UPCOMING EVENTS
Data Breaches: Defense and Response: Chicago (Rosemont/O’Hare), Illinois
Strategies to help your organization prepare for, defend against and respond to breaches.
December 3, 2025
9:00am-5:00pm
7 CPE / 0.7 CEU / CISSP / 7 PDU Credits Awarded
Conference location: Donald E. Stephens Convention Center Rosemont (O’Hare) Illinois
Overview
It is not a matter of if, but when your organization will be breached. Against these threats, enterprises try to build higher and more secure walls around their data and networks. This seems to be a never-ending arms race, as even the most sophisticated systems may, before long, present weaknesses that malicious technology can overcome.
What You Will Learn
In this one day conference attendees will learn:
- How to Build an Effective Threat Investigation and Eradication Capability
- The Threat Landscape for Enterprises
- How to Bake Application Security into Your Application Development Environment (Panel Discussion)
- Value of Investment – Balancing Data Corruption, Disaster Recovery, and Cost
- Improving Security and Governance through Cloud Management
- CyberThreats – How CISOs are Responding to Current & Emerging Security Risks (Panel Discussion)
- Breaches & Ransomware: How to Handle, How to Respond (Panel Discussion)
CONFERENCE AGENDA
8:00am – 9:00am: Registration and Continental Breakfast
9:00am – 9:50am
The Evolving Threat Landscape – Lessons from the Latest Breaches
Nick Schloemer, Cybersecurity Solutions Architect & Leader, WWT
A comprehensive look at recent breach trends and attacker methodologies. Learn what’s changed in 2025 and how organizations can stay ahead of emerging threats.
Areas that will be covered:
- Top breach trends and threat actors
- Shifts in ransomware tactics and extortion models
- Practical intelligence for proactive defense

Schloemer
9:50am – 10:20am Refreshment & Exhibit Break
10:20am – 11:10am: Zero Trust in Action: Reducing Breach Impact Through Identity and Access Control
Zero Trust is no longer optional — it’s essential for containing breaches before they spread. This session explores real-world implementations that prevented credential misuse and lateral movement.
Areas that will be covered:
- How to implement Zero Trust principles pragmatically
- Integration of identity, endpoint, and network controls
- Case studies of successful Zero Trust deployments
11:10am – 12:00pm: Detect Fast, Respond Faster – Building an Effective Incident Response Program
12:00pm – 12:50pm: Data Exfiltration and Forensics: Finding the ‘How’ and ‘What’ After a Breach
When data leaves your network, understanding what happened is critical. Learn best practices for digital forensics, breach investigation, and data recovery.
Areas that will be covered:
- Tools and techniques for post-breach forensics
- Preserving evidence for legal and compliance requirements
- Lessons learned from real-world breach investigations
12:50pm – 1:30pm: Lunch & Exhibit Break
1:30pm – 2:20pm: Managing the Fallout: Legal, Regulatory, and PR Considerations
After a breach, technical response is only part of the challenge. This session outlines how to navigate notification requirements, regulatory obligations, and public relations risks.
Areas that will be covered:
- Compliance with data privacy laws (GDPR, CCPA, SEC, etc.)
- Managing communications with stakeholders and customers
- Working with outside counsel and law enforcement
2:20pm – 2:50pm: Refreshment & Exhibit Break
2:50pm – 3:40pm: Resilience by Design – Security Architecture for Breach Containment
Preventing every attack is impossible, but limiting the blast radius is achievable. This session focuses on designing resilient systems that maintain operations even when compromised.
Areas that will be covered:
- Network segmentation, microservices isolation, and secure enclaves
- Backup and recovery strategies to ensure business continuity
- Architecting for detection, response, and recovery
3:40pm – 4:30pm: Manage Cyber Risk from a Business Perspective: Principles for an Effective Strategy
In the modern digital economy, cyber risk has become a core business concern rather than a purely technical issue. Organizations must adopt a strategic approach that embeds cybersecurity into governance, operations, and culture to safeguard value and ensure resilience. This panel explores practical principles for developing an effective cyber risk strategy—one that aligns security priorities with business objectives, strengthens accountability, and drives sustainable trust in an increasingly connected world.
Key Discussion Points
-
Cyber Risk as Business Risk:
Treat cybersecurity as a strategic business enabler and integrate it into enterprise risk management. -
Governance and Accountability:
Establish clear leadership roles and board-level oversight to ensure responsibility and informed decision-making. -
Strategic Alignment:
Link cyber risk priorities directly to business goals and critical assets to optimize investment and impact. -
Culture and Awareness:
Foster an organizational culture where every employee understands and contributes to cyber resilience. -
Adaptive Resilience:
Build flexible strategies to anticipate, withstand, and recover from evolving digital threats.
Moderator: Ricardo Reati, General Manager, SpearTip
Panelists will include:
- CISOs and Information Security Executives, sharing strategies, tactics and lessons learned

Reati
Conference Price: $349.00 per person
Each attendee will receive a certificate awarding 7 CPE credits for CISSP continuing education, in addition to 0.7 CEUs and 7 PDUs. CISSP is a registered certification mark of (ISC)², Inc.
Exhibits
As is always the case at CAMP IT Conferences events, the talks will not include product presentations. During the continental breakfast, coffee breaks, and the luncheon break you will have the opportunity to informally meet representatives from the following sponsoring companies, who have solutions in the area of the conference.