[vc_row row_type=”row” use_row_as_full_screen_section=”no” type=”full_width” text_align=”left” background_image=”348335″ box_shadow_on_row=”no”][vc_column css=”.vc_custom_1509976289581{padding-top: 200px !important;padding-bottom: 199px !important;}”][vc_column_text]
PAST EVENTS
[/vc_column_text][/vc_column][/vc_row][vc_row row_type=”row” use_row_as_full_screen_section=”no” type=”grid” text_align=”left” box_shadow_on_row=”no”][vc_column][vc_column_text css=”.vc_custom_1587747601116{padding-top: 25px !important;padding-bottom: 25px !important;}”]Data Breaches: Defending Against and Responding To
Strategies to help your organization prepare for, defend against and respond to breaches.
April 30, 2020
9:30am-5:00pm CST
7 CPE / 0.7 CEU / CISSP / 7 PDU Credits Awarded
Conference location: Online[/vc_column_text][/vc_column][/vc_row][vc_row row_type=”row” use_row_as_full_screen_section=”no” type=”grid” text_align=”left” box_shadow_on_row=”no”][vc_column width=”1/2″][vc_column_text][/vc_column_text][/vc_column][vc_column width=”1/2″][vc_column_text] [/vc_column_text][/vc_column][/vc_row][vc_row row_type=”row” use_row_as_full_screen_section=”no” type=”grid” text_align=”left” box_shadow_on_row=”no”][vc_column][vc_column_text css=”.vc_custom_1586288495155{padding-top: 25px !important;padding-bottom: 25px !important;}”]
Overview
It is not a matter of if, but when your organization will be breached. Against these threats, enterprises try to build higher and more secure walls around their data and networks. This seems to be a never-ending arms race, as even the most sophisticates systems may, before long, present weaknesses that malicious technology can overcome.
What You Will Learn
In this one day conference attendees will learn:
- Now What? WFH – How Do We Adapt and Still Protect Our Organizations from Security Threats?
- How to build an Effective Threat Investigation and Eradication Capability
- Security Incident Response Processes
- Third Party Assessment Prioritization: “Vendor Tiering and Due Diligence Levels”
- THE ZERO TRUST FRAMEWORK: What the heck is it, and why is it important to me?
- Cyber Security & BC/DR: Recovering from Ransomware & Breaches
- Breaches & Ransomware: How to Handle, How to Respond (Panel Discussion)
Conference Price: $0.00 per person
Attendance is limited to enterprise IT executives, management and staff in companies with at least 25 employees. Registrants cannot be sales/marketing/business development professionals, nor executives, of companies that provide IT products or services to enterprises.
Each attendee will receive a certificate awarding 7 CPE credits for CISSP continuing education, in addition to 0.7 CEUs and 7 PDUs. CISSP is a registered certification mark of (ISC)², Inc.
[/vc_column_text][/vc_column][/vc_row][vc_row row_type=”row” use_row_as_full_screen_section=”no” type=”grid” text_align=”left” box_shadow_on_row=”no”][vc_column][vc_column_text css=”.vc_custom_1588619765203{padding-top: 25px !important;padding-bottom: 25px !important;}”]
9:30am-10:15am: How to Build an Effective Threat Investigation and Eradication Capability
Milan Patel, Global Co-Head of Managed Security Services, BlueVoyant, In conjunction w/ Innovative Technology Solutions
The threat landscape is quickly evolving. Cyber criminals are more organized and sophisticated than ever. They are building and deploying new techniques to evade traditional defenses. Defenders can’t rely on endpoint detection alone to stop threats. They need to include real time investigations and a native ability to contain threats.
Patel
10:15am -10:45am: Networking Break – Q & A
10:45am-11:30am: The Threat Landscape for Enterprises
Luis Rodriguez, Enterprise Sales Engineer, Mimecast
The goal of this presentation is to:
Discuss problems facing the Enterprise and to help to identify gaps in your email security program.
Also to share the most recent Threat Intelligence from Mimecast in order to prepare your organization to educate your end-users and security teams to respond to emerging threats.
Rodriguez
11:30am-12:15pm: Value of Investment – Balancing Data Corruption, Disaster Recovery, and Cost
Jeff Roseman, Vice President, Information Technology, Marmon Foodservice Technologies
For decades, enterprises have worked to get their Recovery Point from days, to hours, to seconds. Today, ransomware and data corruption are challenging and forcing enterprises to develop new but often counter-intuitive approaches to business continuity. In this session, attendees will learn best practices for balancing data corruption, disaster recovery, and cost.
Roseman
12:15pm-1:00pm: Improving Security and Governance through Cloud Management
Annur Sumar, CTO, Maetech
Sumar
1:00pm-1:30pm Networking Break & Q&A
1:30pm-2:15pm: Cybersecurity Has Metrics Problem Here’s What You Can Do About It
Edward Marchewka, MS, MBA, CISSP, PMP, Director, Information and Technology Services, Gift Hope Organ & Tissue Donor Network
Marchewka
2:15pm-3:00pm: Cyber Security & AI: Protecting Against AI-Enhanced Malware
Sabrina Stanich, Manager, Darktrace
Among rapidly evolving technological advancements, the emergence of AI-enhanced malware is making cyber-attacks exponentially more dangerous and harder to identify. In the near future, we will begin to see supercharged, AI-powered cyber-attacks leveraged at scale. To protect against Offensive AI attacks, organizations are turning to defensive cyber AI, which can identify and neutralize emerging malicious activity, no matter when, or where, it strikes.
In this session, learn about:
• Paradigm shifts in the cyber landscape
• Advancements in offensive AI attack techniques
• Real-world examples of emerging threats that were stopped with Cyber AI
Stanich
3:00pm-4:00pm: Breaches & Ransomware: How to Handle, How to Respond (Panel Discussion)
Moderator:
Frank Geraldi, Innovative Technology Solutions
Panelists:
Edward Marchewka, CISO, Director, Information and Technology Services, Gift of Hope Organ & Tissue Donor Network
Fred Kwong, Ph.D., CISO & AVP Security, Identity and Operations, Delta Dental Plans Association
James Mountain, CISO, Palmer College of Chiropractic
and other IT CISOs sharing experiences and lessons learned
Marchewka Kwong Mountain Geraldi
[/vc_column_text][/vc_column][/vc_row][vc_section][vc_row row_type=”row” use_row_as_full_screen_section=”no” type=”grid” text_align=”left” padding_bottom=”25″ box_shadow_on_row=”no”][vc_column][vc_column_text]Exhibits
As is always the case at CAMP IT Conferences events, the talks will not include product presentations. During the breaks, you will have the opportunity to informally chat offline with representatives from the following sponsoring companies, who have solutions in the area of the conference.[/vc_column_text][/vc_column][/vc_row][vc_row row_type=”row” use_row_as_full_screen_section=”no” type=”grid” text_align=”left” padding_top=”50px” box_shadow_on_row=”no”][vc_column width=”1/3″][vc_single_image image=”354558″ img_size=”full” alignment=”center” onclick=”custom_link” link=”http://www.darktrace.com”][/vc_column][vc_column width=”1/3″][vc_single_image image=”349881″ img_size=”full” alignment=”center” onclick=”custom_link” img_link_target=”_blank” link=”http://www.infoblox.com”][/vc_column][vc_column width=”1/3″][vc_single_image image=”354345″ img_size=”full” alignment=”center” onclick=”custom_link” img_link_target=”_blank” link=”https://www.innovativetech.com/”][vc_single_image image=”354353″ img_size=”full” alignment=”center” onclick=”custom_link” img_link_target=”_blank” link=”http://www.bluevoyant.com”][/vc_column][/vc_row][vc_row row_type=”row” use_row_as_full_screen_section=”no” type=”full_width” text_align=”left” box_shadow_on_row=”no”][vc_column][vc_empty_space image_repeat=”no-repeat”][/vc_column][/vc_row][vc_row row_type=”row” use_row_as_full_screen_section=”no” type=”grid” text_align=”left” padding_top=”50px” box_shadow_on_row=”no”][vc_column width=”1/2″][vc_single_image image=”352180″ img_size=”full” alignment=”center” onclick=”custom_link” img_link_target=”_blank” link=”http://www.mimecast.com”][/vc_column][vc_column width=”1/2″][vc_single_image image=”353637″ img_size=”full” alignment=”center” onclick=”custom_link” img_link_target=”_blank” link=”https://www.ordr.net/”][/vc_column][/vc_row][vc_row row_type=”row” use_row_as_full_screen_section=”no” type=”full_width” text_align=”left” box_shadow_on_row=”no”][vc_column][vc_empty_space image_repeat=”no-repeat”][/vc_column][/vc_row][/vc_section]