Feedback from Attendees

Upcoming  2017 Events

Oct. 26, 2017
Enterprise Architecture Strategies
Info
Chicago, IL

Nov. 1-2, 2017
IT PMO/Portfolio Management
Info
Dallas, TX

Nov. 15, 2017
DR/BC - Resilient Infrastructure
Info
Chicago, IL

Nov. 30, 2017
Business Intelligence/Big Data/Analytics
Info
Chicago, IL

Dec. 7, 2017
Data Breaches: Preparing and Responding
Info
Chicago, IL

Upcoming  2018 Events

Feb. 1, 2018
Enterprise Risk/Security Management
Info
Dallas, TX

Feb. 20, 2018
Enterprise Risk/Security Management
Info
Chicago, IL

Mar. 1, 2018
IT Leadership Strategies
Info
Chicago, IL

Mar. 7, 2018
Enterprise Architecture Strategies
Info
Chicago, IL

April 12, 2018
Business Intelligence/Big Data/Analytics
Info
Chicago, IL

May 2, 2018
Data Breaches: Preparing and Responding
Info
Chicago, IL

May 15, 2018
IT Infrastructure/Operations Management (Data Center)
Info
Chicago, IL

May 31, 2018
Enterprise Risk/Security Management
Info
Minneapolis, MN

June 7, 2018
Enterprise Risk/Security Management
Info
Chicago, IL

June 20-21, 2018
IT PMO/Portfolio Management
Info
Chicago, IL

July 11, 2018
Enterprise Architecture Strategies
Info
Chicago, IL

Sept. 6, 2018
IT Infrastructure/Operations Management (Data Center)
Info
Chicago, IL

Sept. 18, 2018
Enterprise Risk/Security Management
Info
Dallas, TX

Oct. 3, 2018
Enterprise Risk/Security Management
Info
Chicago, IL

Oct. 17, 2018
IT Leadership Strategies
Info
Chicago, IL

Oct. 25, 2018
Enterprise Architecture Strategies
Info
Chicago, IL

Nov. 1-2, 2018
IT PMO/Portfolio Management
Info
Dallas, TX

Nov. 14, 2018
DR/BC - Resilient Infrastructure
Info
Chicago, IL

Nov. 29, 2018
Business Intelligence/Big Data/Analytics
Info
Chicago, IL

Dec. 6, 2018
Data Breaches: Preparing and Responding
Info
Chicago, IL

(Click here to add any of our upcoming events to your calendar)

 

 

Conferences that solve current IT challenges

Enterprise Risk / Security Management

Strategies for reducing risk to the enterprise.

September 19, 2017

9:00am-5:00pm

7 CPE / 0.7 CEU / CISSP / 7 PDU Credits Awarded

Bios

Conference location:  Crowne Plaza Dallas - Market Center  

Overview

In today’s highly regulatory environment it is essential that you have a clear understanding of risk across the enterprise. A risk management framework can bring visibility to key business and compliance risks and enable a company to make decisions on where to prioritize its limited resources. It is through a risk management framework that real value to the business can be achieved.

With all of these challenges, how do you make this happen?

In this one day conference, attendees will be provided with examples of approaches to managing information and compliance risk through a risk management framework.

What You Will Learn

In this one day conference attendees will learn:

  • Articulating Cyber Risk Valuation: Show Me The Money!
  • How to Design an Effective Risk Assessment
  • Reducing Data Breach Risk: Protecting Information Assets from Internal & External Threats
  • How Security and the CSO Can Build Trust with the Business (Panel)
  • Securely Navigating the BYOD Landscape
  • What Are We Doing to Plan for Our Next Breach? (Audience discussion)

Conference Program

8:00am - 9:00am - Registration and Continental Breakfast

Sapp 

9:00am-10:00am

Articulating Cyber Risk Valuation: Show Me The Money!

John B. Sapp, Jr.; Director, IT Security & Controls, Information Security Officer, Orthofix

It's one thing to have solid enterprise risk security management practices and frameworks, but quite another to articulate their value to the greater organization.

In this session John B. Sapp, Jr. will provide attendees with suggestions on how to discuss Cyber Risk Valuation so the extended enterprise can understand in plain terms what it means.














10:00am -10:30am - Refreshment Break

Drain

10:30am-11:30am

Developing Metrics to Track the ‘Human Firewall’

Brian Drain, VP, Information Security Officer, Prospect Mortgage

The Human Firewall. What is it? Is it just another catch phrase or is it a critical part of your layered defense strategy? If you have a human firewall, how do you gauge how effective it is? When you're dealing with a vast unknown, a human, how can you track their actions in a meaningful manner to determine if you need to change or influence behavior? In this talk, you'll gain new ideas to track the human firewall so that you know whether or not configuration changes are necessary.












Wiseman

11:30am-12:30pm

Reducing Data Breach Risk: Protecting Information Assets from Internal & External Threats

David Wiseman, Head of Product and Field Marketing, BlackBerry

The number of significant data breaches are growing in size and frequency. Some of these are from internal sources while others are through targeted external Cyberattacks. The associated business risk is a growing concern for corporate boards with a recent survey finding over 82% of boards are concerned about Cybersecurity. From a planning perspective one must assume data breaches will occur in your organization. This session will examine methods to protect your information assets even after a breach.











12:30pm - 1:30pm Luncheon

Peterson

Finney

Franklin

Addo-Yobo

 

Desmond

1:30pm-2:30pm

How Security and the CSO Can Build Trust with the Business (Panel)

Moderator:
Kevin Peterson, CISSP, Director, Security & Network Transformation, Zscaler
Panelists:
George Finney, Chief Security Officer, Southern Methodist University
Elliott Franklin, Vice President Infrastructure & Security, Omni Hotels & Resorts
Michael Addo-Yobo, Senior Director - Cyber Risk Advisory, COALFIRE
Jim Desmond, Chief Security Officer, Elevate
and other CISOs sharing strategies, tactics and lessons learned

In this session, attendees will learn from a panel of IT security executives as to the strategies they are leveraging to insure their efforts are in sync with business priorities.

Topics covered:

  • How to identify leverage the following areas of value: reputation, regulation, revenue, resilience, and recession for continued investment and security spending
  • How to assess, understand and define security’s current and future roles in the extended enterprise
  • Where are security investments being made on personnel, processes, and technologies











2:30pm - 3:00pm - Refreshment Break

Runyon

3:00pm-4:00pm

Securely Navigating the BYOD Landscape

Ian Runyon, VP of Product, Mobi

BYOD program management can be a daunting task. Ian Runyon, VP of Product, discusses how companies can ensure program success and impact while remaining secure. Discover how enterprises are securely navigating BYOD.












 

4:00pm-5:00pm

What Are We Doing to Plan for Our Next Breach? (Audience discussion)

 



Conference price: $289 per person.


Each attendee will receive a certificate awarding 7 CPE credits for CISSP continuing education, in addition to 0.7 CEUs and 7 PDUs. CISSP is a registered certification mark of (ISC)˛, Inc.

Exhibits

As is always the case at CAMP IT Conferences events, the talks will not include product presentations.  During the continental breakfast, coffee breaks, and the luncheon break you will have the opportunity to informally meet representatives from the following sponsoring companies, who have solutions in the area of the conference.