Feedback from Attendees

Upcoming  2017 Events

July 12, 2017
Enterprise Architecture Strategies
Info
Chicago, IL

Sept. 7, 2017
IT Infrastructure/Operations Management (Data Center)
Info
Chicago, IL

Sept. 19, 2017
Enterprise Risk/Security Management
Info
Dallas, TX

Oct. 4, 2017
Enterprise Risk/Security Management
Info
Chicago, IL

Oct. 18, 2017
IT Leadership Strategies
Info
Chicago, IL

Oct. 26, 2017
Enterprise Architecture Strategies
Info
Chicago, IL

Nov. 1-2, 2017
IT PMO/Portfolio Management
Info
Dallas, TX

Nov. 15, 2017
DR/BC - Resilient Infrastructure
Info
Chicago, IL

Nov. 30, 2017
Business Intelligence/Big Data/Analytics
Info
Chicago, IL

Dec. 7, 2017
Data Breaches: Preparing and Responding
Info
Chicago, IL

Upcoming  2018 Events

Feb. 1, 2018
Enterprise Risk/Security Management
Info
Dallas, TX

Feb. 20, 2018
Enterprise Risk/Security Management
Info
Chicago, IL

Mar. 1, 2018
IT Leadership Strategies
Info
Chicago, IL

Mar. 7, 2018
Enterprise Architecture Strategies
Info
Chicago, IL

April 12, 2018
Business Intelligence/Big Data/Analytics
Info
Chicago, IL

May 2, 2018
Data Breaches: Preparing and Responding
Info
Chicago, IL

May 15, 2018
IT Infrastructure/Operations Management (Data Center)
Info
Chicago, IL

May 31, 2018
Enterprise Risk/Security Management
Info
Minneapolis, MN

June 7, 2018
Enterprise Risk/Security Management
Info
Chicago, IL

June 20-21, 2018
IT PMO/Portfolio Management
Info
Chicago, IL

July 11, 2018
Enterprise Architecture Strategies
Info
Chicago, IL

Sept. 6, 2018
IT Infrastructure/Operations Management (Data Center)
Info
Chicago, IL

Sept. 18, 2018
Enterprise Risk/Security Management
Info
Dallas, TX

Oct. 3, 2018
Enterprise Risk/Security Management
Info
Chicago, IL

Oct. 17, 2018
IT Leadership Strategies
Info
Chicago, IL

Oct. 25, 2018
Enterprise Architecture Strategies
Info
Chicago, IL

Nov. 1-2, 2018
IT PMO/Portfolio Management
Info
Dallas, TX

Nov. 14, 2018
DR/BC - Resilient Infrastructure
Info
Chicago, IL

Nov. 29, 2018
Business Intelligence/Big Data/Analytics
Info
Chicago, IL

Dec. 6, 2018
Data Breaches: Preparing and Responding
Info
Chicago, IL

(Click here to add any of our upcoming events to your calendar)

 

 

Conferences that solve current IT challenges

Enterprise Risk /Security Management - Leakage/Loss/Metrics

Strategies for adopting a comprehensive IT GRC (Governance/Risk Management/Compliance) approach to managing information adhering to business needs

June 9, 2011

9:00am-5:00pm

7 CPE / 0.7 CEU / CISSP / 7 PDU Credits Awarded

Register

Bio

Conference location: Donald E. Stephens Convention Center Rosemont (O'Hare) Illinois

Overview

In today’s highly regulatory environment it is essential that you have a clear understanding of risk across the enterprise. A risk management framework can bring visibility to key business and compliance risks and enable a company to make decisions on where to prioritize its limited resources. It is through a risk management framework that real value to the business can be achieved.

With all of these challenges, how do you make this happen?

In this one day conference, attendees will be provided with examples of approaches to managing data leakage, loss and prevention through risk management best practices.

What You Will Learn

In this one day conference attendees will learn:

  • Preventing Your Data from Going Out the Door: Strategies for Data Loss Prevention

  • How to Avoid the Seven Communication Mistakes CSOs Still Make

  • How Security and the CSO Can Provide Business Value

  • Securing the Cloud: What Security & Risk Leaders Should be Worried About

  • Boundaries versus Mobility: How to Strike a Balance with Consumerized IT Devices

  • Protecting Your Brand: What Security & Risk Leaders Should be Doing to Protect Enterprise Value

Conference Program

8:00am - 9:00am - Registration and Continental Breakfast

Bodner

Gabriel

9:00am-10:00am

Preventing Your Data from Going Out the Door: Strategies for Data Loss Prevention

Michael Gabriel, Director Data Protection Practice, Integralis; Former CISO, Career Education Corp.
Anatoly Bodner, CISSP, Manager - Data Protection Practice, Integralis

Data breaches and data loss have a huge impact on the economy. Consumers and business get hurt, shareholders lose faith and suppliers question the viability of the company they are doing business with.

How do you protect your organization so that you are not the next data breach headline in the media?

In this session, an experienced CISO, Michael Gabriel will provide you with a framework that answers the following:

  • How to determine which types of data pose the most risk
  • How to assess your organization's risk of a costly data breach
  • How to develop a Data Protection Program to reduce your risk
  • How to get executive buy-in for your Data Protection Program
  • How to insure your data does not go out the door when employees leave

10:00am -10:30am - Refreshment Break

Conlee


Davis

Hansen

Yetnikoff

10:30am-11:30am

How to Avoid the Seven Communication Mistakes CSOs Still Make

Moderator: Michael A. Davis, CEO, Savid Technologies, Inc.

Speakers will include:
Keith Conlee, CISSP, CISA, CBCP, Chief Security Officer, IT, College of DuPage
Adam C. Hansen, Director, Information Security, SNR Denton US LLP
Arlene Yetnikoff, Director of Information Security, DePaul University

and other CISOs/Security Directors from Enterprise IT Departments

CSOs are under constant pressure to deliver business value and at the same time protect the assets of the enterprise. In the midst of these pressures the security message of the organization can get lost and potentially undermine the organization’s value.

In this session, attendees will learn from senior IT security professionals about the seven common communication mistakes and steps for avoiding them.

Dayton

Gabriel

Rushing

Sturgeon

Walsh

11:30am-12:30pm

How Security and the CSO Can Provide Business Value

Moderators: Greg Dayton, RSM, VERDASYS
Ann Walsh, Manager - Global Strategic Alliance Program, VERDASYS

Panelists will include:

Michael Gabriel, Director Data Protection Practice, Integralis; Former CISO, Career Education Corp.
Richard Rushing, Sr. Director of Information Security, Motorola Mobility
Victor Sturgeon, CISSP, CEH, CSAD, CEI, OSCP, Information Security Risk Management , Risk Assessment Lead, HCSC

and other CISOs/Security Directors from Enterprise IT Departments


In this session, attendees will learn from a panel of IT security executives as to the strategies they are leveraging to insure their efforts are in sync with business priorities.

Topics covered: 

  • How to identify leverage the following areas of value: reputation, regulation, revenue, resilience, and recession for continued investment and security spending
  • How to assess, understand and define security’s current and future roles in the extended enterprise
  • Where are security investments being made on personnel, processes, and technologies
  • What does security need to specifically achieve for the enterprise in terms of protecting current business processes and enhancing future revenue growth

12:30pm - 1:30pm Luncheon

Green

1:30pm-2:30pm

Boundaries versus Mobility: How to Strike a Balance with Consumerized IT Devices

Jon Green, Sr. Product Manager, Aruba Networks

As employees become increasingly mobile through consumer technologies, IT systems and information become more vulnerable to security risks and breaches. The major challenge becomes how to effectively manage these risks while maximizing employee productivity.

In this session, attendees will learn strategies and tactics to work through these challenges.

2:30pm - 3:00pm - Refreshment Break

Kwong

3:00pm-4:00pm

Securing the Cloud: What Security & Risk Leaders Should be Worried About

Fred Kwong, Senior Security Manager, U.S. Cellular

Cloud Computing is yet another disruptive technology that is promising to deliver huge benefits. But with any disruptive technology there are security and risk concerns that need to be addressed.  

In this session attendees will learn how to adjust their security/risk programs to account for the following risks:

  • Abuse and misuse of cloud
  • Insecure APIs/Interfaces
  • Insider Threats
  • Shared Technology Issues
  • Data Loss or Leakage
  • Service & Account Hijacking
  • Unknown Risks

Shear

Bosak

Iatonna

Kudithipudi

Kwong

4:00pm-5:00pm

Protecting Your Brand: What Security & Risk Leaders Should be Doing to Protect Enterprise Value

Moderator: Michele Shear, RSD, Imperva

Speakers will include:

John Iatonna, Vice President, Information Security, Edelman Public Relations
Vinay Kudithipudi, Director of IT - Infrastructure & Information Security, Aircell LLC
Lori Bosak, Enterprise Risk Management, Information Manager, Zurich North America
Fred Kwong, Senior Security Manager, U.S. Cellular
and other CISOs/Security Directors from Enterprise IT Departments

Brand equity is one of the enterprise’s greatest assets. It impacts revenues, the company’s reputation and current and future customer relationships.

The openness of the internet has connected people, business and helped build brands. At the same time it has created significant challenges including business fraud and brand abuse.

In this session, attendees will learn how leading security and risk executives are protecting their brands.


Conference Price: $249.00 per person


Each attendee will receive a certificate awarding 7 CPE credits for CISSP continuing education, in addition to 0.7 CEUs and 7 PDUs. CISSP is a registered certification mark of (ISC)˛, Inc.

Exhibits

As is always the case at CAMP IT Conferences events, the talks will not include product presentations.  During the continental breakfast, coffee breaks, and the luncheon break you will have the opportunity to informally meet representatives from the following sponsoring companies, who have solutions in the area of the conference.