Conferences that solve current IT challenges

Enterprise Risk / Security Management

Strategies for reducing risk to the enterprise.

June 9, 2016

9:00am-5:00pm

7 CPE / 0.7 CEU / CISSP / 7 PDU Credits Awarded

Bios

Conference location: Donald E. Stephens Convention Center Rosemont (O'Hare) Illinois

Overview

In today’s highly regulatory environment it is essential that you have a clear understanding of risk across the enterprise. A risk management framework can bring visibility to key business and compliance risks and enable a company to make decisions on where to prioritize its limited resources. It is through a risk management framework that real value to the business can be achieved.

With all of these challenges, how do you make this happen?

In this one day conference, attendees will be provided with examples of approaches to managing information and compliance risk through a risk management framework.

What You Will Learn

In this one day conference attendees will learn:

  • Reducing Your Risk: Securing Your Data from the Threat Within

  • Endpoints & Servers, Private & Public Clouds : Are the Security Risks the same?

  • Firming the Posture: Building a World-Class Security-Risk Team (Panel discussion)

  • The Enterprise Immune System – Using Machine Learning to Detect Unknown Threats

  • Vendor Security Assessment-How to Be Innovative and Demonstrate Enterprise Value

  • IoT is Here: How to Reduce the Risk?

  • Breaches in 2016: How is this Affecting Your Security/Risk Strategy (Panel discussion)

Conference Program

8:00am - 9:00am - Registration and Continental Breakfast

Lara

9:00am-10:00am

Reducing Your Risk: Securing Your Data from the Threat Within

Juan Lara, Director of Security Strategy, Imperva

External cybersecurity threats get all the press, and they are certainly dangerous. Shadowy international gangsters, brilliant but evil hackers, mom-and-pop-shop criminals stealing from us one Target transaction at a time – as fictional as it sounds, it is all real, and very much deserves our attention and protection as individuals and a society.

Unfortunately, your worst cybersecurity threat may already be on your payroll.

Join us as we discuss:

  • What are insider threats, and why are they so dangerous?
  • Why current controls can’t contain insider threats
  • Core steps to better protection against insider threats







10:00am -10:30am - Refreshment Break

Shulze

10:30am-11:30am

Endpoints & Servers, Private & Public Clouds : Are the Security Risks the Same?

Eric Shulze, Principal Engineer, Trend Micro

Today most enterprises have a hybrid environment of physical, virtual, and cloud systems, yet many treat these the same from a security risk perspective. In this session, we will discuss these workload types and the security risks of each that an enterprise has to be aware of and the best way to mitigate them.  









Sumar

Barnes

Hartley

Rasheed

Hunka

11:30am-12:30pm

Firming the Posture: Building a World-Class Security-Risk Team (Panel discussion)

Moderator:
Annur Sumar, CTO, Maetech
Panelists:
Joe Barnes, Chief Privacy & Security Officer, University of Illinois at Urbana-Champaign
James P. Hartley, Chief Information Security Officer, Aon Hewitt
Fawaz Rasheed, Chief Information Security Officer, Johnson Controls
Larry Hunka, Chief Information Security Executive, Information Systems, Northwestern Memorial HealthCare
and other CISOs/Security Executives

What does it take to foster and retain top-tier talent as well as adopt an enterprise-wide security culture beyond IT?

In this session, attendees will learn from a CISO panelists sharing their experiences as to getting ahead of the threats while engaging the entire extended enterprise as a part of fight.












12:30pm - 1:30pm Luncheon Session

Munoz

The Enterprise Immune System – Using Machine Learning to Detect  Unknown Threats

Carlos Munoz, Manager, Darktrace












Siteman

1:30pm-2:30pm

Vendor Security Assessment-How to Be Innovative and Demonstrate Enterprise Value

Stephanie Siteman, Vendor Security Program Manager, Facebook

Vendor Security Assessments are more than just a check in the box. Many organizations don’t see the value in an effective Vendor Security Program. In this session, Stephanie Siteman from Facebook will demonstrate the significant value Vendor Security Assessments can provide.








 

2:30pm - 3:00pm - Refreshment Break

Reinhart

3:00pm-4:00pm

IoT is Here: How Can You Reduce the Risk? 

Mike Reinhart, VP of Marketing, AccelOps, Inc.

Regulatory compliance management (such as PCI, HIPAA, ISO) and security breach protection, is already a complex challenge present in many organizations today. The complexity is continuing to grow, and exponentially, with the increasing sources, numbers and types of attacks being generated, with the proliferation of the Internet of Things (IoT). With this complexity also comes higher costs in terms of not only the number of security incidents that need to be investigated, the number of tools needed and in finding the skilled personnel to manage it. And, the cost of these breaches are being measured beyond mere dollars to their detrimental impacts on a company’s brand and reputation, customer and supplier relationships, employee productivity, and all the way up the organization’s board and C-Level reputations.








Sorebo

Chahino

Rushing

4:00pm-5:00pm

Breaches in 2016: How is this Affecting Your Security/Risk Strategy (Panel)

Moderator:
Gib Sorebo, Chief Cybersecurity Strategist, Leidos
Panelists:
Michael Chahino, Ed.D, Executive Director, Network Operations and Information Security, Elgin Community College
Richard Rushing, CISO, Motorola Mobility
Eric Hansen, Country Group Information Security Officer for Latin America, Siemens
and other CISOs/Security Executives

According to industry analysts, approximately 50% of organizations have had to reevaluate their information security standards as a result of recent well-publicized attacks.

In this session, attendees will learn from a panel of IT security executives as to how they are updating their security & risk strategies in the wake of massive security breaches.









Conference Price: $289.00 per person


Each attendee will receive a certificate awarding 7 CPE credits for CISSP continuing education, in addition to 0.7 CEUs and 7 PDUs. CISSP is a registered certification mark of (ISC)˛, Inc.

Exhibits

As is always the case at CAMP IT Conferences events, the talks will not include product presentations.  During the continental breakfast, coffee breaks, and the luncheon break you will have the opportunity to informally meet representatives from the following sponsoring companies, who have solutions in the area of the conference.