Conferences that solve current IT challenges

Data Breaches: Defending Against and Responding to

Strategies to help your organization prepare for, defend against and respond to breaches

October 26, 2016

9:00am-5:00pm

7 CPE / 0.7 CEU / CISSP / 7 PDU Credits Awarded

Bios

Conference location: Donald E. Stephens Convention Center Rosemont (O'Hare) Illinois

Overview

It is not a matter of if, but when your organization will be breached. Against these threats, enterprises try to build higher and more secure walls around their data and networks. This seems to be a never-ending arms race, as even the most sophisticates systems may, before long, present weaknesses that malicious technology can overcome.

What You Will Learn

In this one day conference attendees will learn:

  • Aftermath of a Data Breach: Lessons Learned
  • Data Breach Preparedness: Are You Ready to Handle?
  • The Shifting Wall: A Data Centric Audit and Protect (DCAP) approach to Data Breach prevention
  • Is it a Data Breach? How to Determine the Significance of a Security Incident
  • When the Breach Occurs: How to Gather Evidence and Help Determine the Culprit
  • Legal & IT: Responsibilities for a Data Breach

Conference Program

8:00am - 9:00am - Registration and Continental Breakfast

Chahino

9:00am-10:00am

Aftermath of a Data Breach: Lessons Learned

Michael Chahino, Executive Director, Network Operations and CISO, Elgin Community College

As data breaches continue to hammer organizations with devastating outcomes, monetary as well as reputation costs continue to rise year after year. And while Cybersecurity professionals are tasked with securing and enhancing the information security posture of their organizations, they could find themselves consumed with gathering forensic evidence, executing data recovery plans, gathering facts, containing the damages and dealing with the aftermath in case of a data breach. Having a tested and verified data breach recovery plan is becoming more crucial than ever.

This session explores lessons learned from the aftermath of experiencing the discovery of and recovery from a data breach and provides some recommendations to help organizations deal with disruptive cyber-attacks.









10:00am -10:30am - Refreshment Break

Cox

10:30am-11:30am

Data Breach Preparedness: Are You Ready to Handle?

Steven Cox, Response Ready Advisor, AllClear ID

No one is fully prepared when a data breach occurs, but there are steps an organization can take to mitigate the consequences. In this session, attendees will understand how to handle a breach from the beginning of the process.

Areas that will be covered:

  • How to communicate to internal stakeholders
  • How to articulate to customers and business partners
  • How to handle the potential media circus
  • How to avoid the internal blame game











11:30am-12:30pm

Lara

The Shifting Wall: A Data Centric Audit and Protect (DCAP) Approach to Data Breach Prevention

Juan Lara, Director of Security Strategy, Imperva, Inc.

With the proliferation of cloud adoption, BYOD, SaaS and Big Data deployments, CISOs face a complex set of diverse moving targets within their risk frameworks. A strong Breach Prevention policy requires awareness of the new “walls” we need to build. A Data Centric Audit and Protect (DCAP) view of security will assist CISOs in prioritizing and focusing on reducing risk.









12:30pm - 1:30pm Luncheon

Skrei

1:30pm-2:30pm

Is it a Data Breach? How to Determine the Significance of a Security Incident

Andy Skrei, Solution Architect, Exabeam; former Lead Security Engineer, eBay 

Security incidents occur regularly. But only a small percentage are considered actual “data breaches” or other serious security threats.

How do you determine if it is a breach and how should you respond?

In this session, attendees will learn how to classify whether the incident was an actual breach and the proper steps to pursue.









2:30pm - 3:00pm - Refreshment Break

Karasek

3:00pm-4:00pm

When the Breach Occurs: How to Gather Evidence and Help Determine the Culprit

Ken Karasek, Sr. Solutions Consultant Guidance Software

Finding the evidence and determining the source can be complicated. The evidence of a possible breach can come from different sources , including internal sabotage, external parties such as vendors, business partners and/ or customers.

This session will examine how to locate, preserve and understand the evidence and present it in a fact based scenario while leaving out the hysteria.









4:00pm-5:00pm

Sumar

Devine

Niser

Versetto

Data Breach Security Policy: Governance and Management

Moderator:
Annur Sumar, CTO, MaeTech
Panelists:
Erik Devine, CISO, Riverside Healthcare
Paul Niser, Former Vice President, Financial Services Firm
Ron Versetto, Director Technology, City Colleges of Chicago
and other CISOs sharing experiences and lessons learned

In this thought provoking session, attendees will learn how to design the procedure that should be followed to ensure a consistent and effective approach is in place for managing data breach and information security incidents across the enterprise.












Conference price: $289 per person.


Each attendee will receive a certificate awarding 7 CPE credits for CISSP continuing education, in addition to 0.7 CEUs and 7 PDUs. CISSP is a registered certification mark of (ISC)˛, Inc.

Exhibits

As is always the case at CAMP IT Conferences events, the talks will not include product presentations.  During the continental breakfast, coffee breaks, and the luncheon break you will have the opportunity to informally meet representatives from the following sponsoring companies, who have solutions in the area of the conference.