Conferences that solve current IT challenges

Enterprise Risk / Security Management

Strategies to help leverage full value from your design and implementation of an effective Business Intelligence framework

February 20, 2018

9:00am-5:00pm

7 CPE / 0.7 CEU / CISSP / 7 PDU Credits Awarded

Register

Conference location: Donald E. Stephens Convention Center Rosemont (O'Hare) Illinois

Overview

As organizations prepare for the recovery it is crucial that they have a well designed business intelligence framework to provide them with the necessary insight so they can capitalize on new opportunities.

This one day conference will help attendees design and leverage a solid BI framework to make the decisions necessary for the economic recovery.

What You Will Learn

In this one day conference attendees will learn:

  • Learning from InfoSec Fails - People, Process, and Technology
  • Articulating the Value of InfoSec to Business Units
  • The Connected Worker and the Enterprise of Things
  • Vendor Risk Management: How to Identify and Decrease Potential Risks When Leveraging 3rd Party Vendors (panel discussion)
  • Balancing Act: Ensuring compliance with GDPR and US Regulations
  • User Behavioral Analytics How to Fight the Compromised Credential Analysis! Welcome to Big Data Folks!
  • Breaches & Ransomware: How to Handle, How to Respond

Conference Program

8:00am - 9:00am - Registration and Continental Breakfast

Milroy

9:00am-9:50am

Learning from InfoSec Fails - People, Process, and Technology

Derek Milroy, Information Security, U.S. Cellular

This presentation will highlight some of the reasons why InfoSec either fails or is perceived to fail. People, Process, and Technology issues will be presented with examples. The goal of this talk is to allow people to pick up some pointers for doing things better by analyzing real world failures. This talk makes use of jaded and cynical humor to get some of the lessons learned across.












9:50am -10:20am - Refreshment Break

 

10:20am-11:10am

Articulating the Value of InfoSec to Business Units

 

In this thought provoking session, the following will be covered:

  • The proper use of metrics and visualizations
  • Telling the right story
  • Keeping it simple for all audiences












Hazelton

11:10am-12:00pm

The Connected Worker and the Enterprise of Things

Chris Hazelton, Director, Enterprise Product Marketing at BlackBerry

The dependency on mobile devices will translate into a majority of enterprise computing outside of traditional PC computing. This will have the greatest impact with on campus (non-office-based) and off campus mobile workers who are becoming increasingly connected by rich real time communications powered by mobile applications running on wearable devices such as smart glasses. The rise of IoT in the enterprise, or the Enterprise of Things, will allow these workers to instantly connect with assets in the field to gain immediate understanding of the situation around them. This session will explore security concerns that come with these new tools and how to best address them.









12:00pm - 1:00pm Luncheon

 

1:00pm-1:50pm

Vendor Risk Management: How to Identify and Decrease Potential Risks When Leveraging 3rd Party Vendors (panel discussion)

Panelists will feature CISOs sharing their experiences and lessons learned

Topics that will be covered include:

  • Contract outlining the business relationship between your organization and 3rd party vendor
  • How to monitor vendor performance to ensure that contractual obligations are being met
  • Guidelines regarding which party will have access to what information as part of the agreement
  • How to ensure that 3rd party vendors meet regulatory compliance guidelines for your industry











1:50pm-2:40pm

 

Balancing Act: Ensuring compliance with GDPR and US Regulations

 

GDPR will go into effect in 2018, and will have a significant impact on enterprise cybersecurity and data governance policies and practices beyond the EU. It will significantly impacting global organizations based in the United States that handle data on EU citizens and residents.

Where should you start with this and what kind of plan should you put in place?











2:40pm - 3:10pm - Refreshment Break

 

3:10pm-4:00pm

User Behavioral Analytics How to Fight the Compromised Credential Analysis! Welcome to Big Data Folks!

 














 

4:00pm-5:00pm

 

Breaches & Ransomware: How to Handle, How to Respond

CISOs and InfoSec Executives will share their experiences

CISOs and InfoSec Executives will share their experiences
In this session, attendees will learn from CISOs and Security Executives as to how they are working through the challenges of Data Breaches and Ransomware.

Attendees will walk away with shared strategies and tactics that other organizations are employing.


Conference price: $289 per person.


Each attendee will receive a certificate awarding 7 CPE credits for CISSP continuing education, in addition to 0.7 CEUs and 7 PDUs. CISSP is a registered certification mark of (ISC), Inc.

Exhibits

As is always the case at CAMP IT Conferences events, the talks will not include product presentations.  During the continental breakfast, coffee breaks, and the luncheon break you will have the opportunity to informally meet representatives from the following sponsoring companies, who have solutions in the area of the conference.