[vc_row row_type=”row” use_row_as_full_screen_section=”no” type=”full_width” text_align=”left” background_image=”348335″ box_shadow_on_row=”no”][vc_column css=”.vc_custom_1509976289581{padding-top: 200px !important;padding-bottom: 199px !important;}”][vc_column_text]
PAST EVENTS
[/vc_column_text][/vc_column][/vc_row][vc_row row_type=”row” use_row_as_full_screen_section=”no” type=”grid” text_align=”left” box_shadow_on_row=”no”][vc_column][vc_column_text css=”.vc_custom_1568736823716{padding-top: 25px !important;padding-bottom: 25px !important;}”]Enterprise Risk / Security Management
Strategies for reducing risk to the enterprise.
October 3, 2019
8:30am-5:00pm
7 CPE / 0.7 CEU / CISSP / 7 PDU Credits Awarded
Conference location: Donald E. Stephens Convention Center Rosemont (O’Hare) Illinois[/vc_column_text][/vc_column][/vc_row][vc_row row_type=”row” use_row_as_full_screen_section=”no” type=”grid” text_align=”left” box_shadow_on_row=”no”][vc_column width=”1/2″][vc_column_text][/vc_column_text][/vc_column][vc_column width=”1/2″][vc_column_text] [/vc_column_text][/vc_column][/vc_row][vc_row row_type=”row” use_row_as_full_screen_section=”no” type=”grid” text_align=”left” box_shadow_on_row=”no”][vc_column][vc_column_text css=”.vc_custom_1569357934845{padding-top: 25px !important;padding-bottom: 25px !important;}”]
Overview
In today’s highly regulatory environment it is essential that you have a clear understanding of risk across the enterprise. A risk management framework can bring visibility to key business and compliance risks and enable a company to make decisions on where to prioritize its limited resources. It is through a risk management framework that real value to the business can be achieved.
With all of these challenges, how do you make this happen?
In this one day conference, attendees will be provided with examples of approaches to managing information and compliance risk through a risk management framework.
What You Will Learn
In this one day conference attendees will learn:
- 2019 and Beyond: Security and Risk Management Trends
- Strategies for Protecting Your Key Asset: Your Data
- Reducing Through Insider Threat Through Effective Response
- Cloud, Control & Security: Critical Security Controls You Should be Using
- Managing Customers Identify in the Era of CCPA and Others
- Zero Trust & Security Segmentation: Strategies for Ensuring Consistent Security Across Environments
- CISO Leadership: How Can Security and Risk management Leaders Ensure Roles and Responsibilities are Clear? (Panel Discussion)
- How to Integrate Security Planning into Digital Transformation Efforts (Panel Discussion)
[/vc_column_text][/vc_column][/vc_row][vc_row row_type=”row” use_row_as_full_screen_section=”no” type=”grid” text_align=”left” box_shadow_on_row=”no” css=”.vc_custom_1513895163165{padding-top: 25px !important;padding-bottom: 25px !important;}”][vc_column][vc_column_text css=”.vc_custom_1569949165035{padding-top: 25px !important;padding-bottom: 25px !important;}”]
Conference Program
8:00am – 8:30am: Registration and Continental Breakfast
8:30am-9:20am: 2019 and Beyond: Security and Risk Management Trends
Ray Hicks, Founder & CEO, 5th Column
This presentation will describe the most significant trends in cybersecurity and how your organization needs to take advantage of these trends.
Key areas that will be covered include:
- The next generation of threats
- Trends in creating a top notch security organization
- Strategic trends that will influence security strategy
Hicks
9:20am-10:10am: Protecting Your Key Asset: Your Data
Raul Gutierrez, Manager, Security Technologies Architects, Trustwave
Databases are a key target for hackers because of all the confidential and financial information stored there. In this session, attendees will learn:
- Today’s Top Database Security Challenges
- A strong Database Security Methodology
- Database Security in the cloud
- 10 Principals of Database Security Program design
Gutierrez
10:10am -10:40am: Refreshment Break
10:40am-11:30am: Zero Trust: Not Quite “Zero Risk”, But a Big Step Forward
Jason Garbis, VP of Products a Co-Chair of the CSA Software Defined Perimeter Working Group, Cyxtera
Traditional security architectures have failed to meet today’s security, risk, and compliance needs. There’s a growing recognition that a new “Zero Trust” approach is needed, but many questions about what exactly this approach looks like, and how to achieve it. In this session, we’ll define Zero Trust, and explain how a modern, open security architecture – the Software-Defined Perimeter – achieves its goals. We’ll then look at the benefits of this architecture through a risk management lens, including:
- Reducing the risk of employee and third-party access for remote and on-premises users
- Safely adopting new technologies, such as Cloud, without increasing risk
- Ways to efficiently integrate security with existing business processes and security solutions
Garbis
11:30am-12:20pm: Cloud, Control & Security: Critical Security Controls You Should be Using
Dave Klein, Senior Director, Engineering & Architecture, GuardiCore
At a minimum, cloud computing breaks into 3 primary layers: SaaS, PaaS and IaaS. This presentation will explain the 3 primary security controls for each of these layers: CASB, CSPM and CWPP respectively.
No matter who is responsible for the security of the cloud workloads, the organization is ultimately responsible for what happens to their data.
Organizations must incorporate following security measures to ensure their cloud environments, applications, and data protected from unauthorized access.
- Know what you are responsible for
- Control Access
- Protect the data
- Secure credentials
- Security hygiene
- Improve visibility
Klein
12:20pm – 1:10pm Luncheon
1:10pm-2:00pm: Managing Customers Identify in the Era of CCPA and Others
Patrick Sullivan, CTO, Advanced Technology Group(Security), Akamai
Privacy regulations around the world continue to evolve. In this presentation, Patrick Sullivan will cover the three common threats to customer privacy observed and provide actionable suggestions to combat these risks.
Sullivan
2:00pm-2:50pm: Zero Trust & Security Segmentation: Strategies for Ensuring Consistent Security Across Environments
Katey Wood, Senior Product Manager, Illumio
Enterprises struggling with increasingly complex infrastructure are turning to Zero Trust as a common security model for ensuring consistent security across environments. In fact, Forrester recently concluded that organizations using Zero Trust can mitigate risk by 37% and reduce security costs by more than 30%, potentially saving millions in their overall IT security budgets. Learn more about What is Zero Trust, what is security segmentation, and why traditional network architecture approaches fall short.
Wood
2:50pm – 3:20pm: Refreshment Break
3:20pm-4:10pm: CISO Leadership: How Can Security and Risk Management Leaders Ensure Roles and Responsibilities are Clear? (Panel discussion)
Moderator:
Bob Wolff, Director of Strategic Accounts, Tanium
Panelists:
Joseph Burkard, Chief Security Officer, Alight Solutions
Al Zieba, Director, Network and Security, IDEX Corporation
Riad Amro, Global CISO, Chief Information Security Officer, Grant Thornton International Ltd.
Victor Hsiang, CISO, GATX
and other CISOs/Security Executives sharing strategies, tactics and lessons learned
The moment something bad happens the CISO is maligned for not properly protecting business information. How can security and risk management leaders ensure roles and responsibilities are clear? What can be done to ensure ownership of risk is well articulated? How much risk should the CISO actually own?
Burkard Zieba Amro Hsiang Wolff
4:10pm-5:00pm: How to Integrate Security Planning into Digital Transformation Efforts (Panel discussion)
Moderator:
Annur Sumar, Chief Technology Officer, MaeTech
Panelists:
Eric Hansen, Head, Cyber Defense – Americas, Siemens
Fred Kwong, CISO, Delta Dental
Victor Hsiang, CISO, GATX
and other CISOs/Security Executives sharing strategies, tactics and lessons learned
Digital transformation initiatives continue to question conventional information risk and security management. It requires a focused digital security program based on a clear vision and strategy.
In this session attendees will learn how to:
- articulate a compelling vision for security and risk management.
- identify the key ‘digital differences’ that must be integrated into the security program.
Hansen Kwong Hsiang Sumar
Conference Price: $289.00 per person
Each attendee will receive a certificate awarding 7 CPE credits for CISSP continuing education, in addition to 0.7 CEUs and 7 PDUs. CISSP is a registered certification mark of (ISC)², Inc.
Exhibits
As is always the case at CAMP IT Conferences events, the talks will not include product presentations. During the continental breakfast, coffee breaks, and the luncheon break you will have the opportunity to informally meet representatives from the following sponsoring companies, who have solutions in the area of the conference.
[/vc_column_text][/vc_column][/vc_row][vc_section][vc_row row_type=”row” use_row_as_full_screen_section=”no” type=”full_width” text_align=”left” box_shadow_on_row=”no” css=””][vc_column][vc_column_text]
CONFERENCE CO-SPONSORS
[/vc_column_text][vc_empty_space image_repeat=”no-repeat”][/vc_column][/vc_row][vc_row row_type=”row” use_row_as_full_screen_section=”no” type=”grid” text_align=”left” box_shadow_on_row=”no”][vc_column width=”1/3″][vc_single_image image=”353215″ img_size=”full” alignment=”center” onclick=”custom_link” img_link_target=”_blank” link=”https://5thcolumn.net/”][/vc_column][vc_column width=”1/3″][vc_single_image image=”353216″ img_size=”full” alignment=”center” onclick=”custom_link” img_link_target=”_blank” link=”https://www.akamai.com/”][/vc_column][vc_column width=”1/3″][vc_single_image image=”353217″ img_size=”full” alignment=”center” onclick=”custom_link” img_link_target=”_blank” link=”http://www.code42.com”][/vc_column][/vc_row][vc_row row_type=”row” use_row_as_full_screen_section=”no” type=”full_width” text_align=”left” box_shadow_on_row=”no”][vc_column][vc_empty_space image_repeat=”no-repeat”][/vc_column][/vc_row][vc_row row_type=”row” use_row_as_full_screen_section=”no” type=”grid” text_align=”left” box_shadow_on_row=”no”][vc_column width=”1/3″][vc_single_image image=”351468″ img_size=”full” alignment=”center” onclick=”custom_link” img_link_target=”_blank” link=”http://www.cyxtera.com”][/vc_column][vc_column width=”1/3″][vc_single_image image=”352775″ img_size=”full” alignment=”center” onclick=”custom_link” img_link_target=”_blank” link=”http://www.guardicore.com”][/vc_column][vc_column width=”1/3″][vc_single_image image=”353445″ img_size=”full” alignment=”center” onclick=”custom_link” img_link_target=”_blank” link=”http://www.hopzero.com”][/vc_column][/vc_row][vc_row row_type=”row” use_row_as_full_screen_section=”no” type=”full_width” text_align=”left” box_shadow_on_row=”no”][vc_column][vc_empty_space image_repeat=”no-repeat”][/vc_column][/vc_row][vc_row row_type=”row” use_row_as_full_screen_section=”no” type=”grid” text_align=”left” box_shadow_on_row=”no”][vc_column width=”1/3″][vc_single_image image=”351451″ img_size=”full” alignment=”center” onclick=”custom_link” img_link_target=”_blank” link=”http://www.illumio.com”][/vc_column][vc_column width=”1/3″][vc_single_image image=”350985″ img_size=”full” alignment=”center” onclick=”custom_link” img_link_target=”_blank” link=”http://www.tanium.com”][/vc_column][vc_column width=”1/3″][vc_single_image image=”353218″ img_size=”full” alignment=”center” onclick=”custom_link” img_link_target=”_blank” link=”http://www.trustwave.com”][/vc_column][/vc_row][vc_row row_type=”row” use_row_as_full_screen_section=”no” type=”full_width” text_align=”left” box_shadow_on_row=”no”][vc_column][vc_empty_space image_repeat=”no-repeat”][/vc_column][/vc_row][vc_row row_type=”row” use_row_as_full_screen_section=”no” type=”grid” text_align=”left” box_shadow_on_row=”no”][vc_column width=”1/3″][/vc_column][vc_column width=”1/3″][/vc_column][vc_column width=”1/3″][/vc_column][/vc_row][vc_row row_type=”row” use_row_as_full_screen_section=”no” type=”full_width” text_align=”left” box_shadow_on_row=”no”][vc_column][vc_empty_space image_repeat=”no-repeat”][/vc_column][/vc_row][/vc_section]