Skip to content

UPCOMING EVENTS


Data Breaches: Defense and Response: Chicago (Rosemont/O’Hare), Illinois

Strategies to help your organization prepare for, defend against and respond to breaches.

December 4, 2024

9:00am-5:00pm

7 CPE / 0.7 CEU / CISSP / 7 PDU Credits Awarded

Conference location: Donald E. Stephens Convention Center Rosemont (O’Hare) Illinois

  


Overview

It is not a matter of if, but when your organization will be breached. Against these threats, enterprises try to build higher and more secure walls around their data and networks. This seems to be a never-ending arms race, as even the most sophisticated systems may, before long, present weaknesses that malicious technology can overcome.


What You Will Learn

In this one day conference attendees will learn:

  • Post-Breach Forensics and Recovery: Lessons Learned
  • Legal and Regulatory Considerations in Data Breach Response
  • Understanding the Anatomy of a Data Breach
  • Advanced Threat Detection: Leveraging AI and Machine Learning
  • Incident Response Best Practices: From Detection to Containment
  • Building a Cyber Resilient Organization: People, Process, Technology (Panel Discussion)

Conference Price: $299.00 per person

Each attendee will receive a certificate awarding 7 CPE credits for CISSP continuing education, in addition to 0.7 CEUs and 7 PDUs. CISSP is a registered certification mark of (ISC)², Inc.


CONFERENCE AGENDA


8:00am – 9:00am: Registration & Continental Breakfast


9:00am – 10:00am: Understanding the Anatomy of a Data Breach

Dive into the lifecycle of a data breach, from initial intrusion to data exfiltration, covering common attack vectors like phishing, ransomware, and insider threats.

Key Takeaways:

  • How attackers breach networks and systems
  • Identifying early warning signs and threat patterns
  • Examples from recent high-profile breaches

10:00am – 10:30am: Refreshment & Exhibit Break


10:30am – 11:30am: Incident Response Best Practices: From Detection to Containment

Focus on building and executing an effective incident response (IR) plan, from breach detection to containment and mitigation.

Key Takeaways:

  • Step-by-step breakdown of the incident response process
  • Creating a playbook for breach scenarios
  • Best tools and techniques for rapid response and containment

11:30am – 12:30pm: From Breach to Prevention: Analyzing API Security Risks and Solutions

Kalyan Gottipati, VP, Principal Solutions Architect, Citizens Finance Group

This presentation provides a comprehensive overview of API security, covering common vulnerabilities, best practices for secure development, and the importance of a layered security approach. I’ll share real-world case studies of API breaches, dive deep into how to make developers secure coding literate and offer practical tips on protecting digital assets. In this presentation, we discuss the OWASP API Security Top 10 and provide practical advises to help to create strong APIs.


Gottipati


12:30pm – 1:30pm: Lunch & Exhibit Break


1:30pm – 2:30pm: Advanced Threat Detection: Leveraging AI and Machine Learning

Examine how AI and machine learning can enhance threat detection and monitoring capabilities, helping organizations stay one step ahead of sophisticated attackers.

Key Takeaways:

  • Understanding AI-driven cybersecurity tools
  • Implementing behavior-based detection models
  • Case studies of AI and ML in successful breach prevention

2:30pm – 3:00pm: Refreshment & Exhibit Break


3:00pm – 4:00pm: Post-Breach Forensics and Recovery: Lessons Learned

Focus on the critical post-breach phase, including forensic analysis, damage assessment, and rebuilding systems securely after an attack.

Key Takeaways:

  • Conducting forensic investigations to understand breach scope
  • Data recovery strategies and system restoration
  • Learning from breaches to prevent future incidents

4:00pm – 5:00pm: Building a Cyber Resilient Organization: People, Process, Technology – Panel Discussion

A holistic approach to cybersecurity, highlighting the importance of integrating technology with strong policies, ongoing training, and a resilient organizational culture.

Key Takeaways:

  • How to foster a security-first culture within an organization
  • Aligning incident response efforts with business continuity
  • Training programs to empower employees in defending against breaches

Panelists will include:

  • Michael Babischkin, Vice-President – Deputy Director of Information Security, Federal Home Loan Bank of Chicago
  • Armando D’Onorio, CISSP, GSLC, GCCC, Senior Consultant & CISO, ADOIT Consulting; Information Security Manager, Surf Internet
  • Piotr Topor, Director of Information Security and Governance, LSC Communications
  • John Vatianou, CISO, Connamara
  • Sebastian Whiting, Information Security Engineer,
  • Other Data Executives sharing strategies, tactics, and lessons learned

   

Babischkin                   D’Onorio                Topor            Vatianou          Whiting


Conference Price: $299.00 per person

Each attendee will receive a certificate awarding 7 CPE credits for CISSP continuing education, in addition to 0.7 CEUs and 7 PDUs. CISSP is a registered certification mark of (ISC)², Inc.

Exhibits

As is always the case at CAMP IT Conferences events, the talks will not include product presentations. During the continental breakfast, coffee breaks, and the luncheon break you will have the opportunity to informally meet representatives from the following sponsoring companies, who have solutions in the area of the conference.


Sponsors