Feedback from Attendees

Upcoming  2017 Events

Sept. 19, 2017
Enterprise Risk/Security Management
Info
Dallas, TX

Oct. 4, 2017
Enterprise Risk/Security Management
Info
Chicago, IL

Oct. 18, 2017
IT Leadership Strategies
Info
Chicago, IL

Oct. 26, 2017
Enterprise Architecture Strategies
Info
Chicago, IL

Nov. 1-2, 2017
IT PMO/Portfolio Management
Info
Dallas, TX

Nov. 15, 2017
DR/BC - Resilient Infrastructure
Info
Chicago, IL

Nov. 30, 2017
Business Intelligence/Big Data/Analytics
Info
Chicago, IL

Dec. 7, 2017
Data Breaches: Preparing and Responding
Info
Chicago, IL

Upcoming  2018 Events

Feb. 1, 2018
Enterprise Risk/Security Management
Info
Dallas, TX

Feb. 20, 2018
Enterprise Risk/Security Management
Info
Chicago, IL

Mar. 1, 2018
IT Leadership Strategies
Info
Chicago, IL

Mar. 7, 2018
Enterprise Architecture Strategies
Info
Chicago, IL

April 12, 2018
Business Intelligence/Big Data/Analytics
Info
Chicago, IL

May 2, 2018
Data Breaches: Preparing and Responding
Info
Chicago, IL

May 15, 2018
IT Infrastructure/Operations Management (Data Center)
Info
Chicago, IL

May 31, 2018
Enterprise Risk/Security Management
Info
Minneapolis, MN

June 7, 2018
Enterprise Risk/Security Management
Info
Chicago, IL

June 20-21, 2018
IT PMO/Portfolio Management
Info
Chicago, IL

July 11, 2018
Enterprise Architecture Strategies
Info
Chicago, IL

Sept. 6, 2018
IT Infrastructure/Operations Management (Data Center)
Info
Chicago, IL

Sept. 18, 2018
Enterprise Risk/Security Management
Info
Dallas, TX

Oct. 3, 2018
Enterprise Risk/Security Management
Info
Chicago, IL

Oct. 17, 2018
IT Leadership Strategies
Info
Chicago, IL

Oct. 25, 2018
Enterprise Architecture Strategies
Info
Chicago, IL

Nov. 1-2, 2018
IT PMO/Portfolio Management
Info
Dallas, TX

Nov. 14, 2018
DR/BC - Resilient Infrastructure
Info
Chicago, IL

Nov. 29, 2018
Business Intelligence/Big Data/Analytics
Info
Chicago, IL

Dec. 6, 2018
Data Breaches: Preparing and Responding
Info
Chicago, IL

(Click here to add any of our upcoming events to your calendar)

 

 

Conferences that solve current IT challenges

Enterprise Risk / Security Management

Strategies for reducing risk to the enterprise.

October 4, 2017

9:00am-5:00pm

7 CPE / 0.7 CEU / CISSP / 7 PDU Credits Awarded

Register

Conference location: Donald E. Stephens Convention Center Rosemont (O'Hare) Illinois

Overview

In today’s highly regulatory environment it is essential that you have a clear understanding of risk across the enterprise. A risk management framework can bring visibility to key business and compliance risks and enable a company to make decisions on where to prioritize its limited resources. It is through a risk management framework that real value to the business can be achieved.

With all of these challenges, how do you make this happen?

In this one day conference, attendees will be provided with examples of approaches to managing information and compliance risk through a risk management framework.

What You Will Learn

In this one day conference attendees will learn:

  • Technology and Disruptive Forces: A CISO's View on Future Risks to Your Organization
  • Defining Acceptable Risk in an Age of Evolving Threats
  • Data & Security Analytics: Can We Predict the Next Attack?
  • Risk Mitigation: How to Plan for DDoS Attacks, Detection and Mitigation
  • Vendor Risk Management: How to Identify and Decrease Potential Risks When Leveraging 3rd Party Vendors (panel discussion)
  • How Security and the CSO Can Provide Business Value (panel discussion)

Conference Program

8:00am - 9:00am - Registration and Continental Breakfast

Kwong

9:00am-10:00am

Technology and Disruptive Forces: A CISO's View on Future Risks to Your Organization

Fred Kwong, CISO, Delta Dental

What are the current risks? What are the future risks? How do we prepare for the unknowns or can we?

In this session, Fred Kwong will share his view on the disruptions taking place, the future impact on your enterprise and what you should do now to prepare for the future risks.











10:00am -10:30am - Refreshment Break

 

10:30am-11:30am

Defining Acceptable Risk in an Age of Evolving Threats

 

A clear definition of your acceptable level of information security risk is critical to compliance, and for protecting your liabilities when things go wrong. Recent court decisions and evolving regulatory law have made this definition even more critical to business.

When organizations establish their definition of acceptable risk, they develop their own “pass/fail” grade which is applicable to regulations and litigation, but also sensible to business.

In this session attendees will learn how to Calculate an Acceptable Risk Definition and to apply that definition to their information security programs.











Vetter

11:30am-12:30pm

Data & Security Analytics: Can We Predict the Next Attack?

Laura Vetter, Chief Technologist

The goal of security analytics is to detect attacks as quickly as possible, enable security leadership to block or stop an attack and provide detailed information to reconstruct an attack so that we learn how to predict or prevent the next attack.

In this session, attendees will learn:

  • Best practices for leveraging security analytics
  • How to read the data and learn from what is presented












12:30pm - 1:30pm Luncheon

Mazzucco

1:30pm-2:30pm

Risk Mitigation: How to Plan for DDoS Attacks, Detection and Mitigation

Paul Mazzucco, CISO, TierPoint

You've likely seen it in the news: Distributed Denial of Service (DDoS) attacks have rocked the business world in recent years, inflicting costly and destructive downtime on hosted applications and resources, and costing many IT decision makers their job.

But how do you prepare for a DDoS attack? What steps can you take to prevent it? How should you respond?

In this session, Paul Mazzucco, CISO, TierPoint will provide you with strategies and tactics to use.

  • How to predict future attack based on past experience how to leverage security analytics
  • How to articulate the results to the business for future risk reduction










2:30pm - 3:00pm - Refreshment Break

Duplessis

Rasheed

Guth

3:00pm-4:00pm

Vendor Risk Management: How to Identify and Decrease Potential Risks When Leveraging 3rd Party Vendors (panel discussion)

Panelists:
Robert M. Duplessis, Senior Vice President / Information Security Officer, Old Second National Bank
Fawaz Rasheed, Chief Information Security Officer and Vice President, Trustmark Companies
Mark Guth, Manager Corporate Security Critical Infrastructure Protection Compliance, Southern Company Gas
James Mountain, Director of Information Security, Information Technology, Palmer College
and other professionals from IT departments

Topics that will be covered include:

  • Contract outlining the business relationship between your organization and 3rd party vendor
  • How to monitor vendor performance to ensure that contractual obligations are being met
  • Guidelines regarding which party will have access to what information as part of the agreement
  • How to ensure that 3rd party vendors meet regulatory compliance guidelines for your industry












Dillon

Devine

Maher

4:00pm-5:00pm

How Security and the CSO Can Provide Business Value (panel discussion)

Moderator:
Tim Dillon, Regional Director of Sales, Proofpoint
Panelists:
Erik Devine, Chief Information Security Officer, Riverside Healthcare
Brent Maher, CISSP, Senior Vice President – Chief Information Security Officer (CISO), Johnson Financial Group
Jenny Inserro, Senior Director, Information Security Governance, Risk & Compliance, Health Care Service Corporation
Jerry Pittman, Chief Information Security Officer, Tenneco
and other professionals from IT departments

In this session, attendees will learn from a panel of IT security executives as to the strategies they are leveraging to insure their efforts are in sync with business priorities.

Topics covered:

  • How to identify leverage the following areas of value: reputation, regulation, revenue, resilience, and recession for continued investment and security spending
  • How to assess, understand and define security’s current and future roles in the extended enterprise
  • Where are security investments being made on personnel, processes, and technologies





Conference price: $289 per person.


Each attendee will receive a certificate awarding 7 CPE credits for CISSP continuing education, in addition to 0.7 CEUs and 7 PDUs. CISSP is a registered certification mark of (ISC)˛, Inc.

Exhibits

As is always the case at CAMP IT Conferences events, the talks will not include product presentations.  During the continental breakfast, coffee breaks, and the luncheon break you will have the opportunity to informally meet representatives from the following sponsoring companies, who have solutions in the area of the conference.