Data Breaches: Defending Against and Responding To: Chicago
Strategies to help your organization prepare for, defend against and respond to breaches.
December 6, 2018
7 CPE / 0.7 CEU / CISSP / 7 PDU Credits Awarded
Conference location: Donald E. Stephens Convention Center Rosemont (O’Hare) Illinois
It is not a matter of if, but when your organization will be breached. Against these threats, enterprises try to build higher and more secure walls around their data and networks. This seems to be a never-ending arms race, as even the most sophisticates systems may, before long, present weaknesses that malicious technology can overcome.
What You Will Learn
In this one day conference attendees will learn:
8:00am – 9:00am: Registration and Continental Breakfast
9:00am-10:00am: Today’s Cyber Threats – What Keeps Me Up at Night
Insider look at current events in cyber security and what is in store for the future. What are the most common threats? How to respond to the breaches that seemingly ambush us every day? This technical and insightful overview is a glimpse of hope in an otherwise chaotic cyber world.
10:00am -10:30am: Refreshment Break
10:30am-11:30am: Duty of Care Risk Analysis: “Getting consensus from legal, information security, and executive management.”
This service philosophy has evolved into a a process for risk assessments that is best known as Duty of Care Risk Analysis (“D.O.C.R.A.”). This unique process helps organizations develop criteria by which they can prioritize risk and develop consensus on acceptable risk between the business, legal and security. The process, when implemented correctly, allows organizations to defend their decisions to interested 3rd parties, regulators, and the courts. The Duty of Care Risk Analysis process will be adopted by standards bodies in 2018.
11:30am-12:30pm: Avoiding a Data Breach: Solutions for the Problem You Never Want to Have
Darren Guccione, CEO & Co-Founder, Keeper Security
In this presentation Darren will walk through the current cybersecurity landscape. He’ll walk the attendees through the four facets of cybersecurity so that everyone understands the current landscape we’re in, and how we got here. He will explain the existing threats, review current solutions, and take attendees on a journey to understand how Identity Access Management (IAM) can help them prevent data breaches.
Attendees will learn the threats that exist for both consumers, businesses, and customers. Darren will also provide real world examples of how a lack of IAM tools led to incredibly large data breaches. Lastly, Darren will discuss how users can get started today on protecting themselves and their companies.
12:30pm – 1:30pm Luncheon
1:30pm-2:30pm: Something Old, Something New: 2018 Attack Overview
So far, the 2018 security threat landscape has yielded a combination of tried and true techniques like ransomware (look at the attack that crippled the city of Atlanta in March) and relatively new methods like supply chain attacks (Delta Airlines, Best Buy, Sears and Kmart all suffered one in April). What other attack methods are adversaries likely to turn to this year?
2:30pm – 3:00pm: Refreshment Break
3:00pm-4:00pm: Cyber Security & BC/DR: Recovering from Ransomware & Breaches
Seasoned practitioners are aware that BC/DR practices can reduce the cost of cyber breaches. But breaches will still occur and they will happen with greater frequency. How do you leverage all that DR/BC can offer to reduce the risk and mitigate the effects?
In this session attendees will learn:
4:00pm-5:00pm: Breaches & Ransomware: How to Handle, How to Respond
Darin Hurd, Chief Information Security Officer, Guaranteed Rate
and other CISOs from IT departments
In this session, attendees will learn from CISOs and Security Executives as to how they are working through the challenges of Data Breaches and Ransomware.
Attendees will walk away with shared strategies and tactics that other organizations are employing.
Conference Price: $289.00 per person
Each attendee will receive a certificate awarding 7 CPE credits for CISSP continuing education, in addition to 0.7 CEUs and 7 PDUs. CISSP is a registered certification mark of (ISC)², Inc.
As is always the case at CAMP IT Conferences events, the talks will not include product presentations. During the continental breakfast, coffee breaks, and the luncheon break you will have the opportunity to informally meet representatives from the following sponsoring companies, who have solutions in the area of the conference.