Feedback from Attendees

Upcoming  2016 Events

Sep 8, 2016
IT Infrastructure/Operations Management (Data Center)
Info
Chicago, IL

Sep 22, 2016
Enterprise Risk/Security Management
Info
Dallas, TX

Oct 6, 2016
Enterprise Risk/Security Management
Info
Chicago, IL

Oct 20, 2016
IT Leadership Strategies
Info
Chicago, IL

Oct 26, 2016
Data Breaches: Defending Against and Responding to
Info
Chicago, IL

Nov 2-3, 2016
IT Portfolio Management
Info
Dallas, TX

Nov 15, 2016
Enterprise Risk/Security Management
Atlanta, GA
Info

Dec 1, 2016
Business Intelligence/Big Data/Analytics
Info
Chicago, IL

Dec 8, 2016
Data Breaches: Defending Against and Responding to
Info
Chicago, IL

Upcoming  2017 Events

Feb. 2, 2017
Enterprise Risk/Security Management
Info
Dallas, TX

Feb. 16, 2017
Enterprise Risk/Security Management
Info
Chicago, IL

March 2, 2017
IT Leadership Strategies
Info
Chicago, IL

March 8, 2017
IT Architecture Strategies
Info
Chicago, IL

April 20, 2017
Business Intelligence/Big Data/Analytics
Info
Chicago, IL

April 27-28, 2017
Enterprise Risk/Security Management
Info
Las Vegas, NV

May 4, 2017
Data Breaches: Preparing and Responding
Info
Chicago, IL

May 16, 2017
IT Infrastructure/Operations Management (Data Center)
Info
Chicago, IL

June 1, 2017
Enterprise Risk/Security Management
Info
Minneapolis, MN

June 8, 2017
Enterprise Risk/Security Management
Info
Chicago, IL

June 21-22, 2017
IT PMO/Portfolio Management
Info
Chicago, IL

Sept. 7, 2017
IT Infrastructure/Operations Management (Data Center)
Info
Chicago, IL

Sept. 19, 2017
Enterprise Risk/Security Management
Info
Dallas, TX

Oct. 4, 2017
Enterprise Risk/Security Management
Info
Chicago, IL

Oct. 11, 2017
IT Architecture Strategies
Info
Chicago, IL

Oct. 19, 2017
IT Leadership Strategies
Info
Chicago, IL

Nov. 1-2, 2017
IT PMO/Portfolio Management
Info
Dallas, TX

Nov. 15, 2017
Enterprise Risk/Security Management
Info
Atlanta, GA

Nov. 30, 2017
Business Intelligence/Big Data/Analytics
Info
Chicago, IL

Dec. 7, 2017
Data Breaches: Preparing and Responding
Info
Chicago, IL

(Click here to add any of our upcoming events to your calendar)

 

 

Conferences that solve current IT challenges

Data Breaches: Defending Against and Responding to

Strategies to help your organization prepare for, defend against and respond to breaches

October 26, 2016

9:00am-5:00pm

7 CPE / 0.7 CEU / CISSP / 7 PDU Credits Awarded

Register

   

Conference location: Donald E. Stephens Convention Center Rosemont (O'Hare) Illinois

Overview

It is not a matter of if, but when your organization will be breached. Against these threats, enterprises try to build higher and more secure walls around their data and networks. This seems to be a never-ending arms race, as even the most sophisticates systems may, before long, present weaknesses that malicious technology can overcome.

What You Will Learn

In this one day conference attendees will learn:

  • Aftermath of a Data Breach: Lessons Learned
  • Data Breach Preparedness: Are You Ready to Handle?
  • Is it a Data Breach? How to Determine the Significance of a Security Incident
  • When the Breach Occurs: How to Gather Evidence and Help Determine the Culprit
  • Legal & IT: Responsibilities for a Data Breach
  • Data Breach Workshop – Applying Lessons Learned

Conference Program

8:00am - 9:00am - Registration and Continental Breakfast

Chahino

9:00am-10:00am

Aftermath of a Data Breach: Lessons Learned

Michael Chahino, Executive Director, Network Operations and CISO, Elgin Community College

As data breaches continue to hammer organizations with devastating outcomes, monetary as well as reputation costs continue to rise year after year. And while Cybersecurity professionals are tasked with securing and enhancing the information security posture of their organizations, they could find themselves consumed with gathering forensic evidence, executing data recovery plans, gathering facts, containing the damages and dealing with the aftermath in case of a data breach. Having a tested and verified data breach recovery plan is becoming more crucial than ever.

This session explores lessons learned from the aftermath of experiencing the discovery of and recovery from a data breach and provides some recommendations to help organizations deal with disruptive cyber-attacks.









10:00am -10:30am - Refreshment Break

 

10:30am-11:30am

Data Breach Preparedness: Are You Ready to Handle?

 

No one is fully prepared when a data breach occurs, but there are steps an organization can take to mitigate the consequences. In this session, attendees will understand how to handle a breach from the beginning of the process.

Areas that will be covered:

  • How to communicate to internal stakeholders
  • How to articulate to customers and business partners
  • How to handle the potential media circus
  • How to avoid the internal blame game
  • How to strengthen security/risk controls to prevent it from happening again








 

11:30am-12:30pm

Is it a Data Breach? How to Determine the Significance of a Security Incident

 

Security incidents occur regularly. But only a small percentage are considered actual “data breaches” or other serious security threats.

How do you determine if it is a breach and how should you respond?

In this session, attendees will learn how to classify whether the incident was an actual breach and the proper steps to pursue.









12:30pm - 1:30pm Luncheon

 

1:30pm-2:30pm

When the Breach Occurs: How to Gather Evidence and Help Determine the Culprit

 

Finding the evidence and determining the source can be complicated. The evidence of a possible breach can come from different sources , including internal sabotage, external parties such as vendors, business partners and/ or customers.

This session will examine how to locate, preserve and understand the evidence and present it in a fact based scenario while leaving out the hysteria.









2:30pm - 3:00pm - Refreshment Break

 

3:00pm-4:00pm

Legal & IT: Responsibilities for a Data Breach

 

In this thought provoking session, attendees will learn how Legal and IT need to work together and what their respective responsibilities need to be. Panelists with include an attorney and C-Level Security Risk practitioners.











4:00pm-5:00pm

Data Breach Workshop – Applying Lessons Learned

 

In this session, attendees will break up in groups and learn how to handle a hypothetical data breach.
Areas that will be covered include:

  • Discovery
  • Communications
  • Legal
  • Media
  • Working through the checklist



Conference price: $289 per person.


Each attendee will receive a certificate awarding 7 CPE credits for CISSP continuing education, in addition to 0.7 CEUs and 7 PDUs. CISSP is a registered certification mark of (ISC)², Inc.

Exhibits

As is always the case at CAMP IT Conferences events, the talks will not include product presentations.  During the continental breakfast, coffee breaks, and the luncheon break you will have the opportunity to informally meet representatives from the following sponsoring companies, who have solutions in the area of the conference.