Conferences that solve current IT challenges

Data Breaches: Preparing and Responding

Strategies to help leverage full value from your design and implementation of an effective Business Intelligence framework

December 7, 2017


7 CPE / 0.7 CEU / CISSP / 7 PDU Credits Awarded


Conference location: Donald E. Stephens Convention Center Rosemont (O'Hare) Illinois


As organizations prepare for the recovery it is crucial that they have a well designed business intelligence framework to provide them with the necessary insight so they can capitalize on new opportunities.

This one day conference will help attendees design and leverage a solid BI framework to make the decisions necessary for the economic recovery.

What You Will Learn

In this one day conference attendees will learn:

  • Aftermath of a Data Breach: Lessons Learned
  • Creating an Incident Response Plan and Training Team Members
  • Breach Detection & Prevention: Protect Enterprise Data From Insider Threats
  • Breach Mitigation in the Cloud
  • Reducing Risk of Data Breaches: Automating Security in SDLC
  • The Machine Fights Back: AI and the Future of Cyber Defense
  • The Shifting Wall: Data Breach Prevention & Lessons Learned
  • Hardware vs. Software Encryption For Your Data Storage
  • Breaches & Ransomware: How to Handle, How to Respond

Conference Program

8:00am - 8:30am - Registration and Continental Breakfast



Aftermath of a Data Breach: Lessons Learned

Andrew Walenstein, Director of Security R&D, Blackberry

As data breaches continue to hammer organizations with devastating outcomes, monetary as well as reputation costs continue to rise year after year. And while Cybersecurity professionals are tasked with securing and enhancing the information security posture of their organizations, they could find themselves consumed with gathering forensic evidence, executing data recovery plans, gathering facts, containing the damages and dealing with the aftermath in case of a data breach. Having a tested and verified data breach recovery plan is becoming more crucial than ever.

This session explores lessons learned from the aftermath of experiencing the discovery of and recovery from a data breach and provides some recommendations to help organizations deal with disruptive cyber-attacks.



Creating an Incident Response Plan and Training Team Members

Glenn A. Stout, Ph.D., Managing Consultant, HALOCK Security Labs

Incident Response Plan creation, Training and Testing. Attendees will be provided with a blueprint for an IR plan that is in alignment with the main standards and regulations that many companies have to meet. Additionally, the approach to create the plan, test it, and train team members is also part of the presentation.

  1. Oops... we did that? Learn from your mistakes

  2. Reasons to create an IR Plan

    1. Compliance
    2. Risk
  3. Requirements for an IR Plan according to:
    1. NIST 800-61
    2. NIST 800-53
    3. ISO 27002
    4. PCI DSS
    5. HIPAA
  4. Team required to create an IR Plan
    1. Describe team roles
    2. Parts of company they come from
  5. Main elements of an IR Plan (largest part of presentation)
    1. Elements
    2. Describe each element
    3. How to create each element
    4. Examples
  6. Run Books
  7. Testing & Training the plan
    1. Testing vs. Training
    2. Types of Scenarios

10:10am -10:40am - Refreshment Break



Breach Detection & Prevention: Protect Enterprise Data From Insider Threats

Juan Lara, Director of Security Strategy, Imperva, Inc.

To detect and contain data breaches, organizations need to have visibility into who is accessing enterprise data, understand if that access is legitimate and respond immediately if it's not. To do their jobs, employees, contractors, consultants and vendors must have legitimate access to sensitive and valuable data stored in enterprise databases and file shares. However, when insiders abuse this access, or when insiders are exploited by outside attackers, enterprise data is exposed. Detection and containment of insider threats requires an expert understanding of both users and how they use enterprise data.

11:30am -12:20pm



Breach Mitigation in the Cloud

Wayne Reynolds, Vice President, Security, Armor
Lee Hovermale, CEO, FlexManage

Despite the numerous benefits of using cloud services, there is still concern that deploying to the cloud increases the risk of serious data breaches when shared responsibility is not taken seriously, especially since security is often handled in a clandestine way that doesn’t always clearly demonstrate its value.

Security doesn’t have to be dark and mysterious to work effectively. It needs to be flexible, reliable and, most importantly, transparent. Mitigating breaches in the cloud requires leveraging talent, proper high-yield techniques, and best-of-breed technology. In this session you will learn how to leverage cloud native tools to prevent breaches.

12:20pm - 1:05pm Luncheon



Reducing Risk of Data Breaches: Automating Security in SDLC

Mir Ali, Director, Head of DevOps, FitchRatings

In today's business environment, application security is emerging as a leading factor impacting a company's reputation and even its bottom line. We have all heard stories of well-known companies and systems that we user day being hacked from Whole Foods Market, to Verizon, and to the famous Equifax story. It's now becoming critical that every company that is developing an application has to embed security into its development efforts. In this session, we will discuss how you can build security into every stage of the DevOps process, so you can produce higher quality code faster, more secure, while meeting compliance.

Key Take-Aways:

  • Approach to Security

  • Automating Security in build & deploy process

  • Challenges in implementing security

  • Recommendation to get started with the DevSecOps journey



The Machine Fights Back:  AI and the Future of Cyber Defense

Megan Mullaney, Regional Director, Darktrace 

In 2017, we saw trust attacks impact democracy. Ransomware and Mirai Botnet machine-based attacks moved too fast for humans to keep up. 350,000 US cyber defense posts stood unmanned due to a skills shortage. Today’s attacks are more insidious too, exploiting IoT devices and third-party service providers and disguising themselves for an average of 208 days before detection. When it comes to protecting your organization, the days of telling the board "we've got this" are over.

Cyber security has turned into an arms race—machines fighting machines on the battleground of corporate networks. Catching today’s most sophisticated cyber-attacks requires finding the slightest and subtlest anomalies inside networks containing millions of constantly changing data points, where billions of events take place every day.

Artificial intelligence-based systems are now being deployed to continually assess business environments, marking the advent of the self-defending network. Known as ‘immune system’ cyber defense, this approach is used to uncover threats that have already penetrated the network border and then automatically fight back. Learn how to distinguish the hyperbole surrounding machine learning, from proven AI technology that delivers real results for all types of organizations, small and large – and stops attackers in their track.

In this session, we will discuss:

  • How new machine learning and AI algorithms are automating advanced cyber defense

  • Why automated defenses augment human security teams

  • How to navigate the challenges of implementing AI in a business environment

  • Real-world examples of unknown threats detected and contained by Enterprise Immune System technology

2:25pm - 2:55pm - Refreshment Break



The Shifting Wall: Data Breach Prevention & Lessons Learned

Nick Thomson, CRO & Security Lead, Workshare

A strong Breach Prevention policy requires deep awareness of the new “walls” we need to build, as well as the multiple “channels” we need to protect. This session focuses on lessons learned from an industry that doesn’t have the resources to be anything less than efficient but deal with some of the most highly-regulated sensitive date there is.



Hardware vs. Software Encryption For Your Data Storage

Eryn Brodsky, Systems Engineer, Reduxio

With so many security tools and features available to protect the modern day data center, it can be challenging to determine which ones are right for your business. Here we will discuss the different options that are currently in the market, and help you to decide which one is right for you.






Breaches & Ransomware: How to Handle, How to Respond

Lee Hovermale, CEO, FlexManage
Paul Bivian, Director Information Security, Kirkland & Ellis LLP
Jim Martin, CISSP, CISA, J.D., Vice President of Security & Privacy, Maestro Health
Mir Ali, Director, Head of DevOps, FitchRatings
Amy Buss, Sr. Manager, Enterprise Security, U.S. Cellular
and other CISOs and InfoSec Executives will share their experiences

In this session, attendees will learn from CISOs and Security Executives as to how they are working through the challenges of Data Breaches and Ransomware.

Attendees will walk away with shared strategies and tactics that other organizations are employing.

Conference price: $289 per person.

Each attendee will receive a certificate awarding 7 CPE credits for CISSP continuing education, in addition to 0.7 CEUs and 7 PDUs. CISSP is a registered certification mark of (ISC)˛, Inc.


As is always the case at CAMP IT Conferences events, the talks will not include product presentations.  During the continental breakfast, coffee breaks, and the luncheon break you will have the opportunity to informally meet representatives from the following sponsoring companies, who have solutions in the area of the conference.