Skip to content

[vc_row row_type=”row” use_row_as_full_screen_section=”no” type=”full_width” text_align=”left” background_image=”348335″ box_shadow_on_row=”no”][vc_column css=”.vc_custom_1509976289581{padding-top: 200px !important;padding-bottom: 199px !important;}”][vc_column_text]

PAST EVENTS

[/vc_column_text][/vc_column][/vc_row][vc_row row_type=”row” use_row_as_full_screen_section=”no” type=”grid” text_align=”left” box_shadow_on_row=”no”][vc_column][vc_column_text css=”.vc_custom_1648222312452{padding-top: 25px !important;padding-bottom: 25px !important;}”]Data Breaches:  Defending Against & Responding To: Chicago (Rosemont/O’Hare), Illinois

 

Strategies to help your organization prepare for, defend against and respond to breaches

 

March 31, 2022

 

9:00am-4:00pm

 

7 CPE / 0.7 CEU / CISSP / 7 PDU Credits Awarded

 

Conference location: Donald E. Stephens Convention Center Rosemont (O’Hare) Illinois[/vc_column_text][/vc_column][/vc_row][vc_row row_type=”row” use_row_as_full_screen_section=”no” type=”grid” text_align=”left” box_shadow_on_row=”no”][vc_column width=”1/2″][vc_column_text][/vc_column_text][/vc_column][vc_column width=”1/2″][vc_column_text]

   

[/vc_column_text][/vc_column][/vc_row][vc_row row_type=”row” use_row_as_full_screen_section=”no” type=”grid” text_align=”left” box_shadow_on_row=”no”][vc_column][vc_column_text css=”.vc_custom_1648472227290{padding-top: 25px !important;padding-bottom: 25px !important;}”]


Overview

 

It is not a matter of if, but when your organization will be breached. Against these threats, enterprises try to build higher and more secure walls around their data and networks. This seems to be a never-ending arms race, as even the most sophisticated systems may, before long, present weaknesses that malicious technology can overcome.


What You Will Learn

 

In this one day conference attendees will learn:

  • Today’s Cyber Threats – What Keeps Me Up at Night
  • Duty of Care Risk Analysis: “Getting Consensus From Legal, Information Security, and Executive Management.”
  • Is it an Incident or a Breach? How to Tell and Why it Matters
  • “No More Soft Chewy Centers” – Applying Zero Trust to Prevent and Respond to Breaches In Today’s Data Centers and Clouds
  • Cyber Security & BC/DR: Recovering from Ransomware & Breaches
  • Data Breach – How Do You handle? How Do You Respond?
  • Breaches & Ransomware: How to Handle, How to Respond

Conference Price: $299.00 per person

 

Each attendee will receive a certificate awarding 7 CPE credits for CISSP continuing education, in addition to 0.7 CEUs and 7 PDUs. CISSP is a registered certification mark of (ISC)², Inc.


Conference Program


8:00am – 9:00am: Registration and Continental Breakfast


9:00am-10:00am:  “Building Effective Attack Surface Management Programs”

 

Phillip Wylie, Manager, Tech Evangelism & Enablement, Cycognito

 

Offensive Cybersecurity is becoming more widely used to improve the security postures of organizations, but Offensive Cybersecurity or Attack Surface Management as it is commonly known can be complicated and misunderstood. The building blocks of Attack Surface Management programs red teaming, penetration testing, vulnerability assessments, and vulnerability scanning sometimes get confused.

In this presentation, Phillip Wylie will explain the components of Offensive Cybersecurity and how to utilize them to build an effective Attack Surface Management program. Phillip will be also discussing how to further enhance your Attack Surface Management program by leveraging purple teaming exercises and bug bounty programs.

 

 

Wylie


10:00am -10:30am: Refreshment Break


10:30am-11:30am: “Zero Trust Microsegmentation – Easier Than You Think.”

 

Christer Swartz, Principal Engineer, Illumio

 

Zero Trust has got to be one of the most talked about themes in cyber security.  While the term means different things to different people, there are two things that can be agreed on:  it’s a journey worth taking and microsegmentation is a key pillar of that journey. The next question always is how do you get started?

 

Regardless of the sophistication of the ransomware, the end goal is always the same:  get in through a vulnerability and move laterally through your network.  Join this presentation as we help peel back the layers to provide you simple steps to get started that include:

  • Gaining visibility to where you are the most vulnerable
  • Closing risky ports
  • Leveraging tools you already have in place without adding layers of complexity

 

While the journey can seem intimidating, we’ll help you realize that it doesn’t take a team of 100 or a PhD to deploy zero trust microsegmentation that will protect your organization and keep ransomware at bay.”

 

Swartz

 


11:30am-12:30pm: “The Breach; Risk to Consequences”

 

Doug Howard, CEO, Pondurance

 

How you determine whether it is an incident or a breach that may or may not involve the exposure of sensitive customer data will determine, among other things:

  • Which organizations should get involved
  • What actions should be taken
  • How it will be resolved
  • If notification is required
  • Who? When? How?

 

How you respond will determine how you can minimize the monetary, regulatory, and reputational damages and risks to you, your enterprise, and your customers.

 

Howard

 


12:30pm-1:30pm: Luncheon and Exhibit Break


1:30pm-2:30pm: Optimizing BCDR for Hybrid Environments and Remote Workforces

 

Adam Marget, Product Marketing Manager, Unitrends

Brian Doty, Channel Development Manager, Unitrends

 

Things have changed, and data has spread everywhere. Today’s hybrid work environment demands that organizations protect the applications and workloads vital to their operation with no tolerance of downtime. Cybercrime has exploded and is causing organizations to shift their thinking.

 

In this session, Adam and Brian will share how you can:

  • Create a cyber-resilient BCDR plan
  • Develop a strategy to quickly recover data and applications regardless of where they live
  • Integrate with the right cloud for your organization’s needs

 

     

Marget              Doty

 


2:30pm-3:00pm Refreshment Break


3:00pm-4:00pm:  Breaches & Ransomware: How to Handle, How to Respond (Panel Discussion)

 

Moderator:

Bob Weber, Cycognito

 

Panelists:

Keith Conlee, Chief Security Officer, IT, College of DuPage

John Kellerhals, Security Operations, CF Industries

Tom Kaczmarek, Director Center for CyberSecurity Awareness and Cyber Defense, Marquette University

 

In this session, attendees will learn from CISOs and Security Executives as to how they are working through the challenges of Data Breaches and Ransomware.

 

             

Conlee           Kellerhals      Kaczmarek

 


Conference Price: $299.00 per person

 

Each attendee will receive a certificate awarding 7 CPE credits for CISSP continuing education, in addition to 0.7 CEUs and 7 PDUs. CISSP is a registered certification mark of (ISC)², Inc.

 


[/vc_column_text][/vc_column][/vc_row][vc_row row_type=”row” use_row_as_full_screen_section=”no” type=”full_width” text_align=”left” box_shadow_on_row=”no”][vc_column][vc_column_text]

CONFERENCE SPONSORS

[/vc_column_text][/vc_column][/vc_row][vc_row row_type=”row” use_row_as_full_screen_section=”no” type=”grid” text_align=”left” box_shadow_on_row=”no”][vc_column][vc_empty_space height=”64px” image_repeat=”no-repeat”][/vc_column][/vc_row][vc_row row_type=”row” use_row_as_full_screen_section=”no” type=”grid” text_align=”left” box_shadow_on_row=”no”][vc_column width=”1/2″][vc_single_image image=”360483″ img_size=”medium” onclick=”custom_link” img_link_target=”_blank” link=”https://arcticwolf.com/”][/vc_column][vc_column width=”1/2″][vc_single_image image=”360435″ img_size=”full” alignment=”center” onclick=”custom_link” link=”https://www.cycognito.com/”][/vc_column][/vc_row][vc_row row_type=”row” use_row_as_full_screen_section=”no” type=”grid” text_align=”left” box_shadow_on_row=”no”][vc_column][vc_empty_space height=”64px” image_repeat=”no-repeat”][/vc_column][/vc_row][vc_row row_type=”row” use_row_as_full_screen_section=”no” type=”grid” text_align=”left” box_shadow_on_row=”no”][vc_column width=”1/2″][vc_single_image image=”360501″ img_size=”full” onclick=”custom_link” img_link_target=”_blank” link=”https://illumio.com”][/vc_column][vc_column width=”1/2″][vc_single_image image=”360556″ img_size=”full” alignment=”center”][/vc_column][/vc_row][vc_row row_type=”row” use_row_as_full_screen_section=”no” type=”grid” text_align=”left” box_shadow_on_row=”no”][vc_column][vc_empty_space height=”64px” image_repeat=”no-repeat”][/vc_column][/vc_row][vc_row row_type=”row” use_row_as_full_screen_section=”no” type=”grid” text_align=”left” box_shadow_on_row=”no”][vc_column][vc_single_image image=”360348″ alignment=”center”][/vc_column][/vc_row][vc_row row_type=”row” use_row_as_full_screen_section=”no” type=”grid” text_align=”left” box_shadow_on_row=”no”][vc_column][vc_empty_space image_repeat=”no-repeat”][/vc_column][/vc_row]