Data Breaches:  Defending Against and Responding To: Chicago (Rosemont/O’Hare), Illinois


Strategies to help your organization prepare for, defend against and respond to breaches.


December 8, 2022




7 CPE / 0.7 CEU / CISSP / 7 PDU Credits Awarded


Conference location: Donald E. Stephens Convention Center Rosemont (O’Hare) Illinois





It is not a matter of if, but when your organization will be breached. Against these threats, enterprises try to build higher and more secure walls around their data and networks. This seems to be a never-ending arms race, as even the most sophisticated systems may, before long, present weaknesses that malicious technology can overcome.

What You Will Learn


In this one day conference attendees will learn:

  • Security Operations and Incident Response
  • How to Stop Zero Day Threats
  • Third Party Assessment Prioritization: “Vendor Tiering and Due Diligence Levels”
  • The Role of Identity-Powered Security to Combat and Respond to Breaches
  • Value of Investment – Balancing Data Corruption, Disaster Recovery, and Cost
  • The Timeline of a Data Breach
  • CyberThreats – How CISOs are Responding to Current & Emerging Security Risks (Panel Discussion)

Conference Program


8:00am – 9:00am: Registration and Continental Breakfast

9:00am – 9:50am: Timeline of a Data Breach


Richard Rushing, CISO, Motorola Mobility






9:50am – 10:20am: Refreshment Break

10:20am – 11:10am: It Takes a Village to Stop Zero Day Threats – Network Performance and Security – A Unified Front Against Hackers


Michael Bacon, Director of Enterprise Solutions Marketing, Accedian


How do you stop insider threats, ransomware, supply chain attacks and other modern-day threats from wreaking havoc on today’s networks?

CIOs and CISOs alike are finding it more and more difficult to keep up with the sophistication and increasing frequency of zero-day threats, while also building a highly collaborative and effective IT team.


As businesses today focus more and more on security, there is a need to think outside the box in order to properly mitigate risks and drive network performance goals, while also improving company profitability by driving needed efficiencies and collaboration between the network operations and security teams.


Organizations are struggling to manage the multitude of tools with siloed teams – consolidating data to tell the full story across the network remains a huge challenge, and most incidents today transcend the network into the cloud and are often caused by a security event. With all the separate tools, separate dashboards and separate teams, hackers often use these separations to hide in plain sight, costing enterprises time, money, and reputation.


Come explore converged network operations and security strategies.



Michael Bacon


11:10am – 12:00pm: Value of Investment – Balancing Data Corruption, Disaster Recovery, and Cost


For decades, enterprises have worked to get their Recovery Point from days, to hours, to seconds. Today, ransomware and data corruption are challenging and forcing enterprises to develop new but often counterintuitive approaches to business continuity. In this session, attendees will learn best practices for balancing data corruption, disaster recovery, and cost.


12:00pm – 12:50pm: Who Is After Us and Why? A Practical Guide and Approach to Battling Evil


Fayyaz Rajpari, Sr. Director, Product Management, Gigamon


Doing Security Operations and Incident Response can be hard if you are not experienced or trained. How can you defend against adversaries that continue to bring pain to you and your organization? It’s time to flip the script and gain unprecedented visibility into your environment and bring pain to the adversary. In this talk we will go through the process of detecting, investigating, and responding to threats using a team with examples of incident response approaches used. Guiding you through the process, procedures, and scenarios in Incident Response that enable success should be a priority.




12:50pm – 1:30pm: Luncheon and Exhibit Break

1:30pm – 2:20pm: The Role of Identity-Powered Security to Combat and Respond to Breaches


Nick d’Amato, Senior Solutions Engineer, Okta



Identity is the foundation of any modern security program. As organizations continue their Zero Trust journey, adopting an identity-centric approach empowers them to mitigate risk, respond to security events and prevent breaches.


Join this session to learn more about:

  • Identity as a foundational component to any security program
  • The role identity plays in preventing breaches
  • How identity is key in a response plan for a breach
  • Industry best practices when planning an identity project





2:20pm – 2:50pm Refreshment Break

2:50pm – 3:40pm: Fireside Chat: Third Party Assessment Prioritization: “Vendor Tiering and Due Diligence Levels”


Fred Kwong, Ph.D., Vice President, Chief Information Security, DeVry University




3:40pm – 4:20pm: CyberThreats – How CISOs are Responding to Current & Emerging Security Risks (Panel Discussion)


In this session attendees will learn from a distinguished panel of CISOs sharing their thoughts on:


  • Mitigating Business Email Compromise
  • Responding to Ransomware
  • Reducing Risk to the Business in 2023



Moderator TBA!


Panelists will include Data Executives sharing strategies, tactics and lessons learned. 


Conference Price: $299.00 per person

Each attendee will receive a certificate awarding 7 CPE credits for CISSP continuing education, in addition to 0.7 CEUs and 7 PDUs. CISSP is a registered certification mark of (ISC)², Inc.



As is always the case at CAMP IT Conferences events, the talks will not include product presentations. During the continental breakfast, coffee breaks, and the luncheon break you will have the opportunity to informally meet representatives from the following sponsoring companies, who have solutions in the area of the conference.