Strategies for reducing risk to the enterprise.
In todayís highly regulatory environment it is
essential that you have a clear understanding of risk across the
enterprise. A risk management framework can bring visibility to key
business and compliance risks and enable a company to make decisions
on where to prioritize its limited resources. It is through a risk
management framework that real value to the business can be
In this one day conference, attendees will be provided with examples
of approaches to managing information and compliance risk through a
risk management framework.
8:00am - 9:00am - Registration and Continental Breakfast
Reducing Your Risk: Securing Your Data from the Threat
Dmitry Kuchynski, Customer Solutions Director, Cisco Systems
External cybersecurity threats get all the press, and they are
certainly dangerous. Shadowy international gangsters, brilliant but
evil hackers, mom-and-pop-shop criminals stealing from us one Target
transaction at a time Ė as fictional as it sounds, it is all real,
and very much deserves our attention and protection as individuals
and a society.
Unfortunately, your worst cybersecurity threat may already be on
Join us as we discuss:
What are insider threats, and why are they so dangerous?
Why current controls canít contain insider threats
Core steps to better protection against insider threats
10:00am -10:30am - Refreshment Break
Balancing Digital Transformation & Privacy Compliance
Naren Jangid, Managing Partner, RAAH Technologies
For todayís digital businesses, being prepared to meet new
compliance requirements when storing and managing consumer data will
not only minimize risk, but also enable more valued and trusted
customer experiences that drive increased loyalty, engagement and
revenue. To gain better perspective on this important issue, itís
important to understand: - The trends driving governmental
regulatory shifts and the basic tenets of these new laws - The
challenges faced by executives across the enterprise when managing
privacy compliance for consumer data - The emergence of cloud-based
solutions that help businesses manage privacy compliance by acting
as end-to-end customer data storage and management solutions that
are far more scalable and flexible than legacy systems.
Firming the Posture: Building a World-Class
Security-Risk Team (Panel discussion)
Julie Hughes, Director, The Judge Group
Bob Varnadoe, CISO, NCR
James Baird, Vice President, IT Security & Compliance, American
Cancer Society, Inc.
Mark Reardon, CISSP, AVP of Information Security & CISO, WellStar
Scott Barronton, CISO, Group Head Corporate Information Security
and other CISOs/Security Executives from IT departments sharing
What does it take to foster and retain top-tier talent as well as
adopt an enterprise-wide security culture beyond IT?
In this session, attendees will learn from a CISO panelists sharing
their experiences as to getting ahead of the threats while engaging
the entire extended enterprise as a part of fight.
12:30pm - 1:30pm Luncheon
Vendor Security Assessment-How to Be Innovative and
Demonstrate Enterprise Value
Vendor Security Assessments are more than just a check in the box.
Many organizations donít see the value in an effective Vendor
Security Program. In this session, you will learn how to demonstrate
significant value from Vendor Security Assessments.
2:30pm - 3:00pm - Refreshment Break
IoT is Here: How Can You Reduce the Risk?
Regulatory compliance management (such as PCI, HIPAA, ISO) and
security breach protection, is already a complex challenge present
in many organizations today. The complexity is continuing to grow,
and exponentially, with the increasing sources, numbers and types of
attacks being generated, with the proliferation of the Internet of
Things (IoT). With this complexity also comes higher costs in terms
of not only the number of security incidents that need to be
investigated, the number of tools needed and in finding the skilled
personnel to manage it. And, the cost of these breaches are being
measured beyond mere dollars to their detrimental impacts on a
companyís brand and reputation, customer and supplier relationships,
employee productivity, and all the way up the organizationís board
and C-Level reputations.
Breaches in 2016: How is this Affecting Your Security/Risk
Chris Trytten, Director, Crossmatch
John Bruggemann, CISO, GE Energy Connections
Carlos Batista, SVP, Secure Design & Engineering, SunTrust
and other CISOs/Security Executives from IT
departments sharing lessons learned
According to industry analysts, approximately 50% of organizations
have had to reevaluate their information security standards as a
result of recent well-publicized attacks.
In this session, attendees will learn from a panel of IT security
executives as to how they are updating their security & risk
strategies in the wake of massive security breaches.
Conference Price: $289.00 per person
is always the case at CAMP IT Conferences events, the talks will not include
product presentations. During the continental breakfast,
coffee breaks, and the luncheon break you will have the opportunity
to informally meet representatives from the following sponsoring
companies, who have solutions in the area of the conference.