[vc_row row_type=”row” use_row_as_full_screen_section=”no” type=”full_width” text_align=”left” background_image=”348335″ box_shadow_on_row=”no”][vc_column css=”.vc_custom_1509976289581{padding-top: 200px !important;padding-bottom: 199px !important;}”][vc_column_text]
PAST EVENTS
[/vc_column_text][/vc_column][/vc_row][vc_row row_type=”row” use_row_as_full_screen_section=”no” type=”grid” text_align=”left” box_shadow_on_row=”no”][vc_column][vc_column_text css=”.vc_custom_1594234728039{padding-top: 25px !important;padding-bottom: 25px !important;}”]Data Breaches: Defending Against and Responding To
Strategies to help your organization prepare for, defend against and respond to breaches.
December 3, 2020
9:00am-5:00pm CST
7 CPE / 0.7 CEU / CISSP / 7 PDU Credits Awarded
Conference location: ONLINE[/vc_column_text][/vc_column][/vc_row][vc_row row_type=”row” use_row_as_full_screen_section=”no” type=”grid” text_align=”left” box_shadow_on_row=”no”][vc_column width=”1/2″][vc_column_text][/vc_column_text][/vc_column][vc_column width=”1/2″][vc_column_text] [/vc_column_text][/vc_column][/vc_row][vc_row row_type=”row” use_row_as_full_screen_section=”no” type=”grid” text_align=”left” box_shadow_on_row=”no”][vc_column][vc_column_text css=”.vc_custom_1605292864869{padding-top: 25px !important;padding-bottom: 25px !important;}”]
Overview
It is not a matter of if, but when your organization will be breached. Against these threats, enterprises try to build higher and more secure walls around their data and networks. This seems to be a never-ending arms race, as even the most sophisticates systems may, before long, present weaknesses that malicious technology can overcome.
What You Will Learn
In this one day conference attendees will learn:
- How to Build an Effective Threat Investigation and Eradication Capability
- The Threat Landscape for Enterprises
- How to Bake Application Security into Your Application Development Environment (Panel Discussion)
- Value of Investment – Balancing Data Corruption, Disaster Recovery, and Cost
- Improving Security and Governance through Cloud Management
- CyberThreats – How CISOs are Responding to Current & Emerging Security Risks (Panel Discussion)
- Breaches & Ransomware: How to Handle, How to Respond (Panel Discussion)
Conference Price: $0.00 per person
Each attendee will receive a certificate awarding 7 CPE credits for CISSP continuing education, in addition to 0.7 CEUs and 7 PDUs. CISSP is a registered certification mark of (ISC)², Inc.
[/vc_column_text][/vc_column][/vc_row][vc_row row_type=”row” use_row_as_full_screen_section=”no” type=”grid” text_align=”left” box_shadow_on_row=”no”][vc_column][vc_column_text css=”.vc_custom_1606939162181{padding-top: 25px !important;padding-bottom: 25px !important;}”]
8:00am – 9:00am: Open Networking
9:00am-10:00am: Data Breach Prevention- Going on the Offensive – CISO Fireside Chat
Mitch Christian, IT Security Director, Synergy Global Housing
In this opening session, we will interview a seasoned Security Leader who has the experience of leading over 100 Ransomware investigations.
Christian
10:00am -10:30am: Networking / Sponsoring Break
10:30am-11:30am: How COVID-19 Changed Incident Response
Robert Floodeen Director of Incident Response, Secureworks
What you’ll learn:
- The reality of the threat landscape and expanded attack surface
- Real-world examples of incidents the Secureworks team responded to
- How the pandemic impacted people, processes, and technology related to incident response
COVID-19 saw many organizations racing to stand up remote work infrastructure to enable work from home. In their haste, many businesses had to prioritize speed over security, and left themselves open for attack.
Floodeen
11:30am-12:30pm: Achieving True Zero Trust with Data Consumption Governance
Doug Wick, VP of Product, ALTR
Today’s business users need fast, remote access to sensitive enterprise data simply to do their jobs. Yet this need also expands the attack surface for bad actors to exfiltrate data. What can security teams do to prevent breaches without hampering legitimate users?
By extending “zero trust” to the SQL layer organizations can now achieve powerful security and control at the epicenter of risk — the data itself. This transcends the limitations of traditional identity access management, which imposes controls over identity authentication and data access, but doesn’t provide control down to the individual query.
During this session, you will learn how this approach:
- Prevents breaches from even the most credentialed users
- Enables security to keep pace with the rapid evolution of IT environments
- Reduces the burdens on security teams
Wick
12:30pm – 1:30pm Lunch break
1:30pm-2:30pm: CISO Interview: InfoSec Policies and Procedures to Help Prevent a Breach
Elizabeth D. Ogunti, CISA, CRISC, CISM, Chief Information Security Officer, JBT Corporation
In this interview we will address the following areas:
- How to respond to a breach
- How to work with the business stakeholders
- How to plan for the future
Ogunti
2:30pm – 3:00pm: Networking / Sponsor Break
3:00pm-4:00pm: CyberThreats – How CISOs are Responding to Current & Emerging Security Risks (Panel Discussion)
Moderator:
Steven Sarembock, RVP, Secureworks
Panelists:
Todd Covert, Director Business Information Security Officer, Allstate
Amy Bogac, Head of Information Security, CF Industries
Paul Bivian, Director of Information Security, Kirkland & Ellis
Jim Desmond, Chief Security Officer, Asurion
and other InfoSec Executives sharing experiences and lessons learned
In this session attendees will learn from a distinguished panel of CISOs sharing their thoughts on-
- Mitigating Business Email Compromise
- Responding to Ransomware
- Reducing Risk to the Business in 2021
Covert Bogac Bivian Desmond
Exhibits
As is always the case at CAMP IT Conferences events, the talks will not include product presentations. During the breaks, you will have the opportunity to informally meet representatives from the following sponsoring companies, who have solutions in the area of the conference.[/vc_column_text][/vc_column][/vc_row][vc_section][vc_row row_type=”row” use_row_as_full_screen_section=”no” type=”full_width” text_align=”left” box_shadow_on_row=”no” css=””][vc_column][vc_column_text]
CONFERENCE CO-SPONSORS
[/vc_column_text][vc_empty_space image_repeat=”no-repeat”][/vc_column][/vc_row][vc_row row_type=”row” use_row_as_full_screen_section=”no” type=”grid” text_align=”left” box_shadow_on_row=”no”][vc_column width=”1/2″][vc_single_image image=”355015″ img_size=”full” alignment=”center” onclick=”custom_link” img_link_target=”_blank” link=”http://www.altr.com”][/vc_column][vc_column width=”1/2″][vc_single_image image=”355987″ img_size=”full” alignment=”center” onclick=”custom_link” img_link_target=”_blank” link=”http://www.secureworks.com”][/vc_column][/vc_row][vc_row row_type=”row” use_row_as_full_screen_section=”no” type=”full_width” text_align=”left” box_shadow_on_row=”no”][vc_column][vc_empty_space image_repeat=”no-repeat”][/vc_column][/vc_row][vc_row row_type=”row” use_row_as_full_screen_section=”no” type=”full_width” text_align=”left” box_shadow_on_row=”no”][vc_column width=”1/3″][/vc_column][vc_column width=”1/3″][/vc_column][vc_column width=”1/3″][/vc_column][/vc_row][/vc_section]