

Reed Irvin, as Executive Vice President of Strategy and Marketing for Viewpointe, Reed is responsible for the overall corporate strategy and integrated marketing efforts of Viewpointe.  Reed has more than 25 years of industry experience in ECM, records management and information governance, is an active member of the EDRM and the GDPR working group, currently chairs the IGRM (Information Governance Reference Model) and has been a member of ARMA International for more than 25 years. His organization, Viewpointe, has been providing purpose built private clouds delivering ECM and Information Governance as a managed service for over 17 years.

John Isaza, Esq., FAI, heads the Information Governance & Records Management practice at Rimon. Mr. Isaza is internationally recognized in the emerging legal fields of information governance, as well as records and information management (RIM). He is one of the country’s foremost experts on RIM issues, electronic discovery, and legal holds. He has developed information governance and records retention programs for some of the most highly regulated Fortune 100 companies, including related regulatory research opinions. His clients range from the Fortune 100 to startups.

Scott Kaye has extensive experience advising companies, lenders, sponsors, and private equity funds and their portfolio companies on M&A, restructuring and finance matters, as well as technology companies from start-up to exit on equity and debt financing matters.  Having advised clients on more than $65 billion in financing and debt restructuring in hundreds of transactions, Scott represents private lenders and borrowers as purchasers, in acquisitions and acquisition financing, asset-based lending, bridge financing, liquidity lines, mezzanine and subordinated debt, second lien financing, DIP financing and trustees, debtors, DIP lenders, and creditors in out-of-court workouts and formal bankruptcy proceedings.

D. Madrid, CIP, MBA blends a background of technology, business administration, records management, change management, and information management to her approach to information governance. She has over 15 years of experience in the Records and Information Management profession, an M.B.A. concentrating in Technology Management, a certificate in Change Leadership from Cornell University, and is the Information Body of Knowledge Chair on the Information Coalition's Advisory Board.

Richard Rodney is the President and Chief Consultant at iFi Consulting, LLC. He is an expert in litigation support, electronically stored information, forensic technologies, and an expert certified computer forensics examiner. He has over 20 years’ experience in litigation support, trial support, electronic discovery, computer forensics and various forms of discovery and investigative workflows. Richard is an AccessData Certified Examiner, Accessdata Mobile Examiner, and is trained in various disciplines of computer forensic examination including: Windows Forensics, Mobile Forensics and analysis, Mac/Apple Forensics collection and analysis, and Social Media discovery collections and processing.  He earned a B.S. degree in Business Administration with a minor in Criminal Justice from The Lincoln University of Pennsylvania.

Joe Rogoway is the CEO and Managing Attorney for Rogoway Law Group, a cannabis focused law firm with offices in Los Angeles, San Francisco, and Santa Rosa. Widely recognized as a thought-leader in the cannabis industry, Joe has dedicated his academic and professional career to cannabis law reform, regulation, and the representation of businesses. As a trial attorney, Joe conducted dozens of jury, bench, and administrative trials. As a political advocate, Joe was the author and co-proponent of several state ballot initiatives seeking to end cannabis prohibition in California. Today, Joe leads the Firm dedicated to assisting businesses with their corporate, compliance and litigation needs. Joe resides in Sonoma County, California with his wife and 2 children.

Jeff Sanchez is a Managing Director in Protiviti's Los Angeles office. He joined Protiviti in 2002 after spending ten years with Arthur Andersen's Technology Risk practice. Jeff is one of six security segment leaders and has global responsibility for Protiviti's Data Security and Privacy services. This includes HIPPA/HITRUST, PCI, GDPR, vendor security management, and other data centric security services. Jeff has participated in technical consulting and audit projects across many industries including Financial Services, Hospitality, Healthcare, and Retail. He has conducted numerous technical training courses on network Security, Wireless Security, PCI Compliance, and Privacy. For the last ten years Jeff has concentrated on information security assessment, strategy, design, and implementation.

Sandra Serkes, President, CEO, and Co-Founder of Valora Technologies, is an is a dynamic leader with an extensive background spanning over 20 years in entrepreneurship, software marketing, product management and corporate strategy, particularly in information governance, predictive analytics, document data mining and processing, computer telephony and speech recognition. A graduate of Harvard Business School and MIT, Ms. Serkes serves as an Adjunct Professor to the Columbia University School of Professional Studies, Knowledge Management Program, where she lectures on “Solving Information Governance & Knowledge Management Problems with Pattern-Recognition Technologies & Predictive Analytics.” since Fall 2015.

Kurt Thies is an entrepreneur, adviser, writer and speaker with over 20 years of experience as a strategic adviser and expert in Information Lifecycle Management. Currently, as Vice President of Technology and Strategic Solutions at TAB he is expanding TAB’s focus on technology and advisory services. TAB’s services include the design and implementation of enterprise-wide document and records solutions for Fortune 1000 companies, resulting in operational efficiencies, cost reductions, improvements to access and speed of information retrieval, risk and litigation management, as well as industry and legislative compliance. Kurt founded Accutrac Software, Inc., later acquired by Iron Mountain.

   

SaveSave

Sponsors

Gold Sponsors

SaveSave

SaveSave

SaveSave

Silver Sponsors

SaveSave

Become a Sponsor and Exhibit at the Conference!

ARMA GLA is finalizing our April 27th Annual Conference, now at a larger venue, with more sessions, and a greater line-up of speakers!


If you are not yet a sponsor, or need to renew your sponsorship, please contact Faron Lyons at vendorrelations@arma-gla.org


Platinum Sponsor -- $1,000

  • Exhibit table and three (3) entries to the Conference
  • Your Logo on our website, Conference pages, and Conference materials
  • Your company ad on the Conference web page
  • Table Sponsorship for one (1) Monthly Chapter Meeting for two (2) attendees (includes Table for display and 5-minute presentation)
  • The Conference attendee registration list

Gold Sponsor -- $750
  • Exhibit table and two (2) entries to the Conference
  • Your Logo on our website, Conference pages, and Conference materials
  • Your company ad on the Conference web page
  • Table Sponsorship for one (1) Monthly Chapter Meeting for one (1) attendee (includes Table for display and 5-minute presentation)
  • The Conference attendee registration list

Silver Sponsor -- $500
  • Exhibit table and one (1) entry to the Conference
  • Your Logo on our website, Conference pages, and Conference materials
  • Your company ad on the Conference web page
  • The Conference attendee registration list

Additional Sponsor Opportunities!

This year there are additional opportunities to sponsor our Conference. To qualify for on eof the opportunities below, you MUST be a Platinum, Gold, or Silver sponsor. Please contact vicepresident@arma-gla.org, programs@arma-gla.org, and/or vendorrelations@arma-gla.org if you are interested. 

Vendor Spotlight Session

$500 (1 session left!)

1:15 pm to 1:30 pm

Educational presentation covering Security, InfoGov, Risk & Compliance, or Change management. This can include a general discussion of your services or product.

Book Sponsor

$1950 (options to split with other sponsors - please advise us of the $ amount you would like to contribute)

Full or partial sponsorship of the Key Note speaker Jeff Barnes' best selling book, "The Wisdom of Walt: Leadership Lessons from the Happiest Place on Earth" that will be given to all paid registrants. Sponsorship will include a bookmark with your company logo and message. 

Lunch Sponsor & Presentation

$1000 (1 only)

A seated lunch in the main room with the exhibit tables. Sponsorship will include a 45 minute Educational Presentation by the sponsoring vendor from 12:30 to 1:15 pm

Conference Program

SOLD OUT!

The Conference program has been sponsored!

Conference Tote Bag

SOLD OUT!

The Conference tote bag has been sponsored!

SaveSave