UPCOMING EVENTS

Data Breaches:  Defending Against and Responding To

 

Strategies to help your organization prepare for, defend against and respond to breaches.

 

May 2, 2019

 

9:00am-5:00pm

 

7 CPE / 0.7 CEU / CISSP / 7 PDU Credits Awarded

 

Conference location: Donald E. Stephens Convention Center Rosemont (O’Hare) Illinois

  

      


Overview

 

It is not a matter of if, but when your organization will be breached. Against these threats, enterprises try to build higher and more secure walls around their data and networks. This seems to be a never-ending arms race, as even the most sophisticates systems may, before long, present weaknesses that malicious technology can overcome.


What You Will Learn

 

In this one day conference attendees will learn:

  • Today’s Cyber Threats – What Keeps Me Up at Night
  • Cyber Security & BC/DR: Recovering from Ransomware & Breaches
  • Duty of Care Risk Analysis: “Getting Consensus From Legal, Information Security, and Executive Management.”
  • Something Old, Something New: 2018 Attack Overview
  • Breakout Session: Breaches Real World Scenarios – Response Challenge
  • Breaches & Ransomware: How to Handle, How to Respond

 

Conference Price: $289.00 per person

 

Each attendee will receive a certificate awarding 7 CPE credits for CISSP continuing education, in addition to 0.7 CEUs and 7 PDUs. CISSP is a registered certification mark of (ISC)², Inc.


Conference Program


8:00am – 9:00am: Registration and Continental Breakfast


9:00am-10:00am:  Today’s Cyber Threats – What Keeps Me Up at Night

 

Alex Holden, Founder & CISO, Hold Security

 

Insider look at current events in cyber security and what is in store for the future. What are the most common threats? How to respond to the breaches that seemingly ambush us every day? This technical and insightful overview is a glimpse of hope in an otherwise chaotic cyber world.

 


Holden


10:00am -10:30am: Refreshment Break


10:30am-11:30am: Duty of Care Risk Analysis: “Getting Consensus From Legal, Information Security, and Executive Management.”

 

 

This service philosophy has evolved into a a process for risk assessments that is best known as Duty of Care Risk Analysis (“D.O.C.R.A.”). This unique process helps organizations develop criteria by which they can prioritize risk and develop consensus on acceptable risk between the business, legal and security. The process, when implemented correctly, allows organizations to defend their decisions to interested 3rd parties, regulators, and the courts.

 

 


11:30am-12:30pm: Is it an Incident or a Breach? How to Tell and Why it Matters

 

 

How you determine whether it is an incident or a breach that may or may not involve the exposure of sensitive customer data will determine, among other things:

  • Which organizations should get involved
  • What actions should be taken
  • How it will be resolved
  • If notification required
  • Who? When? How?

 

How you respond will determine can minimize the monetary, regulatory, and reputational damages and risks to you, your enterprise, and your customers.

 

 


12:30pm – 1:30pm Luncheon


1:30pm-2:30pm: Cyber Security & BC/DR: Recovering from Ransomware & Breaches

 

 

Seasoned practitioners are aware that BC/DR practices can reduce the cost of cyber breaches. But breaches will still occur and they will happen with greater frequency. How do you leverage all that DR/BC can offer to reduce the risk and mitigate the effects?

 

In this session attendees will learn:

  • How DR/BC teams can work together more effectively to plan for a breach
  • How you can improve recovery times from a breach
  • How to strengthen the resiliency of your infrastructure to reduce the risk if these incidents

 


 

2:30pm – 3:00pm: Refreshment Break


3:00pm-4:00pm: Prepare for Your Breach Using Big Data

 

 

Incident response professionals and big data show us that organizations who are hit with cybersecurity breaches are woefully unprepared. Incident response plans get the most attention as a preparedness step, but when basic capabilities such as asset inventories, log management, and risk analysis are not in place, forensics specialists have a very hard (expensive) time investigating, containing, and recovering from incidents.

 

 


4:00pm-5:00pm:  Breaches & Ransomware: How to Handle, How to Respond

 

Panelists:
Neal Bridges, Director, Global Incident Response & Threat Management, Abbott Laboratories
and other CISOs/Security Directors

 

In this session, attendees will learn from CISOs and Security Executives as to how they are working through the challenges of Data Breaches and Ransomware.

 


Shipman


Conference Price: $289.00 per person

 

Each attendee will receive a certificate awarding 7 CPE credits for CISSP continuing education, in addition to 0.7 CEUs and 7 PDUs. CISSP is a registered certification mark of (ISC)², Inc.

 

Exhibits

As is always the case at CAMP IT Conferences events, the talks will not include product presentations.  During the continental breakfast, coffee breaks, and the luncheon break you will have the opportunity to informally meet representatives from the following sponsoring companies, who have solutions in the area of the conference.


CONFERENCE CO-SPONSORS