Feedback from Attendees

Upcoming  2017 Events

Oct. 26, 2017
Enterprise Architecture Strategies
Info
Chicago, IL

Nov. 1-2, 2017
IT PMO/Portfolio Management
Info
Dallas, TX

Nov. 15, 2017
DR/BC - Resilient Infrastructure
Info
Chicago, IL

Nov. 30, 2017
Business Intelligence/Big Data/Analytics
Info
Chicago, IL

Dec. 7, 2017
Data Breaches: Preparing and Responding
Info
Chicago, IL

Upcoming  2018 Events

Feb. 1, 2018
Enterprise Risk/Security Management
Info
Dallas, TX

Feb. 20, 2018
Enterprise Risk/Security Management
Info
Chicago, IL

Mar. 1, 2018
IT Leadership Strategies
Info
Chicago, IL

Mar. 7, 2018
Enterprise Architecture Strategies
Info
Chicago, IL

April 12, 2018
Business Intelligence/Big Data/Analytics
Info
Chicago, IL

May 2, 2018
Data Breaches: Preparing and Responding
Info
Chicago, IL

May 15, 2018
IT Infrastructure/Operations Management (Data Center)
Info
Chicago, IL

May 31, 2018
Enterprise Risk/Security Management
Info
Minneapolis, MN

June 7, 2018
Enterprise Risk/Security Management
Info
Chicago, IL

June 20-21, 2018
IT PMO/Portfolio Management
Info
Chicago, IL

July 11, 2018
Enterprise Architecture Strategies
Info
Chicago, IL

Sept. 6, 2018
IT Infrastructure/Operations Management (Data Center)
Info
Chicago, IL

Sept. 18, 2018
Enterprise Risk/Security Management
Info
Dallas, TX

Oct. 3, 2018
Enterprise Risk/Security Management
Info
Chicago, IL

Oct. 17, 2018
IT Leadership Strategies
Info
Chicago, IL

Oct. 25, 2018
Enterprise Architecture Strategies
Info
Chicago, IL

Nov. 1-2, 2018
IT PMO/Portfolio Management
Info
Dallas, TX

Nov. 14, 2018
DR/BC - Resilient Infrastructure
Info
Chicago, IL

Nov. 29, 2018
Business Intelligence/Big Data/Analytics
Info
Chicago, IL

Dec. 6, 2018
Data Breaches: Preparing and Responding
Info
Chicago, IL

(Click here to add any of our upcoming events to your calendar)

 

 

Conferences that solve current IT challenges

Enterprise Risk / Security Management

Strategies for reducing risk to the enterprise.

October 4, 2017

9:00am-5:00pm

7 CPE / 0.7 CEU / CISSP / 7 PDU Credits Awarded

Bios

Conference location: Donald E. Stephens Convention Center Rosemont (O'Hare) Illinois

Overview

In today’s highly regulatory environment it is essential that you have a clear understanding of risk across the enterprise. A risk management framework can bring visibility to key business and compliance risks and enable a company to make decisions on where to prioritize its limited resources. It is through a risk management framework that real value to the business can be achieved.

With all of these challenges, how do you make this happen?

In this one day conference, attendees will be provided with examples of approaches to managing information and compliance risk through a risk management framework.

What You Will Learn

In this one day conference attendees will learn:

  • Technology and Disruptive Forces: A CISO's View on Future Risks to Your Organization
  • Defining Acceptable Risk in an Age of Evolving Threats
  • Data & Security Analytics: Can We Predict the Next Attack?
  • The Disconnect - IoT vs Security
  • Risk Mitigation: How to Plan for DDoS Attacks, Detection and Mitigation
  • Ransomware
  • Vendor Risk Management: How to Identify and Decrease Potential Risks When Leveraging 3rd Party Vendors (panel discussion)
  • How Security and the CSO Can Provide Business Value (panel discussion)

Conference Program

8:00am - 9:00am - Registration and Continental Breakfast

Kwong

9:00am-10:00am

Technology and Disruptive Forces: A CISO's View on Future Risks to Your Organization

Fred Kwong, CISO, Delta Dental

What are the current risks? What are the future risks? How do we prepare for the unknowns or can we?

In this session, Fred Kwong will share his view on the disruptions taking place, the future impact on your enterprise and what you should do now to prepare for the future risks.











10:00am -10:30am - Refreshment Break

Melnick

10:30am-11:30am

AI For Good: Moving Beyond Legacy Security

Richard Melick, Sr. Security Technologist, Cylance 

Supporting enterprises in complex and diverse environments requires technologically sophisticated security solutions to combat zero-day threats. Endpoint security providers sell legacy technology in layered formats, focusing on the reactive, as the only solution. Artificial intelligence can secure a system against unknown threats in addition to threats that may hide their malicious behavior while under scrutiny.











Vetter

11:30am-12:30pm

Data & Security Analytics: Can We Predict the Next Attack?

Laura Vetter, Chief Technologist

The goal of security analytics is to detect attacks as quickly as possible, enable security leadership to block or stop an attack and provide detailed information to reconstruct an attack so that we learn how to predict or prevent the next attack.

In this session, attendees will learn:

  • Best practices for leveraging security analytics
  • How to read the data and learn from what is presented











12:30pm - 1:30pm Luncheon

1:30pm-2:30pm

Terlizzi

Ransomware

Rob Terlizzi, Director, Solutions Architecture, Reduxio
















2:30pm - 3:00pm - Refreshment Break

Rashed

Duplessis

Rasheed

Guth

Mountain

3:00pm-4:00pm

Vendor Risk Management: How to Identify and Decrease Potential Risks When Leveraging 3rd Party Vendors (panel discussion)

Moderator:
Byron Rashed, Global VP, Marketing, InfoArmor
Panelists:
Robert M. Duplessis, Senior Vice President / Information Security Officer, Old Second National Bank
Fawaz Rasheed, Chief Information Security Officer and Vice President, Trustmark Companies
Mark Guth, Manager Corporate Security Critical Infrastructure Protection Compliance, Southern Company Gas
James Mountain, Director of Information Security, Information Technology, Palmer College
and other professionals from IT departments

Topics that will be covered include:

  • Contract outlining the business relationship between your organization and 3rd party vendor
  • How to monitor vendor performance to ensure that contractual obligations are being met
  • Guidelines regarding which party will have access to what information as part of the agreement
  • How to ensure that 3rd party vendors meet regulatory compliance guidelines for your industry












Dillon

Devine

Maher

Inserro

Pittman

4:00pm-5:00pm

How Security and the CSO Can Provide Business Value (panel discussion)

Moderator:
Tim Dillon, Regional Director of Sales, Proofpoint
Panelists:
Erik Devine, Chief Information Security Officer, Riverside Healthcare
Brent Maher, CISSP, Senior Vice President – Chief Information Security Officer (CISO), Johnson Financial Group
Jenny Inserro, Senior Director, Information Security Governance, Risk & Compliance, Health Care Service Corporation
Jerry Pittman, Chief Information Security Officer, Tenneco
and other professionals from IT departments

In this session, attendees will learn from a panel of IT security executives as to the strategies they are leveraging to insure their efforts are in sync with business priorities.

Topics covered:

  • How to identify leverage the following areas of value: reputation, regulation, revenue, resilience, and recession for continued investment and security spending
  • How to assess, understand and define security’s current and future roles in the extended enterprise
  • Where are security investments being made on personnel, processes, and technologies





Conference price: $289 per person.


Each attendee will receive a certificate awarding 7 CPE credits for CISSP continuing education, in addition to 0.7 CEUs and 7 PDUs. CISSP is a registered certification mark of (ISC)˛, Inc.

Exhibits

As is always the case at CAMP IT Conferences events, the talks will not include product presentations.  During the continental breakfast, coffee breaks, and the luncheon break you will have the opportunity to informally meet representatives from the following sponsoring companies, who have solutions in the area of the conference.