Harvest Tech Fest at Beak & Skiff Apple Orchards

Harvest Tech Fest combines networking and community at Central New York’s iconic orchard, with space for open dialogue around IT modernization and the decisions shaping the current and future success of local organizations.

You Can Expect:

  • Networking with peers in a relaxed, scenic setting
  • Open dialogue with experts on securing and modernizing IT
  • Food, drinks, and the Beak & Skiff experience

Share this Event with Your Network

Agenda

Don’t miss this unique opportunity to connect, learn, and celebrate technology in the heart of the harvest season.

Check-in and networking kick-off.

Welcoming remarks from the M.A. Polce Team.

Brief, partner-led educational sessions.

A break from sessions to connect with attendees, and enjoy food and beverages.

An interactive panel session on What Leaders Should Prioritize in 2025–26, featuring M.A. Polce, partners, and special guests. 

Drinks, food, casual conversations. Optional side Q&A stations for your tech questions.

Key Benefits of Attending

In today’s digitally driven world, cybersecurity is not just a luxury but a necessity for business continuity. However, navigating the complexities of cybersecurity investments can be daunting, especially for SMBs with limited resources. This webinar aims to equip you with essential insights from multiple perspectives, ensuring you make informed decisions to safeguard your organization.

Multi-Angled Insights

Gain a holistic understanding of cybersecurity essentials, including crucial controls that should be in place to protect your business from evolving cyber threats.

Risk Mitigation via Insurance

Discover how cyber insurance can play a pivotal role in mitigating risks associated with cyber incidents, safeguarding your business's financial stability.

Understanding Cyber Liability Insurance

Learn what cyber liability insurance entails and why it's a critical component of your risk management strategy in today's digital landscape.

Legal Considerations for IR

Understand the legal considerations involved in cyber incident response, ensuring your organization is well-prepared to navigate potential legal ramifications effectively.

Presenters

Javier Figueroa

M.A. Polce

Javier is a Certified Information Systems Security Professional (CISSP), Certified Information Security Manager (CISM), and Certified Cloud Security Professional (CCSP) with over 15 years of expertise in the field of Information Technology, specializing as an Information Security Program Manager. As a Cybersecurity Manager, Javier plays a pivotal role in elevating the cybersecurity posture of clients through a comprehensive suite of services. These include strategic vCISO consultations, meticulous risk analysis, development of security roadmaps, policy formulation, and conducting incident readiness tabletop exercises.

Claire Farszmil

With 10+ years of experience, Claire possesses extensive knowledge in establishing and recommending desired coverage by lines of business. Claire is skilled in identifying competitive markets for quotes, negotiating terms, and leading specialty insurance staff. Claire has held many positions at Lawley, including commercial insurance account associate, claims associate, personal insurance claim consultant, captive assistant/marketing assistant, commercial insurance, account manager in the small business department, and, most recently, specialty insurance account manager and marketer.

Amber Lawyer, Esq.

Amber serves as the Deputy Chair of Bond’s Data Privacy and Cybersecurity practice and maintains Certified Information Privacy Professional/United States (CIPP/US) and Certified Information Privacy Professional/European (CIPP/E) credentials through the ANSI-accredited International Association of Privacy Professionals. Amber represents a wide range of clients across all industries, including retail, hospitality, manufacturing, development, higher education, technology, health care and media. She currently serves as part-time corporate counsel.

Download the "How Strong is Your Cybersecurity Culture?" Checklist!

Name(Required)