Data Breaches: Defending Against and Responding To
Strategies to help your organization prepare for, defend against and respond to breaches.
December 3, 2020
7 CPE / 0.7 CEU / CISSP / 7 PDU Credits Awarded
Conference location: ONLINE
It is not a matter of if, but when your organization will be breached. Against these threats, enterprises try to build higher and more secure walls around their data and networks. This seems to be a never-ending arms race, as even the most sophisticates systems may, before long, present weaknesses that malicious technology can overcome.
What You Will Learn
In this one day conference attendees will learn:
Conference Price: $0.00 per person
Each attendee will receive a certificate awarding 7 CPE credits for CISSP continuing education, in addition to 0.7 CEUs and 7 PDUs. CISSP is a registered certification mark of (ISC)², Inc.
8:00am – 9:00am: Open Networking
9:00am-10:00am: Data Breach Prevention- Going on the Offensive – CISO Fireside Chat
Mitch Christian, IT Security Director, Synergy Global Housing
In this opening session, we will interview a seasoned Security Leader who has the experience of leading over 100 Ransomware investigations.
10:00am -10:30am: Networking / Sponsoring Break
10:30am-11:30am: How COVID-19 Changed Incident Response
Robert Floodeen Director of Incident Response, Secureworks
What you’ll learn:
COVID-19 saw many organizations racing to stand up remote work infrastructure to enable work from home. In their haste, many businesses had to prioritize speed over security, and left themselves open for attack.
11:30am-12:30pm: Achieving True Zero Trust with Data Consumption Governance
Doug Wick, VP of Product, ALTR
Today’s business users need fast, remote access to sensitive enterprise data simply to do their jobs. Yet this need also expands the attack surface for bad actors to exfiltrate data. What can security teams do to prevent breaches without hampering legitimate users?
By extending “zero trust” to the SQL layer organizations can now achieve powerful security and control at the epicenter of risk — the data itself. This transcends the limitations of traditional identity access management, which imposes controls over identity authentication and data access, but doesn’t provide control down to the individual query.
During this session, you will learn how this approach:
12:30pm – 1:30pm Lunch break
1:30pm-2:30pm: CISO Interview: InfoSec Policies and Procedures to Help Prevent a Breach
Elizabeth D. Ogunti, CISA, CRISC, CISM, Chief Information Security Officer, JBT Corporation
In this interview we will address the following areas:
2:30pm – 3:00pm: Networking / Sponsor Break
3:00pm-4:00pm: CyberThreats – How CISOs are Responding to Current & Emerging Security Risks (Panel Discussion)
Steven Sarembock, RVP, Secureworks
Todd Covert, Director Business Information Security Officer, Allstate
Amy Bogac, Head of Information Security, CF Industries
Paul Bivian, Director of Information Security, Kirkland & Ellis
Jim Desmond, Chief Security Officer, Asurion
and other InfoSec Executives sharing experiences and lessons learned
In this session attendees will learn from a distinguished panel of CISOs sharing their thoughts on-
Covert Bogac Bivian Desmond
As is always the case at CAMP IT Conferences events, the talks will not include product presentations. During the breaks, you will have the opportunity to informally meet representatives from the following sponsoring companies, who have solutions in the area of the conference.