Skip to content

UPCOMING EVENTS


Data Breaches: Defense and Response: Chicago (Rosemont/O’Hare), Illinois

Strategies to help your organization prepare for, defend against and respond to breaches.

March 18, 2026

9:00am-5:00pm

7 CPE / 0.7 CEU / CISSP / 7 PDU Credits Awarded

Conference location: Donald E. Stephens Convention Center Rosemont (O’Hare) Illinois

  


Overview

It is not a matter of if, but when your organization will be breached. Against these threats, enterprises try to build higher and more secure walls around their data and networks. This seems to be a never-ending arms race, as even the most sophisticated systems may, before long, present weaknesses that malicious technology can overcome.


What You Will Learn

In this one day conference attendees will learn:

  • How to Build an Effective Threat Investigation and Eradication Capability
  • The Threat Landscape for Enterprises
  • How to Bake Application Security into Your Application Development Environment (Panel Discussion)
  • Value of Investment – Balancing Data Corruption, Disaster Recovery, and Cost
  • Improving Security and Governance through Cloud Management
  • CyberThreats – How CISOs are Responding to Current & Emerging Security Risks (Panel Discussion)
  • Breaches & Ransomware: How to Handle, How to Respond (Panel Discussion)

Conference Price: $349.00 per person

Each attendee will receive a certificate awarding 7 CPE credits for CISSP continuing education, in addition to 0.7 CEUs and 7 PDUs. CISSP is a registered certification mark of (ISC)², Inc.


CONFERENCE AGENDA

 

8:00am – 9:00am: Registration and Continental Breakfast


9:00am – 10:00am Deconstructing the Latest Breach Tactics: What’s Working (and What’s Not)

An in-depth look at modern breach techniques used by threat actors and practical defenses that are showing results in 2026. Explore how attackers are evolving their tradecraft and what defenders need to know to stay ahead.

Key takeaways:

  • Understanding breach methodologies with real case examples
  • Defensive controls that are proving effective
  • How to anticipate attacker behavior

 


10:00 AM – 10:30 AM — Sponsor & Networking Break

 


10:30 AM – 11:30 AM Beyond Prevention: Building Immediate Detection into Every Layer

Inject detection across your entire environment — from endpoints and networks to identity and cloud — to spot breaches early, reduce dwell time, and enable faster response.

Topics covered:

  • Detection engineering fundamentals
  • Threat hunting best practices
  • Integrating telemetry from diverse data sources

11:30 AM – 12:30 PM  Incident Response Playbooks That Work: From First Alert to Recovery

Break down the incident response lifecycle with practical playbooks and checklists you can immediately apply. Learn how to organize teams, automate responses, and reduce chaos during a breach.

Focus areas:

  • Incident triage and classification
  • Communication flow and stakeholder updates
  • Recovery sequencing and lessons learned

12:30 PM – 1:30 PM — Lunch & Exhibits

 


1:30 PM – 2:30 PM  AI in Breach Defense & Response: Accelerating Detection Without Adding Risk

 

AI is now embedded in both attacker and defender toolkits. This session explores how organizations are using AI and machine learning to detect breaches faster, automate response actions, and improve investigation speed — while also managing the new risks AI introduces into the security stack.

Highlights:

  • How attackers are leveraging AI in breach campaigns
  • Using AI for anomaly detection and threat triage
  • AI-assisted incident investigation and response automation
  • Guardrails to prevent AI-driven security blind spots
  • Governance and validation of AI security tools

Key takeaway: How to safely operationalize AI to shorten breach detection and response time without increasing exposure.

 


 

2:30 PM – 3:00 PM — Sponsor Break

 


3:00 PM – 4:00 PM  Human & Organizational Resilience: Preparing Teams for High-Stress Events

Breaches aren’t just technical — they stress teams and organizations. Learn how to build resilience, improve cross-team coordination, and foster a culture that stays effective under pressure.

Includes:

  • Psychological readiness for incident response
  • Cross-department alignment and training
  • Reducing burnout and improving performance

4:00 PM – 5:00 PM  Expert Panel: Real-World Defense & Response – Lessons and Pitfalls (Panel Discussion)


A moderated panel featuring seasoned breach responders, CISOs, and security leaders sharing stories from the field — what worked, what didn’t, and how breaches reshaped security programs.

Discussion points:

  • Top breach response errors and how to avoid them
  • Board and executive engagement during crises
  • Post-breach remediation and monitoring priorities

 


Exhibits

As is always the case at CAMP IT Conferences events, the talks will not include product presentations. During the continental breakfast, coffee breaks, and the luncheon break you will have the opportunity to informally meet representatives from the following sponsoring companies, who have solutions in the area of the conference.