Skip to content

UPCOMING EVENTS


Enterprise Risk / Security Management: Chicago (Rosemont/O’Hare), Illinois

Strategies for reducing risk to the enterprise.

February 19, 2026

9:00am-5:00pm

7 CPE / 0.7 CEU / CISSP / 7 PDU Credits Awarded

Conference location: Donald E. Stephens Convention Center Rosemont (O’Hare) Illinois

  

 


 


Overview

In today’s highly regulatory environment it is essential that you have a clear understanding of risk across the enterprise. A risk management framework can bring visibility to key business and compliance risks and enable a company to make decisions on where to prioritize its limited resources. It is through a risk management framework that real value to the business can be achieved.

With all of these challenges, how do you make this happen?

In this one day conference, attendees will be provided with examples of approaches to managing information and compliance risk through a risk management framework.


What You Will Learn

In this one day conference attendees will learn:

  • Enterprise Risk in 2026: From Regulatory Pressure to Strategic Risk Leadership
  • AI-Driven Risk and Security: Navigating Opportunities and Threats
  • CISO Roundtable: Largest Strategic Risks CISOs Are Tackling in 2026
  • Risk Quantification and Metrics That Drive Decisions
  • Identity and Access Risk in a Zero Trust World
  • Emerging Threat Vectors and Risk Mitigation: Insights from the Front Lines
  • Third-Party and Supply Chain Risk: Strategies That Work
  • Risk Response and Resilience: From Incident to Business Continuity

Conference Price: $349.00 per person

Each attendee will receive a certificate awarding 7 CPE credits for CISSP continuing education, in addition to 0.7 CEUs and 7 PDUs. CISSP is a registered certification mark of (ISC)², Inc.


CONFERENCE AGENDA


8:00am – 9:00am: Registration and Continental Breakfast


9:00am – 9:50am: Enterprise Risk in 2026: From Regulatory Pressure to Strategic Risk Leadership

In a climate where regulatory frameworks, business continuity demands, and emerging technologies collide, enterprise risk leaders must evolve beyond compliance checklists to strategic enablers of business resilience. This session will examine the latest risk management frameworks, integration of risk appetite metrics into board reporting, and ways to make risk a strategic advantage. We’ll contrast traditional ERM practices with modern risk intelligence strategies that align enterprise risk with business outcomes.


9:50am – 10:20am: Refreshment Break


10:20am – 11:10am: AI-Driven Risk & Security: Governing Innovation Without Slowing the Business

AI adoption is accelerating faster than most risk frameworks can adapt. This session focuses on identifying and managing AI-specific risks — including generative AI misuse, autonomous decision-making, data exposure, and regulatory uncertainty. Learn how organizations are building AI governance models, managing shadow AI risk, and embedding AI risk controls without stifling innovation.


11:10am – 12:00pm: The Top Strategic Risks CISOs Are Prioritizing in 2026 (Panel Discussion)

Senior CISOs discuss the most pressing enterprise risk challenges shaping their 2026 roadmaps. Topics include board-level risk reporting, identity and cloud exposure, regulatory pressure, talent constraints, and aligning cyber risk with enterprise risk management. Panelists will share candid insights on what’s keeping them up at night — and how they are reframing risk as a business issue, not just a security problem.

Moderator: TBD

Panelists will include:

  • Dan Browder, Director, Information Security Portfolio Manager, First National Bank of Omaha
  • Helen Negre, Virtual Chief Information Security Officer, Levi, Ray & Shoup, Inc. 
  • Safi Raza, Senior Director of Cyber Security, Fusion Risk Management
  • Ron Versetto, Deputy Chief Information Security Officer, Illinois Attorney General’s Office
  • Additional CISOs and Information Security Executives sharing experiences and lessons learned

   

Browder                     Negre                           Raza                           Versetto

 


12:00pm – 12:50pm: Lunch and Exhibit Break


12:50pm – 1:40pm: Risk Quantification That Executives Actually Use

Security leaders are increasingly expected to quantify risk in financial and operational terms. This session explores practical approaches to cyber risk quantification, including scenario-based modeling, risk scoring, and financial impact analysis. Attendees will learn how to move beyond heat maps and develop metrics that resonate with executives and boards, enabling smarter investment and prioritization decisions.


1:40pm – 2:30pm: Maturing Your Paths to Privilege Access  

Christopher Hills, Chief Security Strategist, BeyondTrust

In this presentation, we will discuss the evolution of PAM, the importance of managing both human and non-human identities across distributed workforces and cloud environments, while introducing a PAM Maturity Model that will empowering organizations with a framework to evaluate their security posture through risk reduction, operational efficiency, compliance, and business protection. 

Key strategies will include Zero Trust Architectures, Just-In-Time Access, and AI-Driven continuous monitoring, ensuring that all privileged access is granted security and only when necessary. We will highlight the importance of transitioning from legacy Pam practices, such as VPN reliance and standing privileges to passwordless authentication and least privilege enforcement. 

Business benefits include: 

  • Meeting Cyber Insurance Mandates 
  • Improved Compliance 
  • Enhanced Security 
  • Holistic Visibility and Business Efficiency  

         Hills


2:30pm – 3:00pm: Refreshment Break


3:00pm – 3:50pm: Emerging Threat Vectors: What CISOs Are Preparing for Next (Panel Discussion)

Threat actors are evolving rapidly — leveraging automation, AI, supply-chain compromise, and insider exploitation. In this forward-looking panel, CISOs discuss emerging threat vectors and how they are adapting enterprise risk strategies to stay ahead. Panelists will share lessons learned, risk prioritization strategies, and how they balance prevention, detection, and resilience.

Moderator: TBD

Panelists will include:

  • Mykhaylo Bulyk, Senior Director IT Security, ATI Physical Therapy
  • Johnny Burton, VP of IT & Security Officer, The Family Institute at Northwestern University
  • Mitch Christian, Head of Information Security and Infrastructure, Synergy Global Housing
  • Chris Newton, Director Information Security, Tegria
  • Jatin Mannepalli, Information Security Officer, IMC Trading
  • Additional CISOs and Information Security Executives sharing experiences and lessons learned

   

Bulyk                                       Burton                            Christian                    Mannepalli                        Newton

 


3:50pm– 4:40pm: Incident to Resilience: Operationalizing Risk Response

True risk management extends beyond prevention to include response, recovery, and learning. This session focuses on integrating incident response, crisis management, and business continuity into enterprise risk planning. Attendees will gain practical guidance on tabletop exercises, executive communication during incidents, post-incident analysis, and using risk insights to strengthen long-term organizational resilience.


Conference Price: $349.00 per person

Each attendee will receive a certificate awarding 7 CPE credits for CISSP continuing education, in addition to 0.7 CEUs and 7 PDUs. CISSP is a registered certification mark of (ISC)², Inc.


Exhibits

As is always the case at CAMP IT Conferences events, the talks will not include product presentations. During the continental breakfast, coffee breaks, and the luncheon break you will have the opportunity to informally meet representatives from the following sponsoring companies, who have solutions in the area of the conference.