Feedback from Attendees

Upcoming  2017 Events

Oct. 4, 2017
Enterprise Risk/Security Management
Info
Chicago, IL

Oct. 18, 2017
IT Leadership Strategies
Info
Chicago, IL

Oct. 26, 2017
Enterprise Architecture Strategies
Info
Chicago, IL

Nov. 1-2, 2017
IT PMO/Portfolio Management
Info
Dallas, TX

Nov. 15, 2017
DR/BC - Resilient Infrastructure
Info
Chicago, IL

Nov. 30, 2017
Business Intelligence/Big Data/Analytics
Info
Chicago, IL

Dec. 7, 2017
Data Breaches: Preparing and Responding
Info
Chicago, IL

Upcoming  2018 Events

Feb. 1, 2018
Enterprise Risk/Security Management
Info
Dallas, TX

Feb. 20, 2018
Enterprise Risk/Security Management
Info
Chicago, IL

Mar. 1, 2018
IT Leadership Strategies
Info
Chicago, IL

Mar. 7, 2018
Enterprise Architecture Strategies
Info
Chicago, IL

April 12, 2018
Business Intelligence/Big Data/Analytics
Info
Chicago, IL

May 2, 2018
Data Breaches: Preparing and Responding
Info
Chicago, IL

May 15, 2018
IT Infrastructure/Operations Management (Data Center)
Info
Chicago, IL

May 31, 2018
Enterprise Risk/Security Management
Info
Minneapolis, MN

June 7, 2018
Enterprise Risk/Security Management
Info
Chicago, IL

June 20-21, 2018
IT PMO/Portfolio Management
Info
Chicago, IL

July 11, 2018
Enterprise Architecture Strategies
Info
Chicago, IL

Sept. 6, 2018
IT Infrastructure/Operations Management (Data Center)
Info
Chicago, IL

Sept. 18, 2018
Enterprise Risk/Security Management
Info
Dallas, TX

Oct. 3, 2018
Enterprise Risk/Security Management
Info
Chicago, IL

Oct. 17, 2018
IT Leadership Strategies
Info
Chicago, IL

Oct. 25, 2018
Enterprise Architecture Strategies
Info
Chicago, IL

Nov. 1-2, 2018
IT PMO/Portfolio Management
Info
Dallas, TX

Nov. 14, 2018
DR/BC - Resilient Infrastructure
Info
Chicago, IL

Nov. 29, 2018
Business Intelligence/Big Data/Analytics
Info
Chicago, IL

Dec. 6, 2018
Data Breaches: Preparing and Responding
Info
Chicago, IL

(Click here to add any of our upcoming events to your calendar)

 

 

Conferences that solve current IT challenges

Enterprise Risk / Security Management

Strategies for reducing risk to the enterprise.

February 2, 2017

9:00am-5:00pm

7 CPE / 0.7 CEU / CISSP / 7 PDU Credits Awarded

Bios

Conference location:  Crowne Plaza Dallas - Market Center  

Overview

In today’s highly regulatory environment it is essential that you have a clear understanding of risk across the enterprise. A risk management framework can bring visibility to key business and compliance risks and enable a company to make decisions on where to prioritize its limited resources. It is through a risk management framework that real value to the business can be achieved.

With all of these challenges, how do you make this happen?

In this one day conference, attendees will be provided with examples of approaches to managing information and compliance risk through a risk management framework.

What You Will Learn

In this one day conference attendees will learn:

  • Fifth Generation Networks and Security: Moving Towards Software Defined WANs and Advanced Secure Forensics

  • Cyber Crime Unmasked – How to Leverage Defense Best Practices Against Ransomware

  • Data & Security Analytics: Can We Predict the Next Attack?  

  • How Security and the CSO Can Build Trust with the Business (Panel discussion)

  • The Importance of Packets in Network Security

  • PKI Implementation - Lessons Learned from the Field

  • Managing the Politics— How to Protect and Grow Your Security Budget (Panel discussion)

Early confirmed CISO speakers include:

Jim Desmond, Chief Security Officer, Elevate

John Woods, Vice President, Information Security, PDX

Anil Varghese, CISO, Information Technology, Service King Collision Repair Centers

Cecil Pineda, AVP Technology Security, IT Services, Dallas Forth Worth International Airport

Mike Kegerreis, IT Security, SMTS, Texas Instruments

John South, Consultant; Former CISO Heartland Payment Systems

Joshua Danielson, Director of Information Security, Copart

Mark Nagiel, VP/CISO, PrimeLending

Todd Meedel, Sr., Cybersecurity Engineer, HSCC - Blue Cross Blue Shield







Conference Program

8:00am - 9:00am - Registration and Continental Breakfast

Watson

9:00am-9:50am

Fifth Generation Networks and Security: Moving Towards Software Defined WANs and Advanced Secure Forensics

Ray Watson, VP of Global Technology, Masergy

Wide area networks and cyber security have evolved through four major generations, and a fifth generation of networks and security is now emerging. This presentation will discuss some of the challenges, advantages and pitfalls of fifth generation wide area networking and cyber security, including:

  • What is the history and evolution of the five generations of wide area networks?
  • Are hybrid networks becoming the de facto standard?
  • Is MPLS dead, dying, or still growing?
  • What are some best practices for migrating to programmable fifth generation technologies?
  • What is the history and evolution of the five generations of cyber defense and security?
  • How can global enterprises possibly hope to defend themselves from Advanced Persistent Threats?
  • What are some best practices for enterprises around security?








9:50am -10:20am - Refreshment Break

Cox

10:20am-11:10am

Cyber Crime Unmasked – How to Leverage Defense Best Practices Against Ransomware

Allan Cox, System Engineer, CyberArk

This session will cover how real world threats work focusing on a case study of ransomware that will include defense best practices. Attendees will walk leave the session with steps they can take to reduce the risk.









Sumar

11:10am-12:00pm

Data & Security Analytics: Can We Predict the Next Attack?

Annur Sumar, CTO, Maetech; Microsoft MVP, Former Vice President of IT D&P 

The goal of security analytics is to detect attacks as quickly as possible, enable security leadership to block or stop an attack and provide detailed information to reconstruct an attack so that we learn how to predict or prevent the next attack.

In this session, attendees will learn:

  • Best practices for leveraging security analytics
  • How to read the data and learn from what is presented
  • How to predict future attack based on past experience how to leverage security analytics
  • How to articulate the results to the business for future risk reduction













12:00pm - 1:00pm Luncheon

Sumar

Desmond

Woods

Varghese

Kegerreis

1:00pm-1:50pm

How Security and the CSO Can Build Trust with the Business (Panel)

Moderator:
Annur Sumar, CTO, Maetech; Microsoft MVP, Former Vice President of IT D&P 
Panelists:
Jim Desmond, Chief Security Officer, Elevate
John Woods, Vice President, Information Security, PDX
Anil Varghese, CISO, Information Technology, Service King Collision Repair Centers
Cecil Pineda, AVP Technology Security, IT Services, Dallas Fort Worth International Airport
Mike Kegerreis, IT Security, SMTS, Texas Instruments
and other CISOs/IT Security Executives

In this session, attendees will learn from a panel of IT security executives as to the strategies they are leveraging to insure their efforts are in sync with business priorities.

Topics covered:

  • How to identify leverage the following areas of value: reputation, regulation, revenue, resilience, and recession for continued investment and security spending
  • How to assess, understand and define security’s current and future roles in the extended enterprise
  • Where are security investments being made on personnel, processes, and technologies











1:50pm - 2:20pm - Refreshment Break

Naylor

2:20pm-3:10pm

The Importance of Packets in Network Security

Bill Naylor, Sr. Engineer, Viavi Solutions

Packets don’t lie. For network teams to effectively support their security counterparts, they not only need complete packet data – they need the ability to quickly analyze the data for anomalies that can lead to prompt recovery from a security breach and faster time to resolution. Bill Naylor will explain why today’s network security requires full packet capture to root out anomalies as well identify potential threats for immediate attention.










3:10pm-4:00pm

Meedel

PKI Implementation - Lessons Learned from the Field

Todd Meedel, Sr., Cybersecurity Engineer, HSCC - Blue Cross Blue Shield














4:00pm-5:00pm

South

Danielson

Nagiel

Meedel

Managing the Politics— How to Protect and Grow Your Security Budget (Panel discussion)

Moderator:
Mike Henry, RSM, Gemalto
Panelists:
John South, Consultant; Former CISO Heartland Payment Systems
Joshua Danielson, Director of Information Security, Copart
Mark Nagiel, VP/CISO, PrimeLending
Todd Meedel, Sr., Cybersecurity Engineer, HSCC - Blue Cross Blue Shield
and other CISOs sharing strategies, tactics and lessons learned

Budgets are always under pressure and being scrutinized. Given the constant threats, CISOs are always fighting to grow their budget. How can you best defend your budget while asking for more? In this session, attendees will learn from prominent CISOs as to strategies they are using to achieve this.



Conference Price: $289.00 per person


Each attendee will receive a certificate awarding 7 CPE credits for CISSP continuing education, in addition to 0.7 CEUs and 7 PDUs. CISSP is a registered certification mark of (ISC)˛, Inc.

Exhibits

As is always the case at CAMP IT Conferences events, the talks will not include product presentations.  During the continental breakfast, coffee breaks, and the luncheon break you will have the opportunity to informally meet representatives from the following sponsoring companies, who have solutions in the area of the conference.