Feedback from Attendees

Upcoming  2016 Events

Sep 22, 2016
Enterprise Risk/Security Management
Info
Dallas, TX

Oct 6, 2016
Enterprise Risk/Security Management
Info
Chicago, IL

Oct 20, 2016
IT Leadership Strategies
Info
Chicago, IL

Oct 26, 2016
Data Breaches: Defending Against and Responding to
Info
Chicago, IL

Nov 2-3, 2016
IT PMO/Portfolio Management
Info
Dallas, TX

Nov 15, 2016
Enterprise Risk/Security Management
Atlanta, GA
Info

Dec 1, 2016
Business Intelligence/Big Data/Analytics
Info
Chicago, IL

Dec 8, 2016
Data Breaches: Defending Against and Responding to
Info
Chicago, IL

Upcoming  2017 Events

Feb. 2, 2017
Enterprise Risk/Security Management
Info
Dallas, TX

Feb. 16, 2017
Enterprise Risk/Security Management
Info
Chicago, IL

March 2, 2017
IT Leadership Strategies
Info
Chicago, IL

March 8, 2017
IT Architecture Strategies
Info
Chicago, IL

April 20, 2017
Business Intelligence/Big Data/Analytics
Info
Chicago, IL

April 24-25, 2017
Enterprise Risk/Security Management
Info
Las Vegas, NV

May 4, 2017
Data Breaches: Preparing and Responding
Info
Chicago, IL

May 16, 2017
IT Infrastructure/Operations Management (Data Center)
Info
Chicago, IL

June 1, 2017
Enterprise Risk/Security Management
Info
Minneapolis, MN

June 8, 2017
Enterprise Risk/Security Management
Info
Chicago, IL

June 21-22, 2017
IT PMO/Portfolio Management
Info
Chicago, IL

Sept. 7, 2017
IT Infrastructure/Operations Management (Data Center)
Info
Chicago, IL

Sept. 19, 2017
Enterprise Risk/Security Management
Info
Dallas, TX

Oct. 4, 2017
Enterprise Risk/Security Management
Info
Chicago, IL

Oct. 11, 2017
IT Architecture Strategies
Info
Chicago, IL

Oct. 19, 2017
IT Leadership Strategies
Info
Chicago, IL

Nov. 1-2, 2017
IT PMO/Portfolio Management
Info
Dallas, TX

Nov. 15, 2017
Enterprise Risk/Security Management
Info
Atlanta, GA

Nov. 30, 2017
Business Intelligence/Big Data/Analytics
Info
Chicago, IL

Dec. 7, 2017
Data Breaches: Preparing and Responding
Info
Chicago, IL

 

 

 

(Click here to add any of our upcoming events to your calendar)

 

 

Conferences that solve current IT challenges

Enterprise Risk / Security Management

Strategies for reducing risk to the enterprise.

February 5, 2015

9:00am-5:00pm

7 CPE / 0.7 CEU / CISSP / 7 PDU Credits Awarded

Bios

Conference location: Donald E. Stephens Convention Center Rosemont (O'Hare) Illinois

Overview

In today’s highly regulatory environment it is essential that you have a clear understanding of risk across the enterprise. A risk management framework can bring visibility to key business and compliance risks and enable a company to make decisions on where to prioritize its limited resources. It is through a risk management framework that real value to the business can be achieved.

With all of these challenges, how do you make this happen?

In this one day conference, attendees will be provided with examples of approaches to managing information and compliance risk through a risk management framework.

What You Will Learn

In this one day conference attendees will learn:

  • Calculating Your Acceptable Level of Risk

  • 2014 Lessons Learned and Top Predictions for 2015

  • Reducing Risk: How to Leverage the Threat & Vulnerability Management Maturity Model

  • Control Who is Telling the InfoSec Story

  • How Security and the CSO Can Provide Business Value (Panel)

  • Breaches in 2015: How is this Affecting Your Security/Risk Strategy

Conference Program

8:00am - 9:00am - Registration and Continental Breakfast

Goerlich

9:00am-10:00am

Calculating Your Acceptable Level of Risk

J. Wolfgang Goerlich, Security Strategist, CBI

With so many potential risks it can be difficult to determine which an enterprise can live with, which it can't, and which it can cope with when reduced to an acceptable level of risk.

Determining an acceptable level of risk needs to be undertaken when there is a significant change in a business' activities within the environment. Examples are updating policies and training or improving security controls and contingency plans, the risks need constant monitoring to ensure the right balance between risk, security and profit.

In this session attendees will learn how to build a framework to define an acceptable level of risk.










10:00am -10:30am - Refreshment Break

Kurzynski

10:30am-11:30am

2014 Lessons Learned and Top Predictions for 2015

Terry Kurzynski, Senior Partner, ISO 27001 Auditor, CISSP, CISA, HALOCK Security Labs

2014 was a busy year in the cyber world. As Target, Home Depot, Jimmy Johns, and Sony were hacked. Malware like Shellshock, Heartbleed, and Regin were topping headlines. What can we learn from 2014 to shore up our data security? What can companies expect to see in 2015? This informative talk by Terry Kurzynski, Senior Partner at HALOCK Security Labs will take you through the lessons-learned of 2014 and offer some predictions for the coming year.







Cowperthwaite 

11:30am-12:30pm

Reducing Risk: How to Leverage the Threat & Vulnerability Management Maturity Model

Eric Cowperthwaite, VP, Advanced Security and Strategy, Core Security

Threat and Vulnerability Management combines an understanding of an organization’s assets, information technology infrastructure and systemic vulnerabilities into a coherent whole. A formal TVM Program is a critical component of a robust information security program. It enables an organization to understand 1) how adversaries will take action 2) what vulnerabilities exist within the organization 3) how this combination puts critical assets at risk and 4) how to manage and mitigate that risk.








12:30pm - 1:30pm Luncheon

Marchewka

1:30pm-2:30pm

Control Who is Telling the InfoSec Story

Edward Marchewka, Enterprise Information Security and Server Operations Manager, Chicago Public Schools

As the Board is getting more involved with information security they want answers to questions like, "Are we secure?", and "What are we doing about compliance gaps?", and even "What is everyone else doing?" This talk will take a look at answering these questions by telling the information security story - tying measures and metrics to business outcomes and setting direction based on risk and effort. There will be practical take-always as well as tools to leverage to get the message out and build a culture of security.










2:30pm - 3:00pm - Refreshment Break

Cariddi

Garcia

Hansen

Johnson

Bivian

Kwong

3:00pm-4:00pm

How Security and the CSO Can Provide Business Value (Panel)

Moderator:
Robert Cariddi, Vice President, SentinelOne
Panelists:
Victor Garcia, Global Security Officer, Global Treasury Services-Americas, BP
John Johnson, Global Security Strategist, John Deere
Roberta A. Hansen, Senior Manager, IT Risk Management, Abbott
Paul Bivian, CISO, Information Security Office, (DoIT), City of Chicago
Fred Kwong, Head of Privilege Access Control, Farmers Insurance
and other professionals from IT departments

In this session, attendees will learn from a panel of IT security executives as to the strategies they are leveraging to insure their efforts are in sync with business priorities.

Topics covered:

  • How to identify leverage the following areas of value: reputation, regulation, revenue, resilience, and recession for continued investment and security spending
  • How to assess, understand and define security’s current and future roles in the extended enterprise
  • Where are security investments being made on personnel, processes, and technologies















Withrow

Bee

Guth

Ramakrishnan

Davis

4:00pm-5:00pm

Breaches in 2015: How is this Affecting Your Security/Risk Strategy (Panel)

Moderator:
Wes Withrow, IT GRC Subject Matter Expert, TraceSecurity
Panelists:
Greg Bee, CISO, Country Financial
Mark Guth, Director of Security, AGL Resources/Nicor
Prasanna Ramakrishnan, VP – Information Risk Management, Career Education Corporation
Michael Davis, Chief Technology Officer, CounterTack
and other professionals from IT departments 

According to industry analysts, approximately 50% of organizations have had to reevaluate their information security standards as a result of recent well-publicized attacks.

In this session, attendees will learn from a panel of IT security executives as to how they are updating their security & risk strategies in the wake of massive security breaches.






Conference Price: $289.00 per person


Each attendee will receive a certificate awarding 7 CPE credits for CISSP continuing education, in addition to 0.7 CEUs and 7 PDUs. CISSP is a registered certification mark of (ISC)˛, Inc.

Exhibits

As is always the case at CAMP IT Conferences events, the talks will not include product presentations.  During the continental breakfast, coffee breaks, and the luncheon break you will have the opportunity to informally meet representatives from the following sponsoring companies, who have solutions in the area of the conference.