PAST EVENTS
Data Breaches: Defense and Response: Chicago (Rosemont/O’Hare), Illinois
Strategies to help your organization prepare for, defend against and respond to breaches.
March 14, 2024
9:00am-5:00pm
7 CPE / 0.7 CEU / CISSP / 7 PDU Credits Awarded
Conference location: Donald E. Stephens Convention Center Rosemont (O’Hare) Illinois
Overview
It is not a matter of if, but when your organization will be breached. Against these threats, enterprises try to build higher and more secure walls around their data and networks. This seems to be a never-ending arms race, as even the most sophisticated systems may, before long, present weaknesses that malicious technology can overcome.
What You Will Learn
In this one day conference attendees will learn:
- Cyber Security & BC/DR: Recovering from Ransomware & Breaches
- Fireside Chat: Wait a minute! These Folks Have Access to Our Data, Too?
- Applying Zero Trust to Prevent and Respond to Breaches In Today’s Data Centers and Clouds
- Fireside Chat: Privacy Considerations in the Era of Data Breaches
- Aftermath of a Data Breach: Lessons Learned
- Breaches & Ransomware: How to Handle, How to Respond (Panel Discussion)
Conference Price: $299.00 per person
Each attendee will receive a certificate awarding 7 CPE credits for CISSP continuing education, in addition to 0.7 CEUs and 7 PDUs. CISSP is a registered certification mark of (ISC)², Inc.
CONFERENCE AGENDA
8:00am – 9:00am: Registration and Continental Breakfast
9:00am – 10:00am: The Breach; Risk to Consequences
Michael Neuman, Head of Information Security, VelocityEHS
How you determine whether it is an incident or a breach that may or may not involve the exposure of sensitive customer data will determine, among other things:
- Which organizations should get involved
- What actions should be taken
- How it will be resolved
- If notification is required
- Who? When? How?
How you respond will determine how you can minimize the monetary, regulatory, and reputational damages and risks to you, your enterprise, and your customers.
Neuman
10:00am – 10:30am: Refreshment Break
10:30am – 11:30am: Results of Cybersecurity Assessments – Filling the Gaps
Phillip Conrad, Senior Information Security Analyst, Purdue cyberTAP
What are some of the most common cybersecurity gaps facing organizations?
• Surprising issues among organizations
• Primary gaps found in most organizations
• Supporting organizations with CMMC readiness
• Basic process of a cybersecurity gap analysis assessment
Conrad
11:30am – 12:30pm: The Role of AI Analytics to Uplift Security Operations
Bob Hansmann, Security Products Team, Infoblox
In cybersecurity today, “AI” may be the term most used … and abused. For those trying to understand how this may impact their security stack/profile in the future, it is essential to have a grounded, real world, and near-term perspective of the potential for AI in cybersecurity. Using multiple sources of recent research data, this session will review the SOC challenges that matter, and how the current and likely future state of AI technology in cybersecurity might help. Covered topics include:
- ML vs AI: How they align, differ, and conflict.
- Chatbots and other ‘low hanging fruit’ for vendors.
- AI’s potential in triage, investigation, and response.
- The future state of SIEM, SOAR and general automation.
- Using AI to address the Top 10 challenges to SOC efficiency.
Hansmann
12:30am – 1:30pm: Lunch and Exhibit Break
1:30pm – 2:30pm: Breach Prevention – We Keep Doing the Same Things, But Expect Different Results?
Ron Zochalski,
– Cybersecurity started back in 2013… Why hasn’t Zero Trust taken off? Is it because people don’t want to change?
– Why do we continue to use the inside BS jargon no one understands then wonder why no one is listening… Sound familiar? How to understand the big picture
– Recent breach messages leaders are sending out and how to interpret them. Why is our president using TikTok? What we can do better.
– Why it is important to communicate why we do what we do and the importance of building relationships with other departments and it’s impact on your career
Zochalski
2:30pm – 3:00pm: Refreshment Break
3:00pm – 4:00pm: Strategic Defense in the Digital Age: Applying Sun Tzu’s Art of War to Cybersecurity Leadership
Randy Lee,
“In an era where cyber threats loom large over organizations of all sizes, the ancient wisdom of Sun Tzu’s “The Art of War” offers timeless strategies for understanding and combating these challenges. “Sun Tzu’s Wisdom in Cybersecurity: Mastering Self and Enemy Knowledge” is a presentation designed for executives, focusing on the intersection of classical strategy and modern cybersecurity practices. This presentation explores the top ten exploits utilized by hackers, presenting them through the lens of Sun Tzu’s core principle: the importance of knowing both oneself and one’s adversaries.”
This presentation aims to bridge the gap between technical cybersecurity challenges and strategic leadership insights.
• C-Level Executives: CEOs, CIOs, CFOs responsible for strategic security decisions.
• Corporate Leaders: VPs, directors, and senior managers involved in risk management.
• Business Strategists and Consultants: Advisors on cybersecurity best practices.
• Board Members: Those needing strategic insights on cybersecurity for governance.
• Policy Makers: Individuals shaping cybersecurity policies and regulations.
Lee
4:00pm – 5:00pm: How InfoSec Leaders & Executives are Responding to Current & Emerging Security Risks (Panel Discussion)
Moderator:
Gregg Kalman, RSM, Expel
Panelists will include:
- Jessica Boehm, IT Security Manager, Global Cyber Information Security, Gallagher
- Nic Colõn, CTO, Elsewhen MSP
- Brandon Daab, Information Security Analyst at Foundation Finance Company LLC
- Aaron Demaster, Director, Cyber Security, Gilbraltar Industries
- Thomas Freeman, Director, DFIR, & Offensive Cybersecurity, Sikich
- Danny Hetzel, Cybersecurity Engineer and Researcher, Accuray
Kalman Boehm Colõn Daab Demaster Freeman Hetzel
In this session attendees will learn from a distinguished panel of information security leaders sharing their thoughts on:
Mitigating Business Email Compromise
Responding to Ransomware
Reducing Risk to the Business in 2023
Topics covered:
How to identify leverage areas of value (reputation, regulation, revenue, resilience, and recession) for continued investment and security spending
How to assess, understand, and define security’s current and future roles in the extended enterprise
Where are security investments being made on personnel, processes, and technologies?
Exhibits
As is always the case at CAMP IT Conferences events, the talks will not include product presentations. During the continental breakfast, coffee breaks, and the luncheon break you will have the opportunity to informally meet representatives from the following sponsoring companies, who have solutions in the area of the conference.
CONFERENCE SPONSORS
[/vc_column_text][/vc_column][/vc_row][vc_row row_type=”row” use_row_as_full_screen_section=”no” type=”full_width” text_align=”left” box_shadow_on_row=”no”][vc_column][vc_empty_space image_repeat=”no-repeat”][/vc_column][/vc_row][vc_row row_type=”row” use_row_as_full_screen_section=”no” type=”grid” text_align=”left” box_shadow_on_row=”no”][vc_column width=”1/3″][vc_single_image image=”365155″ img_size=”medium” onclick=”custom_link” img_link_target=”_blank” link=”https://www.infoblox.com/”][/vc_column][vc_column width=”1/3″][vc_single_image image=”360619″ img_size=”medium” onclick=”custom_link” img_link_target=”_blank” link=”https://www.zerto.com/”][/vc_column][vc_column width=”1/3″][vc_single_image image=”366274″ img_size=”medium” alignment=”center” onclick=”custom_link” link=”http://www.expel.com”][/vc_column][/vc_row][vc_row row_type=”row” use_row_as_full_screen_section=”no” type=”grid” text_align=”left” box_shadow_on_row=”no”][vc_column width=”1/3″][vc_single_image image=”362599″ img_size=”medium” alignment=”center” onclick=”custom_link” img_link_target=”_blank” link=”https://www.veeam.com/”][/vc_column][vc_column width=”1/3″][/vc_column][vc_column width=”1/3″][vc_single_image image=”366380″ img_size=”medium” alignment=”center” onclick=”custom_link” link=”http://www.expel.com”][/vc_column][/vc_row][vc_row row_type=”row” use_row_as_full_screen_section=”no” type=”full_width” text_align=”left” box_shadow_on_row=”no”][vc_column][vc_empty_space image_repeat=”no-repeat”][/vc_column][/vc_row]