Feedback from Attendees

Upcoming  2017 Events

July 12, 2017
Enterprise Architecture Strategies
Info
Chicago, IL

Sept. 7, 2017
IT Infrastructure/Operations Management (Data Center)
Info
Chicago, IL

Sept. 19, 2017
Enterprise Risk/Security Management
Info
Dallas, TX

Oct. 4, 2017
Enterprise Risk/Security Management
Info
Chicago, IL

Oct. 18, 2017
IT Leadership Strategies
Info
Chicago, IL

Oct. 26, 2017
Enterprise Architecture Strategies
Info
Chicago, IL

Nov. 1-2, 2017
IT PMO/Portfolio Management
Info
Dallas, TX

Nov. 15, 2017
DR/BC - Resilient Infrastructure
Info
Chicago, IL

Nov. 30, 2017
Business Intelligence/Big Data/Analytics
Info
Chicago, IL

Dec. 7, 2017
Data Breaches: Preparing and Responding
Info
Chicago, IL

Upcoming  2018 Events

Feb. 1, 2018
Enterprise Risk/Security Management
Info
Dallas, TX

Feb. 20, 2018
Enterprise Risk/Security Management
Info
Chicago, IL

Mar. 1, 2018
IT Leadership Strategies
Info
Chicago, IL

Mar. 7, 2018
Enterprise Architecture Strategies
Info
Chicago, IL

April 12, 2018
Business Intelligence/Big Data/Analytics
Info
Chicago, IL

May 2, 2018
Data Breaches: Preparing and Responding
Info
Chicago, IL

May 15, 2018
IT Infrastructure/Operations Management (Data Center)
Info
Chicago, IL

May 31, 2018
Enterprise Risk/Security Management
Info
Minneapolis, MN

June 7, 2018
Enterprise Risk/Security Management
Info
Chicago, IL

June 20-21, 2018
IT PMO/Portfolio Management
Info
Chicago, IL

July 11, 2018
Enterprise Architecture Strategies
Info
Chicago, IL

Sept. 6, 2018
IT Infrastructure/Operations Management (Data Center)
Info
Chicago, IL

Sept. 18, 2018
Enterprise Risk/Security Management
Info
Dallas, TX

Oct. 3, 2018
Enterprise Risk/Security Management
Info
Chicago, IL

Oct. 17, 2018
IT Leadership Strategies
Info
Chicago, IL

Oct. 25, 2018
Enterprise Architecture Strategies
Info
Chicago, IL

Nov. 1-2, 2018
IT PMO/Portfolio Management
Info
Dallas, TX

Nov. 14, 2018
DR/BC - Resilient Infrastructure
Info
Chicago, IL

Nov. 29, 2018
Business Intelligence/Big Data/Analytics
Info
Chicago, IL

Dec. 6, 2018
Data Breaches: Preparing and Responding
Info
Chicago, IL

(Click here to add any of our upcoming events to your calendar)

 

 

Conferences that solve current IT challenges

Enterprise Risk / Security Management

Strategies for reducing risk to the enterprise.

September 22, 2016

9:00am-5:00pm

7 CPE / 0.7 CEU / CISSP / 7 PDU Credits Awarded

 

Conference location: Plano Centre, Plano Texas

Overview

In today’s highly regulatory environment it is essential that you have a clear understanding of risk across the enterprise. A risk management framework can bring visibility to key business and compliance risks and enable a company to make decisions on where to prioritize its limited resources. It is through a risk management framework that real value to the business can be achieved.

With all of these challenges, how do you make this happen?

In this one day conference, attendees will be provided with examples of approaches to managing information and compliance risk through a risk management framework.


Early confirmed speakers from IT departments include:

Prabhakar Kota, Director, Information Security, MBA, CISA, CISSP, CompuCom

Willis Marti, CISO, Texas A&M University

Ingrid Rodríguez, Director, Risk Management, Office of Business Technology, American Heart Association

Matt Fearin, CISO Epsilon / Conversant

Ken Waterman, CTO & CISO, Textron

Harvey Ewing, Chief Information Security Officer, G6 Hospitality

Michael Britton, Chief Information Security Officer, Alliance Data



What You Will Learn

In this one day conference attendees will learn:

  • Cyber Crime Unmasked – How to Leverage Defense Best Practices Against Ransomware

  • Endpoints & Servers, Private & Public Clouds : Are the Security Risks the Same?

  • Firming the Posture: Building a World-Class Security-Risk Team (Panel discussion)

  • Risk Mitigation: How to Plan for DDoS Attacks, Detection and Mitigation

  • Cyber Attacks: How Can You Reduce the Risk?

  • Breaches in 2016: How is this Affecting Your Security/Risk Strategy (Panel discussion)

Conference Program

8:00am - 9:00am - Registration and Continental Breakfast

Muniz

9:00am-10:00am

Cyber Crime Unmasked – How to Leverage Defense Best Practices Against Ransomware

Joey Muniz, Consultant and Security Researcher, Cisco Systems

This session will cover how real world threats work focusing on a case study of ransomware that will include defense best practices. Attendees will walk leave the session with steps they can take to reduce the risk.










10:00am -10:30am - Refreshment Break

Fearin

10:30am-11:30am

Endpoints & Servers, Private & Public Clouds : Are the Security Risks the Same?

Matt Fearin, CISO Epsilon / Conversant
Scott Savage, Enterprise Security Architect, Capital One

Today most enterprises have a hybrid environment of physical, virtual, and cloud systems, yet many treat these the same from a security risk perspective. In this session, we will discuss these workload types and the security risks of each that an enterprise has to be aware of and the best way to mitigate them.  









Sumar

Kota

Marti

Waterman

Ewing

Britton

11:30am-12:30pm

Firming the Posture: Building a World-Class Security-Risk Team (Panel discussion)

Moderator:
Annur Sumar, CTO, MaeTech
Panelists:
Prabhakar Kota, Director, Information Security, MBA, CISA, CISSP, CompuCom
Willis Marti, CISO, Texas A&M University
Ken Waterman, CTO & CISO, Textron
Harvey Ewing, Chief Information Security Officer, G6 Hospitality
Michael Britton, Chief Information Security Officer, Alliance Data
and other CISOs/Security Executives from IT departments sharing lessons learned

What does it take to foster and retain top-tier talent as well as adopt an enterprise-wide security culture beyond IT?

In this session, attendees will learn from a CISO panelists sharing their experiences as to getting ahead of the threats while engaging the entire extended enterprise as a part of fight.





















12:30pm - 1:30pm Luncheon

Mazzucco

1:30pm-2:30pm

Risk Mitigation: How to Plan for DDoS Attacks, Detection and Mitigation

Paul Mazzucco, CISO, TierPoint

You've likely seen it in the news: Distributed Denial of Service (DDoS) attacks have rocked the business world in recent years, inflicting costly and destructive downtime on hosted applications and resources, and costing many IT decision makers their job.

But how do you prepare for a DDoS attack? What steps can you take to prevent it? How should you respond?

In this session, Paul Mazzucco, CISO, TierPoint will provide you with strategies and tactics to use.










 

2:30pm - 3:00pm - Refreshment Break

Sumar

3:00pm-4:00pm

Cyber Attacks: How Can You Reduce the Risk?

Annur Sumar, CTO, MaeTech

Regulatory compliance management (such as PCI, HIPAA, ISO) and security breach protection, is already a complex challenge present in many organizations today. The complexity is continuing to grow, and exponentially, with the increasing sources, numbers and types of attacks being generated, with the proliferation of Cloud technologies. With this complexity also comes higher costs in terms of not only the number of security incidents that need to be investigated, the number of tools needed and in finding the skilled personnel to manage it. And, the cost of these breaches are being measured beyond mere dollars to their detrimental impacts on a company’s brand and reputation, customer and supplier relationships, employee productivity, and all the way up the organization’s board and C-Level reputations.








Fearin 

4:00pm-5:00pm

Breaches in 2016: How is this Affecting Your Security/Risk Strategy (Panel)

Panelists:
Ingrid Rodríguez, Director, Risk Management, Office of Business Technology, American Heart Association
Matt Fearin, CISO Epsilon / Conversant
Scott Savage, Enterprise Security Architect, Capital One
and other CISOs/Security Executives from IT departments sharing lessons learned

According to industry analysts, approximately 50% of organizations have had to reevaluate their information security standards as a result of recent well-publicized attacks.

In this session, attendees will learn from a panel of IT security executives as to how they are updating their security & risk strategies in the wake of massive security breaches.









Conference Price: $289.00 per person


Each attendee will receive a certificate awarding 7 CPE credits for CISSP continuing education, in addition to 0.7 CEUs and 7 PDUs. CISSP is a registered certification mark of (ISC)˛, Inc.

Exhibits

As is always the case at CAMP IT Conferences events, the talks will not include product presentations.  During the continental breakfast, coffee breaks, and the luncheon break you will have the opportunity to informally meet representatives from the following sponsoring companies, who have solutions in the area of the conference.