Conferences that solve current IT challenges
Enterprise Risk / Security Management
Strategies for reducing risk to the enterprise.
September 19, 2017
7 CPE / 0.7 CEU / CISSP / 7 PDU Credits Awarded
Conference location: Donald E. Stephens Convention Center Rosemont (O'Hare) Illinois
In today’s highly regulatory environment
it is essential that you have a clear
understanding of risk across the
enterprise. A risk management framework
can bring visibility to key business and
compliance risks and enable a company to
make decisions on where to prioritize
its limited resources. It is through a
risk management framework that real
value to the business can be achieved.
With all of these challenges, how do you make this happen?
In this one day conference, attendees will be provided with examples of approaches to managing information and compliance risk through a risk management framework.
What You Will Learn
In this one day conference attendees will learn:
- Articulating Cyber Risk Valuation: Show Me The Money!
- How to Design an Effective Risk Assessment
- Cyber Crime Unmasked – How to Leverage Defense Best Practices Against Ransomware
- How Security and the CSO Can Build Trust with the Business (Panel)
- Data & Security Analytics: Can We Predict the Next Attack?
- Managing the Politics— How to Protect and Grow Your Security Budget (Panel discussion)
8:00am - 9:00am - Registration and Continental Breakfast
Articulating Cyber Risk Valuation: Show Me The Money!
John B. Sapp, Jr.; Director, IT Security & Controls, Information Security Officer, Orthofix
It's one thing to have solid enterprise risk
security management practices and frameworks,
but quite another to articulate their value to
the greater organization.
In this session John B. Sapp, Jr. will provide attendees with suggestions on how to discuss Cyber Risk Valuation so the extended enterprise can understand in plain terms what it means.
10:00am -10:30am - Refreshment Break
Developing Metrics to Track the ‘Human Firewall’
Brian Drain, VP, Information Security Officer, Prospect Mortgage
- What to track
- Frequency of tracking
Cyber Crime Unmasked – How to Leverage Defense Best Practices Against Ransomware
Bill Bradford, Former CIO, Akorn Pharmaceuticals
This session will cover how real world threats
work focusing on a case study of ransomware that
will include defense best practices. Attendees
will walk leave the session with steps they can
take to reduce the risk.
12:30pm - 1:30pm Luncheon
How Security and the CSO Can Build Trust with the Business (Panel)
Panelists will feature CISOs sharing strategies, tactics and lessons learned
In this session, attendees will learn from a
panel of IT security executives as to the
strategies they are leveraging to insure their
efforts are in sync with business priorities.
- How to identify leverage the following areas of value: reputation, regulation, revenue, resilience, and recession for continued investment and security spending
- How to assess, understand and define security’s current and future roles in the extended enterprise
Where are security investments being
made on personnel, processes, and
2:30pm - 3:00pm - Refreshment Break
Data & Security Analytics: Can We Predict the Next Attack?
The goal of security analytics is to detect
attacks as quickly as possible, enable security
leadership to block or stop an attack and
provide detailed information to reconstruct an
attack so that we learn how to predict or
prevent the next attack.
In this session, attendees will learn:
- Best practices for leveraging security analytics
- How to read the data and learn from what is presented
- How to predict future attack based on past experience how to leverage security analytics
How to articulate the results to the
business for future risk reduction
Managing the Politics— How to Protect and Grow Your Security Budget (Panel discussion)
Speakers will include CISOs sharing strategies, tactics and lessons learned
Budgets are always under pressure and being scrutinized. Given the constant threats, CISOs are always fighting to grow their budget. How can you best defend your budget while asking for more? In this session, attendees will learn from prominent CISOs as to strategies they are using to achieve this.
Conference price: $289 per person.
Each attendee will receive a certificate awarding 7 CPE credits for CISSP continuing education, in addition to 0.7 CEUs and 7 PDUs. CISSP is a registered certification mark of (ISC)², Inc.
As is always the case at CAMP IT Conferences events, the talks will not include
product presentations. During the continental breakfast,
coffee breaks, and the luncheon break you will have the opportunity
to informally meet representatives from the following sponsoring
companies, who have solutions in the area of the conference.