Conferences that solve current IT challenges

Enterprise Risk / Security Management

Strategies for reducing risk to the enterprise.

November 15, 2016

9:00am-5:00pm

7 CPE / 0.7 CEU / CISSP / 7 PDU Credits Awarded

Conference location: Cobb Energy Performing Arts Centre, Atlanta GA

Overview

In todayís highly regulatory environment it is essential that you have a clear understanding of risk across the enterprise. A risk management framework can bring visibility to key business and compliance risks and enable a company to make decisions on where to prioritize its limited resources. It is through a risk management framework that real value to the business can be achieved.

With all of these challenges, how do you make this happen?

In this one day conference, attendees will be provided with examples of approaches to managing information and compliance risk through a risk management framework.

What You Will Learn

In this one day conference attendees will learn:

  • Reducing Your Risk: Securing Your Data from the Threat Within

  • Endpoints & Servers, Private & Public Clouds : Are the Security Risks the same?

  • Firming the Posture: Building a World-Class Security-Risk Team (Panel discussion)

  • Vendor Security Assessment-How to Be Innovative and Demonstrate Enterprise Value

  • IoT is Here: How to Reduce the Risk?

  • Breaches in 2016: How is this Affecting Your Security/Risk Strategy (Panel discussion)

Conference Program

8:00am - 9:00am - Registration and Continental Breakfast

9:00am-10:00am

Kuchynski

Reducing Your Risk: Securing Your Data from the Threat Within

Dmitry Kuchynski, Customer Solutions Director, Cisco Systems

External cybersecurity threats get all the press, and they are certainly dangerous. Shadowy international gangsters, brilliant but evil hackers, mom-and-pop-shop criminals stealing from us one Target transaction at a time Ė as fictional as it sounds, it is all real, and very much deserves our attention and protection as individuals and a society.

Unfortunately, your worst cybersecurity threat may already be on your payroll.

Join us as we discuss:

  • What are insider threats, and why are they so dangerous?

  • Why current controls canít contain insider threats

  • Core steps to better protection against insider threats









10:00am -10:30am - Refreshment Break

Jangid

10:30am-11:30am

Balancing Digital Transformation & Privacy Compliance

Naren Jangid, Managing Partner, RAAH Technologies

For todayís digital businesses, being prepared to meet new compliance requirements when storing and managing consumer data will not only minimize risk, but also enable more valued and trusted customer experiences that drive increased loyalty, engagement and revenue. To gain better perspective on this important issue, itís important to understand: - The trends driving governmental regulatory shifts and the basic tenets of these new laws - The challenges faced by executives across the enterprise when managing privacy compliance for consumer data - The emergence of cloud-based solutions that help businesses manage privacy compliance by acting as end-to-end customer data storage and management solutions that are far more scalable and flexible than legacy systems.








11:30am-12:30pm

Varnadoe

Baird

Reardon

Barronton

Firming  the Posture: Building a World-Class Security-Risk Team (Panel discussion)

Moderator:
Julie Hughes, Director, The Judge Group

Panelists:
Bob Varnadoe, CISO, NCR
James Baird, Vice President, IT Security & Compliance, American Cancer Society, Inc.
Mark Reardon, CISSP, AVP of Information Security & CISO, WellStar Health System
Scott Barronton, CISO, Group Head Corporate Information Security Services, D+H
and other CISOs/Security Executives from IT departments sharing lessons learned

What does it take to foster and retain top-tier talent as well as adopt an enterprise-wide security culture beyond IT?

In this session, attendees will learn from a CISO panelists sharing their experiences as to getting ahead of the threats while engaging the entire extended enterprise as a part of fight.









12:30pm - 1:30pm Luncheon

1:30pm-2:30pm

 

Vendor Security Assessment-How to Be Innovative and Demonstrate Enterprise Value

 

Vendor Security Assessments are more than just a check in the box. Many organizations donít see the value in an effective Vendor Security Program. In this session, you will learn how to demonstrate significant value from Vendor Security Assessments.










2:30pm - 3:00pm - Refreshment Break

3:00pm-4:00pm

 

IoT is Here: How Can You Reduce the Risk?

 

Regulatory compliance management (such as PCI, HIPAA, ISO) and security breach protection, is already a complex challenge present in many organizations today. The complexity is continuing to grow, and exponentially, with the increasing sources, numbers and types of attacks being generated, with the proliferation of the Internet of Things (IoT). With this complexity also comes higher costs in terms of not only the number of security incidents that need to be investigated, the number of tools needed and in finding the skilled personnel to manage it. And, the cost of these breaches are being measured beyond mere dollars to their detrimental impacts on a companyís brand and reputation, customer and supplier relationships, employee productivity, and all the way up the organizationís board and C-Level reputations.









4:00pm-5:00pm

Batista

Breaches in 2016: How is this Affecting Your Security/Risk Strategy (Panel)

Moderator:
Chris Trytten, Director, Crossmatch
Panelists:
John Bruggemann, CISO, GE Energy Connections
Carlos Batista, SVP, Secure Design & Engineering, SunTrust
and other CISOs/Security Executives from IT departments sharing lessons learned

According to industry analysts, approximately 50% of organizations have had to reevaluate their information security standards as a result of recent well-publicized attacks.

In this session, attendees will learn from a panel of IT security executives as to how they are updating their security & risk strategies in the wake of massive security breaches.

 

 

 

Register

Conference Price: $289.00 per person

 

Exhibits

 

As is always the case at CAMP IT Conferences events, the talks will not include product presentations.  During the continental breakfast, coffee breaks, and the luncheon break you will have the opportunity to informally meet representatives from the following sponsoring companies, who have solutions in the area of the conference.