Skip to content

UPCOMING EVENTS


Data Breaches: Defense and Response: Chicago (Rosemont/O’Hare), Illinois

Strategies to help your organization prepare for, defend against and respond to breaches.

December 4, 2024

9:00am-5:00pm

7 CPE / 0.7 CEU / CISSP / 7 PDU Credits Awarded

Conference location: Donald E. Stephens Convention Center Rosemont (O’Hare) Illinois

  


Overview

It is not a matter of if, but when your organization will be breached. Against these threats, enterprises try to build higher and more secure walls around their data and networks. This seems to be a never-ending arms race, as even the most sophisticated systems may, before long, present weaknesses that malicious technology can overcome.


What You Will Learn

In this one day conference attendees will learn:

  • Post-Breach Forensics and Recovery: Lessons Learned
  • Incident Response
  • From Breach to Prevention: Analyzing API Security Risks and Solutions
  • Advanced Threat Detection: Leveraging AI and Machine Learning
  • Hidden Threats, Resilient Defenses: Fortifying Your Cyber Blind Spots
  • Building a Cyber Resilient Organization: People, Process, Technology (Panel Discussion)

Conference Price: $299.00 per person

Each attendee will receive a certificate awarding 7 CPE credits for CISSP continuing education, in addition to 0.7 CEUs and 7 PDUs. CISSP is a registered certification mark of (ISC)², Inc.


CONFERENCE AGENDA


8:00am – 9:00am: Registration & Continental Breakfast


9:00am – 10:00am:  Incident Response

Derek Milroy, Sr. Security Architect, Large Midwest Enterprise

This talk will cover the SANS Six Steps, as well as using MITRE and Threat Intelligence. The focus will be on how to prepare for an incident by ensuring you have the proper processes in place.

Milroy


10:00am – 10:30am: Refreshment & Exhibit Break


10:30am – 11:30am: Hidden Threats, Resilient Defenses: Fortifying Your Cyber Blind Spots

Mike Bitz, RVP, Technical Account Management, Tanium

In today’s rapidly evolving threat landscape, attackers constantly adapt and exploit vulnerabilities that often go unnoticed. We will explore how organizations can identify and defend against the hidden cyber risks that pose the greatest danger to their systems, data, and reputation. This talk will equip you with actionable strategies to build resilience into your security practices and fortify your organizations against hidden threats that could otherwise go undetected, helping prevent breaches and respond more effectively when they occur.

 

Bitz


11:30am – 12:30pm: From Breach to Prevention: Analyzing API Security Risks and Solutions

Kalyan Gottipati, VP, Principal Solutions Architect, Citizens Finance Group

This presentation provides a comprehensive overview of API security, covering common vulnerabilities, best practices for secure development, and the importance of a layered security approach. I’ll share real-world case studies of API breaches, dive deep into how to make developers secure coding literate and offer practical tips on protecting digital assets. In this presentation, we discuss the OWASP API Security Top 10 and provide practical advises to help to create strong APIs.


Gottipati


12:30pm – 1:30pm: Lunch & Exhibit Break


1:30pm – 2:30pm: Emerging Threats: How AI is Shaping the Future of Cybersecurity

Dmitriy Sandler, Director, Presales Systems Engineering, Arctic Wolf

As the cybersecurity threat landscape continues to evolve, AI use in attacks poses a growing danger. In this session, we will explore the risks AI poses in attacks, what it takes to combat this emerging threat, some of the challenges and limitations of AI from a defensive layer, and approaches security vendors should take into account when dealing with these new risks.

Sandler


2:30pm – 3:00pm: Refreshment & Exhibit Break


3:00pm – 4:00pm: Post-Breach Forensics and Recovery: Lessons Learned

Focus on the critical post-breach phase, including forensic analysis, damage assessment, and rebuilding systems securely after an attack.

Key Takeaways:

  • Conducting forensic investigations to understand breach scope
  • Data recovery strategies and system restoration
  • Learning from breaches to prevent future incidents

4:00pm – 5:00pm: Building a Cyber Resilient Organization: People, Process, Technology – Panel Discussion

A holistic approach to cybersecurity, highlighting the importance of integrating technology with strong policies, ongoing training, and a resilient organizational culture.

Key Takeaways:

  • How to foster a security-first culture within an organization
  • Aligning incident response efforts with business continuity
  • Training programs to empower employees in defending against breaches

Panelists will include:

  • Michael Babischkin, Vice-President – Deputy Director of Information Security, Federal Home Loan Bank of Chicago
  • Armando D’Onorio, CISSP, GSLC, GCCC, Senior Consultant & CISO, ADOIT Consulting; Information Security Manager, Surf Internet
  • Piotr Topor, Director of Information Security and Governance, LSC Communications
  • John Vatianou, CISO, Connamara
  • Sebastian Whiting, Information Security Engineer,
  • Other Data Executives sharing strategies, tactics, and lessons learned

   

Babischkin                   D’Onorio                Topor            Vatianou          Whiting


Conference Price: $299.00 per person

Each attendee will receive a certificate awarding 7 CPE credits for CISSP continuing education, in addition to 0.7 CEUs and 7 PDUs. CISSP is a registered certification mark of (ISC)², Inc.

Exhibits

As is always the case at CAMP IT Conferences events, the talks will not include product presentations. During the continental breakfast, coffee breaks, and the luncheon break you will have the opportunity to informally meet representatives from the following sponsoring companies, who have solutions in the area of the conference.


Sponsors