UPCOMING EVENTS
Data Breaches: Defense and Response: Chicago (Rosemont/O’Hare), Illinois
Strategies to help your organization prepare for, defend against and respond to breaches.
December 3, 2025
9:00am-5:00pm
7 CPE / 0.7 CEU / CISSP / 7 PDU Credits Awarded
Conference location: Donald E. Stephens Convention Center Rosemont (O’Hare) Illinois
Overview
It is not a matter of if, but when your organization will be breached. Against these threats, enterprises try to build higher and more secure walls around their data and networks. This seems to be a never-ending arms race, as even the most sophisticated systems may, before long, present weaknesses that malicious technology can overcome.
What You Will Learn
In this one day conference attendees will learn:
- How to Build an Effective Threat Investigation and Eradication Capability
- The Threat Landscape for Enterprises
- How to Bake Application Security into Your Application Development Environment (Panel Discussion)
- Value of Investment – Balancing Data Corruption, Disaster Recovery, and Cost
- Improving Security and Governance through Cloud Management
- CyberThreats – How CISOs are Responding to Current & Emerging Security Risks (Panel Discussion)
- Breaches & Ransomware: How to Handle, How to Respond (Panel Discussion)
CONFERENCE AGENDA
8:00am – 9:00am: Registration and Continental Breakfast
9:00am – 9:50am
The Evolving Threat Landscape – Lessons from the Latest Breaches
Nick Schloemer, Cybersecurity Solutions Architect & Leader, WWT
A comprehensive look at recent breach trends and attacker methodologies. Learn what’s changed in 2025 and how organizations can stay ahead of emerging threats.
Areas that will be covered:
- Top breach trends and threat actors
- Shifts in ransomware tactics and extortion models
- Practical intelligence for proactive defense

Schloemer
9:50am – 10:20am Refreshment & Exhibit Break
10:20am – 11:10am: From Complexity to Stress-Free: Building Trust in Data to Power the Next Era of AI
Landen Brown, Field CTO, MIND
Trust as the Currency of AI – How modern CISOs earn and spend trust through unified data protection and stress-free data loss prevention (DLP)
- The AI boom has shifted the battleground from network perimeters to data trust, the new currency of business.
- CISOs must now ensure that every byte of data fueling AI is governed and secure, not through friction or fear but through stress-free DLP and insider risk management that strengthens collaboration instead of stifling it.
- This session explores how organizations can earn trust by building a seamless data security program across discovery, classification, detection, remediation, and prevention, protecting data everywhere it lives or moves.
- Real-world examples show how enterprises are turning data chaos into clarity, gaining unified visibility from cloud to endpoint, and securing data at rest and in motion without slowing innovation.
- Finally, we’ll examine how CISOs can spend the trust they’ve earned by enabling safe, compliant adoption of GenAI, new productivity tools and open collaboration with confidence.
A blueprint for earning, growing and investing data trust as the foundation of secure, scalable AI transformation.

Brown
11:10am – 12:00pm: Detect Fast, Respond Faster – Building an Effective Incident Response Program
12:00pm – 12:50pm: Defeating AI Driven Digital Deception
Kendra Cooley, Senior Director, Security and IT, Doppel
Social engineering has entered a new era where attackers use AI to run multi-channel, highly personalized campaigns at scale. From fake domains to deepfaked executives, adversaries now impersonate your people, brand, and infrastructure with alarming precision. In this session, we’ll expose how these attacks actually unfold and why email-only phishing simulations fail to prepare organizations. You’ll learn how to leverage AI to detect, map, and disrupt sophisticated impersonation campaigns before they impact your business. Modern attacks demand modern defenses, and this session will show you how to build them.

Cooley
12:50pm – 1:30pm: Lunch & Exhibit Break
1:30pm – 2:20pm: Managing the Fallout: Legal, Regulatory, and PR Considerations
After a breach, technical response is only part of the challenge. This session outlines how to navigate notification requirements, regulatory obligations, and public relations risks.
Areas that will be covered:
- Compliance with data privacy laws (GDPR, CCPA, SEC, etc.)
- Managing communications with stakeholders and customers
- Working with outside counsel and law enforcement
2:20pm – 2:50pm: Refreshment & Exhibit Break
2:50pm – 3:40pm: Resilience by Design – Security Architecture for Breach Containment
Preventing every attack is impossible, but limiting the blast radius is achievable. This session focuses on designing resilient systems that maintain operations even when compromised.
Areas that will be covered:
- Network segmentation, microservices isolation, and secure enclaves
- Backup and recovery strategies to ensure business continuity
- Architecting for detection, response, and recovery
3:40pm – 4:30pm: Manage Cyber Risk from a Business Perspective: Principles for an Effective Strategy
In the modern digital economy, cyber risk has become a core business concern rather than a purely technical issue. Organizations must adopt a strategic approach that embeds cybersecurity into governance, operations, and culture to safeguard value and ensure resilience. This panel explores practical principles for developing an effective cyber risk strategy—one that aligns security priorities with business objectives, strengthens accountability, and drives sustainable trust in an increasingly connected world.
Key Discussion Points
-
Cyber Risk as Business Risk:
Treat cybersecurity as a strategic business enabler and integrate it into enterprise risk management. -
Governance and Accountability:
Establish clear leadership roles and board-level oversight to ensure responsibility and informed decision-making. -
Strategic Alignment:
Link cyber risk priorities directly to business goals and critical assets to optimize investment and impact. -
Culture and Awareness:
Foster an organizational culture where every employee understands and contributes to cyber resilience. -
Adaptive Resilience:
Build flexible strategies to anticipate, withstand, and recover from evolving digital threats.
Moderator: Ricardo Reati, General Manager, SpearTip
Panelists will include:
- Don Balis, Global IT Security Director, Griffith Foods, Inc.
- Johnny Burton, Vice President of IT and Security Officer, The Family Institute at Northwestern University
- Mouncef Elalamy, Director, Cloud and Data Centers, HUB International Limited
- Victor Hsiang, CISO, GATX
- CISOs and Information Security Executives, sharing strategies, tactics and lessons learned

Reati Balis Burton Elalamy Hsiang
Conference Price: $349.00 per person
Each attendee will receive a certificate awarding 7 CPE credits for CISSP continuing education, in addition to 0.7 CEUs and 7 PDUs. CISSP is a registered certification mark of (ISC)², Inc.
Exhibits
As is always the case at CAMP IT Conferences events, the talks will not include product presentations. During the continental breakfast, coffee breaks, and the luncheon break you will have the opportunity to informally meet representatives from the following sponsoring companies, who have solutions in the area of the conference.