Feedback from Attendees

Upcoming  2017 Events

July 12, 2017
Enterprise Architecture Strategies
Info
Chicago, IL

Sept. 7, 2017
IT Infrastructure/Operations Management (Data Center)
Info
Chicago, IL

Sept. 19, 2017
Enterprise Risk/Security Management
Info
Dallas, TX

Oct. 4, 2017
Enterprise Risk/Security Management
Info
Chicago, IL

Oct. 18, 2017
IT Leadership Strategies
Info
Chicago, IL

Oct. 26, 2017
Enterprise Architecture Strategies
Info
Chicago, IL

Nov. 1-2, 2017
IT PMO/Portfolio Management
Info
Dallas, TX

Nov. 15, 2017
DR/BC - Resilient Infrastructure
Info
Chicago, IL

Nov. 30, 2017
Business Intelligence/Big Data/Analytics
Info
Chicago, IL

Dec. 7, 2017
Data Breaches: Preparing and Responding
Info
Chicago, IL

Upcoming  2018 Events

Feb. 1, 2018
Enterprise Risk/Security Management
Info
Dallas, TX

Feb. 20, 2018
Enterprise Risk/Security Management
Info
Chicago, IL

Mar. 1, 2018
IT Leadership Strategies
Info
Chicago, IL

Mar. 7, 2018
Enterprise Architecture Strategies
Info
Chicago, IL

April 12, 2018
Business Intelligence/Big Data/Analytics
Info
Chicago, IL

May 2, 2018
Data Breaches: Preparing and Responding
Info
Chicago, IL

May 15, 2018
IT Infrastructure/Operations Management (Data Center)
Info
Chicago, IL

May 31, 2018
Enterprise Risk/Security Management
Info
Minneapolis, MN

June 7, 2018
Enterprise Risk/Security Management
Info
Chicago, IL

June 20-21, 2018
IT PMO/Portfolio Management
Info
Chicago, IL

July 11, 2018
Enterprise Architecture Strategies
Info
Chicago, IL

Sept. 6, 2018
IT Infrastructure/Operations Management (Data Center)
Info
Chicago, IL

Sept. 18, 2018
Enterprise Risk/Security Management
Info
Dallas, TX

Oct. 3, 2018
Enterprise Risk/Security Management
Info
Chicago, IL

Oct. 17, 2018
IT Leadership Strategies
Info
Chicago, IL

Oct. 25, 2018
Enterprise Architecture Strategies
Info
Chicago, IL

Nov. 1-2, 2018
IT PMO/Portfolio Management
Info
Dallas, TX

Nov. 14, 2018
DR/BC - Resilient Infrastructure
Info
Chicago, IL

Nov. 29, 2018
Business Intelligence/Big Data/Analytics
Info
Chicago, IL

Dec. 6, 2018
Data Breaches: Preparing and Responding
Info
Chicago, IL

(Click here to add any of our upcoming events to your calendar)

 

 

Conferences that solve current IT challenges

Enterprise Risk / Security Management

Strategies for adopting a comprehensive IT GRC (Governance/Risk Management/Compliance) approach to managing information adhering to business needs

February 7, 2013

9:00am-5:00pm

7 CPE / 0.7 CEU / CISSP / 7 PDU Credits Awarded

Bios

Conference location: Donald E. Stephens Convention Center Rosemont (O'Hare) Illinois

Overview

In today’s highly regulatory environment it is essential that you have a clear understanding of risk across the enterprise. A risk management framework can bring visibility to key business and compliance risks and enable a company to make decisions on where to prioritize its limited resources. It is through a risk management framework that real value to the business can be achieved.

With all of these challenges, how do you make this happen?

In this one day conference, attendees will be provided with examples of approaches to managing information and compliance risk through a risk management framework.

What You Will Learn

In this one day conference attendees will learn:

  • IT Risk & Social Engineering: Establishing Metrics to Manage the Human Layer

  • How to Design an Effective Risk Assessment

  • How Security and the CSO Can Provide Business Value

  • How to Reduce the Risk of Data Loss and Audit Failures: Implementing a Response Plan

  • Mobile Technology in the Enterprise: How to Manage Security Risks of BYOD

  • Big Data - Didn't We Used to Call it SEIM?

Conference Program

8:00am - 9:00am - Registration and Continental Breakfast

Chapman

9:00am-10:00am

IT Risk & Social Engineering: Establishing Metrics to Manage the Human Layer

Mark T. Chapman, CFE CISSP CISM CRISC, President and Founder, PhishLine.com

The most damaging information security attacks often use low-tech social-engineering methods to trick users into sharing sensitive information. In spite of the significant money spent on email and web content filtering technologies, organizations ultimately must rely on the generally unreliable “human firewall” to thwart phishing attempts. For such an important class of critical security controls, it is surprisingly rare to formally configure and manage the human layer beyond ad-hoc techniques based on anecdotal, incomplete and inaccurate information.

There are now ways to safely use some of the methods employed by attackers to provide objective, understandable and actionable metrics to proactively measure, manage and improve the effectiveness of the last line of defense.

Objectives:

  • Take a real-world look at “configuring” the human firewall in the enterprise beyond generic security awareness training.
  • Define objective, understandable and actionable metrics around social engineering.
  • Discuss stories-from-the-trenches with examples that measured and improved the effectiveness of people, process and technology controls.
  • Help establish an “Information Security Awareness Operational Plan”, where employees thwart unauthorized attempts to obtain sensitive information.

10:00am -10:30am - Refreshment Break

Cronin

10:30am-11:30am

Risk, Security and Compliance: Notes from the Field

Chris Cronin, Governance & Strategy Consultant, ISO 27001 Auditor, HALOCK Security Labs

Laws and regulations are telling us to manage our information security by identifying our risks and reducing them to a reasonable level, and for good reason. Risk management makes information security and compliance more attainable and more meaningful than when we use a compliance checklist. So why has American business been so slow to adopt risk management?

This talk will present case histories of organizations that initially avoided risk management but who eventually found a surprising payoff: Managing information security and compliance through risk management coordinated the interests of the executive team, operations, IT, legal, sales, compliance and audit. As a result, information security became easier to implement and maintain.

As well, we will present the basics of implementing risk management to achieve the successes of these organizations.

Amedeo

Germain

Kunas

Witek

11:30am-12:30pm

How Security and the CSO Can Provide Business Value (Panel)

Moderator:
Bill Amedeo, BDM, Column Technologies
Panelists:
John Germain, Chief Information Security Officer, Xylem
Neil Witek, VP, Information Security Governance, AIM Specialty Health (subsidiary of WellPoint)
Jim Huddleston, Director, Global IT Risk Management, US Resources
Paul Kunas, Director, Information Security, Sidley Austin
and other CISOs/Security Directors from Enterprise IT Departments

In this session, attendees will learn from a panel of IT security executives as to the strategies they are leveraging to insure their efforts are in sync with business priorities.

Topics covered:

  • How to identify leverage the following areas of value: reputation, regulation, revenue, resilience, and recession for continued investment and security spending
  • How to assess, understand and define security’s current and future roles in the extended enterprise
  • Where are security investments being made on personnel, processes, and technologies
  • What does security need to specifically achieve for the enterprise in terms of protecting current business processes and enhancing future revenue growth

12:30pm - 1:30pm Luncheon

Skehan

1:30pm-2:30pm

How to Reduce the Risk of Data Loss and Audit Failures: Implementing a Response Plan

Joe Skehan, Sr. Director, Product Management, Venafi

In today's fast-paced, high tech ‘cloud’ and ‘BYOD’ world, encryption keys and digital certificates serve as the primary security mechanisms (authentication & encryption) for protecting usernames, passwords, and other sensitive data transferred in and out of corporate networks and between computers.

Most organizations today are unprepared to handle the day-to-day security, operational and compliance risks related to managing their encryption keys and certificates. What will happen to your company or government agency when (NOT IF) your Certificate Authority is compromised?

In 2011, for the first time publically recorded in history, 4 public CA’s were compromised, forcing public and private sector organizations to immediately and manually locate, revoke and replace the compromised certificates.

Notably, the Dutch government was crippled by the DigiNotar CA compromise which disabled all secure online operations for a prolonged period of time. This incident caused the Dutch government the expensive and embarrassing action of informing their citizens to “only use pen and paper, or fax” as a means of secure communication.

This session provides a risk overview, security best practices and lessons learned from recent CA compromises on a global scale. The session will also provide guidance to organizations looking to implement a CA compromise response plan.

2:30pm - 3:00pm - Refreshment Break

McCully

Guth

Corn

Merkel

Bee

3:00pm-4:00pm

Mobile Technology in the Enterprise: How to Manage Security Risks of BYOD (Panel)

Moderator:
Mic McCully, Senior Mobile Architect, WatchDox
Speakers will include:
Greg Bee, CISO, Country Financial
Mark Guth, Director of Security, AGL Resources/Nicor
Michael Corn, CISO, University of Illinois
Chris Merkel, Director IS Security, Brunswick
and other CISOs/security leaders sharing their experiences and lessons learned

As employees become increasingly mobile through consumer technologies, IT systems and information become more vulnerable to security risks and breaches. The major challenge becomes how to effectively manage these risks while maximizing employee productivity.

In this session, attendees will learn from a group of seasoned IT security executives as to how they are handling these challenges.













Milroy

4:00pm-5:00pm

Big Data - Didn't We Used to Call it SEIM?

Derek Milroy, Senior IS Security Engineer, U.S. Cellular

This presentation will examine what Big Data is/may be as it relates to Information Security. Many times, there is a lot of data that must be optimized/put in use, prior to implementing Big Data. The presentation will then focus on steps to reaching a point where Big Data analytics may be possible. A structured approach will be presented so that Organizations can optimize and use existing data while preparing for a Big Data initiative or implementation.


Conference Price: $269.00 per person


Each attendee will receive a certificate awarding 7 CPE credits for CISSP continuing education, in addition to 0.7 CEUs and 7 PDUs. CISSP is a registered certification mark of (ISC)², Inc.

Exhibits

As is always the case at CAMP IT Conferences events, the talks will not include product presentations.  During the continental breakfast, coffee breaks, and the luncheon break you will have the opportunity to informally meet representatives from the following sponsoring companies, who have solutions in the area of the conference.