Skip to content

UPCOMING EVENTS


Enterprise Risk / Security Management: Chicago (Rosemont/O’Hare), Illinois

Strategies for reducing risk to the enterprise.

May 28, 2026

9:00am-5:00pm

7 CPE / 0.7 CEU / CISSP / 7 PDU Credits Awarded

Conference location: Donald E. Stephens Convention Center Rosemont (O’Hare) Illinois

  

 


Overview

In today’s highly regulatory environment it is essential that you have a clear understanding of risk across the enterprise. A risk management framework can bring visibility to key business and compliance risks and enable a company to make decisions on where to prioritize its limited resources. It is through a risk management framework that real value to the business can be achieved.

With all of these challenges, how do you make this happen?

In this one day conference, attendees will be provided with examples of approaches to managing information and compliance risk through a risk management framework.


What You Will Learn

In this one day conference attendees will learn:

  • Risk Mitigation Strategies – A CISO’s Guide
  • Learning from Risk Management and InfoSec Fails
  • Proactive Defense: Addressing Risks from External Threats
  • Balancing Risk and Innovation in a Cloud-First AI World
  • Adaptive Risk Management: Dealing with Punctuated Equilibrium in Cybersecurity
  • The Critical Nexus of Risk Management in Cybersecurity: A Gap in Professional Training
  • Balancing Cybersecurity Budgets with Business Needs (Panel Discussion)

Conference Price: $349.00 per person

Each attendee will receive a certificate awarding 7 CPE credits for CISSP continuing education, in addition to 0.7 CEUs and 7 PDUs. CISSP is a registered certification mark of (ISC)², Inc.


Exhibits

As is always the case at CAMP IT Conferences events, the talks will not include product presentations. During the continental breakfast, coffee breaks, and the luncheon break you will have the opportunity to informally meet representatives from the following sponsoring companies, who have solutions in the area of the conference.

 

Overview

In today’s highly regulatory environment it is essential that you have a clear understanding of risk across the enterprise. A risk management framework can bring visibility to key business and compliance risks and enable a company to make decisions on where to prioritize its limited resources. It is through a risk management framework that real value to the business can be achieved.

With all of these challenges, how do you make this happen?

In this one day conference, attendees will be provided with examples of approaches to managing information and compliance risk through a risk management framework.


What You Will Learn

In this one day conference attendees will learn:

  • Risk Mitigation Strategies – A CISO’s Guide
  • Learning from Risk Management and InfoSec Fails
  • Proactive Defense: Addressing Risks from External Threats
  • Balancing Risk and Innovation in a Cloud-First AI World
  • Adaptive Risk Management: Dealing with Punctuated Equilibrium in Cybersecurity
  • The Critical Nexus of Risk Management in Cybersecurity: A Gap in Professional Training
  • Balancing Cybersecurity Budgets with Business Needs (Panel Discussion)

Conference Price: $349.00 per person

Each attendee will receive a certificate awarding 7 CPE credits for CISSP continuing education, in addition to 0.7 CEUs and 7 PDUs. CISSP is a registered certification mark of (ISC)², Inc.


 

CONFERENCE AGENDA


8:00am – 9:00am: Registration and Continental Breakfast


9:00am – 10:00am: Seeing Risk Clearly: Making the Invisible Visible Across the Enterprise

Enterprise risk often exists in silos, limiting its value to leadership. This session focuses on how organizations create shared visibility into business, compliance, and security risks to support better decisions and prioritization.

Includes:

  • Breaking down risk silos across the organization
  • Translating risk into business-relevant language
  • Using risk visibility to guide resource allocation

10:00am – 10:30am: Sponsor & Refreshment Break


10:30am – 11:30am: Risk Decisions Under Constraint: Where to Act, Accept, or Transfer

Limited budgets, staffing, and time force difficult risk decisions. This session explores practical approaches to deciding when to mitigate, accept, transfer, or avoid risk — and how to defend those choices.

Includes:

  • Risk decision frameworks for constrained environments
  • Aligning actions with enterprise risk tolerance
  • Documenting and communicating accepted risk

11:30am – 12:30pm: When Controls Fail: Turning Incidents into Risk Intelligence

Incidents and near-misses are valuable sources of risk insight. This session examines how organizations extract meaningful lessons from security and compliance failures to strengthen future risk management efforts.

Includes:

  • Learning from incidents without assigning blame
  • Identifying systemic risk gaps
  • Feeding lessons learned back into risk frameworks

12:30pm – 1:30pm: Lunch and Exhibit Break


1:30pm – 2:30pm: External Risk Isn’t Static: Adapting to a Shifting Threat Environment

External threats, dependencies, and partners continuously change an organization’s risk profile. This session focuses on building adaptive approaches to managing third-party, supply chain, and threat-driven risk.

Includes:

  • Monitoring risk changes over time
  • Managing third-party and ecosystem exposure
  • Integrating threat intelligence into risk decisions

2:30pm – 3:00pm: Refreshment Break


3:00pm – 4:00pm: Managing Risk During Rapid Change: Cloud, AI, and Organizational Disruption

Periods of rapid transformation introduce uncertainty and new risk patterns. This session explores how adaptive risk management helps organizations remain resilient during cloud adoption, AI initiatives, and business change.

Includes:

  • Managing risk during cloud and AI adoption
  • Responding to sudden shifts in the threat landscape
  • Applying adaptive risk management principles

4:00pm – 5:00pm: Security Investment Panel: Aligning Risk, Budget, and Business Priorities

Panelists will include Enterprise Identity Executives sharing the strategies, tactics, and lessons learned.

Security and risk leaders must continuously justify investments in terms the business understands. This panel focuses on how organizations prioritize cybersecurity spending based on risk impact and business value.

Includes:

  • Risk-based budgeting and prioritization
  • Communicating security value to executives and boards
  • Addressing skills and training gaps in risk management
  • Audience Q&A

Exhibits

As is always the case at CAMP IT Conferences events, the talks will not include product presentations. During the continental breakfast, coffee breaks, and the luncheon break you will have the opportunity to informally meet representatives from the following sponsoring companies, who have solutions in the area of the conference.