Feedback from Attendees

Upcoming  2017 Events

Oct. 26, 2017
Enterprise Architecture Strategies
Info
Chicago, IL

Nov. 1-2, 2017
IT PMO/Portfolio Management
Info
Dallas, TX

Nov. 15, 2017
DR/BC - Resilient Infrastructure
Info
Chicago, IL

Nov. 30, 2017
Business Intelligence/Big Data/Analytics
Info
Chicago, IL

Dec. 7, 2017
Data Breaches: Preparing and Responding
Info
Chicago, IL

Upcoming  2018 Events

Feb. 1, 2018
Enterprise Risk/Security Management
Info
Dallas, TX

Feb. 20, 2018
Enterprise Risk/Security Management
Info
Chicago, IL

Mar. 1, 2018
IT Leadership Strategies
Info
Chicago, IL

Mar. 7, 2018
Enterprise Architecture Strategies
Info
Chicago, IL

April 12, 2018
Business Intelligence/Big Data/Analytics
Info
Chicago, IL

May 2, 2018
Data Breaches: Preparing and Responding
Info
Chicago, IL

May 15, 2018
IT Infrastructure/Operations Management (Data Center)
Info
Chicago, IL

May 31, 2018
Enterprise Risk/Security Management
Info
Minneapolis, MN

June 7, 2018
Enterprise Risk/Security Management
Info
Chicago, IL

June 20-21, 2018
IT PMO/Portfolio Management
Info
Chicago, IL

July 11, 2018
Enterprise Architecture Strategies
Info
Chicago, IL

Sept. 6, 2018
IT Infrastructure/Operations Management (Data Center)
Info
Chicago, IL

Sept. 18, 2018
Enterprise Risk/Security Management
Info
Dallas, TX

Oct. 3, 2018
Enterprise Risk/Security Management
Info
Chicago, IL

Oct. 17, 2018
IT Leadership Strategies
Info
Chicago, IL

Oct. 25, 2018
Enterprise Architecture Strategies
Info
Chicago, IL

Nov. 1-2, 2018
IT PMO/Portfolio Management
Info
Dallas, TX

Nov. 14, 2018
DR/BC - Resilient Infrastructure
Info
Chicago, IL

Nov. 29, 2018
Business Intelligence/Big Data/Analytics
Info
Chicago, IL

Dec. 6, 2018
Data Breaches: Preparing and Responding
Info
Chicago, IL

(Click here to add any of our upcoming events to your calendar)

 

 

Conferences that solve current IT challenges

Data Breaches: Preparing and Responding

Strategies to help leverage full value from your design and implementation of an effective Business Intelligence framework

December 7, 2017

9:00am-5:00pm

7 CPE / 0.7 CEU / CISSP / 7 PDU Credits Awarded

Register

Conference location: Donald E. Stephens Convention Center Rosemont (O'Hare) Illinois

Overview

As organizations prepare for the recovery it is crucial that they have a well designed business intelligence framework to provide them with the necessary insight so they can capitalize on new opportunities.

This one day conference will help attendees design and leverage a solid BI framework to make the decisions necessary for the economic recovery.

What You Will Learn

In this one day conference attendees will learn:

  • Aftermath of a Data Breach: Lessons Learned
  • Data Breach Preparation: Creating an Effective Incident Response Plan Creation
  • You Have Been Breached: Now What?
  • AI Cyber Security – Defending Against the Unknown Unknowns
  • The Shifting Wall: A Data Centric Audit and Protect (DCAP) Approach to Data Breach Prevention
  • Breaches & Ransomware: How to Handle, How to Respond

Conference Program

8:00am - 9:00am - Registration and Continental Breakfast

Walenstein

9:00am-10:00am

Aftermath of a Data Breach: Lessons Learned

Andrew Walenstein, Director of Security R&D, Blackberry

As data breaches continue to hammer organizations with devastating outcomes, monetary as well as reputation costs continue to rise year after year. And while Cybersecurity professionals are tasked with securing and enhancing the information security posture of their organizations, they could find themselves consumed with gathering forensic evidence, executing data recovery plans, gathering facts, containing the damages and dealing with the aftermath in case of a data breach. Having a tested and verified data breach recovery plan is becoming more crucial than ever.

This session explores lessons learned from the aftermath of experiencing the discovery of and recovery from a data breach and provides some recommendations to help organizations deal with disruptive cyber-attacks.










10:00am -10:30am - Refreshment Break

Stout

10:30am-11:30am

Data Breach Preparation: Creating an Effective Incident Response Plan Creation

Glenn A. Stout, Ph.D., Managing Consultant, HALOCK Security Labs

Incident Response Plan creation, Training and Testing. Attendees will be provided with a blueprint for an IR plan that is in alignment with the main standards and regulations that many companies have to meet. Additionally, the approach to create the plan, test it, and train team members is also part of the presentation.

  1. Oops... we did that? Learn from your mistakes

  2. Reasons to create an IR Plan

    1. Compliance
    2. Risk
  3. Requirements for an IR Plan according to:
    1. NIST 800-61
    2. NIST 800-53
    3. ISO 27002
    4. PCI DSS
    5. HIPAA
  4. Team required to create an IR Plan
    1. Describe team roles
    2. Parts of company they come from
  5. Main elements of an IR Plan (largest part of presentation)
    1. Elements
    2. Describe each element
    3. How to create each element
    4. Examples
  6. Run Books
  7. Testing & Training the plan
    1. Testing vs. Training
    2. Types of Scenarios










 

11:30am-12:30pm

You Have Been Breached: Now What?

 

“The story you are about to see is true. Only the names have been changed to protect the innocent" (Dragnet). In this talk will hear about data breaches (not just the big ones that make the 5 O’clock news). We will discuss and go through the steps you should be taking before, during and after a breach. So sit back and grab a chair. Turn off you mobile phone, put down your tablet and hear real world issues facing enterprises every day.














12:30pm - 1:30pm Luncheon

 

1:30pm-2:30pm

AI Cyber Security – Defending Against the Unknown Unknowns

 



















2:30pm - 3:00pm - Refreshment Break

 

3:00pm-4:00pm

The Shifting Wall: A Data Centric Audit and Protect (DCAP) Approach to Data Breach Prevention

 

With the proliferation of cloud adoption, BYOD, SaaS and Big Data deployments, CISOs face a complex set of diverse moving targets within their risk frameworks. A strong Breach Prevention policy requires awareness of the new “walls” we need to build. A Data Centric Audit and Protect (DCAP) view of security will assist CISOs in prioritizing and focusing on reducing risk.















Bivian

4:00pm-5:00pm

Breaches & Ransomware: How to Handle, How to Respond

Paul Bivian, Director Information Security, Kirkland & Ellis LLP
and other CISOs and InfoSec Executives will share their experiences

In this session, attendees will learn from CISOs and Security Executives as to how they are working through the challenges of Data Breaches and Ransomware.

Attendees will walk away with shared strategies and tactics that other organizations are employing.


Conference price: $289 per person.


Each attendee will receive a certificate awarding 7 CPE credits for CISSP continuing education, in addition to 0.7 CEUs and 7 PDUs. CISSP is a registered certification mark of (ISC)˛, Inc.

Exhibits

As is always the case at CAMP IT Conferences events, the talks will not include product presentations.  During the continental breakfast, coffee breaks, and the luncheon break you will have the opportunity to informally meet representatives from the following sponsoring companies, who have solutions in the area of the conference.