Feedback from Attendees

Upcoming  2016 Events

Sep 8, 2016
IT Infrastructure/Operations Management (Data Center)
Info
Chicago, IL

Sep 22, 2016
Enterprise Risk/Security Management
Info
Dallas, TX

Oct 6, 2016
Enterprise Risk/Security Management
Info
Chicago, IL

Oct 20, 2016
IT Leadership Strategies
Info
Chicago, IL

Oct 26, 2016
Data Breaches: Defending Against and Responding to
Info
Chicago, IL

Nov 2-3, 2016
IT Portfolio Management
Info
Dallas, TX

Nov 15, 2016
Enterprise Risk/Security Management
Atlanta, GA
Info

Dec 1, 2016
Business Intelligence/Big Data/Analytics
Info
Chicago, IL

Dec 8, 2016
Data Breaches: Defending Against and Responding to
Info
Chicago, IL

Upcoming  2017 Events

Feb. 2, 2017
Enterprise Risk/Security Management
Info
Dallas, TX

Feb. 16, 2017
Enterprise Risk/Security Management
Info
Chicago, IL

March 2, 2017
IT Leadership Strategies
Info
Chicago, IL

March 8, 2017
IT Architecture Strategies
Info
Chicago, IL

April 20, 2017
Business Intelligence/Big Data/Analytics
Info
Chicago, IL

April 27-28, 2017
Enterprise Risk/Security Management
Info
Las Vegas, NV

May 4, 2017
Data Breaches: Preparing and Responding
Info
Chicago, IL

May 16, 2017
IT Infrastructure/Operations Management (Data Center)
Info
Chicago, IL

June 1, 2017
Enterprise Risk/Security Management
Info
Minneapolis, MN

June 8, 2017
Enterprise Risk/Security Management
Info
Chicago, IL

June 21-22, 2017
IT PMO/Portfolio Management
Info
Chicago, IL

Sept. 7, 2017
IT Infrastructure/Operations Management (Data Center)
Info
Chicago, IL

Sept. 19, 2017
Enterprise Risk/Security Management
Info
Dallas, TX

Oct. 4, 2017
Enterprise Risk/Security Management
Info
Chicago, IL

Oct. 11, 2017
IT Architecture Strategies
Info
Chicago, IL

Oct. 19, 2017
IT Leadership Strategies
Info
Chicago, IL

Nov. 1-2, 2017
IT PMO/Portfolio Management
Info
Dallas, TX

Nov. 15, 2017
Enterprise Risk/Security Management
Info
Atlanta, GA

Nov. 30, 2017
Business Intelligence/Big Data/Analytics
Info
Chicago, IL

Dec. 7, 2017
Data Breaches: Preparing and Responding
Info
Chicago, IL

(Click here to add any of our upcoming events to your calendar)

 

 

Conferences that solve current IT challenges

Enterprise Risk / Security Management

Strategies for reducing risk to the enterprise.

September 22, 2016

9:00am-5:00pm

7 CPE / 0.7 CEU / CISSP / 7 PDU Credits Awarded

Register

Conference location: Plano Centre, Plano Texas

Overview

In today’s highly regulatory environment it is essential that you have a clear understanding of risk across the enterprise. A risk management framework can bring visibility to key business and compliance risks and enable a company to make decisions on where to prioritize its limited resources. It is through a risk management framework that real value to the business can be achieved.

With all of these challenges, how do you make this happen?

In this one day conference, attendees will be provided with examples of approaches to managing information and compliance risk through a risk management framework.


Early confirmed speakers from IT departments include:

Prabhakar Kota, Director, Information Security, MBA, CISA, CISSP, CompuCom

Willis Marti, CISO, Texas A&M University

Ingrid Rodríguez, Director, Risk Management, Office of Business Technology, American Heart Association

Matt Fearin, CISO Epsilon / Conversant

Ken Waterman, CTO & CISO, Textron





What You Will Learn

In this one day conference attendees will learn:

  • Reducing Your Risk: Securing Your Data from the Threat Within

  • Endpoints & Servers, Private & Public Clouds : Are the Security Risks the same?

  • Firming the Posture: Building a World-Class Security-Risk Team (Panel discussion)

  • Vendor Security Assessment-How to Be Innovative and Demonstrate Enterprise Value

  • IoT is Here: How to Reduce the Risk?

  • Breaches in 2016: How is this Affecting Your Security/Risk Strategy (Panel discussion)

Conference Program

8:00am - 9:00am - Registration and Continental Breakfast

 

 

9:00am-10:00am

Reducing Your Risk: Securing Your Data from the Threat Within

 

External cybersecurity threats get all the press, and they are certainly dangerous. Shadowy international gangsters, brilliant but evil hackers, mom-and-pop-shop criminals stealing from us one Target transaction at a time – as fictional as it sounds, it is all real, and very much deserves our attention and protection as individuals and a society.

Unfortunately, your worst cybersecurity threat may already be on your payroll.

Join us as we discuss:

  • What are insider threats, and why are they so dangerous?
  • Why current controls can’t contain insider threats
  • Core steps to better protection against insider threats







10:00am -10:30am - Refreshment Break

Fearin

10:30am-11:30am

Endpoints & Servers, Private & Public Clouds : Are the Security Risks the Same?

Matt Fearin, CISO Epsilon / Conversant

Today most enterprises have a hybrid environment of physical, virtual, and cloud systems, yet many treat these the same from a security risk perspective. In this session, we will discuss these workload types and the security risks of each that an enterprise has to be aware of and the best way to mitigate them.  









Kota

Marti

11:30am-12:30pm

Firming the Posture: Building a World-Class Security-Risk Team (Panel discussion)

Panelists:
Prabhakar Kota, Director, Information Security, MBA, CISA, CISSP, CompuCom
Willis Marti, CISO, Texas A&M University
Ken Waterman, CTO & CISO, Textron
and other CISOs/Security Executives from IT departments sharing lessons learned

What does it take to foster and retain top-tier talent as well as adopt an enterprise-wide security culture beyond IT?

In this session, attendees will learn from a CISO panelists sharing their experiences as to getting ahead of the threats while engaging the entire extended enterprise as a part of fight.












12:30pm - 1:30pm Luncheon

 

 

1:30pm-2:30pm

Vendor Security Assessment-How to Be Innovative and Demonstrate Enterprise Value

 

Vendor Security Assessments are more than just a check in the box. Many organizations don’t see the value in an effective Vendor Security Program. In this session, Stephanie Siteman from Facebook will demonstrate the significant value Vendor Security Assessments can provide.








 

2:30pm - 3:00pm - Refreshment Break

 

 

3:00pm-4:00pm

IoT is Here: How Can You Reduce the Risk? 

 

Regulatory compliance management (such as PCI, HIPAA, ISO) and security breach protection, is already a complex challenge present in many organizations today. The complexity is continuing to grow, and exponentially, with the increasing sources, numbers and types of attacks being generated, with the proliferation of the Internet of Things (IoT). With this complexity also comes higher costs in terms of not only the number of security incidents that need to be investigated, the number of tools needed and in finding the skilled personnel to manage it. And, the cost of these breaches are being measured beyond mere dollars to their detrimental impacts on a company’s brand and reputation, customer and supplier relationships, employee productivity, and all the way up the organization’s board and C-Level reputations.








Fearin 

4:00pm-5:00pm

Breaches in 2016: How is this Affecting Your Security/Risk Strategy (Panel)

Panelists:
Ingrid Rodríguez, Director, Risk Management, Office of Business Technology, American Heart Association
Matt Fearin, CISO Epsilon / Conversant
and other CISOs/Security Executives from IT departments sharing lessons learned

According to industry analysts, approximately 50% of organizations have had to reevaluate their information security standards as a result of recent well-publicized attacks.

In this session, attendees will learn from a panel of IT security executives as to how they are updating their security & risk strategies in the wake of massive security breaches.









Conference Price: $289.00 per person


Each attendee will receive a certificate awarding 7 CPE credits for CISSP continuing education, in addition to 0.7 CEUs and 7 PDUs. CISSP is a registered certification mark of (ISC)˛, Inc.

Exhibits

As is always the case at CAMP IT Conferences events, the talks will not include product presentations.  During the continental breakfast, coffee breaks, and the luncheon break you will have the opportunity to informally meet representatives from the following sponsoring companies, who have solutions in the area of the conference.