Skip to content

[vc_row row_type=”row” use_row_as_full_screen_section=”no” type=”full_width” text_align=”left” background_image=”348335″ box_shadow_on_row=”no”][vc_column css=”.vc_custom_1509976289581{padding-top: 200px !important;padding-bottom: 199px !important;}”][vc_column_text]

PAST EVENTS

[/vc_column_text][/vc_column][/vc_row][vc_row row_type=”row” use_row_as_full_screen_section=”no” type=”grid” text_align=”left” box_shadow_on_row=”no”][vc_column][vc_column_text css=”.vc_custom_1516041449643{padding-top: 25px !important;padding-bottom: 25px !important;}”]Data Breaches:  Defending Against and Responding To: Chicago

 

Strategies to help your organization prepare for, defend against and respond to breaches.

 

December 6, 2018

 

9:00am-5:00pm

 

7 CPE / 0.7 CEU / CISSP / 7 PDU Credits Awarded

 

Conference location: Donald E. Stephens Convention Center Rosemont (O’Hare) Illinois[/vc_column_text][/vc_column][/vc_row][vc_row row_type=”row” use_row_as_full_screen_section=”no” type=”grid” text_align=”left” box_shadow_on_row=”no”][vc_column width=”1/2″][vc_column_text][/vc_column_text][/vc_column][vc_column width=”1/2″][vc_column_text][sharethis-inline-buttons][/vc_column_text][/vc_column][/vc_row][vc_row row_type=”row” use_row_as_full_screen_section=”no” type=”grid” text_align=”left” box_shadow_on_row=”no”][vc_column][vc_column_text css=”.vc_custom_1543948964644{padding-top: 25px !important;padding-bottom: 25px !important;}”]


Overview

 

It is not a matter of if, but when your organization will be breached. Against these threats, enterprises try to build higher and more secure walls around their data and networks. This seems to be a never-ending arms race, as even the most sophisticates systems may, before long, present weaknesses that malicious technology can overcome.


What You Will Learn

 

In this one day conference attendees will learn:

  • Prepare for Your Breach Using Big Data
  • The Evolution of Endpoint Security
  • Avoiding a Data Breach: Solutions for the Problem You Never Want to Have
  • Myths – Securing the Cloud*
  • Cyber Security & BC/DR: Recovering from Ransomware & Breaches
  • Breaches & Ransomware: How to Handle, How to Respond

[/vc_column_text][/vc_column][/vc_row][vc_row row_type=”row” use_row_as_full_screen_section=”no” type=”grid” text_align=”left” box_shadow_on_row=”no” css=”.vc_custom_1513895163165{padding-top: 25px !important;padding-bottom: 25px !important;}”][vc_column][vc_column_text css=”.vc_custom_1543949392292{padding-top: 25px !important;padding-bottom: 25px !important;}”] Conference Program


8:00am – 9:00am: Registration and Continental Breakfast


9:00am-10:00am:  Prepare for Your Breach Using Big Data

 

Todd Becker, Principal Consultant, Halock Security Labs
Steve Lawn, Senior Consultant, Halock Security Labs

 

Incident response professionals and big data show us that organizations who are hit with cybersecurity breaches are woefully unprepared. Incident response plans get the most attention as a preparedness step, but when basic capabilities such as asset inventories, log management, and risk analysis are not in place, forensics specialists have a very hard (expensive) time investigating, containing, and recovering from incidents. HALOCK will describe how to use big data to develop these basic capabilities by prioritizing efforts where incidents are most likely to occur.

 

     
Becker       Lawn


10:00am -10:30am: Refreshment Break


10:30am-11:30am:  The Evolution of Endpoint Security

 

Trent Greenwood, South Senior Manager, Sales Engineering, Carbon Black

 

We will discuss how traditional AV failed to evolve while attackers progressed. Traditional AV is no longer enough and has failed to react to the changes of attackers. There is also a lot of noise from vendors and fancy terms being thrown around and what to be on the lookout for when thinking about your endpoints.

 


Greenwood


11:30am-12:30pm:  Avoiding a Data Breach: Solutions for the Problem You Never Want to Have

 

Darren Guccione, CEO & Co-Founder, Keeper Security

 

In this presentation Darren will walk through the current cybersecurity landscape. He’ll walk the attendees through the four facets of cybersecurity so that everyone understands the current landscape we’re in, and how we got here. He will explain the existing threats, review current solutions, and take attendees on a journey to understand how Identity Access Management (IAM) can help them prevent data breaches.

 

Attendees will learn the threats that exist for both consumers, businesses, and customers. Darren will also provide real world examples of how a lack of IAM tools led to incredibly large data breaches. Lastly, Darren will discuss how users can get started today on protecting themselves and their companies.

 


Guccione


12:30pm – 1:30pm Luncheon


1:30pm-2:30pm: Myths – Securing the Cloud*

 

Tom McKowen, Executive Consultant, US Signal

 

Ever wonder what you need to know to evaluate and audit the cloud?

 

In this session you will understand the reality of cloud security and steps you can take.

 


McKowen


2:30pm – 3:00pm: Refreshment Break


3:00pm-4:00pm: Something Old, Something New: 2018 Attack Overview

 

Ben Boyd, CISO, INFOSEC Consulting, Risk Advisory Integration Partners
Jeff Sadecky, Solution Architect, Fortinet

 

So far, the 2018 security threat landscape has yielded a combination of tried and true techniques like ransomware (look at the attack that crippled the city of Atlanta in March) and relatively new methods like supply chain attacks (Delta Airlines, Best Buy, Sears and Kmart all suffered one in April). What other attack methods are adversaries likely to turn to this year?

 

     
Boyd        Sadecky


4:00pm-5:00pm: Breaches & Ransomware: How to Handle, How to Respond

 

Moderator:
George Harrison, NAM, Infoblox
Panelists:
Darin Hurd, Chief Information Security Officer, Guaranteed Rate
Mark Shipman, District Director of InfoSec, City Colleges of Chicago
Dean Sorensen, Former Security Information Officer, Cook County Health
Neal Bridges, Director, Global Incident Response & Threat Management, Abbott Laboratories
and other CISOs  from IT departments

 

In this session, attendees will learn from CISOs and Security Executives as to how they are working through the challenges of Data Breaches and Ransomware.

 

Attendees will walk away with shared strategies and tactics that other organizations are employing.

 

                    
Sorensen   Hurd         Shipman      Bridges       Harrison


Conference Price: $289.00 per person

 

Each attendee will receive a certificate awarding 7 CPE credits for CISSP continuing education, in addition to 0.7 CEUs and 7 PDUs. CISSP is a registered certification mark of (ISC)², Inc.

 

Exhibits

As is always the case at CAMP IT Conferences events, the talks will not include product presentations.  During the continental breakfast, coffee breaks, and the luncheon break you will have the opportunity to informally meet representatives from the following sponsoring companies, who have solutions in the area of the conference.


[/vc_column_text][/vc_column][/vc_row][vc_row row_type=”row” use_row_as_full_screen_section=”no” type=”full_width” text_align=”left” box_shadow_on_row=”no”][vc_column][vc_column_text]

CONFERENCE CO-SPONSORS

[/vc_column_text][/vc_column][/vc_row][vc_row row_type=”row” use_row_as_full_screen_section=”no” type=”full_width” text_align=”left” box_shadow_on_row=”no”][vc_column][vc_empty_space image_repeat=”no-repeat”][/vc_column][/vc_row][vc_row row_type=”row” use_row_as_full_screen_section=”no” type=”grid” text_align=”left” box_shadow_on_row=”no”][vc_column width=”1/3″][vc_single_image image=”351934″ img_size=”full” alignment=”center” onclick=”custom_link” img_link_target=”_blank” link=”http://carbonblack.com”][/vc_column][vc_column width=”1/3″][vc_single_image image=”351662″ img_size=”full” alignment=”center” onclick=”custom_link” img_link_target=”_blank” link=”http://cloudflare.com”][/vc_column][vc_column width=”1/3″][vc_single_image image=”351318″ img_size=”full” alignment=”center” onclick=”custom_link” img_link_target=”_blank” link=”http://guardicore.com”][/vc_column][/vc_row][vc_row row_type=”row” use_row_as_full_screen_section=”no” type=”full_width” text_align=”left” box_shadow_on_row=”no”][vc_column][vc_empty_space image_repeat=”no-repeat”][/vc_column][/vc_row][vc_row row_type=”row” use_row_as_full_screen_section=”no” type=”grid” text_align=”left” box_shadow_on_row=”no”][vc_column width=”1/3″][vc_single_image image=”350433″ img_size=”full” alignment=”center” onclick=”custom_link” img_link_target=”_blank” link=”http://halock.com”][/vc_column][vc_column width=”1/3″][vc_single_image image=”351451″ img_size=”full” alignment=”center” onclick=”custom_link” img_link_target=”_blank” link=”http://illumio.com”][/vc_column][vc_column width=”1/3″][vc_single_image image=”349881″ img_size=”full” alignment=”center” onclick=”custom_link” img_link_target=”_blank” link=”http://infoblox.com”][/vc_column][/vc_row][vc_row row_type=”row” use_row_as_full_screen_section=”no” type=”full_width” text_align=”left” box_shadow_on_row=”no”][vc_column][vc_empty_space image_repeat=”no-repeat”][/vc_column][/vc_row][vc_row row_type=”row” use_row_as_full_screen_section=”no” type=”grid” text_align=”left” box_shadow_on_row=”no”][vc_column width=”1/3″][vc_single_image image=”351945″ img_size=”full” alignment=”center” onclick=”custom_link” img_link_target=”_blank” link=”https://www.integrationpartners.com/”][vc_single_image image=”349662″ img_size=”full” alignment=”center” onclick=”custom_link” img_link_target=”_blank” link=”http://fortinet.com”][/vc_column][vc_column width=”1/3″][vc_single_image image=”351718″ img_size=”full” alignment=”center” onclick=”custom_link” img_link_target=”_blank” link=”http://keepersecurity.com”][/vc_column][vc_column width=”1/3″][vc_single_image image=”350906″ img_size=”full” alignment=”center” onclick=”custom_link” img_link_target=”_blank” link=”http://servicenow.com”][/vc_column][/vc_row][vc_row row_type=”row” use_row_as_full_screen_section=”no” type=”full_width” text_align=”left” box_shadow_on_row=”no”][vc_column][vc_empty_space image_repeat=”no-repeat”][/vc_column][/vc_row][vc_row row_type=”row” use_row_as_full_screen_section=”no” type=”grid” text_align=”left” box_shadow_on_row=”no”][vc_column width=”1/3″][vc_single_image image=”349847″ img_size=”full” alignment=”center” onclick=”custom_link” img_link_target=”_blank” link=”http://ussignal.com”][/vc_column][vc_column width=”1/3″][/vc_column][vc_column width=”1/3″][/vc_column][/vc_row][vc_row row_type=”row” use_row_as_full_screen_section=”no” type=”full_width” text_align=”left” box_shadow_on_row=”no”][vc_column][vc_empty_space image_repeat=”no-repeat”][/vc_column][/vc_row]