PAST EVENTS
Enterprise Risk / Security Management: Chicago (Rosemont/O’Hare), Illinois
Strategies for reducing risk to the enterprise.
May 18, 2022
9:00am-4:00pm
7 CPE / 0.7 CEU / CISSP / 7 PDU Credits Awarded
Conference location: Donald E. Stephens Convention Center Rosemont (O’Hare) Illinois
Overview
In today’s highly regulatory environment it is essential that you have a clear understanding of risk across the enterprise. A risk management framework can bring visibility to key business and compliance risks and enable a company to make decisions on where to prioritize its limited resources. It is through a risk management framework that real value to the business can be achieved.
With all of these challenges, how do you make this happen?
In this one day conference, attendees will be provided with examples of approaches to managing information and compliance risk through a risk management framework.
What You Will Learn
In this one day conference attendees will learn:
- Keeping Up with the Latest Security and Risk Management Trends
- Achieving Governance and Security through Cloud Management
- The Cybersecurity Department: Making Cybersecurity a Business Competency Through Key Risk Indicators
- How to Ensure Your Suppliers are Meeting Your Security Requirements
- Securing Your Cloud in the Age of Hybrid Workplaces
- How CISOs are Building Successful Cyber Security Teams
Conference Price: $299.00 per person
Each attendee will receive a certificate awarding 7 CPE credits for CISSP continuing education, in addition to 0.7 CEUs and 7 PDUs. CISSP is a registered certification mark of (ISC)², Inc.
Conference Program
9:00am-10:00am: Reducing Your Risk: Understanding the Data Security Laws and Applying a Reasonable Security Program
Fireside Chat with John Bates, Manager, Cybersecurity (Cyber Strategy, Assessment & Compliance), EY
Bates
10:00am-10:30am: Refreshment Break
10:30am-11:30am: How are You Defining Risk in the Enterprise? (Breakout Session)
In this session, attendees will go discuss the different elements of IT Security Risk Management, including:
- How to Evaluate New Technologies from a Risk Perspective
- What KPI’s Do You Use to Evaluate Risk
- How Do You Articulate Risk in Business Terms?
- How Do You Articulate Risk in IT Terms?
11:30am-12:30pm: Reducing Risk – Ransomware Prevention “Not Another Backup Pitch”
James Mountain, Director of Information Security, Palmer College of Chiropractic
Mountain
12:30pm-1:30pm: Lunch Break
1:30pm-2:30pm: Security as an Accelerator
Saad Mirza, Sr. Dir. of Solutions Architecture, Aviatrix
Every CISO or CIO has tasked their architects to secure the ever-growing cloud footprint. With so many different tools and options to choose from, the lack of a prescriptive approach can result in both wasted time and resources. The net effect is that cloud adoption is slowed by security, when in fact, the right approach to security will accelerate cloud adoption.
In this TechTalk, you will hear from Aviatrix Architects on the seven fundamentals of how to transform your cloud security model from a gatekeeper to an accelerator.
Highlights include:
- Accelerating operations with end-to-end visibility
- Achieving line rate encryption throughout the data plane
- The benefits of a uniform security model
- Dealing with ransomware, bit mining, and data exfiltration at scale
Join us as we cover the fundamentals of secure cloud networking!
Mirza
2:30pm-3:00pm: Refreshment Break
3:00pm-4:00pm: How CISOs are Building Successful Cyber Security Teams (Panel Discussion)
In this session, CISOs will share how they build culture, drive effective cross-team communication, leverage non-traditional hiring practices and programs to find extraordinary talent from across generations, geographies and genders.
Moderator:
Mike Skurko, Founder and Principal Consultant, PRE Consulting Inc.
Panelists include:
- Victor Hsiang, CISO, GATX
- Patrick Kinard, Senior Server Enterprise Operations Manager, CPS
- James Mountain, Director of Information Security, Palmer College of Chiropractic
- Richard Rushing, CISO, Motorola
- Tim Walter, Global Chief Information Officer/SVP/CISO, Randa Apparel and Accessories
Skurko Hsiang Mountain Kinard Rushing Walter
Exhibits
As is always the case at CAMP IT Conferences events, the talks will not include product presentations. During the continental breakfast, coffee breaks, and the luncheon break you will have the opportunity to informally meet representatives from the following sponsoring companies, who have solutions in the area of the conference.
CONFERENCE SPONSORS
[/vc_column_text][/vc_column][/vc_row][vc_row row_type=”row” use_row_as_full_screen_section=”no” type=”full_width” text_align=”left” box_shadow_on_row=”no”][vc_column][vc_empty_space height=”64px” image_repeat=”no-repeat”][/vc_column][/vc_row][vc_row row_type=”row” use_row_as_full_screen_section=”no” type=”grid” text_align=”left” box_shadow_on_row=”no”][vc_column width=”1/2″][vc_single_image image=”361053″ img_size=”medium” alignment=”center” onclick=”custom_link” img_link_target=”_blank” link=”https://abnormalsecurity.com/”][/vc_column][vc_column width=”1/2″][vc_single_image image=”361087″ img_size=”full” alignment=”center” onclick=”custom_link” img_link_target=”_blank” link=”https://aviatrix.com/”][/vc_column][/vc_row][vc_row row_type=”row” use_row_as_full_screen_section=”no” type=”full_width” text_align=”left” box_shadow_on_row=”no”][vc_column][vc_empty_space height=”64px” image_repeat=”no-repeat”][/vc_column][/vc_row][vc_row row_type=”row” use_row_as_full_screen_section=”no” type=”grid” text_align=”left” box_shadow_on_row=”no”][vc_column][vc_single_image image=”361202″ img_size=”medium” alignment=”center” onclick=”custom_link” img_link_target=”_blank” link=”http://hoxhunt.com”][/vc_column][/vc_row][vc_row row_type=”row” use_row_as_full_screen_section=”no” type=”full_width” text_align=”left” box_shadow_on_row=”no”][vc_column][vc_empty_space height=”64px” image_repeat=”no-repeat”][/vc_column][/vc_row]