Skip to content

[vc_row row_type=”row” use_row_as_full_screen_section=”no” type=”full_width” text_align=”left” background_image=”348335″ box_shadow_on_row=”no”][vc_column css=”.vc_custom_1509976289581{padding-top: 200px !important;padding-bottom: 199px !important;}”][vc_column_text]

PAST EVENTS

[/vc_column_text][/vc_column][/vc_row][vc_row row_type=”row” use_row_as_full_screen_section=”no” type=”grid” text_align=”left” box_shadow_on_row=”no”][vc_column][vc_column_text css=”.vc_custom_1607720192219{padding-top: 25px !important;padding-bottom: 25px !important;}”]Data Breaches:  Defending Against and Responding To

 

Strategies to help your organization prepare for, defend against and respond to breaches.

 

April 29, 2021

 

9:00am-5:00pm CST; 10:00am-6:00pm EST

 

7 CPE / 0.7 CEU / CISSP / 7 PDU Credits Awarded

 

Conference location: ONLINE[/vc_column_text][/vc_column][/vc_row][vc_row row_type=”row” use_row_as_full_screen_section=”no” type=”grid” text_align=”left” box_shadow_on_row=”no”][vc_column width=”1/2″][vc_column_text][/vc_column_text][/vc_column][vc_column width=”1/2″][vc_column_text]      [/vc_column_text][/vc_column][/vc_row][vc_row row_type=”row” use_row_as_full_screen_section=”no” type=”grid” text_align=”left” box_shadow_on_row=”no”][vc_column][vc_column_text css=”.vc_custom_1618243031560{padding-top: 25px !important;padding-bottom: 25px !important;}”]


Overview

 

It is not a matter of if, but when your organization will be breached. Against these threats, enterprises try to build higher and more secure walls around their data and networks. This seems to be a never-ending arms race, as even the most sophisticates systems may, before long, present weaknesses that malicious technology can overcome.


What You Will Learn

 

In this one day conference attendees will learn:

  • Cybersecurity is Not an IT Problem to Solve. It’s a Business Risk to Manage
  • The Threat Landscape for Enterprises
  • Cyber Security Has Metrics Problem Here’s What You Can Do About It
  • Improving Security and Governance through Cloud Management
  • Value of Investment – Balancing Data Corruption, Disaster Recovery, and Cost
  • Breaches & Ransomware: How to Handle, How to Respond (Panel Discussion)

 

Conference Price: $0.00 per person

 

Attendance is limited to enterprise IT executives, management and staff in companies with at least 25 employees. Registrants cannot be sales/marketing/business development professionals, nor executives, of companies that provide IT products or services to enterprises.

 

Each attendee will receive a certificate awarding 7 CPE credits for CISSP continuing education, in addition to 0.7 CEUs and 7 PDUs. CISSP is a registered certification mark of (ISC)², Inc.


[/vc_column_text][/vc_column][/vc_row][vc_row row_type=”row” use_row_as_full_screen_section=”no” type=”grid” text_align=”left” box_shadow_on_row=”no”][vc_column][vc_column_text]


Conference Program


9:00am-10:00am: Cybersecurity is Not an IT Problem to Solve. It’s a Business Risk to Manage

 

Mark Sangster, Author and Industry Security Strategist, eSentire, Inc.

 

What you don’t know can hurt you. Most companies fall victim to attacks because the C-suite doesn’t understand the risk, and the IT practitioners speak a language that doesn’t resonate with business leaders. Together, they learn the hard way what accountability, legal obligations and liability look like in the wake of a cyber incident. The chain of accountability begins with executive awareness cyber risks, and an understanding of resulting obligations. For more than a decade, Mark Sangster has worked with technical teams, C-suite executives and Boards to provide cybersecurity awareness training and run real-world simulations to bring both parties together to address risks, respond to cyber threats, and ensure they protect the interests of their stakeholders. Through his work, he has crafted a five pillar executive approach to cyber risk management. Join Mark as he unpacks practical ways of working with you executive to respond to a risk before it becomes a public breach.

 

 


Sangster


10:00am -10:30am: Networking Break


10:30am-11:30am: Zero Trust – From Theory to Reality in Five Steps

 

Igor Livshitz, Senior Director of Product Management, Guardicore

 

Let’s be real. True to its name, there is zero trust about the term “zero trust.” It’s been used as marketecture since its inception. Cut through the fog with this presentation with practical insight and steps to take to ensure your organization makes the most out of ZTA.

 


Livshitz


11:30am-12:30pm: Data Protection from an IT Legal Perspective

 

Mark Guth, Manager, Corporate Security Critical Infrastructure Protection Compliance, Southern Company Gas

 

 


Guth


12:30pm – 1:30pm Lunch Break


1:30pm-2:30pm: Security Risk Vendor Management- A CISO’s Perspective

 

James Mountain, CISO, Palmer College

 

 


Mountain


2:30pm – 3:00pm: Networking Break


3:00pm-4:00pm: Value of Investment – Balancing Data Corruption, Disaster Recovery, and Cost

 

Annur Sumar, CTO, Maetech

 

For decades, enterprises have worked to get their Recovery Point from days, to hours, to seconds. Today, ransomware and data corruption are challenging and forcing enterprises to develop new but often counter-intuitive approaches to business continuity. In this session, attendees will learn best practices for balancing data corruption, disaster recovery, and cost.

 

 


Sumar


4:00pm-5:00pm: Breaches & Ransomware: How to Handle, How to Respond (Panel Discussion)

 

Moderator:
Mark Sangster, Author and Industry Security Strategist, eSentire, Inc.
Panelists:
Dr. Fred Kwong, CISO, Delta Dental of Illinois
Jesse Miller, CISO, Stratosphere Networks
Dave Gochenaur, Senior Director, CyberSecurity, Ensono
Jim Desmond, CSO, Asurion
and other CISOs sharing experiences and lessons learned

 

 

                  
Kwong      Miller        Gochenaur   Desmond   Sangster

 


Conference Price: $0.00 per person

 

Each attendee will receive a certificate awarding 7 CPE credits for CISSP continuing education, in addition to 0.7 CEUs and 7 PDUs. CISSP is a registered certification mark of (ISC)², Inc.

 

Exhibits

As is always the case at CAMP IT Conferences events, the talks will not include product presentations.  During the breaks you will have the opportunity to informally meet representatives from the following sponsoring companies, who have solutions in the area of the conference.


[/vc_column_text][/vc_column][/vc_row][vc_row row_type=”row” use_row_as_full_screen_section=”no” type=”grid” text_align=”left” box_shadow_on_row=”no” css=””][vc_column css=”.vc_custom_1617646715275{padding-top: 50px !important;padding-bottom: 50px !important;}”][vc_column_text]

CONFERENCE CO-SPONSORS

[/vc_column_text][/vc_column][/vc_row][vc_section][vc_row row_type=”row” use_row_as_full_screen_section=”no” type=”grid” text_align=”left” box_shadow_on_row=”no”][vc_column width=”1/2″][vc_single_image image=”353541″ img_size=”full” alignment=”center” onclick=”custom_link” img_link_target=”_blank” link=”http://www.esentire.com”][/vc_column][vc_column width=”1/2″][vc_single_image image=”352775″ img_size=”full” alignment=”center” onclick=”custom_link” img_link_target=”_blank” link=”http://www.guardicore.com”][/vc_column][/vc_row][/vc_section][vc_row row_type=”row” use_row_as_full_screen_section=”no” type=”full_width” text_align=”left” box_shadow_on_row=”no”][vc_column][vc_empty_space image_repeat=”no-repeat”][/vc_column][/vc_row]