PAST EVENTS
Enterprise Risk / Security Management: Chicago (Rosemont/O’Hare), Illinois
Strategies for reducing risk to the enterprise.
February 24, 2022
9:00am-5:00pm
7 CPE / 0.7 CEU / CISSP / 7 PDU Credits Awarded
Conference location: Donald E. Stephens Convention Center Rosemont (O’Hare) Illinois
Overview
In today’s highly regulatory environment it is essential that you have a clear understanding of risk across the enterprise. A risk management framework can bring visibility to key business and compliance risks and enable a company to make decisions on where to prioritize its limited resources. It is through a risk management framework that real value to the business can be achieved.
With all of these challenges, how do you make this happen?
In this one day conference, attendees will be provided with examples of approaches to managing information and compliance risk through a risk management framework.
What You Will Learn
In this one day conference attendees will learn:
- Managing Risk & Building Resiliency
- Embedding a Culture of Security to Enable Smart, Secure Decision-Making
- Keeping Up with the Latest Security and Risk Management Trends
- Cloud, Control & Security: Critical Security Controls You Should be Using
- Risk Management – How to Demonstrate Security Program Value to Stakeholders
- Managing Security Risk at the Speed of Business (CISO Panel Discussion)
Conference Price: $299.00 per person
Each attendee will receive a certificate awarding 7 CPE credits for CISSP continuing education, in addition to 0.7 CEUs and 7 PDUs. CISSP is a registered certification mark of (ISC)², Inc.
9:00am-10:00am: Quantifying Cyber Risk to Drive Business Decisions
Jason Bowen, Managing Director, Protiviti Chicago
George Quinlan, Senior Manager, Protiviti Chicago
Cyber risk management programs serve a wide array of stakeholders across the organization (executive team members, audit boards, governance committees, and technical teams). One common question that all stakeholders can relate to is “Where do I spend my limited time and budget to reduce risk in the most effective way?” When faced with multiple risks rated as critical or high, determining where to focus your resources can be challenging. Cyber risk quantification can bring a fresh perspective to your cybersecurity program by answering the questions below:
- How much would a cyber event cost our organization?
- Which projects or initiatives will reduce the most amount of risk?
- Are we over or under insured with our current cyber insurance policy?
Bowen Quinlan
10:00am-10:30am: Refreshment Break
10:30am-11:30am: Embedding a Culture of Security to Enable Smart, Secure Decision-Making
Moderator:
- Byron Rashed, Vice President of Marketing, Centripetal
Panelists:
- Fred Kwong, Ph.D., Vice President, Chief Information Security, DeVry University
- Keith Conlee, Chief Security Officer, IT, College of DuPage
- Brian Palmer, Director IT Security & Infrastructure, Ventas
- Dr. Michael Chahino, CIO, Elgin Community College
- John Bates, Manager, Cybersecurity, EY
- Other CISOs sharing experiences, tactics, and lessons learned
With the increased adoption of remote and hybrid work, the cybersecurity framework continues to expand. Security must be a high-priority for every company stakeholder, and CISOs must lead the charge.
Rashed Kwong Conlee Palmer Chahino Bates
11:30am-12:30pm: A Floppy Disk, The Internet, and a Threat Hunter
Peter Steyaert, Sr. SE Manager, Gigamon
A brief overview of the history of Ransomware, going from one of the first initial known attacks to modern day. Giving you an understanding how the model has changed from an opportunistic smash and grab method to a low and slow targeted approach, to include ransomware as a service. Discussing assets that are needed by the Threat hunter in the organization to identify and resolve the treat in an environment before and after an organization is targeted by a ransomware organization.
Steyaert
12:30pm-1:30pm: Lunch Break
1:30pm-2:30pm: Achieving Data Privacy via Data Security: The CDSA Credential and Data Security Assessment
David Braun, President & CTO, Indecium
Regardless of an attacker’s entry point into an organization, they’re always after the same two things – credentials and data.
To help shine a light on where you’re most vulnerable, a comprehensive assessment of select data repositories, Active Directory, and Windows infrastructure is required which can allow for;
- Removing inappropriate data access
- securing the credentials attackers seek to compromise and exploit,
- Detecting, preventing, and mitigating advanced threats at the system, directory, and data layers of your environment.
Braun
2:30pm-3:00pm: Refreshment Break
3:00pm-4:00pm: SaaS Security: Challenges, Planning & Priorities
Eliana Vuijsje, Director of Product Marketing and Research, Adaptive Shield
There is no question SaaS has now become the default system of record, and many companies have yet to update the way they monitor their business-critical apps. To understand how teams are currently dealing with their SaaS security posture, and what their main concerns are, we surveyed hundreds of CISOs from across the globe. The SaaS Security Survey Report highlights their perspectives on the SSPM space and the steps they are taking to secure their SaaS app stack.
4:00pm-5:00pm: Stopping Ransomware with Autonomous Response
Mary Bobos, Cybersecurity Director, Darktrace
Stopping Ransomware with Autonomous Response
New strains of ransomware are leaving organizations vulnerable – too often, security teams lack the ability to respond proportionately to an attack, leading to cyber disruption across the organization.
Join Cybersecurity Director, Mary Bobos, as she unpacks some of today’s most advanced ransomware threats. Learn how Self-Learning AI understands the organization to reveal every stage of a ransomware attack – and takes targeted, autonomous action to stop the threat in its tracks.
- Recent ransomware threat trends, including double extortion and RDP attacks
- How Autonomous Response takes action to contain an emerging attack, even when security teams are out of office
- Real-world examples of ransomware detected by AI – including a zero-day and an attack initiated on Christmas Day
Bobos
Conference Price: $299.00 per person
Each attendee will receive a certificate awarding 7 CPE credits for CISSP continuing education, in addition to 0.7 CEUs and 7 PDUs. CISSP is a registered certification mark of (ISC)², Inc.
Exhibits
As is always the case at CAMP IT Conferences events, the talks will not include product presentations. During the continental breakfast, coffee breaks, and the luncheon break you will have the opportunity to informally meet representatives from the following sponsoring companies, who have solutions in the area of the conference.
CONFERENCE SPONSORS