Feedback from Attendees

Upcoming  2016 Events

Sep 8, 2016
IT Infrastructure/Operations Management (Data Center)
Info
Chicago, IL

Sep 22, 2016
Enterprise Risk/Security Management
Info
Dallas, TX

Oct 6, 2016
Enterprise Risk/Security Management
Info
Chicago, IL

Oct 20, 2016
IT Leadership Strategies
Info
Chicago, IL

Oct 26, 2016
Data Breaches: Defending Against and Responding to
Info
Chicago, IL

Nov 2-3, 2016
IT Portfolio Management
Info
Dallas, TX

Nov 15, 2016
Enterprise Risk/Security Management
Atlanta, GA
Info

Dec 1, 2016
Business Intelligence/Big Data/Analytics
Info
Chicago, IL

Dec 8, 2016
Data Breaches: Defending Against and Responding to
Info
Chicago, IL

Upcoming  2017 Events

Feb. 2, 2017
Enterprise Risk/Security Management
Info
Dallas, TX

Feb. 16, 2017
Enterprise Risk/Security Management
Info
Chicago, IL

March 2, 2017
IT Leadership Strategies
Info
Chicago, IL

March 8, 2017
IT Architecture Strategies
Info
Chicago, IL

April 20, 2017
Business Intelligence/Big Data/Analytics
Info
Chicago, IL

April 27-28, 2017
Enterprise Risk/Security Management
Info
Las Vegas, NV

May 4, 2017
Data Breaches: Preparing and Responding
Info
Chicago, IL

May 16, 2017
IT Infrastructure/Operations Management (Data Center)
Info
Chicago, IL

June 1, 2017
Enterprise Risk/Security Management
Info
Minneapolis, MN

June 8, 2017
Enterprise Risk/Security Management
Info
Chicago, IL

June 21-22, 2017
IT PMO/Portfolio Management
Info
Chicago, IL

Sept. 7, 2017
IT Infrastructure/Operations Management (Data Center)
Info
Chicago, IL

Sept. 19, 2017
Enterprise Risk/Security Management
Info
Dallas, TX

Oct. 4, 2017
Enterprise Risk/Security Management
Info
Chicago, IL

Oct. 11, 2017
IT Architecture Strategies
Info
Chicago, IL

Oct. 19, 2017
IT Leadership Strategies
Info
Chicago, IL

Nov. 1-2, 2017
IT PMO/Portfolio Management
Info
Dallas, TX

Nov. 15, 2017
Enterprise Risk/Security Management
Info
Atlanta, GA

Nov. 30, 2017
Business Intelligence/Big Data/Analytics
Info
Chicago, IL

Dec. 7, 2017
Data Breaches: Preparing and Responding
Info
Chicago, IL

(Click here to add any of our upcoming events to your calendar)

 

 

Conferences that solve current IT challenges

Enterprise Risk / Security Management

Strategies for reducing risk to the enterprise.

February 18, 2016

9:00am-5:00pm

7 CPE / 0.7 CEU / CISSP / 7 PDU Credits Awarded

Bios

Conference location: Donald E. Stephens Convention Center Rosemont (O'Hare) Illinois

Overview

In today’s highly regulatory environment it is essential that you have a clear understanding of risk across the enterprise. A risk management framework can bring visibility to key business and compliance risks and enable a company to make decisions on where to prioritize its limited resources. It is through a risk management framework that real value to the business can be achieved.

With all of these challenges, how do you make this happen?

In this one day conference, attendees will be provided with examples of approaches to managing information and compliance risk through a risk management framework.

What You Will Learn

In this one day conference attendees will learn:

  • Defining Acceptable Risk in an Age of Evolving Threats

  • Mitigating Enterprise Risk - Leveraging Intelligent Data Technologies

  • Cyber-Insurance for CISOs: What IT Security Executives Need to Know

  • Risk Reduction: Defending against a Data Breach with an Active Defense Strategy

  • How Security and the CSO Can Provide Business Value (Panel)

  • Breaches in 2016: How is this Affecting Your Security/Risk Strategy (Panel)






Conference Program

8:00am - 9:00am - Registration and Continental Breakfast

Becker

9:00am-10:00am

Defining Acceptable Risk in an Age of Evolving Threats

Todd Becker, Managing Consultant, HALOCK Security Labs

A clear definition of your acceptable level of information security risk is critical to compliance, and for protecting your liabilities when things go wrong. Recent court decisions and evolving regulatory law have made this definition even more critical to business.

When organizations establish their definition of acceptable risk, they develop their own “pass/fail” grade which is applicable to regulations and litigation, but also sensible to business.

In this session attendees will learn how to Calculate an Acceptable Risk Definition and to apply that definition to their information security programs.










10:00am -10:30am - Refreshment Break

Hittle

10:30am-11:30am

Mitigating Enterprise Risk - Leveraging Intelligent Data Technologies

Audie Hittle, CISSP, CTO Federal and Cyber Security, EMC Corporation

This session highlights how operational risk can be mitigated through the introduction of cybersecurity resilient solutions such as intelligent data storage. The session introduces the concepts of cybersecurity resiliency and the data lake as well as an overview of alternate operational uses cases that leverage emerging Intelligent Data Storage or Software Defined Storage (SDS) to improve the management and protection of a critical enterprise asset – information.

Identified as key equipment, and available as a commercial off-the-shelf (COTS) solution, Intelligent Data Storage can be leveraged to address numerous Confidentiality, Integrity and Availability (CIA) cyber security objectives. Intelligent Data Storage also creates a data-driven cyber analytics capability, enabling cyber use cases such as proactive cyber analytics, and long-term cyber forensic analyses, thereby complementing traditional techniques and mitigating risks.

Cybersecurity mission success requires the ability to look back, and look forward to predict the next vulnerability and conduct business continuity operations. With creative thinking about cyber analytics and the deployment of innovative Intelligent Data Storage, cyber teams can deliver new levels of threat awareness and protection across the enterprise.










Lidz

Graf

11:30am-12:30pm

Cyber-Insurance for CISOs: What IT Security Executives Need to Know

E. Larry Lidz, Chief Information Security Officer, CNA Insurance
Nick Graf, CISSP, CEH, CIPT, Consulting Director of Information Security, CNA Insurance

Larry Lidz and Nick Graf will be discussing everything that the CISO and Security team need to know about CyberLiability Insurance and risk transference for data privacy risks. They will discuss insurance essentials, what coverage can be expected from different types of insurance policies, practical information on what drives claims for cyber insurance, and the CISO and Security team’s role in a company’s evaluation as to whether to purchase Cyber Liability insurance and the what the Security team should expect through the process.











12:30pm - 1:30pm Luncheon

Bezzina

1:30pm-2:30pm

Risk Reduction: Defending against a Data Breach with an Active Defense Strategy

Mitchell Bezzina, Principal Solutions Consultant, Guidance Software, Inc.

In the decade where security strategies based on the traditional "alert,monitor,block" approach are being tested, a new technology industry has emerged to provide the last line of defense against advanced threats. Learn how Endpoint detection and response tools can enable security teams to act before a breach becomes a data breach be providing unseen threat detection, alert triage, root cause analysis, scope assessment and remediation.









2:30pm - 3:00pm - Refreshment Break

Sumar

Raheja

Combs

Marchewka

Olejnicki

Tang

3:00pm-4:00pm

How Security and the CSO Can Provide Business Value (Panel)

Moderator:
Annur Sumar, Microsoft MVP, Former Vice President of IT D&P
Panelists:
Aman Raheja, CISO, BMO Harris Bank
Dannie Combs, Director, Network Security, U.S. Cellular
Edward Marchewka, Director, Information Technology, Gift of Hope
Rob Olejnicki, Manager of Global Information Security, Reyes Holdings, LLC
Oliver Tang, Director, IT Global Security, Acco Brands
and other CISOs/IT Security Executives

In this session, attendees will learn from a panel of IT security executives as to the strategies they are leveraging to insure their efforts are in sync with business priorities.

Topics covered:

  • How to identify leverage the following areas of value: reputation, regulation, revenue, resilience, and recession for continued investment and security spending
  • How to assess, understand and define security’s current and future roles in the extended enterprise
  • Where are security investments being made on personnel, processes, and technologies
















 

4:00pm-5:00pm

Sumar

Burnside

Williams

Kwong

Breaches in 2016: How is this Affecting Your Security/Risk Strategy (Panel)

Moderator: Annur Sumar, Microsoft MVP, Former Vice President of IT D&P
Panelists:
Andy Burnside, CISO, Sr. Manager, DevOps and Information Security, DirectBuy, Inc.
Amrit Williams, Chief Technology Officer, CloudPassage
Fred Kwong, Head of Access Control, Group Information Security, Farmers Insurance
and other CISOs/IT Security Executives

According to industry analysts, approximately 50% of organizations have had to reevaluate their information security standards as a result of recent well-publicized attacks.

In this session, attendees will learn from a panel of IT security executives as to how they are updating their security & risk strategies in the wake of massive security breaches.










Conference Price: $289.00 per person


Each attendee will receive a certificate awarding 7 CPE credits for CISSP continuing education, in addition to 0.7 CEUs and 7 PDUs. CISSP is a registered certification mark of (ISC)˛, Inc.

Exhibits

As is always the case at CAMP IT Conferences events, the talks will not include product presentations.  During the continental breakfast, coffee breaks, and the luncheon break you will have the opportunity to informally meet representatives from the following sponsoring companies, who have solutions in the area of the conference.