PAST EVENTS
Enterprise Risk / Security Management: Chicago (Rosemont/O’Hare), Illinois
Strategies for reducing risk to the enterprise.
May 4, 2023
9:00am-5:00pm
7 CPE / 0.7 CEU / CISSP / 7 PDU Credits Awarded
Conference location: Donald E. Stephens Convention Center Rosemont (O’Hare) Illinois
Overview
In today’s highly regulatory environment it is essential that you have a clear understanding of risk across the enterprise. A risk management framework can bring visibility to key business and compliance risks and enable a company to make decisions on where to prioritize its limited resources. It is through a risk management framework that real value to the business can be achieved.
With all of these challenges, how do you make this happen?
In this one day conference, attendees will be provided with examples of approaches to managing information and compliance risk through a risk management framework.
What You Will Learn
Join us as we cover:
- How to Ensure Your Suppliers are Meeting Your Security Requirements
- Embedding a Culture of Security to Enable Smart, Secure Decision-Making (Panel Discussion)
- Keeping Up with the Latest Security and Risk Management Trends
- How to Build an Insider Threat Program
- The Last Step in Moving to the Cloud – Network and Security as a Service
- Managing Security Risk at the Speed of Business (Panel Discussion)
Conference Price: $299.00 per person
Each attendee will receive a certificate awarding 7 CPE credits for CISSP continuing education, in addition to 0.7 CEUs and 7 PDUs. CISSP is a registered certification mark of (ISC)², Inc.
[/vc_column_text][/vc_column][/vc_row][vc_row row_type=”row” use_row_as_full_screen_section=”no” type=”grid” text_align=”left” box_shadow_on_row=”no”][vc_column][vc_column_text]
CONFERENCE AGENDA
8:00am – 9:00am: Registration and Continental Breakfast
9:00am – 9:50am: Keeping Up with the Latest Security and Risk Management Trends
Dmitriy Ayrapetov, VP, Product Management, Delinea
What’s the best approach to enterprise security? The prevailing consensus in the industry has generally been threat-based or compliance-based approaches. However, many organizations that use these approaches struggle to strike the right balance between technical tools and practical outcomes.
The answer is to focus on reducing risk.
Join us to get an actionable roadmap for success, including:
- Examining 20 plus years of security paradigms — and learn why many of them fail
- Explore the increasing risks tied to digital transformation initiatives
- Understand how security intelligence helps teams make better decisions based on contextual data and metrics
- Discover a proven, comprehensive framework for cybersecurity that emphasizes risk over threats
- Learn how to create a persistent information advantage for better security — with a focus on being profitable
Ayrapetov
9:50am – 10:20am: Refreshment & Exhibit Break
10:20am – 11:10am: How to Build an Insider Threat Program
Ben Burkholder, Sr. Sales Engineer, Exabeam
Sometimes just having a SOC isn’t enough to address insider threat issues. Security operations teams are managing massive amounts of data across billions of events from on premises to the cloud. Looking for specific needles like insider threats in this complex haystack has special requirements that encompass both searching historic data and seeing evolving credential behavior changes as they happen.
Whether from downsizing or expanding the business, employees, vendors, contractors, and more are moving in and out of your environment. And often, it is during turbulent times that insider threats go unobserved as everything changes so quickly. Insider threat initiatives require a new, more focused approach.
This presentation will explore:
- The common scenarios that indicate you need an insider threat team, how to build a mission statement, and tools
- Four attributes of a successful insider threat program
- How behavioral analytics baseline “normal” behavior of users and devices – showing risk faster
Burkholder
11:10am – 12:00pm: Fireside Chat: Cyber Security Hiring Strategies
Hosted by: Zach Bastarache, Vice President of Business Development – Technology, inSpring
Cyber Security attacks are constantly evolving as is the technology and resources needed to counter them. Yet the US is facing a shortage in cyber security resources. In our fireside chat we will explore the following topics.
- How can companies identify, hire, and retain the right talent to grow their cyber teams?
- What technical and professional qualities in candidates lead to fantastic employees?
- The gap between higher education and workplace readiness
- Hiring trends in the cyber space
Panelist will include:
- Victor Hsiang, CISO, GATX
- Liz Ogunti, CISO, JBT Corporation
- Trent Ridgway, Head of Cloud Infrastructure & Security / Senior IT Project Manager, Anning-Johnson Company
- Other InfoSec executives
Bastarache Hsiang Ogunti Ridgeway
12:00pm – 12:40pm: Lunch & Exhibit Break
12:40pm – 1:30pm: Managing Security Risk at the Speed of Business (Panel Discussion)
As a valued partner to the business, CISOs need to lead with business first execution.
In this session, attendees will learn from CISOs/Security Executives as to how they are:
- Leading a business first mentality
- Looking at every security risk decision through the lens of business impact
- How can security and IT operations can work together effectively to identify best cost actions that have the most meaningful impact on exposure to business compromise and impact
- Understand what Cloud/DevOps/Digital mean for your risk management program
Moderated by: Michael Corvo, Regional Sales Director, Pentera
Panelists include:
- Christopher Clai, Director, Information Security, Green Thumb Industries
- Raum Sandoval, CISO, Entara
- Nicholas Opas, VP, Information Security Officer, Peoples Bank
- Stella Danso, Global Senior Director – Security Governance, Risk, Compliance, and Privacy, Expedia Group
- Jeffrey Deakins, CISO, Marmon Holdings, Inc.
- Other CISOs and IT Security Leaders experiences, tactics, and lessons learned
Corvo Clai Sandoval Opas Danso Deakins
1:30pm – 2:20pm: Encryption: The Hard Way
Chris Gruel, Senior Solutions Architect, Akeyless
In this presentation, we will provide an overview of encryption key management from a DevOps perspective and highlight the best practices for ensuring the security of encryption keys. We will explore three real-world scenarios that DevOps professionals must navigate for encryption key management. We will stress the importance of using secure random number generators, storing keys in secure locations, encrypting keys, regularly rotating keys, implementing version control for keys, and synchronizing keys between organizations.
By the end of this lecture, you will understand the criticality of encryption key management and know how to implement best practices in your own work. With practical guidance and real-world scenarios, this seminar will equip you with the knowledge to ensure data privacy and security in your organization. As a member of the DevOps team, you cannot afford to overlook encryption key management in modern cybersecurity. Join this presentation to learn the best practices for managing encryption keys effectively and ensure your organization’s data privacy and security.
Gruel
2:20pm – 2:50pm: Refreshment & Exhibit Break
2:50pm – 3:40pm: The Last Step in Moving to the Cloud – Network and Security as a Service
Michael Kaunitz, Sr. SASE Solutions Specialist, Cloudflare
Your users and application have moved to the cloud but what comes next? How can you move your network and security infrastructure to the cloud as well while still maintaining the same level of visibility and control that you have traditional on premise solutions? In this session we will discuss the benefits of this architectural shift and explore how to get started with the least amount of risk to the business.
Kaunitz
3:40pm – 4:30pm: Embedding a Culture of Security to Enable Smart, Secure Decision-Making (Panel Discussion)
With the increased adoption of remote and hybrid work, the cybersecurity framework continues to expand. Security must be a high-priority for every company stakeholder, and CISOs must lead the charge.
Moderated by: Tim Poffenbarger, Director of Solutions Architecture, GitLab
Panelists include:
- Derek Milroy, Information Security, U.S. Cellular
- MJ McSheehy, Director of Information Security/CISO, Addison Group
- Christina Payton, Vice President Information Technology & Security, Huse Culinary, Inc.
- Kyle Joerger, AVP, Information Security Risk Manager, ABN AMRO Clearing USA LLC
- Other CISOs and IT Security Leaders experiences, tactics, and lessons learned
Poffenbarger Milroy McSheehy Payton Joerger
Conference Price: $299.00 per person
Each attendee will receive a certificate awarding 7 CPE credits for CISSP continuing education, in addition to 0.7 CEUs and 7 PDUs. CISSP is a registered certification mark of (ISC)², Inc.
Exhibits
As is always the case at CAMP IT Conferences events, the talks will not include product presentations. During the continental breakfast, coffee breaks, and the luncheon break you will have the opportunity to informally meet representatives from the following sponsoring companies, who have solutions in the area of the conference.
[/vc_column_text][/vc_column][/vc_row][vc_row row_type=”row” use_row_as_full_screen_section=”no” type=”grid” text_align=”left” box_shadow_on_row=”no”][vc_column][vc_column_text]
conference sponsors
[/vc_column_text][/vc_column][/vc_row][vc_row row_type=”row” use_row_as_full_screen_section=”no” type=”full_width” text_align=”left” box_shadow_on_row=”no”][vc_column][vc_empty_space height=”128px” image_repeat=”no-repeat”][/vc_column][/vc_row][vc_row row_type=”row” use_row_as_full_screen_section=”no” type=”grid” text_align=”center” box_shadow_on_row=”no”][vc_column width=”1/3″][vc_single_image image=”363672″ img_size=”medium” onclick=”custom_link” img_link_target=”_blank” link=”https://www.akeyless.io/”][/vc_column][vc_column width=”1/3″][vc_single_image image=”363890″ img_size=”medium” alignment=”center” onclick=”custom_link” img_link_target=”_blank” link=”https://www.armorcode.com/”][/vc_column][vc_column width=”1/3″][vc_single_image image=”363793″ img_size=”large” alignment=”right” onclick=”custom_link” img_link_target=”_blank” link=”https://www.cloudflare.com/”][/vc_column][/vc_row][vc_row row_type=”row” use_row_as_full_screen_section=”no” type=”full_width” text_align=”left” box_shadow_on_row=”no”][vc_column][vc_empty_space height=”128px” image_repeat=”no-repeat”][/vc_column][/vc_row][vc_row row_type=”row” use_row_as_full_screen_section=”no” type=”grid” text_align=”center” box_shadow_on_row=”no”][vc_column width=”1/3″][vc_single_image image=”363785″ alignment=”center” onclick=”custom_link” img_link_target=”_blank” link=”https://delinea.com/”][/vc_column][vc_column width=”1/3″][vc_single_image image=”363446″ img_size=”medium” alignment=”center” onclick=”custom_link” img_link_target=”_blank” link=”https://www.exabeam.com/”][/vc_column][vc_column width=”1/3″][vc_single_image image=”364024″ img_size=”medium” onclick=”custom_link” img_link_target=”_blank” link=”https://about.gitlab.com/”][/vc_column][/vc_row][vc_row row_type=”row” use_row_as_full_screen_section=”no” type=”full_width” text_align=”left” box_shadow_on_row=”no”][vc_column][vc_empty_space height=”128px” image_repeat=”no-repeat”][/vc_column][/vc_row][vc_row row_type=”row” use_row_as_full_screen_section=”no” type=”grid” text_align=”center” box_shadow_on_row=”no”][vc_column width=”1/3″][vc_single_image image=”363805″ img_size=”medium” onclick=”custom_link” img_link_target=”_blank” link=”https://www.inspringcareers.com/”][/vc_column][vc_column width=”1/3″][vc_single_image image=”363442″ img_size=”medium” alignment=”center” onclick=”custom_link” img_link_target=”_blank” link=”https://www.logicgate.com/”][/vc_column][vc_column width=”1/3″][vc_single_image image=”363915″ img_size=”medium” alignment=”right” onclick=”custom_link” img_link_target=”_blank” link=”https://pentera.io/”][/vc_column][/vc_row][vc_row row_type=”row” use_row_as_full_screen_section=”no” type=”full_width” text_align=”left” box_shadow_on_row=”no”][vc_column][vc_empty_space height=”128px” image_repeat=”no-repeat”][/vc_column][vc_column][/vc_column][/vc_row]