Conferences that solve current IT challenges
Data Breaches: Defending Against and Responding to
Strategies to help your organization prepare for, defend against and respond to breaches
May 3, 2017
7 CPE / 0.7 CEU / CISSP / 7 PDU Credits Awarded
Conference location: Donald E. Stephens Convention Center Rosemont (O'Hare) Illinois
Overview: It is not a matter of if, but when your organization will be breached. Against these threats, enterprises try to build higher and more secure walls around their data and networks. This seems to be a never-ending arms race, as even the most sophisticates systems may, before long, present weaknesses that malicious technology can overcome.
What You Will Learn
In this one day conference attendees will learn:
- Aftermath of a Data Breach: Lessons Learned
- You've Been Breached, Now What?
The Shifting Wall: A Data Centric Audit and Protect (DCAP) Approach to Data Breach Prevention
- Is it a Data Breach? How to Determine the Significance of a Security Incident
- When the Breach Occurs: How to Gather Evidence and Help Determine the Culprit
- Data Breach Security Policy: Governance and Management (Panel Discussion)
8:00am - 9:00am - Registration and Continental Breakfast
Aftermath of a Data Breach: Lessons Learned
As data breaches continue to hammer
organizations with devastating outcomes,
monetary as well as reputation costs continue to
rise year after year. And while Cybersecurity
professionals are tasked with securing and
enhancing the information security posture of
their organizations, they could find themselves
consumed with gathering forensic evidence,
executing data recovery plans, gathering facts,
containing the damages and dealing with the
aftermath in case of a data breach. Having a
tested and verified data breach recovery plan is
becoming more crucial than ever.
This session explores lessons learned from the aftermath of experiencing the discovery of and recovery from a data breach and provides some recommendations to help organizations deal with disruptive cyber-attacks.
10:00am -10:30am - Refreshment Break
You've Been Breached, Now What?
David Balcar, Security Evangelist, Kaspersky Lab
“The story you are about to see is true. Only
the names have been changed to protect the
innocent" (Dragnet). In this talk will hear
about data breaches (not just the big ones that
make the 5 O’clock news). We will discuss and go
through the steps you should be taking before,
during and after a breach. So sit back and grab
a chair. Turn off you mobile phone, put down
your tablet and hear real world issues facing
enterprises every day.
Reducing the Risk for a Data Breach through Effective Vulnerability Management
Steve Hamburg, Security Engineering & Incident Response Practice Lead, Halock
Cyber-risks are growing at an exponential rate.
Cyber criminals only need small gaps to execute
an attack. Designing an effective vulnerability
management will help minimize breaches. In this
session, attendees will learn steps they can
take to design such a system.
12:30pm - 1:30pm Luncheon
Is it a Data Breach? How to Determine the Significance of a Security Incident
Security incidents occur regularly. But only a
small percentage are considered actual “data
breaches” or other serious security threats.
How do you determine if it is a breach and how should you respond?
In this session, attendees will learn how to classify whether the incident was an actual breach and the proper steps to pursue.
2:30pm - 3:00pm - Refreshment Break
When the Breach Occurs: How to Gather Evidence and Help Determine the Culprit
Ken Karasek, Sr. Solutions Consultant, Guidance
Finding the evidence and determining the source
can be complicated. The evidence of a possible
breach can come from different sources ,
including internal sabotage, external parties
such as vendors, business partners and/ or
This session will examine how to locate, preserve and understand the evidence and present it in a fact based scenario while leaving out the hysteria.
Data Breach Security Policy: Governance and Management
Stefan Wahe, Associate Chief Information Security Officer, University of Wisconsin-Madison
Victor Hsiang, CISO, GATX
and other CISOs/Directors sharing their experiences
In this thought provoking session, attendees
will learn how to design the procedure that
should be followed to ensure a consistent and
effective approach is in place for managing data
breach and information security incidents across
Conference price: $289 per person.
Each attendee will receive a certificate awarding 7 CPE credits for CISSP continuing education, in addition to 0.7 CEUs and 7 PDUs. CISSP is a registered certification mark of (ISC)˛, Inc.
As is always the case at CAMP IT Conferences events, the talks will not include
product presentations. During the continental breakfast,
coffee breaks, and the luncheon break you will have the opportunity
to informally meet representatives from the following sponsoring
companies, who have solutions in the area of the conference.