Conferences that solve current IT challenges

Enterprise Risk / Security Management

Strategies for reducing risk to the enterprise.

October 4, 2017


7 CPE / 0.7 CEU / CISSP / 7 PDU Credits Awarded


Conference location: Donald E. Stephens Convention Center Rosemont (O'Hare) Illinois


In today’s highly regulatory environment it is essential that you have a clear understanding of risk across the enterprise. A risk management framework can bring visibility to key business and compliance risks and enable a company to make decisions on where to prioritize its limited resources. It is through a risk management framework that real value to the business can be achieved.

With all of these challenges, how do you make this happen?

In this one day conference, attendees will be provided with examples of approaches to managing information and compliance risk through a risk management framework.

What You Will Learn

In this one day conference attendees will learn:

  • Technology and Disruptive Forces: A CISO's View on Future Risks to Your Organization
  • Defining Acceptable Risk in an Age of Evolving Threats
  • Data & Security Analytics: Can We Predict the Next Attack?
  • The Disconnect - IoT vs Security
  • Risk Mitigation: How to Plan for DDoS Attacks, Detection and Mitigation
  • Ransomware
  • Vendor Risk Management: How to Identify and Decrease Potential Risks When Leveraging 3rd Party Vendors (panel discussion)
  • How Security and the CSO Can Provide Business Value (panel discussion)

Conference Program

8:00am - 9:00am - Registration and Continental Breakfast



Technology and Disruptive Forces: A CISO's View on Future Risks to Your Organization

Fred Kwong, CISO, Delta Dental

What are the current risks? What are the future risks? How do we prepare for the unknowns or can we?

In this session, Fred Kwong will share his view on the disruptions taking place, the future impact on your enterprise and what you should do now to prepare for the future risks.

10:00am -10:30am - Refreshment Break



AI For Good: Moving Beyond Legacy Security

Richard Melick, Sr. Security Technologist, Cylance 

Supporting enterprises in complex and diverse environments requires technologically sophisticated security solutions to combat zero-day threats. Endpoint security providers sell legacy technology in layered formats, focusing on the reactive, as the only solution. Artificial intelligence can secure a system against unknown threats in addition to threats that may hide their malicious behavior while under scrutiny.



Data & Security Analytics: Can We Predict the Next Attack?

Laura Vetter, Chief Technologist

The goal of security analytics is to detect attacks as quickly as possible, enable security leadership to block or stop an attack and provide detailed information to reconstruct an attack so that we learn how to predict or prevent the next attack.

In this session, attendees will learn:

  • Best practices for leveraging security analytics
  • How to read the data and learn from what is presented

12:30pm - 1:30pm Luncheon




Rob Terlizzi, Director, Solutions Architecture, Reduxio

2:30pm - 3:00pm - Refreshment Break







Vendor Risk Management: How to Identify and Decrease Potential Risks When Leveraging 3rd Party Vendors (panel discussion)

Byron Rashed, Global VP, Marketing, InfoArmor
Robert M. Duplessis, Senior Vice President / Information Security Officer, Old Second National Bank
Fawaz Rasheed, Chief Information Security Officer and Vice President, Trustmark Companies
Mark Guth, Manager Corporate Security Critical Infrastructure Protection Compliance, Southern Company Gas
James Mountain, Director of Information Security, Information Technology, Palmer College
and other professionals from IT departments

Topics that will be covered include:

  • Contract outlining the business relationship between your organization and 3rd party vendor
  • How to monitor vendor performance to ensure that contractual obligations are being met
  • Guidelines regarding which party will have access to what information as part of the agreement
  • How to ensure that 3rd party vendors meet regulatory compliance guidelines for your industry







How Security and the CSO Can Provide Business Value (panel discussion)

Tim Dillon, Regional Director of Sales, Proofpoint
Erik Devine, Chief Information Security Officer, Riverside Healthcare
Brent Maher, CISSP, Senior Vice President – Chief Information Security Officer (CISO), Johnson Financial Group
Jenny Inserro, Senior Director, Information Security Governance, Risk & Compliance, Health Care Service Corporation
Jerry Pittman, Chief Information Security Officer, Tenneco
and other professionals from IT departments

In this session, attendees will learn from a panel of IT security executives as to the strategies they are leveraging to insure their efforts are in sync with business priorities.

Topics covered:

  • How to identify leverage the following areas of value: reputation, regulation, revenue, resilience, and recession for continued investment and security spending
  • How to assess, understand and define security’s current and future roles in the extended enterprise
  • Where are security investments being made on personnel, processes, and technologies

Conference price: $289 per person.

Each attendee will receive a certificate awarding 7 CPE credits for CISSP continuing education, in addition to 0.7 CEUs and 7 PDUs. CISSP is a registered certification mark of (ISC)˛, Inc.


As is always the case at CAMP IT Conferences events, the talks will not include product presentations.  During the continental breakfast, coffee breaks, and the luncheon break you will have the opportunity to informally meet representatives from the following sponsoring companies, who have solutions in the area of the conference.