Enterprise Risk / Security Management: Chicago (Rosemont/O’Hare), Illinois
Strategies for reducing risk to the enterprise.
May 4, 2023
9:00am-5:00pm
7 CPE / 0.7 CEU / CISSP / 7 PDU Credits Awarded
Conference location: Donald E. Stephens Convention Center Rosemont (O’Hare) Illinois
Overview
In today’s highly regulatory environment it is essential that you have a clear understanding of risk across the enterprise. A risk management framework can bring visibility to key business and compliance risks and enable a company to make decisions on where to prioritize its limited resources. It is through a risk management framework that real value to the business can be achieved.
With all of these challenges, how do you make this happen?
In this one day conference, attendees will be provided with examples of approaches to managing information and compliance risk through a risk management framework.
What You Will Learn
Join us as we cover:
Conference Price: $299.00 per person
Each attendee will receive a certificate awarding 7 CPE credits for CISSP continuing education, in addition to 0.7 CEUs and 7 PDUs. CISSP is a registered certification mark of (ISC)², Inc.
8:00am – 9:00am: Registration and Continental Breakfast
9:00am – 9:50am: Keeping Up with the Latest Security and Risk Management Trends
Dmitriy Ayrapetov, VP, Product Management, Delinea
What’s the best approach to enterprise security? The prevailing consensus in the industry has generally been threat-based or compliance-based approaches. However, many organizations that use these approaches struggle to strike the right balance between technical tools and practical outcomes.
The answer is to focus on reducing risk.
Join us to get an actionable roadmap for success, including:
Ayrapetov
9:50am – 10:20am: Refreshment & Exhibit Break
10:20am – 11:10am: How to Build an Insider Threat Program
Ben Burkholder, Sr. Sales Engineer, Exabeam
Sometimes just having a SOC isn’t enough to address insider threat issues. Security operations teams are managing massive amounts of data across billions of events from on premises to the cloud. Looking for specific needles like insider threats in this complex haystack has special requirements that encompass both searching historic data and seeing evolving credential behavior changes as they happen.
Whether from downsizing or expanding the business, employees, vendors, contractors, and more are moving in and out of your environment. And often, it is during turbulent times that insider threats go unobserved as everything changes so quickly. Insider threat initiatives require a new, more focused approach.
This presentation will explore:
Burkholder
11:10am – 12:00pm: Fireside Chat: Cyber Security Hiring Strategies
Hosted by: Zach Bastarache, Vice President of Business Development – Technology, inSpring
Cyber Security attacks are constantly evolving as is the technology and resources needed to counter them. Yet the US is facing a shortage in cyber security resources. In our fireside chat we will explore the following topics.
Panelist will include:
Bastarache Hsiang Ogunti Ridgeway
12:00pm – 12:40pm: Lunch & Exhibit Break
12:40pm – 1:30pm: Managing Security Risk at the Speed of Business (Panel Discussion)
As a valued partner to the business, CISOs need to lead with business first execution.
In this session, attendees will learn from CISOs/Security Executives as to how they are:
Moderated by: Michael Corvo, Regional Sales Director, Pentera
Panelists include:
Corvo Clai Sandoval Opas Danso Deakins
1:30pm – 2:20pm: Encryption: The Hard Way
Chris Gruel, Senior Solutions Architect, Akeyless
In this presentation, we will provide an overview of encryption key management from a DevOps perspective and highlight the best practices for ensuring the security of encryption keys. We will explore three real-world scenarios that DevOps professionals must navigate for encryption key management. We will stress the importance of using secure random number generators, storing keys in secure locations, encrypting keys, regularly rotating keys, implementing version control for keys, and synchronizing keys between organizations.
By the end of this lecture, you will understand the criticality of encryption key management and know how to implement best practices in your own work. With practical guidance and real-world scenarios, this seminar will equip you with the knowledge to ensure data privacy and security in your organization. As a member of the DevOps team, you cannot afford to overlook encryption key management in modern cybersecurity. Join this presentation to learn the best practices for managing encryption keys effectively and ensure your organization’s data privacy and security.
Gruel
2:20pm – 2:50pm: Refreshment & Exhibit Break
2:50pm – 3:40pm: The Last Step in Moving to the Cloud – Network and Security as a Service
Michael Kaunitz, Sr. SASE Solutions Specialist, Cloudflare
Your users and application have moved to the cloud but what comes next? How can you move your network and security infrastructure to the cloud as well while still maintaining the same level of visibility and control that you have traditional on premise solutions? In this session we will discuss the benefits of this architectural shift and explore how to get started with the least amount of risk to the business.
Kaunitz
3:40pm – 4:30pm: Embedding a Culture of Security to Enable Smart, Secure Decision-Making (Panel Discussion)
With the increased adoption of remote and hybrid work, the cybersecurity framework continues to expand. Security must be a high-priority for every company stakeholder, and CISOs must lead the charge.
Moderated by: Tim Poffenbarger, Director of Solutions Architecture, GitLab
Panelists include:
Poffenbarger Milroy McSheehy Payton Joerger
Conference Price: $299.00 per person
Each attendee will receive a certificate awarding 7 CPE credits for CISSP continuing education, in addition to 0.7 CEUs and 7 PDUs. CISSP is a registered certification mark of (ISC)², Inc.
Exhibits
As is always the case at CAMP IT Conferences events, the talks will not include product presentations. During the continental breakfast, coffee breaks, and the luncheon break you will have the opportunity to informally meet representatives from the following sponsoring companies, who have solutions in the area of the conference.