2014 Chief Information Security Officer (CISO) Leadership Forum
2014 Chief Information Security Officer (CISO) Leadership Forum
May 6, 2014 - San Francisco, CA
JOIN LIKE-MINDED PROFESSIONALS IN YOUR FIELD FOR A FULL DAY OF LEARNING. EXPLORE CUTTING EDGE CONTENT AND EXPAND YOUR NETWORK WITH THE BEST AND BRIGHTEST EXECUTIVES IN THE REGION!
Argyle Executive Forum’s 2014 Chief Information Security Officer Leadership Forum will explore the evolution of the Chief Information Security Officer role and discuss best practices and strategies for the security organization to help drive the business forward and have a profound impact on the local and global business climate.
Argyle Executive Forum is bringing together CISOs, CIOs, CTOs, and direct reports from a variety of industries. Using a discussion-based format, our 2014 Chief Information Security Officer Leadership Forum in San Francisco will focus on several areas including: “Effective strategies for Fighting Cyber Crime,” “The Evolution of the CISO and Predictions Going Forward,” “Assessing Security in the Cloud Environment,” “Vendor Risk Management,” and “The Risk of BYOD and the Mobile Workforce.”
This event will feature insights from top
Charles Schwab View Bio »
Bashar Abouseido is the VP, Chief Information Security Officer for Charles Schwab Corporation. He is currently responsible for leading the Information Security and Privacy programs at the financial services firm. Prior to that, he headed up the information security and risk management team for the global wealth management businesses at Thomson Reuters working with his peers in the brokerage industry to protect sensitive data and the availability of high scale transaction-based computing environments.
Prior to his tenure at Thomson Reuters, Abouseido worked at fortune 500 company, among others, in a variety of leadership positions including information security management, software development, architecture and technology operations roles.
He has an M.B.A. with International Business emphasis from Marquette University and a Bachelor’s of Science, with a major in Computer Science, from University of Wisconsin-Milwaukee.
Bitglass View Bio »
Rich drives product management and marketing at Bitglass. Prior to joining Bitglass in April 2013, Rich was Senior Director of Product Management at F5 Networks, responsible for SSL VPN, access security, and mobility strategy. Prior to joining F5 in 2012, Rich was Senior Director, Product Management for Juniper Networks’ Junos Pulse Business Unit, with responsibilities including SSL VPN, NAC, mobile security and WAN optimization. Before Juniper, Rich was a Systems Engineer at telecommunications giant Sprint Corporation. Rich received an MBA from UCLA Anderson School of Management and a B.S. in Electrical Engineering from Pennsylvania State University.
McKesson View Bio »
Vince is a vice president with McKesson Corporation and is the IT Risk Leader for the US Pharmaceutical division. His role includes the identification, management and monitoring of IT related risks including security, compliance and privacy. Vince is also responsible for McKesson’s enterprise-wide IT Vendor Assurance program.
Prior to joining McKesson, Vince held various leadership roles with major financial service firms with the Internal Audit and Risk Management functions. Vince’s career also included over 12 years as a partner in PriceWaterhouseCoopers specializing in Technology Risk Advisory services
Vince is a graduate of Penn State University with a degree in Mechanical Engineering and the University of Maryland with an MBA in Operations Research.
Vince is active with various risk management and security organizations, and is co-chair of the recently formed Healthcare Information Working Group of the Cloud Security Alliance.
Los Angeles World Airports View Bio »
Bob is the CISO for Los Angeles World Airports and is responsible for information security at LAX International Airport, Ontario International Airport, and Van Nuys Airport. Bob specializes in cyber operation and successfully implemented an Advanced Cyber Security Operation Center. He architect a network infrastructure using security techniques to track advanced persistent threat (APT), spear phishing, drive-by malware, application hacking and other types of cyber threats. He is also responsible for implementing an Enterprise Risk & Compliance Management, BCP IT COOP plan, security awareness training, and performed computer forensics with multiple law enforcement agencies. On a regular basis, he consults other airports on IT security strategies and best practices. Recently, Bob briefed Suzanne E. Spaulding, Under Secretary of National Protection & Programs Directorate for DHS on Airport Cybersecurity at LAX International Airport.
Bob is a recipient of a CSO Magazine’s CSO40 Award and Government Technology Magazine’s LA Digital Summit Award. He is a guest speaker at HTCIA (High Technology Crime Investigation Association), RSA Asia Pacific & Japan 2013 Conference, and RSA Security Analytics 2013 Summit. He holds a BS degree in Computer Science from California State University and a CISSP and CISM certifications.
Maxim Integrated Products View Bio »
As Vice President and CIO for Maxim Integrated since 2008, Walter Curd has led the modernization of infrastructure and applications and is now leading a radical transformation of the IT organization to establish a full strategic business partnership. In his current position, Walter has insured that Maxim is an early adopter of consumer technologies, cloud computing, and most recently enterprise social networking. Maxim, a leader in the analog semiconductor market with $2.4B in annual revenue, has been recognized as having one of the most innovative IT organizations in the Information Week 500. Prior to joining Maxim, Walter built the IT organization for Marvell Semiconductor to support their growth from $300M to over $3.0B during his tenure. He has also led the IT organizations for Fujitsu, Electroglas, and CyberIQ Systems. Walter has a B.S and MBA from the University of Virginia.
ForgeRock View Bio »
With more than 30 years of experience in the software and technology industries, Mike has held senior executive roles at SAP, i2 Technologies, Oracle, and Apple. Mike has also provided consulting expertise to some of the largest software firms and venture-funded startups to define and drive new growth and execution opportunities.
Kaazing View Bio »
Frank D. Greco is the Director of Technology for Kaazing Corporation. He is responsible for the Kaazing Internet of Things and Web communication strategy and for guiding customers with new technology approaches that leverage the value of extending application protocols over the Web. Frank has extensive experience in IT projects for over 15 years and has worked on global architecture, grid/cloud computing, innovative user interfaces and mobile computing. He has been named by Sun/Oracle a "Java Champion" for many years and chairs the NYJavaSIG (largest Java User Group in North America) and the NYHTML5 User Groups.
Seculert View Bio »
In his role as President of Seculert, Richard leads the company’s global sales, support, and customer success operations. Richard has a long history of launching cutting edge technologies into global markets for companies that include McAfee, PGP, Symantec, and Securify. Most recently, Richard served as President and CEO of AppCentral, the leader in enterprise mobile appstores. AppCentral was acquired by Good Technologies in 2012.
Richard brings over 25 years of experience in the IT security industry to Seculert. Richard also brings a unique and at times controversial perspective to the information security sector based on his experiences at the inception of the antivirus, encryption, web security and network security industries. Richard holds a B.Sc. in Mechanical Engineering from Nottingham University (United Kingdom).
AvePoint View Bio »
Greg Headley joined AvePoint in 2011 and serves as Vice President of Sales and is responsible for driving company expansion in U.S. State and Local Government, West and Mid Atlantic Commercial regions.
Joining AvePoint in 2011 as Enterprise Sales Executive, Greg quickly developed the Northwest territory into a top performing region by developing some of the best known brands into AvePoint customers, including Microsoft, Starbucks and Costco. In 2012, Greg moved into the role of Director of Sales with expanded responsibility to include U.S. State and Local Government and Mid Atlantic Commercial where his team grew revenues by 136%.
Greg brings more than 15 years of sales, partner and business development experience at companies such as McAfee, CA and Microsoft. Greg received his Bachelor’s degree from the University of Washington in Marketing and Management, and is an IAPP Certified Privacy Professional in IT and expecting Privacy Program Management certification in July 2014. Outside of work, Greg is actively involved with various philanthropic groups such as Wounded Warriors and United Way. He currently resides in Kirkland, WA.
UnitedHealth View Bio »
Elimu Kajunju is the chief privacy officer for UnitedHealthcare Military & Veterans, responsible of the design, implementation and maintenance of a compliant privacy program. He is also responsible for information security compliance and for providing legal counsel on matters relating to privacy, security, records, data handling and general IT compliance. He has held similar roles at Boston Scientific and Carlson. Prior to Carlson, Elimu held senior technical information security positions at Park Nicollet Health Services and Qwest.
Elimu is a privacy, security and compliance leader with experience in the following areas: regulatory compliance, PCI, security engineering, international data privacy compliance, internal and third party assessments, HIPAA privacy and security, GLBA/FFIEC, Privacy Act/DOD privacy program, incident/breach investigation, response and notification, privacy/security awareness, and workplace privacy. In addition to providing legal advice on data privacy and information security matters, he has also provided counsel on contract compliance, export restrictions and investigation handling procedures.
Elimu holds a bachelor degree in business from St. Mary's University of Minnesota and a law degree from Hamline University School of Law. In addition to the CISSP, he also holds the following privacy certifications: CIPP/US, CIPP/E, CIPP/IT, CIPP/C, CIPP/G and CIPM.
Dropbox View Bio »
Cory has over a decade of industry & government experience on all things security. His expertise was built on a broad foundation of experience in information security, security operations, incident response, trust & safety, risk & compliance, investigations and physical security. Prior to joining Dropbox, Cory was responsible for the protection of users, revenue and brand at Google. Before Google, Cory was a Special Agent with the United States Secret Service where he was trained in the Electronic Crime Special Agent Program, specializing in network intrusions, unauthorized computer access, financial fraud, phishing, malware and other Internet based threats.
CalPERS View Bio »
Speaker bio coming soon...
Wells Fargo View Bio »
Sri Muthu is Head of Technology for ClearXchange, a payments joint venture of Bank Of America, Capital One, JPM Chase and Wells Fargo. As a co- founding technologist, he has had responsibility for various areas since 2011. He was previously with Wells Fargo since 1999 and co-founded & managed Incubator, Labs and R&D for Internet Services since 2007. He managed Online Investments Technology from 2002 to 2007 and was responsible for Online Brokerage & Trust sites and OFX & Investment Web Services. He also previously managed Internet Services Configuration Management and Pre-Production Groups. Sri attended Regional Applied Computing Center in Singapore, Virginia Tech and recently completed the Strategic Decision and Risk Management program at Stanford. He previously held FINRA 7, 63 and 24 registrations and has completed CISA, CISSP, CISS, CISM and CGEIT examinations.
The Gap View Bio »
Speaker bio coming soon...
State of California View Bio »
Michele Robinson was appointed Director of the California Office of Information Security (OIS) and State Chief Information Security Officer (CISO) by Gov. Jerry Brown in May 2013. Robinson joined OIS in 2007 and assumed the position of Acting Director in February 2013, where she served as the liaison to federal, State and local government on cyber security policies and issues. From 2010 to 2013, she served as Deputy CISO and was responsible for managing the day-to-day operations of OIS and the statewide information security program, including enterprise policy development, disaster recovery planning, incident management, and compliance. From 2007 to 2010, Robinson served as Assistant CISO managing the statewide enterprise incident management program and effecting several significant policies. Prior to joining OIS, Robinson served as the CISO and Privacy Officer for the California Unemployment Insurance Appeals Board (CUIAB) for nearly 5 years.
Prior to her appointment with CUIAB she worked for the Department of Consumer Affairs (DCA) for 8 years, serving on policy development, new program implementation, business process reengineering and system design and integration committees, and representing DCA and its constituent board and bureau programs at task force meetings, board meetings and special meetings with control agencies and members of the Legislature. Robinson has 10 years of experience in the finance and credit industry where she has held manager, supervisor, and fraud investigator positions. She holds a Bachelor of Science in information systems from the University of San Francisco, and CISSP, CISM, CIPP/US, and CIPP/IT certifications.
Motorola Mobility View Bio »
Mr. Richard Rushing is the Chief Information Security Officer for Motorola Mobility LLC.; Richard participates in several corporate, community, private, and government security council’s and working groups setting standards, policies, and solutions to current and emerging security issues. As Chief Information Security Officer for Motorola Mobility he has lead the security effort by developing an international team to tackle the emerging threats of mobile devices, targeted attacks, and cyber-crime. He organized, developed and deployed practices, tools and techniques to protect the intellectual property across the world-wide enterprise. A much-in-demand international speaker on information security Richard has presented at many leading security conferences and seminars around the world.
Experian View Bio »
Stephen Scharf, CISSP, is currently employed as Senior Vice President and Global Chief Information Security Officer for Experian. Mr. Scharf is accountable for the overall strategy, leadership and governance of Experian’s Global Information Security, Physical Security, and Business Continuity programs.
Prior to his position with Experian, Mr. Scharf was employed as the Global Chief Security Officer for Bloomberg, LP. He was responsible for information security, physical security, business continuity, security awareness/training, and investigations. His focus on security strategies had supported the organization in growing a world-class security program that concentrates on customer and employee protection via constant security testing and improvements.
Prior to his position with Bloomberg, Mr. Scharf was a Managing Security Architect for security consulting firm @stake. At @stake, Mr. Scharf was responsible for managing application, physical, policy, and network security assessments for global financial service clients. His efforts allowed @stake clients to identify and remediate numerous security concerns while providing equal support for critical business drivers.
As part of his industry volunteer activities, Mr. Scharf was a member of the International Board of Directors for ASIS from 2011 to 2013. He has also served as a past member of the Advisory Board for the ASIS CSO Roundtable and a past member of the ASIS Committee for Enterprise Risk Management. He has also served on the Information Systems Security Association (ISSA) International Board of Directors.
Mr. Scharf has over nineteen years experience in Information Technology with a fifteen year concentration in Information Security. He has achieved the Certified Information Systems Security Professional (CISSP), and previously held certifications as Microsoft Certified Systems Engineer (MCSE), Checkpoint Certified Systems Engineer (CCSE), and Cisco Certified Network Administrator (CCNA). He is a regular speaker at security events, including talks at the United Nations. Mr. Scharf has also authored multiple articles on security topics, including forensics, security administration, business continuity planning, and outsourcing. In 2012 Mr. Scharf was honored as CSO of the Year by SC Magazine.
Mr. Scharf received a Bachelor of Arts degree from Ithaca College with a major in history and a minor in English.
HP ArcSight View Bio »
Eric Schou is the Director of Product Marketing for HP ArcSight, the company’s Security Information and Event Management solution. Schou is responsible for buyer research, product messaging, go to market strategy as well sales enablement.
Previous to HP, Schou was a Senior Director of Product Marketing at Good Technology, a mobile applications management and mobile security company. He has spent over 15 years in the security and storage industry.
Eric holds a Bachelor’s degree in Science from St. Mary’s College.
Druva View Bio »
With a strong track record of new business creation for consumers, small businesses, and enterprises, Chandar brings strong product leadership to Druva. Previously, Chandar was a product management executive at Intuit, where he spearheaded the launch of several cloud-based offerings for small businesses. Prior to Intuit, Chandar was Vice President of Products at MindTouch and a Senior Director at Yahoo.
Wal-Mart Stores View Bio »
Kevin Walker has spent over twenty-five years in various computer science and information technology disciplines, focusing primarily on enterprise applications, network design and information security. He brings this experience to the Assistant Chief Information Security Officer role at Walmart.
Kevin has served as Chief Information Security Officer (CISO), Chief Security Strategist and Director of Information Security for several companies in many industry sectors including; Intuit, Cisco, Symantec and VERITAS Software. Kevin has also built one of the first managed security services providers supporting numerous Fortune 100 companies.
Over the course of his career, Kevin has held increasingly responsible research, engineering and senior management roles. As an Information Security practitioner, Kevin has a proven track record of InfoSEC team development, policy and technology alignment with the business to deliver a credible, sound and sustainable security posture for the enterprise.
Kevin has worked as an engineer and researcher for Digital Equipment Corporation, EDS, SAIC, SRI International and the University of California at Berkeley. He has extensive experience in securing enterprise applications, intrusion detection and prevention, incident response, strong authentication and voice biometrics.
In addition to his interest in information security, Kevin has longstanding professional interests in networking protocols, securing applications at the atomic level, cryptography and speech biometrics. In these areas he was a key member of the engineering teams that developed secure video telephony over conventional telephone lines, speaker independent telephony-based voice recognition and broadcast quality distributed video.
Kevin is an accomplished international public speaker regularly addressing issues ranging from technology adoption, process optimization, and regulatory impact to IT and industry trends. He also hosts a Peer-to-Peer podcast What’s TRENDing addressing timely information security concerns.
7:45am â€“ 8:45am Breakfast
8:45am â€“ 8:50am Argyle Executive Forum Opening Remarks
8:50am â€“ 8:55am Introducing Elimu Kajunju:
read more »
Frank GrecoDirector of TechnologyKaazing
8:55am â€“ 9:30am â€śWhat every security professional needs to know about privacyâ€ť
read more »
Elimu KajunjuChief Privacy Officer & Senior Compliance DirectorUnitedHealth 9:35am â€“ 9:55am
Thought Leadership Spotlight Presented by Dropbox"Evaluating the security of a service: Is it enterprise-ready?"There are numerous security considerations when evaluating a third party service, including compliance, infrastructure, features, privacy and overall security assurance and trust. How can you sort through the most important questions and determine which areas to prioritize for your particular needs? In this talk we'll share lessons learned from Dropbox's evolution to offering both a consumer and an enterprise service.Cory LouieHead of Trust, Safety & SecurityDropbox
9:55am â€“ 10:25am Coffee Break
10:25am â€“ 11:15am Panel Discussion
read more »
â€śEvolution of Security: Securing the Organization While Embracing New Innovationsâ€ť
Session topics include, but are not limited to:Major security issues that are intrinsic to business growth in areas of Mobile, Social and CloudÂ
- How to deliver a seamless end-user experience to a growing, user base, while balancing corporate and regulatory compliance policies?
- Which new mobile devices will remain viable tools for business users?
- What new technologies will have the biggest impact on business in the year ahead?
- What are the key benefits of cloud computing for a business? Does it effectively cut costs? Improve productivity?
- How does your cloud strategy impact business initiatives in every aspect of the business â€“ customers, engagement and execution?
- Looking Forward: Should IT Security be made into a business enabler?
- Where has wireless network technology made the most improvements in the last year?
- How does your organization choose which mobile devices and platforms to support?
- What security issues do mobile devices present and how are IT departments responding to them?
11:20am â€“ 11:40am Thought Leadership Spotlight Presented by Seculert
read more »
â€śYou Canâ€™t Stop What You Canâ€™t Seeâ€ť Richard GreenePresidentSeculert
11:40am â€“ 12:00pm Coffee Break
12:00pm â€“ 12:35pm Fireside Chat
read more »
Kevin WalkerVice President, Assistant CISOWal-Mart StoresInterviewed by:Richard NogueraHead of Information SecurityThe Gap*Please note, this session is off the record
12:40pmâ€“ 1:00pm Thought Leadership Spotlight Presented by Druva
read more »
"How to Defend Your Data in the Wild"Protecting data for your entire company is a heavy responsibility. Thereâ€™s the employee who leaves his laptop in the airport. And the former employee who still has access to corporate data from her personal device. Or the ever-present danger of litigation. Youâ€™re accountable for a wide range of scenarios that put your corporate data at risk.How can you learn from the experiences of others to ensure that youâ€™re prepared for every threat to your corporate data in the wild? Â What are the best practices for keeping your prized corporate assets out of harmâ€™s way?Chandar VenkataramanChief Product OfficerDruva
1:00pm â€“ 2:00pm Lunch
2:00pm â€“ 2:20pm Thought Leadership Spotlight Presented by ForgeRock
read more »
"Identity Relationship Management: Using identity to empower CISOs everywhere"Identity and Access Management (IAM) was traditionally designed for internal, perimeter-based enterprise. However, the world has significantly changed. Todayâ€™s CIOs and CISOs are being asked to shift investments from lowering operational costs to driving top-line revenue. Solutions must be stateless and link all types of devices, applications and things. In this session we will discuss the new model for identity -- Identity Relationship Management -- and its impact on the modern enterprise.Mike EllisCEOForgeRock
2:25pm â€“ 3:10pm Panel Discussion
read more »
â€śThe Art of Risk: Understanding the Evolution of Risk and Cyber Attacksâ€ťSession topics include, but are not limited to:Â Â
- What does cyber security mean when managing risk in the enterprise?
- Shifting Economics of Cybercrime
- CISO â€“ What does it mean in todayâ€™s world?
- How to distinguish the fine lines of cyber policy
- Differences and similarities of traditional and enterprise risk management
- Defending against increasingly complex cybercrime. Differences and similarities of traditional and enterprise risk management
3:10pm â€“ 3:30pm Coffee Break
3:30pm â€“ 4:05pm "Cyber Operation with Security Intelligence"
read more »
- Auditing with Cyber Security Framework
4:10pm â€“ 4:45pm "2014 Transcendence in IT Security"
read more »
With the every increasing number of threats, severity of Â risks, with your perimeter looking like swiss cheese we have created the perfect storm. Now where ever you turn you see it like APT, HeartBleed, Cyberrcrime, BYOD, Spying, and much more.This is not the same internet that it was a few years ago, We have been bypassed, leapfrog, or caught napping in the security space by the bad guys and our friends. Now we will be always be reacting to the risks and threats never planning. The only hope is to transcend our current situation in both new and old ways. Â To get one step Â ahead of the bad guys and too stay ahead. We will look at where to focus and what makes the biggest impact. Â How security must jump the gap that exists before it widens more.Richard RushingChief Information Security OfficerMotorola Mobility
4:45pm â€“ 4:50pm Argyle Executive Forum Closing Remarks
4:50pm â€“ 5:50pm Closing Reception
What will be discussed? Explore security hot topics and challenge areas such as:
Security and innovation
Evaluate what technologies will have the biggest impact on the business world in the year ahead, and reflect on the reality of IT security becoming a business enabler. Our speakers will discuss:
- Tracking the improvement of wireless networks
- Choosing the best devices to support internally
- Cutting costs through cloud technology
- Taking stock of risks imposed by the mobile channel
Review the major changes the field of IT has experienced over the past few years, the driving forces behind them, and the barriers they present. Get briefed on:
- Driving long-term business initiatives
- Overcoming barriers to a solid mobile strategy
- Aligning risk management with business priorities
- Developing a successful incident response plan for security incidents
The Evolution of IT
Discuss the importance of having accurate information on customers and prospects in real time, and how the rise of apps, data management tools and practices like hosting have added made the business of protecting enterprise information more complex. Gain insight into:
- Enriching the customer experience with real-time data
- Staying alert to prevent theft of data and/or funds
- Overcoming barriers to implementing multichannel integration
- Evaluating security risks mobile devices present and how to respond
Transparency and security
Define how the concepts of identity and access management are building and shaping new security perimeters, and hear how successful organizations are managing identities in applications. Learn how top CIOs and CISOs are:
- Lowering costs and risks related to security
- Achieving success through data management
- Defining the key benefits of SSO
- Protecting enterprise data across the organization
Still have questions? We have answers.
I want to attend, but what if I'm unsure of my schedule and need to cancel my participation?
Just let us know. We understand that schedules
we always have a waiting list for this event,
and if you don't
cancel, we will assume you are still attending
and your spot will
go unused. If you must, cancel at least 48 hours
prior to the
event to make room for others!
What if I can't be OOO for a whole day, or need
to come late?
We have wifi and private rooms available for
attendees to take
calls and spend some quiet time on emails, as
well as access to
printing. Have a morning meeting you can't miss?
No problem. This
event was designed for busy executives - we get
I'd like to bring some colleagues. Do I need to
Events are more fun with friends, and we'd be happy to host your team. You can have them register online, or send us their names, titles and email addresses and we will take care of it for you!
I don't see the event venue listed. Where will
the meeting be
To maintain exclusivity, we don't release the
venue address until
the registration process has been completed. All
details will be shared once you have requested a
pass and been
The 2014 Chief Information Security Officer (CISO) Leadership Forum in San Francisco is proudly sponsored by:
"Not only are the speakers relevant and experts in their fields, but I was able to make some great connections at the meetings as well."
The Chief Technology Officer at PC Richard and Son on the quality of past Argyle CIO Forums.
"Argyle's meetings are well balanced in terms of panels and presentations and networking opportunities with local business leaders."
A Head of Emerging Business and Technology at Ericsson on attending Argyle CIO events.
"The meetings that Argyle Executive Forum runs are truly enjoyable and well put together....I'm looking forward to the next forum."
A VP of Information Systems at Garmin International on attending Argyle events.
Traveling for the event? Stay at one of our
The below hotels are recommended by Argyle Executive Forum. Please note that we do not have a corporate rate.
San Francisco Marriott Union Square
480 Sutter Street
San Francisco, CA 94108
Telephone: (866) 912-0973
Sir Francis Drake Hotel
450 Powell Street
San Francisco, CA, 94102
Telephone: (800) 795-7129
The Warwick Hotel
490 Geary Street
San Francisco, CA, 94102
Telephone: (415) 928-7900
The Westin St. Francis
335 Powell Street
San Francisco, CA, 94102
Telephone: (415) 397-7000
Continuing Education Credits:
Due to the nature of our program, Argyle events do not always receive continuing education credits. We do make efforts to apply in several states and will work with members to apply as an individual if credits are not awarded for the event. Should we receive credits, we do however inform our members.