Feedback from Attendees

Upcoming  2017 Events

July 12, 2017
Enterprise Architecture Strategies
Info
Chicago, IL

Sept. 7, 2017
IT Infrastructure/Operations Management (Data Center)
Info
Chicago, IL

Sept. 19, 2017
Enterprise Risk/Security Management
Info
Dallas, TX

Oct. 4, 2017
Enterprise Risk/Security Management
Info
Chicago, IL

Oct. 18, 2017
IT Leadership Strategies
Info
Chicago, IL

Oct. 26, 2017
Enterprise Architecture Strategies
Info
Chicago, IL

Nov. 1-2, 2017
IT PMO/Portfolio Management
Info
Dallas, TX

Nov. 15, 2017
DR/BC - Resilient Infrastructure
Info
Chicago, IL

Nov. 30, 2017
Business Intelligence/Big Data/Analytics
Info
Chicago, IL

Dec. 7, 2017
Data Breaches: Preparing and Responding
Info
Chicago, IL

Upcoming  2018 Events

Feb. 1, 2018
Enterprise Risk/Security Management
Info
Dallas, TX

Feb. 20, 2018
Enterprise Risk/Security Management
Info
Chicago, IL

Mar. 1, 2018
IT Leadership Strategies
Info
Chicago, IL

Mar. 7, 2018
Enterprise Architecture Strategies
Info
Chicago, IL

April 12, 2018
Business Intelligence/Big Data/Analytics
Info
Chicago, IL

May 2, 2018
Data Breaches: Preparing and Responding
Info
Chicago, IL

May 15, 2018
IT Infrastructure/Operations Management (Data Center)
Info
Chicago, IL

May 31, 2018
Enterprise Risk/Security Management
Info
Minneapolis, MN

June 7, 2018
Enterprise Risk/Security Management
Info
Chicago, IL

June 20-21, 2018
IT PMO/Portfolio Management
Info
Chicago, IL

July 11, 2018
Enterprise Architecture Strategies
Info
Chicago, IL

Sept. 6, 2018
IT Infrastructure/Operations Management (Data Center)
Info
Chicago, IL

Sept. 18, 2018
Enterprise Risk/Security Management
Info
Dallas, TX

Oct. 3, 2018
Enterprise Risk/Security Management
Info
Chicago, IL

Oct. 17, 2018
IT Leadership Strategies
Info
Chicago, IL

Oct. 25, 2018
Enterprise Architecture Strategies
Info
Chicago, IL

Nov. 1-2, 2018
IT PMO/Portfolio Management
Info
Dallas, TX

Nov. 14, 2018
DR/BC - Resilient Infrastructure
Info
Chicago, IL

Nov. 29, 2018
Business Intelligence/Big Data/Analytics
Info
Chicago, IL

Dec. 6, 2018
Data Breaches: Preparing and Responding
Info
Chicago, IL

(Click here to add any of our upcoming events to your calendar)

 

 

Conferences that solve current IT challenges

Enterprise Risk / Security Management

Strategies for reducing risk to the enterprise.

February 4, 2016

9:00am-5:00pm

7 CPE / 0.7 CEU / CISSP / 7 PDU Credits Awarded

Bios

Conference location: Plano Centre, Plano Texas

Overview

In today’s highly regulatory environment it is essential that you have a clear understanding of risk across the enterprise. A risk management framework can bring visibility to key business and compliance risks and enable a company to make decisions on where to prioritize its limited resources. It is through a risk management framework that real value to the business can be achieved.

With all of these challenges, how do you make this happen?

In this one day conference, attendees will be provided with examples of approaches to managing information and compliance risk through a risk management framework.

What You Will Learn

In this one day conference attendees will learn:

  • Planning Your Cybersecurity Future

  • Calculating Your Acceptable Level of Risk

  • Control Who is Telling the InfoSec Story

  • Risk Framework: Managing the Risk of New Technologies – Identity, Mobility and Cloud

  • How Security and the CSO Can Provide Business Value (Panel)

  • Breaches in 2016: How is this Affecting Your Security/Risk Strategy (Panel)






Early confirmed CISO speakers include: 

Andrew Gunn, CISO, Director, IS Security and Operations, Conifer Health Solutions

Betty Holte, CISSP, VP, CISO, MoneyGram International

Mark Nagiel, SVP, CISO, Prime Lending

Andy Sawyer, CISM, CISO, Director of Security, Locke Lord

Ajay Gupta, CISO, Head of Enterprise Architecture, Concentra

KC Condit, Senior Director, Information Security & IT Service Management, Rent-A-Center, Inc.

Elliott Franklin, CISSP, CISM, Information Security Officer, Essilor of America Inc

Paul Mazzucco, Chief Security Officer, TierPoint

Adam Maslow, Director, Security and Compliance, JCPenney









Conference Program

8:00am - 9:00am - Registration and Continental Breakfast

Vela

9:00am-10:00am

Planning Your Cybersecurity Future

Ryan Vela, Regional Director, Cyber Breach Therapist, Fidelis Cybersecurity

There has been a maturity in large-scale cyber breaches over the past decade from unorganized to sophisticated. Based on actual case investigations of the past decade, this presentation presents the changes that have, are, and will occur from adversaries, malicious motivations, targets, security architectures, a maturing understanding of cyber risk. This presentation also outlines steps that organizations can take to plan for the risks associated with cyber breaches.

  • How has the landscape changed in the past 10 years?
  • How will the threat landscape change in the next 5 years?
  • Will I get breached?
  • What tactics are organizations using today to minimize the risk of breaches?








10:00am -10:30am - Refreshment Break

Shteiman

10:30am-11:30am

How to Leverage Behavior Analytics to Reduce Security Risks

Barry Shteiman, Director, Exabeam Labs

With so many potential risks it can be difficult to determine which an enterprise can live with, which it can't, and which it can cope with when reduced to an acceptable level of risk.

In this session attendees will learn how to build a framework to define an acceptable level of risk.  Areas that will be covered include how to apply machine learning and user behavior analytics. 










Chapa

11:30am-12:30pm

Mitigating Enterprise Risk - Leveraging Intelligent Data Technologies

David A. Chapa, CTO, EMC Isilon

This session highlights how operational risk can be mitigated through the introduction of cybersecurity resilient solutions such as intelligent data storage. The session introduces the concepts of cybersecurity resiliency and the data lake as well as an overview of alternate operational uses cases that leverage emerging Intelligent Data Storage or Software Defined Storage (SDS) to improve the management and protection of a critical enterprise asset – information.

Identified as key equipment, and available as a commercial off-the-shelf (COTS) solution, Intelligent Data Storage can be leveraged to address numerous Confidentiality, Integrity and Availability (CIA) cyber security objectives. Intelligent Data Storage also creates a data-driven cyber analytics capability, enabling cyber use cases such as proactive cyber analytics, and long-term cyber forensic analyses, thereby complementing traditional techniques and mitigating risks.

Cybersecurity mission success requires the ability to look back, and look forward to predict the next vulnerability and conduct business continuity operations. With creative thinking about cyber analytics and the deployment of innovative Intelligent Data Storage, cyber teams can deliver new levels of threat awareness and protection across the enterprise.












12:30pm - 1:30pm Luncheon

Sumar

1:30pm-2:30pm

Risk Framework: Managing the Risk of New Technologies – Identity, Mobility and Cloud

Annur Sumar, Microsoft MVP, Former Vice President of IT D&P

The change of pace in new cloud technologies is overwhelming at times. While the advances being made can lead to great advantages for the business, the security risks also increase significantly.

In this session, attendees will learn how to develop a framework to assess and mitigate the risk when implementing new technologies such as Cloud based Identity and Mobility in the enterprise.













2:30pm - 3:00pm - Refreshment Break

Mazzucco

Gunn

Holte

Nagiel

Gupta

3:00pm-4:00pm

How Security and the CSO Can Provide Business Value (Panel)

Moderator:
Paul Mazzucco, Chief Security Officer, TierPoint
Panelists will include:
Andrew Gunn, CISO, Director, IS Security and Operations, Conifer Health Solutions
Betty Holte, CISSP, VP, CISO, MoneyGram International
Mark Nagiel, SVP, CISO, Prime Lending
Ajay Gupta, Former CISO, Head of Enterprise Architecture, Concentra
and other CISOs/IT Security Executives

In this session, attendees will learn from a panel of IT security executives as to the strategies they are leveraging to insure their efforts are in sync with business priorities.

Topics covered:

  • How to identify leverage the following areas of value: reputation, regulation, revenue, resilience, and recession for continued investment and security spending
  • How to assess, understand and define security’s current and future roles in the extended enterprise
  • Where are security investments being made on personnel, processes, and technologies













 

4:00pm-5:00pm

Sumar

Condit

Maslow

Franklin

Breaches in 2016: How is this Affecting Your Security/Risk Strategy (Panel)

Moderator:
Annur Sumar, Microsoft MVP, Former Vice President of IT D&P
Panelists:
KC Condit, Senior Director, Information Security & IT Service Management, Rent-A-Center, Inc.
Adam Maslow, Director, Security and Compliance, JCPenney
Elliott Franklin, CISSP, CISM, Information Security Officer, Essilor of America Inc.
and other CISOs/IT Security Executives

According to industry analysts, approximately 50% of organizations have had to reevaluate their information security standards as a result of recent well-publicized attacks.

In this session, attendees will learn from a panel of IT security executives as to how they are updating their security & risk strategies in the wake of massive security breaches.












Conference Price: $289.00 per person


Each attendee will receive a certificate awarding 7 CPE credits for CISSP continuing education, in addition to 0.7 CEUs and 7 PDUs. CISSP is a registered certification mark of (ISC)˛, Inc.

Exhibits

As is always the case at CAMP IT Conferences events, the talks will not include product presentations.  During the continental breakfast, coffee breaks, and the luncheon break you will have the opportunity to informally meet representatives from the following sponsoring companies, who have solutions in the area of the conference.