Data Breaches: Defense and Response: Chicago (Rosemont/O’Hare), Illinois
Strategies to help your organization prepare for, defend against and respond to breaches.
March 14, 2024
7 CPE / 0.7 CEU / CISSP / 7 PDU Credits Awarded
Conference location: Donald E. Stephens Convention Center Rosemont (O’Hare) Illinois
It is not a matter of if, but when your organization will be breached. Against these threats, enterprises try to build higher and more secure walls around their data and networks. This seems to be a never-ending arms race, as even the most sophisticated systems may, before long, present weaknesses that malicious technology can overcome.
What You Will Learn
In this one day conference attendees will learn:
Conference Price: $299.00 per person
Each attendee will receive a certificate awarding 7 CPE credits for CISSP continuing education, in addition to 0.7 CEUs and 7 PDUs. CISSP is a registered certification mark of (ISC)², Inc.
8:00am – 9:00am: Registration and Continental Breakfast
9:00am – 10:00am: The Breach; Risk to Consequences
How you determine whether it is an incident or a breach that may or may not involve the exposure of sensitive customer data will determine, among other things:
How you respond will determine how you can minimize the monetary, regulatory, and reputational damages and risks to you, your enterprise, and your customers.
10:00am – 10:30am: Refreshment Break
10:30am – 11:30am: The Anatomy of a Breach
In this presentation we will cover:
11:30am – 12:30pm: The Role of AI Analytics to Uplift Security Operations
Bob Hansmann, Security Products Team, Infoblox
In cybersecurity today, “AI” may be the term most used … and abused. For those trying to understand how this may impact their security stack/profile in the future, it is essential to have a grounded, real world, and near-term perspective of the potential for AI in cybersecurity. Using multiple sources of recent research data, this session will review the SOC challenges that matter, and how the current and likely future state of AI technology in cybersecurity might help. Covered topics include:
12:30am – 1:30pm: Lunch and Exhibit Break
1:30pm – 2:30pm: Cyber Security & BC/DR: Recovering from Ransomware & Breaches
Seasoned practitioners are aware that BC/DR practices can reduce the cost of cyber breaches. But breaches will still occur and they will happen with greater frequency. How do you leverage all that DR/BC can offer to reduce the risk and mitigate the effects?
In this session attendees will learn:
How DR/BC teams can work together more effectively to plan for a breach
How you can improve recovery times from a breach
How to strengthen the resiliency of your infrastructure to reduce the risk if
2:30pm – 3:00pm: Refreshment Break
3:00pm – 4:00pm: The “Real” Dark Web and How the Underground Economy Works
The Dark Web is where the underground economy marketplace is the main source of selling and trading published leaked. The volume of the breached data available on the Dark Web exceeds 1.5 billion records, which is close to 50% of the number of Internet users on the planet.
The proactive analysis of the leaked data may create unique value for modern security community in terms of additional mechanisms for risk scoring and customers safety improvements. More and more businesses and organizations in various vertical markets started to use leaked data analysis in their security operations, protecting their enterprise, partners, employees and customers from potential network infiltration and data exfiltration, or more significant targeted threats.
This session will show actual examples of Dark Web forums and marketplaces from actual breaches and how threat actors leverage this data to monetize, blackmail, trade, and parse data to buyers, and verified sources (IP addresses and domains) containing context may help in investigations and bad actor attribution if a breach occurs. Threat intelligence and incident response units may also extract valuable information about attack patterns and additional meaningful indicators to help safeguard potential attacks.
4:00pm – 5:00pm: How InfoSec Leaders & Executives are Responding to Current & Emerging Security Risks (Panel Discussion)
Panelists will include:
In this session attendees will learn from a distinguished panel of information security leaders sharing their thoughts on:
Mitigating Business Email Compromise
Responding to Ransomware
Reducing Risk to the Business in 2023
How to identify leverage areas of value (reputation, regulation, revenue, resilience, and recession) for continued investment and security spending
How to assess, understand, and define security’s current and future roles in the extended enterprise
Where are security investments being made on personnel, processes, and technologies?
As is always the case at CAMP IT Conferences events, the talks will not include product presentations. During the continental breakfast, coffee breaks, and the luncheon break you will have the opportunity to informally meet representatives from the following sponsoring companies, who have solutions in the area of the conference.