UPCOMING EVENTS
Data Breaches: Defense and Response: Chicago (Rosemont/O’Hare), Illinois
Strategies to help your organization prepare for, defend against and respond to breaches.
March 18, 2026
9:00am-5:00pm
7 CPE / 0.7 CEU / CISSP / 7 PDU Credits Awarded
Conference location: Donald E. Stephens Convention Center Rosemont (O’Hare) Illinois
Overview
It is not a matter of if, but when your organization will be breached. Against these threats, enterprises try to build higher and more secure walls around their data and networks. This seems to be a never-ending arms race, as even the most sophisticated systems may, before long, present weaknesses that malicious technology can overcome.
What You Will Learn
In this one day conference attendees will learn:
- How to Build an Effective Threat Investigation and Eradication Capability
- The Threat Landscape for Enterprises
- How to Bake Application Security into Your Application Development Environment (Panel Discussion)
- Value of Investment – Balancing Data Corruption, Disaster Recovery, and Cost
- Improving Security and Governance through Cloud Management
- CyberThreats – How CISOs are Responding to Current & Emerging Security Risks (Panel Discussion)
- Breaches & Ransomware: How to Handle, How to Respond (Panel Discussion)
Conference Price: $349.00 per person
Each attendee will receive a certificate awarding 7 CPE credits for CISSP continuing education, in addition to 0.7 CEUs and 7 PDUs. CISSP is a registered certification mark of (ISC)², Inc.
CONFERENCE AGENDA
8:00am – 9:00am: Registration and Continental Breakfast
9:00am – 10:00am Deconstructing the Latest Breach Tactics: What’s Working (and What’s Not)
An in-depth look at modern breach techniques used by threat actors and practical defenses that are showing results in 2026. Explore how attackers are evolving their tradecraft and what defenders need to know to stay ahead.
Key takeaways:
- Understanding breach methodologies with real case examples
- Defensive controls that are proving effective
- How to anticipate attacker behavior
10:00 AM – 10:30 AM — Sponsor & Networking Break
10:30 AM – 11:30 AM Beyond Prevention: Building Immediate Detection into Every Layer
Inject detection across your entire environment — from endpoints and networks to identity and cloud — to spot breaches early, reduce dwell time, and enable faster response.
Topics covered:
- Detection engineering fundamentals
- Threat hunting best practices
- Integrating telemetry from diverse data sources
11:30 AM – 12:30 PM Incident Response Playbooks That Work: From First Alert to Recovery
Break down the incident response lifecycle with practical playbooks and checklists you can immediately apply. Learn how to organize teams, automate responses, and reduce chaos during a breach.
Focus areas:
- Incident triage and classification
- Communication flow and stakeholder updates
- Recovery sequencing and lessons learned
12:30 PM – 1:30 PM — Lunch & Exhibits
1:30 PM – 2:30 PM AI in Breach Defense & Response: Accelerating Detection Without Adding Risk
AI is now embedded in both attacker and defender toolkits. This session explores how organizations are using AI and machine learning to detect breaches faster, automate response actions, and improve investigation speed — while also managing the new risks AI introduces into the security stack.
Highlights:
- How attackers are leveraging AI in breach campaigns
- Using AI for anomaly detection and threat triage
- AI-assisted incident investigation and response automation
- Guardrails to prevent AI-driven security blind spots
- Governance and validation of AI security tools
Key takeaway: How to safely operationalize AI to shorten breach detection and response time without increasing exposure.
2:30 PM – 3:00 PM — Sponsor Break
3:00 PM – 4:00 PM Human & Organizational Resilience: Preparing Teams for High-Stress Events
Breaches aren’t just technical — they stress teams and organizations. Learn how to build resilience, improve cross-team coordination, and foster a culture that stays effective under pressure.
Includes:
- Psychological readiness for incident response
- Cross-department alignment and training
- Reducing burnout and improving performance
4:00 PM – 5:00 PM Expert Panel: Real-World Defense & Response – Lessons and Pitfalls (Panel Discussion)
A moderated panel featuring seasoned breach responders, CISOs, and security leaders sharing stories from the field — what worked, what didn’t, and how breaches reshaped security programs.
Discussion points:
- Top breach response errors and how to avoid them
- Board and executive engagement during crises
- Post-breach remediation and monitoring priorities
Exhibits
As is always the case at CAMP IT Conferences events, the talks will not include product presentations. During the continental breakfast, coffee breaks, and the luncheon break you will have the opportunity to informally meet representatives from the following sponsoring companies, who have solutions in the area of the conference.
