UPCOMING EVENTS

Enterprise Risk / Security Management: Chicago (Rosemont/O’Hare), Illinois

 

Strategies for reducing risk to the enterprise.

 

May 7, 2024

 

9:00am-5:00pm

 

7 CPE / 0.7 CEU / CISSP / 7 PDU Credits Awarded

 

Conference location: Donald E. Stephens Convention Center Rosemont (O’Hare) Illinois

  


Overview

 

In today’s highly regulatory environment it is essential that you have a clear understanding of risk across the enterprise. A risk management framework can bring visibility to key business and compliance risks and enable a company to make decisions on where to prioritize its limited resources. It is through a risk management framework that real value to the business can be achieved.

 

With all of these challenges, how do you make this happen?

 

In this one day conference, attendees will be provided with examples of approaches to managing information and compliance risk through a risk management framework.


What You Will Learn

 

In this one day conference we’ll cover:

  • 2023 Cyber Threat Landscape: Insights and Predictions for 2024
  • How Security and the CSO Can Build Trust with the Business (Panel Discussion)
  • Mitigating Internal Risks: How to Build an Effective Insider Risk Program
  • GenAI – Risks and Opportunities
  • Driving a Culture of Security Consciousness in Your Organization (Panel Discussion)
  • Outcome Driven Metrics for Advancing Cybersecurity Maturity

Conference Price: $299.00 per person

 

Each attendee will receive a certificate awarding 7 CPE credits for CISSP continuing education, in addition to 0.7 CEUs and 7 PDUs. CISSP is a registered certification mark of (ISC)², Inc.


CONFERENCE AGENDA


8:00am – 9:00am: Registration and Continental Breakfast


9:00am – 10:00am: 2023 Cyber Threat Landscape: Insights and Predictions for 2024

 

Dylan Davis, Sr. Manager, Strategic Intelligence, Insikt, Recorded Future

 

Join us for an insightful presentation based on Insikt Group’s 2023 Annual Report, where we unveil critical cyber threat dynamics over the past year and offer forward-looking predictions into 2024. Discover how cybercriminals exploited the interconnectedness of enterprise software to launch unprecedented attacks, like the MOVEit exploit, which marked a significant shift in the threat landscape. We’ll delve into the evolving use of generative AI by cyber threat actors, highlighting its impact on phishing and information operations. This session is a must-attend for those looking to understand the convergence of cybercrime with geopolitical instability.

 

 

Davis

 


10:00am – 10:30am: Refreshment & Exhibit Break


10:30am – 11:30am: Outcome Driven Metrics for Advancing Cybersecurity Maturity

 

Takeaways from this session include learn practical metrics that you can leverage to help your organizations better align with business needs.

 

The goal is to become a trusted business partner rather than just a separate security unit.

 


11:30am – 12:30pm:  GenAI – Risks and Opportunities

 

GenAI poses both great opportunities for enterprise advancement as well as known and unknown risks.

 

Here, we learn how to balance the benefits and risks based on the current states of affairs.

 


12:30pm – 1:30pm: Lunch and Exhibit Break


1:30pm – 2:30pm:   How Security and the CSO Can Build Trust with the Business (Panel Discussion)

 

This hour, attendees will learn from a panel of IT security executives as to the strategies they are leveraging to ensure their efforts are in sync with business priorities.

 

Topics covered:

  • How to leverage areas of value (reputation, regulation, revenue, resilience, and recession) for continued investment and security spending
  • How to assess, understand, and define security’s current and future roles in the extended enterprise
  • Where are security investments being made on personnel, processes, and technologies?

 

Moderated by Michael Corvo, RSD, Pentera

 

Panelists will include: 

  • Jay Patel, CISO, Harris Associates
  • Lori Kevin, Vice President, Enterprise IT & Security, Intelligent Medical Objects
  • Michael Babischkin, Vice-President – Deputy Director of Information Security, Federal Home Loan Bank of Chicago
  • Nitin Raina, Global CISO and Global Head of Enterprise Risk, Thoughtworks
  • Other CISOs/Information Security Executives sharing strategies, tactics and lessons learned

 

 

  

        Corvo                Patel                    Kevin               Babischkin              Raina               Zochalski

 


3:00pm – 4:00pm: Mitigating Internal Risks: How to Build an Effective Insider Risk Program

 

One of the biggest risks are our internal users.

 

This hour, we’ll discuss processes, tool and technologies to help you build an effective insider risk program.

 


4:00pm – 5:00pm: Driving a Culture of Security Consciousness in Your Organization (Panel Discussion)

 

The human firewall is the most frequent contributor to data breaches. Legacy approaches no longer effective. CIOs and CISOs must look beyond merely raising ‘security awareness’ and embed an overarching security culture in their organization.

 

Learn from CISOs and Information Security Executives as they share how they continue to build and deliver an effective security behavior and culture change program.

 

Panelists will include:

  • Ryan Devlin, Director, IT Cloud Security, CNA
  • Juliet DeVries, Director, IT Security and Compliance. GTreasury
  • Other CISOs/Information Security Executives sharing strategies, tactics and lessons learned.

 

 

Devlin                             DeVries

 


Conference Price: $299.00 per person

 

Each attendee will receive a certificate awarding 7 CPE credits for CISSP continuing education, in addition to 0.7 CEUs and 7 PDUs. CISSP is a registered certification mark of (ISC)², Inc.

 

Exhibits

As is always the case at CAMP IT Conferences events, the talks will not include product presentations. During the continental breakfast, coffee breaks, and the luncheon break you will have the opportunity to informally meet representatives from the following sponsoring companies, who have solutions in the area of the conference.


CONFERENCE SPONSORS