Conferences that solve current IT challenges

Data Breaches: Defending Against and Responding to

Strategies to help your organization prepare for, defend against and respond to breaches

May 3, 2017

9:00am-5:00pm

7 CPE / 0.7 CEU / CISSP / 7 PDU Credits Awarded



Conference location: Donald E. Stephens Convention Center Rosemont (O'Hare) Illinois

Register

Overview

Overview: It is not a matter of if, but when your organization will be breached. Against these threats, enterprises try to build higher and more secure walls around their data and networks. This seems to be a never-ending arms race, as even the most sophisticates systems may, before long, present weaknesses that malicious technology can overcome.

What You Will Learn

In this one day conference attendees will learn:

  • Aftermath of a Data Breach: Lessons Learned
  • You've Been Breached, Now What?
  • The Shifting Wall: A Data Centric Audit and Protect (DCAP) Approach to Data Breach Prevention

  • Is it a Data Breach? How to Determine the Significance of a Security Incident
  • When the Breach Occurs: How to Gather Evidence and Help Determine the Culprit
  • Data Breach Security Policy: Governance and Management (Panel Discussion)

Conference Program

8:00am - 9:00am - Registration and Continental Breakfast

 

9:00am-10:00am

Aftermath of a Data Breach: Lessons Learned

 

As data breaches continue to hammer organizations with devastating outcomes, monetary as well as reputation costs continue to rise year after year. And while Cybersecurity professionals are tasked with securing and enhancing the information security posture of their organizations, they could find themselves consumed with gathering forensic evidence, executing data recovery plans, gathering facts, containing the damages and dealing with the aftermath in case of a data breach. Having a tested and verified data breach recovery plan is becoming more crucial than ever.

This session explores lessons learned from the aftermath of experiencing the discovery of and recovery from a data breach and provides some recommendations to help organizations deal with disruptive cyber-attacks.











10:00am -10:30am - Refreshment Break

 

10:30am-11:30am

You've Been Breached, Now What?

David Balcar, Security Evangelist, Kaspersky Lab

“The story you are about to see is true. Only the names have been changed to protect the innocent" (Dragnet). In this talk will hear about data breaches (not just the big ones that make the 5 O’clock news). We will discuss and go through the steps you should be taking before, during and after a breach. So sit back and grab a chair. Turn off you mobile phone, put down your tablet and hear real world issues facing enterprises every day.














 

11:30am-12:30pm

Reducing the Risk for a Data Breach through Effective Vulnerability Management

Steve Hamburg, Security Engineering & Incident Response Practice Lead, Halock 

Cyber-risks are growing at an exponential rate. Cyber criminals only need small gaps to execute an attack. Designing an effective vulnerability management will help minimize breaches. In this session, attendees will learn steps they can take to design such a system.













12:30pm - 1:30pm Luncheon

 

1:30pm-2:30pm

Is it a Data Breach? How to Determine the Significance of a Security Incident

 

Security incidents occur regularly. But only a small percentage are considered actual “data breaches” or other serious security threats.

How do you determine if it is a breach and how should you respond?

In this session, attendees will learn how to classify whether the incident was an actual breach and the proper steps to pursue.











2:30pm - 3:00pm - Refreshment Break

 

3:00pm-4:00pm

When the Breach Occurs: How to Gather Evidence and Help Determine the Culprit

Ken Karasek, Sr. Solutions Consultant, Guidance Software
 

Finding the evidence and determining the source can be complicated. The evidence of a possible breach can come from different sources , including internal sabotage, external parties such as vendors, business partners and/ or customers.

This session will examine how to locate, preserve and understand the evidence and present it in a fact based scenario while leaving out the hysteria.










Wahe

Hsiang

4:00pm-5:00pm

Data Breach Security Policy: Governance and Management

Panelists:
Stefan Wahe, Associate Chief Information Security Officer, University of Wisconsin-Madison
Victor Hsiang, CISO, GATX
and other CISOs/Directors sharing their experiences

In this thought provoking session, attendees will learn how to design the procedure that should be followed to ensure a consistent and effective approach is in place for managing data breach and information security incidents across the enterprise.





Conference price: $289 per person.


Each attendee will receive a certificate awarding 7 CPE credits for CISSP continuing education, in addition to 0.7 CEUs and 7 PDUs. CISSP is a registered certification mark of (ISC)˛, Inc.

Exhibits

As is always the case at CAMP IT Conferences events, the talks will not include product presentations.  During the continental breakfast, coffee breaks, and the luncheon break you will have the opportunity to informally meet representatives from the following sponsoring companies, who have solutions in the area of the conference.