FoleyTECH Chicago: Share the Vision. Shape the Future will bring together a top-tier speaker roster of leading technology executives, entrepreneurs, and investors to discuss and review the state of Chicago’s technology market and provide business insight and best practices. This half-day event will focus on the issues and challenges facing today’s technology companies including:
- The role of accelerators in the entrepreneurial ecosystem
- Expanding your investor network from coast to coast
- What strategies to consider when selling and why, and what challenges you can expect to face
Program Agenda and Confirmed Speakers to Date
Additional information on our panel discussions, as well as the most recent list of featured speakers at this year’s FoleyTECH Chicago, is available here.
There is no cost to participate in this program, but pre-registration is required. For more information, please contact Ellie Kemmeter at ekemmeter@foley.com.
People
Related Insights
27 May 2025
Events
The RIF Roadmap: Tools and Tactics for a Smooth and Compliant Transition
Join us for an insightful discussion on proactive workforce planning in today's dynamic economic and regulatory landscape.
16 May 2025
Manufacturing Industry Advisor
Reese’s Law: The Evolving Regulatory and Enforcement Landscape for Consumer Products Containing Button Cell or Coin Batteries
Over the past year, manufacturers, importers, distributors, and retailers of consumer products containing button cell and coin batteries (or products intended to contain them) have continued to adapt to the requirements of Reese’s Law and the Consumer Product Safety Commission’s corresponding enforcement efforts.
29 May 2025
Events
May 2025 Midwest Cyber Security Alliance Meeting | What Happens After a Breach: Practical Tips for the Notification Process
Join us on Thursday, May 29, 2025, at the next Midwest Cyber Security Alliance Meeting. Brandon Hollinder, Esq., and Adam Botter from Epiq will provide practical tips and insights on organizing the data mining and subsequent notification process after a cybersecurity breach.