Conferences that solve current IT challenges

Data Breaches: Securing the Infrastructure

Strategies to help your organization prepare for, defend against and respond to breaches

December 8, 2016


7 CPE / 0.7 CEU / CISSP / 7 PDU Credits Awarded


Conference location: Donald E. Stephens Convention Center Rosemont (O'Hare) Illinois


Overview: It is not a matter of if, but when your organization will be breached. Against these threats, enterprises try to build higher and more secure walls around their data and networks. This seems to be a never-ending arms race, as even the most sophisticates systems may, before long, present weaknesses that malicious technology can overcome.

What You Will Learn

In this one day conference attendees will learn:

  • Data Breach Interrupted

  • Breaking the Data Breach Kill Chain Using Privileged Access Management

  • Naked and Vulnerable: A Cybersecurity Starter Kit

  • End-to-End Segmentation: How the Target Breach Could Have Been Prevented

  • The Value of a SOC in the Proactive Monitoring of a Breach

  • The Importance of Packets in Security Forensics

  • Breaches & Ransomware: How to Handle, How to Respond

Conference Program

8:00am - 9:00am - Registration and Continental Breakfast



Data Breach Interrupted

Alex Holden, Founder and CISO, Hold Security

As hackers set their sights on attacking our networks and systems, our defenses do not always scale to their assaults. In this presentation, based on real-life experience dealing with the largest and every day breaches, we will learn lessons and draw conclusions on how to create effective defenses and deal with security breaches to minimize or mitigate their impact.

9:50am -10:20am - Refreshment Break



Breaking the Data Breach Kill Chain Using Privileged Access Management

Steven J McCullar, Advisor, Solution Strategy, CA Technologies

Targeted breaches are increasing and each of these attacks share a common thread — a kill chain that exploits privileged users and their credentials to gain access to sensitive systems. Privileged access management is the most direct means of disrupting the kill chain and stopping attackers before they ever get started.

In this session you will learn:

  • The role that privileged access plays in an attacker’s kill chain
  • Compensating Controls that can be applied by a Privileged Access Management solution
  • How Privileged Access Management fits into a Defense-in-Depth strategy for cyber-defense



Naked and Vulnerable: A Cybersecurity Starter Kit

Shannon Fritz, Solutions Architect, Concurrency, Inc.

An Introductory Guide for business that want to "improve security", but don’t really know where to begin. This session will outline a strategy to get your company motivated to invest in security improvements. We'll also explore the TOP FOUR attacks being used today, and what you can do right now to protect against them and dramatically improve your security profile.


  • See where small changes can make big improvements to your security stance
  •  Learn where the low-hanging fruit of vulnerabilities are
  • Take home a list of improvement areas to get started with

12:00pm - 1:00pm Luncheon



End-to-End Segmentation: How the Target Breach Could Have Been Prevented

Steve Emert, DSE, APDS, ACE Fx #24, Network Solutions Architect, Avaya

Recent events illustrate the increasing need to focus on securing all our networks – whether Intranets, IoT deployments, or those leveraging Cloud services. Increased complexity, cost and dealing with security in large scale are the traditional barriers to successfully securing an Enterprise infrastructure.

This discussion focuses on leveraging several recently introduced networking standards to help secure the network by reducing the potential attack surface through scalable network segmentation with a simplified deployment and management model; making network pathways invisible to potential intruders to thwart potential attacks; and by securing access through network elasticity – automatically extending services dynamically to users and IoT devices when authorized and retracting them when the user or device disconnects.

1:50pm - 2:20pm - Refreshment Break



The Value of a SOC in the Proactive Monitoring of a Breach

Stewart Tan, Security Principal and CISSP, Cisco

With increased attack vectors, many breaches are going unnoticed due to immature SOCs. Learn why so many organizations are concerned about their current SOCs and the value that enhanced SOC services can achieve in proactively monitoring for attacks. In this session, you will learn the various levels of SOCs in the market today and services that can be added to your current SOC achieve maximum effectiveness.



The Importance of Packets in Security Forensics

Darren Sanders, Engineer, Viavi Solutions

Packets don’t lie. For network teams to effectively support their security counterparts, they not only need complete packet data – they need the ability to quickly analyze the data for anomalies that can lead to prompt recovery from a security breach and faster time to resolution. Darren Sanders will explain why it’s critical to capture full packets to root out anomalies as well identify potential threats for immediate attention.





Breaches & Ransomware: How to Handle, How to Respond

George Harrison, Manager, Infoblox
Fred Kwong, CISO, Delta Dental
Edward Marchewka, CIO/CISO, Gift of Hope
Derek Milroy, IS Security Architect, U.S. Cellular
and other professionals from IT departments

In this session, attendees will learn from CISOs and Security Executives as to how they are working through the challenges of Data Breaches and Ransomware.

Attendees will walk away with shared strategies and tactics that other organizations are employing.

Conference Price: $289.00 per person

Each attendee will receive a certificate awarding 7 CPE credits for CISSP continuing education, in addition to 0.7 CEUs and 7 PDUs. CISSP is a registered certification mark of (ISC)˛, Inc.


As is always the case at CAMP IT Conferences events, the talks will not include product presentations.  During the continental breakfast, coffee breaks, and the luncheon break you will have the opportunity to informally meet representatives from the following sponsoring companies, who have solutions in the area of the conference.