Skip to content

[vc_row row_type=”row” use_row_as_full_screen_section=”no” type=”full_width” text_align=”left” background_image=”348335″ box_shadow_on_row=”no”][vc_column css=”.vc_custom_1509976289581{padding-top: 200px !important;padding-bottom: 199px !important;}”][vc_column_text]

PAST EVENTS

[/vc_column_text][/vc_column][/vc_row][vc_row row_type=”row” use_row_as_full_screen_section=”no” type=”grid” text_align=”left” box_shadow_on_row=”no”][vc_column][vc_column_text css=”.vc_custom_1536699012357{padding-top: 25px !important;padding-bottom: 25px !important;}”]Enterprise Risk / Security Management: Dallas

 

Conference Chair: Jim Desmond, Chief Security Officer, Elevate

 

Desmond

 

Strategies for reducing risk to the enterprise.

 

September 18, 2018

 

9:00am-5:00pm

 

7 CPE / 0.7 CEU / CISSP / 7 PDU Credits Awarded

 

Conference location: Irving Convention Center at Las Colinas[/vc_column_text][/vc_column][/vc_row][vc_row row_type=”row” use_row_as_full_screen_section=”no” type=”grid” text_align=”left” box_shadow_on_row=”no”][vc_column width=”1/2″][vc_column_text][/vc_column_text][/vc_column][vc_column width=”1/2″][vc_column_text][sharethis-inline-buttons][/vc_column_text][/vc_column][/vc_row][vc_row row_type=”row” use_row_as_full_screen_section=”no” type=”grid” text_align=”left” box_shadow_on_row=”no”][vc_column][vc_column_text css=”.vc_custom_1536593410977{padding-top: 25px !important;padding-bottom: 25px !important;}”]


Overview

 

In today’s highly regulatory environment it is essential that you have a clear understanding of risk across the enterprise. A risk management framework can bring visibility to key business and compliance risks and enable a company to make decisions on where to prioritize its limited resources. It is through a risk management framework that real value to the business can be achieved.

With all of these challenges, how do you make this happen?

In this one day conference, attendees will be provided with examples of approaches to managing information and compliance risk through a risk management framework.


What You Will Learn

 

In this one day conference attendees will learn:

  • Strategic Security: Impact or Influence
  • Identifying Risk Across an Expanding Attack Surface
  • Are you Protecting Enough, and Protecting Effectively Enough?
  • Key Steps to Reduce the Risk of Malicious Insiders, Over Privileged-Users and Compromised Third Parties
  • Vendor Risk Management: How to Identify and Decrease Potential Risks When Leveraging 3rd Party Vendors (panel discussion)
  • A Risk Adaptive Approach to Data Protection
  • Managing Security Risk at the Speed of Business (panel discussion)

 

Conference Price: $289.00 per person

 

Each attendee will receive a certificate awarding 7 CPE credits for CISSP continuing education, in addition to 0.7 CEUs and 7 PDUs. CISSP is a registered certification mark of (ISC)², Inc.


[/vc_column_text][/vc_column][/vc_row][vc_row row_type=”row” use_row_as_full_screen_section=”no” type=”grid” text_align=”left” box_shadow_on_row=”no”][vc_column][vc_column_text]Conference Program


8:00am – 9:00am: Registration and Continental Breakfast


9:00am-9:50am: Strategic Security: Impact or Influence

 

Jim Desmond, CISO, Elevate

 

 

 


Desmond


9:50am -10:20am: Refreshment Break


10:20am-11:10am: Identifying Risk Across an Expanding Attack Surface

 

Tim Roddy, Vice President of Product Strategy, Fidelis Cybersecurity

 

With technology advances and threats seemingly coming from every direction, security environments have become more complex. Sensitive data is no longer locked within the corporate walls as the boundaries have expanded from the network to endpoints to the cloud. As new issues arise, new products and capabilities are created. The challenge is that the security bolt-on approach has led to many point security tools managed in silos, creating many blind spots. Visibility is a key challenge for cybersecurity teams and without having a holistic view, it’s nearly impossible to detect threats across every stage of the kill chain.

 

Join cybersecurity expert, Tim Roddy, as he shines a light on the challenges of attaining complete visibility across your security environment and discuss:

  • How to gain visibility across networks, endpoints and cloud environments
  • Alternative ways to gain visibility with and without requiring an agent on every system
  • Misconceptions around “real-time” visibility and the importance of “looking back”
  • The power of threat intelligence when combined with visibility
  • How to ensure detection across the entire kill chain – from infiltration to activity to lateral movement to data exfiltration

 


Roddy


11:10am-12:00pm: How Blockchain Technology Will Transform Security

 

James Beecham, CTO & Founder, ALTR

 

Data breaches are worse than ever, yet blockchain technology has rendered the public Bitcoin network virtually invulnerable. How can we apply this new technology to dramatically improve security? This session will describe the underlying technology of blockchain and what makes it so secure, and then take attendees on a journey from how the technology is applied in a public network to how it can be applied in a private network. We’ll talk through various real-world examples of blockchain being used and make some predictions about where it will lead in the coming years.

 


Beecham


12:00pm – 12:50pm: Key Steps to Reduce the Risk of Malicious Insiders, Over Privileged-Users and Compromised Third Parties

 

Jim Anthony, VP Cybersecurity, Cyxtera

 

Business leaders have embraced the concept of allowing employees and third-party contractors to work from remote locations. But remote workforce migration as well as some malicious insiders present new operational and security challenges that must be addressed by IT and Security leaders.

Attend this session and learn:

  • Best practices addressing remote worker access using the Software-Defined Perimeter
  • Methods of efficiently integrating security with existing business processes and security solutions
  • Reducing security complexity while improving the user experience all while saving money and resources

 


Anthony


12:50pm – 1:50pm Luncheon


1:50pm-2:40pm: Vendor Risk Management: How to Identify and Decrease Potential Risks When Leveraging 3rd Party Vendors (panel discussion)

 

Moderator:
Stephen Bird, Channel Account Executive, Comodo Cybersecurity
Panelists:
Gregory Wilson, Head of Information Security, 1st Global
Scot Miller, SVP, CISO, Mr. Cooper
John Woods, Vice President, Information Security, PDX Inc.
Robert Pace, Vice President, Information Security & Compliance, First American
Mark Houpt, Chief Information Security Officer, Databank
and other enterprise CISOs and IT Security Executives sharing strategies, tactics and lessons learned

 

Topics that will be covered include:

  • Contract outlining the business relationship between your organization and 3rd party vendor
  • How to monitor vendor performance to ensure that contractual obligations are being met
  • Guidelines regarding which party will have access to what information as part of the agreement
  • How to ensure that 3rd party vendors meet regulatory compliance guidelines for your industry

 

                    
Wilson       Miller          Woods        Houpt        Pace


2:40pm – 3:10pm: Refreshment Break


3:10pm-4:00pm: Putting the Human Back Into Network Security

 

Chris Morris, Security Specialist, Forcepoint

 

Network security technology is shifting from just being a way to keep threats out of your network to providing operational insights that can make your people more effective and your organization more efficient. With the growth of unmanaged devices like phones, tables, appliances and Internet of Things (IoT) gadgets, the network often is the only place where sensing and enforcement can be done consistently. Advances in behavioral monitoring, analytics and machine learning are converging, enabling security to go beyond the old black-and-white, threat-centric approach of separating activities into “good” and “bad.” Now, security is becoming context-based, addressing the fuzzy “gray” area where today’s greatest productivity and greatest risks are found. We’ll discuss how network security products are making it easier to understand people’s intent so that you can take a modern risk-adaptive approach connecting and protecting your people and data.

 


Morris


4:00pm-5:00pm: Managing Security Risk at the Speed of Business (Panel discussion)

 

Moderator:
Doug Wick, VP Products & Marketing, ALTR
Panelists:
Kurt Hagerman, CISO, ARMOR
Paola Saibene, Data Privacy & Data Protection, Business Integrity & Compliance, Flowserve
Peter Tomaszewski, CISO, Pharmaceutical Strategies Group
Sailaja Kotra-Turner, Director, IT Security & Risk Management, Brinker
Randy Potts, Managing Director – InfoSec, Real Time Resolutions
and other enterprise CISOs and IT Security Executives sharing strategies, tactics and lessons learned

 

As a valued partner to the business, CISOs need to lead with business first execution.

 

In this session, attendees will learn from CISOs/Security Executives as to how they are:

  • Leading a business first mentality
  • Looking at every security risk decision through the lens of business impact
  • How can security and IT operations can work together effectively to identify best cost actions that have the most meaningful impact on exposure to business compromise and impact
  • Understand what Cloud/DevOps/Digital mean for your risk management program

 

                              
Wick          Hagerman     Saibene       Potts        Kotra-Tuner    Tomaszewski


Conference Price: $289.00 per person

 

Each attendee will receive a certificate awarding 7 CPE credits for CISSP continuing education, in addition to 0.7 CEUs and 7 PDUs. CISSP is a registered certification mark of (ISC)², Inc.

 

Exhibits

As is always the case at CAMP IT Conferences events, the talks will not include product presentations.  During the continental breakfast, coffee breaks, and the luncheon break you will have the opportunity to informally meet representatives from the following sponsoring companies, who have solutions in the area of the conference.


[/vc_column_text][/vc_column][/vc_row][vc_row row_type=”row” use_row_as_full_screen_section=”no” type=”grid” text_align=”left” padding_bottom=”25″ box_shadow_on_row=”no”][vc_column][vc_column_text]

CONFERENCE CO-SPONSORS

[/vc_column_text][/vc_column][/vc_row][vc_row row_type=”row” use_row_as_full_screen_section=”no” type=”grid” text_align=”left” box_shadow_on_row=”no”][vc_column width=”1/3″][vc_single_image image=”351403″ img_size=”full” alignment=”center” onclick=”custom_link” img_link_target=”_blank” link=”http://altr.com”][/vc_column][vc_column width=”1/3″][vc_single_image image=”351418″ img_size=”full” alignment=”center” onclick=”custom_link” img_link_target=”_blank” link=”http://comodo.com”][/vc_column][vc_column width=”1/3″][vc_single_image image=”351468″ img_size=”full” alignment=”center” onclick=”custom_link” img_link_target=”_blank” link=”http://www.cyxtera.com”][/vc_column][/vc_row][vc_row row_type=”row” use_row_as_full_screen_section=”no” type=”full_width” text_align=”left” box_shadow_on_row=”no”][vc_column][vc_empty_space height=”52px” image_repeat=”no-repeat”][/vc_column][/vc_row][vc_row row_type=”row” use_row_as_full_screen_section=”no” type=”grid” text_align=”left” box_shadow_on_row=”no”][vc_column width=”1/3″][vc_single_image image=”350638″ img_size=”full” alignment=”center” onclick=”custom_link” img_link_target=”_blank” link=”https://www.fidelissecurity.com/”][/vc_column][vc_column width=”1/3″][vc_single_image image=”350528″ img_size=”full” alignment=”center” onclick=”custom_link” img_link_target=”_blank” link=”http://forcepoint.com”][/vc_column][vc_column width=”1/3″][vc_single_image image=”349784″ img_size=”full” alignment=”center” onclick=”custom_link” img_link_target=”_blank” link=”http://reduxio.com”][/vc_column][/vc_row][vc_row row_type=”row” use_row_as_full_screen_section=”no” type=”full_width” text_align=”left” box_shadow_on_row=”no”][vc_column][vc_empty_space height=”52px” image_repeat=”no-repeat”][/vc_column][/vc_row][vc_row row_type=”row” use_row_as_full_screen_section=”no” type=”grid” text_align=”left” box_shadow_on_row=”no”][vc_column width=”1/3″][vc_single_image image=”351421″ img_size=”full” alignment=”center” onclick=”custom_link” img_link_target=”_blank” link=”http://www.zscaler.com”][/vc_column][vc_column width=”1/3″][/vc_column][vc_column width=”1/3″][/vc_column][/vc_row][vc_row row_type=”row” use_row_as_full_screen_section=”no” type=”full_width” text_align=”left” box_shadow_on_row=”no”][vc_column][vc_empty_space height=”52px” image_repeat=”no-repeat”][/vc_column][/vc_row]