Conferences that solve current IT challenges

Enterprise Risk / Security Management

Strategies for reducing risk to the enterprise.

September 19, 2017

9:00am-5:00pm

7 CPE / 0.7 CEU / CISSP / 7 PDU Credits Awarded

Register

Conference location: Donald E. Stephens Convention Center Rosemont (O'Hare) Illinois

Overview

In today’s highly regulatory environment it is essential that you have a clear understanding of risk across the enterprise. A risk management framework can bring visibility to key business and compliance risks and enable a company to make decisions on where to prioritize its limited resources. It is through a risk management framework that real value to the business can be achieved.

With all of these challenges, how do you make this happen?

In this one day conference, attendees will be provided with examples of approaches to managing information and compliance risk through a risk management framework.

What You Will Learn

In this one day conference attendees will learn:

  • Articulating Cyber Risk Valuation: Show Me The Money!
  • How to Design an Effective Risk Assessment
  • Cyber Crime Unmasked – How to Leverage Defense Best Practices Against Ransomware
  • How Security and the CSO Can Build Trust with the Business (Panel)
  • Data & Security Analytics: Can We Predict the Next Attack?
  • Managing the Politics— How to Protect and Grow Your Security Budget (Panel discussion)

Conference Program

8:00am - 9:00am - Registration and Continental Breakfast

Sapp 

9:00am-10:00am

Articulating Cyber Risk Valuation: Show Me The Money!

John B. Sapp, Jr.; Director, IT Security & Controls, Information Security Officer, Orthofix

It's one thing to have solid enterprise risk security management practices and frameworks, but quite another to articulate their value to the greater organization.

In this session John B. Sapp, Jr. will provide attendees with suggestions on how to discuss Cyber Risk Valuation so the extended enterprise can understand in plain terms what it means.














10:00am -10:30am - Refreshment Break

 

10:30am-11:30am

Developing Metrics to Track the ‘Human Firewall’

Brian Drain, VP, Information Security Officer, Prospect Mortgage

  • What to track
  • Frequency of tracking
  • Etc...










Bradford

11:30am-12:30pm

Cyber Crime Unmasked – How to Leverage Defense Best Practices Against Ransomware

Bill Bradford, Former CIO, Akorn Pharmaceuticals

This session will cover how real world threats work focusing on a case study of ransomware that will include defense best practices. Attendees will walk leave the session with steps they can take to reduce the risk.












12:30pm - 1:30pm Luncheon

 

1:30pm-2:30pm

How Security and the CSO Can Build Trust with the Business (Panel)

Panelists will feature CISOs sharing strategies, tactics and lessons learned

In this session, attendees will learn from a panel of IT security executives as to the strategies they are leveraging to insure their efforts are in sync with business priorities.

Topics covered:

  • How to identify leverage the following areas of value: reputation, regulation, revenue, resilience, and recession for continued investment and security spending
  • How to assess, understand and define security’s current and future roles in the extended enterprise
  • Where are security investments being made on personnel, processes, and technologies











2:30pm - 3:00pm - Refreshment Break

 

3:00pm-4:00pm

Data & Security Analytics: Can We Predict the Next Attack?

 

The goal of security analytics is to detect attacks as quickly as possible, enable security leadership to block or stop an attack and provide detailed information to reconstruct an attack so that we learn how to predict or prevent the next attack.

In this session, attendees will learn:

  • Best practices for leveraging security analytics
  • How to read the data and learn from what is presented
  • How to predict future attack based on past experience how to leverage security analytics
  • How to articulate the results to the business for future risk reduction








 

4:00pm-5:00pm

Managing the Politics— How to Protect and Grow Your Security Budget (Panel discussion)

Speakers will include CISOs sharing strategies, tactics and lessons learned

Budgets are always under pressure and being scrutinized. Given the constant threats, CISOs are always fighting to grow their budget. How can you best defend your budget while asking for more? In this session, attendees will learn from prominent CISOs as to strategies they are using to achieve this.


Conference price: $289 per person.


Each attendee will receive a certificate awarding 7 CPE credits for CISSP continuing education, in addition to 0.7 CEUs and 7 PDUs. CISSP is a registered certification mark of (ISC)², Inc.

Exhibits

As is always the case at CAMP IT Conferences events, the talks will not include product presentations.  During the continental breakfast, coffee breaks, and the luncheon break you will have the opportunity to informally meet representatives from the following sponsoring companies, who have solutions in the area of the conference.