Conferences that solve current IT challenges
Data Breaches: Defending Against and Responding to
Strategies to help your organization prepare for, defend against and respond to breaches
October 26, 2016
7 CPE / 0.7 CEU / CISSP / 7 PDU Credits Awarded
Conference location: Donald E. Stephens Convention Center Rosemont (O'Hare) Illinois
It is not a matter of if, but when your organization will be breached. Against these threats, enterprises try to build higher and more secure walls around their data and networks. This seems to be a never-ending arms race, as even the most sophisticates systems may, before long, present weaknesses that malicious technology can overcome.
What You Will Learn
In this one day conference attendees will learn:
- Aftermath of a Data Breach: Lessons Learned
- Data Breach Preparedness: Are You Ready to Handle?
- The Shifting Wall: A Data Centric Audit and Protect (DCAP) approach to Data Breach prevention
- Is it a Data Breach? How to Determine the Significance of a Security Incident
- When the Breach Occurs: How to Gather Evidence and Help Determine the Culprit
- Legal & IT: Responsibilities for a Data Breach
8:00am - 9:00am - Registration and Continental Breakfast
Aftermath of a Data Breach: Lessons Learned
Michael Chahino, Executive Director, Network Operations and CISO, Elgin Community College
As data breaches continue to hammer
organizations with devastating outcomes,
monetary as well as reputation costs continue to
rise year after year. And while Cybersecurity
professionals are tasked with securing and
enhancing the information security posture of
their organizations, they could find themselves
consumed with gathering forensic evidence,
executing data recovery plans, gathering facts,
containing the damages and dealing with the
aftermath in case of a data breach. Having a
tested and verified data breach recovery plan is
becoming more crucial than ever.
This session explores lessons learned from the aftermath of experiencing the discovery of and recovery from a data breach and provides some recommendations to help organizations deal with disruptive cyber-attacks.
10:00am -10:30am - Refreshment Break
Data Breach Preparedness: Are You Ready to Handle?
Steven Cox, Response Ready Advisor, AllClear ID
No one is fully prepared when a data breach
occurs, but there are steps an organization can
take to mitigate the consequences. In this
session, attendees will understand how to handle
a breach from the beginning of the process.
Areas that will be covered:
- How to communicate to internal stakeholders
- How to articulate to customers and business partners
- How to handle the potential media circus
How to avoid the internal blame game
The Shifting Wall: A Data Centric Audit and Protect (DCAP) Approach to Data Breach Prevention
Juan Lara, Director of Security Strategy, Imperva, Inc.
With the proliferation of cloud adoption, BYOD,
SaaS and Big Data deployments, CISOs face a
complex set of diverse moving targets within
their risk frameworks. A strong Breach
Prevention policy requires awareness of the new
“walls” we need to build. A Data Centric Audit
and Protect (DCAP) view of security will assist
CISOs in prioritizing and focusing on reducing
12:30pm - 1:30pm Luncheon
Is it a Data Breach? How to Determine the Significance of a Security Incident
Andy Skrei, Solution Architect, Exabeam; former Lead Security Engineer, eBay
Security incidents occur regularly. But only a
small percentage are considered actual “data
breaches” or other serious security threats.
How do you determine if it is a breach and how should you respond?
In this session, attendees will learn how to classify whether the incident was an actual breach and the proper steps to pursue.
2:30pm - 3:00pm - Refreshment Break
When the Breach Occurs: How to Gather Evidence and Help Determine the Culprit
Ken Karasek, Sr. Solutions Consultant Guidance Software
Finding the evidence and determining the source
can be complicated. The evidence of a possible
breach can come from different sources ,
including internal sabotage, external parties
such as vendors, business partners and/ or
This session will examine how to locate, preserve and understand the evidence and present it in a fact based scenario while leaving out the hysteria.
Data Breach Security Policy: Governance and Management
Annur Sumar, CTO, MaeTech
Erik Devine, CISO, Riverside Healthcare
Paul Niser, Former Vice President, Financial Services Firm
Ron Versetto, Director Technology, City Colleges of Chicago
and other CISOs sharing experiences and lessons learned
In this thought provoking session, attendees
will learn how to design the procedure that
should be followed to ensure a consistent and
effective approach is in place for managing data
breach and information security incidents across
Conference price: $289 per person.
Each attendee will receive a certificate awarding 7 CPE credits for CISSP continuing education, in addition to 0.7 CEUs and 7 PDUs. CISSP is a registered certification mark of (ISC)˛, Inc.
As is always the case at CAMP IT Conferences events, the talks will not include
product presentations. During the continental breakfast,
coffee breaks, and the luncheon break you will have the opportunity
to informally meet representatives from the following sponsoring
companies, who have solutions in the area of the conference.