Skip to content

UPCOMING EVENTS


Data Breaches: Defense and Response: Chicago (Rosemont/O’Hare), Illinois

Strategies to help your organization prepare for, defend against and respond to breaches.

December 3, 2025

9:00am-5:00pm

7 CPE / 0.7 CEU / CISSP / 7 PDU Credits Awarded

Conference location: Donald E. Stephens Convention Center Rosemont (O’Hare) Illinois

  


Overview

It is not a matter of if, but when your organization will be breached. Against these threats, enterprises try to build higher and more secure walls around their data and networks. This seems to be a never-ending arms race, as even the most sophisticated systems may, before long, present weaknesses that malicious technology can overcome.


What You Will Learn

In this one day conference attendees will learn:

  • How to Build an Effective Threat Investigation and Eradication Capability
  • The Threat Landscape for Enterprises
  • How to Bake Application Security into Your Application Development Environment (Panel Discussion)
  • Value of Investment – Balancing Data Corruption, Disaster Recovery, and Cost
  • Improving Security and Governance through Cloud Management
  • CyberThreats – How CISOs are Responding to Current & Emerging Security Risks (Panel Discussion)
  • Breaches & Ransomware: How to Handle, How to Respond (Panel Discussion)

CONFERENCE AGENDA

8:00am – 9:00am: Registration and Continental Breakfast


9:00am – 10:00am

The Evolving Threat Landscape – Lessons from the Latest Breaches

Nick Schloemer, Cybersecurity Solutions Architect & Leader, WWT

A comprehensive look at recent breach trends and attacker methodologies. Learn what’s changed in 2025 and how organizations can stay ahead of emerging threats.

Areas that will be covered:

  • Top breach trends and threat actors
  • Shifts in ransomware tactics and extortion models
  • Practical intelligence for proactive defense

 

Schloemer


10:00am – 10:30am  Refreshment & Exhibit Break


10:30am – 11:30am: From Complexity to Stress-Free: Building Trust in Data to Power the Next Era of AI

Landen Brown, Field CTO, MIND

Trust as the Currency of AI – How modern CISOs earn and spend trust through unified data protection and stress-free data loss prevention (DLP)

  • The AI boom has shifted the battleground from network perimeters to data trust, the new currency of business.
  • CISOs must now ensure that every byte of data fueling AI is governed and secure, not through friction or fear but through stress-free DLP and insider risk management that strengthens collaboration instead of stifling it.
  • This session explores how organizations can earn trust by building a seamless data security program across discovery, classification, detection, remediation, and prevention, protecting data everywhere it lives or moves.
  • Real-world examples show how enterprises are turning data chaos into clarity, gaining unified visibility from cloud to endpoint, and securing data at rest and in motion without slowing innovation.
  • Finally, we’ll examine how CISOs can spend the trust they’ve earned by enabling safe, compliant adoption of GenAI, new productivity tools and open collaboration with confidence.

A blueprint for earning, growing and investing data trust as the foundation of secure, scalable AI transformation.

Brown


11:30am – 12:30pm: Defeating AI Driven Digital Deception

Kendra Cooley, Senior Director, Security and IT, Doppel

Social engineering has entered a new era where attackers use AI to run multi-channel, highly personalized campaigns at scale. From fake domains to deepfaked executives, adversaries now impersonate your people, brand, and infrastructure with alarming precision. In this session, we’ll expose how these attacks actually unfold and why email-only phishing simulations fail to prepare organizations. You’ll learn how to leverage AI to detect, map, and disrupt sophisticated impersonation campaigns before they impact your business. Modern attacks demand modern defenses, and this session will show you how to build them.

Cooley


12:30pm – 1:30pm: Lunch & Exhibit Break


1:30pm – 2:30pm: The Enemy in Your Pocket: Attackers Have a Mobile-First Strategy. Is Your Enterprise Ready?

Krishna Vishnubhotla, VP of Product Strategy, Zimperium

Despite investments in EMM, ZTNA, Cloud and app security, mobile remains the weakest link in enterprise security. Attackers are now targeting both devices and apps, leveraging supply chain attacks, zero-day exploits, and mobile phishing to bypass traditional defenses—putting enterprises at risk of financial, operational, and compliance failures.

Attackers have a mobile-first strategy, knowing that most enterprise apps rely on basic protections and most mobile devices lack real runtime security. 

The result? 1 in 5 employee devices encounter malware, and spyware threats have surged by 80%1 in 4 apps on work devices communicate with risky or embargoed countries.

This session breaks down the threat chains that are bypassing today’s defenses and provides clear guidance for closing the gap with practical, deployable controls.

Key Takeaways
• How modern attackers bypass EMM, ZTNA, and legacy app security
• How mobile threat chains form across devices, networks, and apps
• A practical model for implementing real on-device and in-app protection

 

Vishnubhotla


2:30pm – 3:00pm: Refreshment & Exhibit Break


3:00pm – 4:00pm: The State of Stress in Cybersecurity and the Mean Time to Recovery—Human: Measuring What Matters Most

Steve Shelton, Founder and Chief Resilience Officer, Green Shoe Consulting

In a profession defined by nonstop alerts and relentless pressure, cybersecurity leaders often monitor every system except their own. This interactive session invites CISOs and security executives to step back and measure the one metric most organizations overlook — their human energy system. Drawing on data from the 2025 State of Stress in Cybersecurity report and performance-psychology research, participants will complete a brief “Energy Check-In” to assess their physical, mental, and emotional recovery levels. Through guided reflection and small-group discussion, they’ll learn how to recognize energy depletion before it turns into burnout, and discover practical habits to restore clarity, focus, and resilience.

Attendees will leave with a simple framework and worksheet to apply immediately — a quick, repeatable method to monitor and improve their personal and team energy, helping them perform sustainably in a field that rarely powers down.

Shelton


4:00pm – 5:00pm: Manage Cyber Risk from a Business Perspective: Principles for an Effective Strategy  (Panel Discussion)

In the modern digital economy, cyber risk has become a core business concern rather than a purely technical issue. Organizations must adopt a strategic approach that embeds cybersecurity into governance, operations, and culture to safeguard value and ensure resilience. This panel explores practical principles for developing an effective cyber risk strategy—one that aligns security priorities with business objectives, strengthens accountability, and drives sustainable trust in an increasingly connected world.

Key Discussion Points

  • Cyber Risk as Business Risk:
    Treat cybersecurity as a strategic business enabler and integrate it into enterprise risk management.

  • Governance and Accountability:
    Establish clear leadership roles and board-level oversight to ensure responsibility and informed decision-making.

  • Strategic Alignment:
    Link cyber risk priorities directly to business goals and critical assets to optimize investment and impact.

  • Culture and Awareness:
    Foster an organizational culture where every employee understands and contributes to cyber resilience.

  • Adaptive Resilience:
    Build flexible strategies to anticipate, withstand, and recover from evolving digital threats.

Moderator: Ricardo Reati, General Manager, SpearTip

Panelists will include:

  • Don Balis, Global IT Security Director, Griffith Foods, Inc.
  • Johnny Burton, Vice President of IT and Security Officer, The Family Institute at Northwestern University
  • Victor Hsiang, CISO, GATX
  • Bruce Parr, Manager Cloud Security, Paylocity
  • CISOs and Information Security Executives, sharing strategies, tactics and lessons learned

 

Reati                                 Balis                           Burton                     Hsiang                    Parr


Conference Price: $349.00 per person

Each attendee will receive a certificate awarding 7 CPE credits for CISSP continuing education, in addition to 0.7 CEUs and 7 PDUs. CISSP is a registered certification mark of (ISC)², Inc.

Exhibits

As is always the case at CAMP IT Conferences events, the talks will not include product presentations. During the continental breakfast, coffee breaks, and the luncheon break you will have the opportunity to informally meet representatives from the following sponsoring companies, who have solutions in the area of the conference.