Feedback from Attendees

Upcoming  2016 Events

Sep 8, 2016
IT Infrastructure / Operations  Management
Info
Chicago, IL

Sep 22, 2016
Enterprise Risk/Security Management
Info
Dallas, TX

Oct 6, 2016
Enterprise Risk/Security Management
Info
Chicago, IL

Oct 20, 2016
IT Leadership Strategies
Info
Chicago, IL

Oct 26, 2016
Data Breaches: Defending Against and Responding to
Info
Chicago, IL

Nov 2-3, 2016
IT PMO / Portfolio Management
Info
Dallas, TX

Nov 15, 2016
Enterprise Risk / Security Management
Atlanta, GA
Info

Dec 1, 2016
Business Intelligence/Big Data/Analytics
Info
Chicago, IL

Dec 8, 2016
Data Breaches: Defending Against and Responding to
Info
Chicago, IL

 

Upcoming  2017 Events

Feb. 2, 2017
Enterprise Risk/Security Management
Info
Dallas, TX

Feb. 16, 2017
Enterprise Risk/Security Management
Info
Chicago, IL

March 2, 2017
IT Leadership Strategies
Info
Chicago, IL

March 8, 2017
IT Architecture Strategies
Info
Chicago, IL

April 20, 2017
Business Intelligence/Big Data/Analytics
Info
Chicago, IL

April 27-28, 2017
Enterprise Risk/Security Management
Info
Las Vegas, NV

May 4, 2017
Data Breaches: Preparing and Responding
Info
Chicago, IL

May 16, 2017
IT Infrastructure/Operations Management (Data Center)
Info
Chicago, IL

June 1, 2017
Enterprise Risk/Security Management
Info
Minneapolis, MN

June 8, 2017
Enterprise Risk/Security Management
Info
Chicago, IL

June 21-22, 2017
IT PMO/Portfolio Management
Info
Chicago, IL

Sept. 7, 2017
IT Infrastructure/Operations Management (Data Center)
Info
Chicago, IL

Sept. 19, 2017
Enterprise Risk/Security Management
Info
Dallas, TX

Oct. 4, 2017
Enterprise Risk/Security Management
Info
Chicago, IL

Oct. 11, 2017
IT Architecture Strategies
Info
Chicago, IL

Oct. 19, 2017
IT Leadership Strategies
Info
Chicago, IL

Nov. 1-2, 2017
IT PMO/Portfolio Management
Info
Dallas, TX

Nov. 15, 2017
Enterprise Risk/Security Management
Info
Atlanta, GA

Nov. 30, 2017
Business Intelligence/Big Data/Analytics
Info
Chicago, IL

Dec. 7, 2017
Data Breaches: Preparing and Responding
Info
Chicago, IL

(Click here to add any of our upcoming events to your calendar)

 

 

Conferences that solve current IT challenges

Enterprise Risk / Security Management

Strategies for reducing risk to the enterprise.

June 25, 2015

9:00am-5:00pm

7 CPE / 0.7 CEU / CISSP / 7 PDU Credits Awarded

Bios

Conference location: Donald E. Stephens Convention Center Rosemont (O'Hare) Illinois

Overview

In today’s highly regulatory environment it is essential that you have a clear understanding of risk across the enterprise. A risk management framework can bring visibility to key business and compliance risks and enable a company to make decisions on where to prioritize its limited resources. It is through a risk management framework that real value to the business can be achieved.

With all of these challenges, how do you make this happen?

In this one day conference, attendees will be provided with examples of approaches to managing information and compliance risk through a risk management framework.

What You Will Learn

In this one day conference attendees will learn:

  • The Day You Are Sued: Positioning Yourself For the Best Defense After a Data Breach

  • How to Reduce the Risk of the Data Breach
  • Risk Framework: Managing the Risk of New Technologies – Cloud, Mobility, IoT, OT

  • Leveraging Privilege Access Control to Respond to Insider Threats

  • Vendor Risk Management: How to Identify and Decrease Potential Risks When Leveraging 3rd Party Vendors (panel discussion)

  • How to Monetize Risks for Security Spending Decisions (panel discussion)

Conference Program

8:00am - 9:00am - Registration and Continental Breakfast

Cronin

9:00am-10:00am

The Day You Are Sued: Positioning Yourself For the Best Defense After a Data Breach

Chris Cronin, Principal Consultant, Halock

The day you are sued for a data breach, you will be asked a specific set of questions that you won’t be prepared to answer. In fact, with all the information security questions you’ve been asked in audits, questionnaires and certification tests, no one ever let you know that when it all comes down to it, you will be judged on how well you answer these few questions.

In this talk, Chris Cronin will prepare you to answer those questions using an analytic method that breaks down barriers between lawyers, regulators, business managers and information security experts.








10:00am -10:30am - Refreshment Break

Harris

10:30am-11:30am

How to Reduce the Risk of the Data Breach

Jason Harris, Managing Principal Consultant - Security and End User Computing, Dimension Data

Over the past years, many data breaches have resulted from companies mismanaging the risk with 3rd party software that is used throughout the organization's datacenter and in the cloud.

This talk will walk through defining the problem, show examples of hacking and provide you with sound advice on how to build a defensible strategy.








Shulze 

11:30am-12:30pm

Risk Framework: Managing the Risk of New Technologies – Cloud, Mobility, IoT, OT

Eric Shulze, Sr. Engineer, Trend Micro

The change of pace in new technologies is dizzying. While the advances being made can lead to great advantages for the enterprise, the security risks increase.

In this session, attendees will learn how to develop a framework to mitigate the risk when implementing new technologies such as Cloud, Mobility, IoT, etc.









12:30pm - 1:30pm Luncheon

Kwong

1:30pm-2:30pm

Leveraging Privilege Access Control to Respond to Insider Threats

Dr. Fred Kwong, Head of Privilege Access Control, Farmers Insurance

With some of the largest breaches behind us in 2014, a reflection back will underscore the need to better detect, control, and monitor privileged access in the enterprise. In order to combat the external threat, security professionals need to rethink the external actors understanding that all external threats become internal once a privileged account has been compromised. This presentation will help to define the privileged account, and how to leverages synergies between the privileged access control and insider threat space.

Key Takeaways:

  • Privileged accounts are not just system administrators
  • External threats can become an insider threat
  • Leverage next generation privileged account technologies to detect the insider threat











2:30pm - 3:00pm - Refreshment Break

Treglia

Kunas

Boucher

Yetnikoff

Kovarik

3:00pm-4:00pm

Vendor Risk Management: How to Identify and Decrease Potential Risks When Leveraging 3rd Party Vendors (panel discussion)

Moderator:
Stephen Treglia, Legal Counsel, Absolute Software
Panelists:
Paul Kunas, Director of Information Security and Risk Management, Sidley Austin
Michael Boucher, Director, IT Risk Management & IT Services, FTD
Arlene Yetnikoff, Director, Information Security and Business Continuity, DePaul University
Dave Kovarik, Director, Information Security, Northwestern University
and other CISOs and IT Security Executives sharing experiences and lessons learned

Topics that will be covered include:

  • Contract outlining the business relationship between your organization and 3rd party vendor
  • How to monitor vendor performance to ensure that contractual obligations are being met
  • Guidelines regarding which party will have access to what information as part of the agreement
  • How to ensure that 3rd party vendors meet regulatory compliance guidelines for your industry















Moran

Bee

Ziemniak

Williams

Thakkar

4:00pm-5:00pm

How to Monetize Risks for Security Spending Decisions

Moderator:
Richard Moran, Senior Manager, Systems Engineering, Fortinet
Panelists:
Greg Bee, CISO, Country Financial
Terry Ziemniak, Director, IS Security, Presence Health
Clayton Williams, Jr., Global Director, Information Technology Security & Compliance, Heidrick & Struggles
Nayan Thakkar, IT Risk & Compliance Manager, VW Credit
and other CISOs and IT Security Executives sharing experiences and lessons learned

In this session, attendees will learn from a group of senior IT security executives as to how they monetize risks.

Topics that will be covered include:

  • How to measure the impact to the business
  • How to monetize your key risks
  • How to involve the business in risk decision making






Conference Price: $289.00 per person


Each attendee will receive a certificate awarding 7 CPE credits for CISSP continuing education, in addition to 0.7 CEUs and 7 PDUs. CISSP is a registered certification mark of (ISC)², Inc.

Exhibits

As is always the case at CAMP IT Conferences events, the talks will not include product presentations.  During the continental breakfast, coffee breaks, and the luncheon break you will have the opportunity to informally meet representatives from the following sponsoring companies, who have solutions in the area of the conference.