Skip to content

UPCOMING EVENTS


Data Breaches: Defense and Response: Chicago (Rosemont/O’Hare), Illinois

Strategies to help your organization prepare for, defend against and respond to breaches.

December 10, 2026

9:00am-5:00pm

7 CPE / 0.7 CEU / CISSP / 7 PDU Credits Awarded

Conference location: Donald E. Stephens Convention Center Rosemont (O’Hare) Illinois

  


Overview

It is not a matter of if, but when your organization will be breached. Against these threats, enterprises try to build higher and more secure walls around their data and networks. This seems to be a never-ending arms race, as even the most sophisticated systems may, before long, present weaknesses that malicious technology can overcome.


What You Will Learn

In this one day conference attendees will learn:

  • How to Build an Effective Threat Investigation and Eradication Capability
  • The Threat Landscape for Enterprises
  • How to Bake Application Security into Your Application Development Environment (Panel Discussion)
  • Value of Investment – Balancing Data Corruption, Disaster Recovery, and Cost
  • Improving Security and Governance through Cloud Management
  • Cyber Threats – How CISOs are Responding to Current & Emerging Security Risks (Panel Discussion)
  • Breaches & Ransomware: How to Handle, How to Respond (Panel Discussion)

CONFERENCE AGENDA


8:00am – 9:00am: Registration and Continental Breakfast


9:00am – 10:00am: Understanding the Threat Landscape for Enterprises

Awareness is the first step toward prevention. This session explores the current and emerging threats enterprises face.

Includes:

  • Common attack vectors and breach scenarios
  • Threat actor motivations and methods
  • Prioritizing security focus areas

10:00am – 10:30am: Sponsor & Refreshment Break


10:30am – 11:30am: Building an Effective Threat Investigation and Eradication Capability

Detecting and eliminating threats quickly reduces impact. This session provides practical guidance for setting up robust investigation and response teams.

Includes:

  • Key processes and capabilities for threat detection
  • Coordinating cross-team eradication efforts
  • Lessons from high-profile incident responses

11:30am – 12:30pm: Value of Investment: Balancing Data Corruption, Disaster Recovery, and Cost

Security investments must balance risk, cost, and recovery capabilities. This session explores how organizations can prioritize resources effectively.

Includes:

  • Evaluating risk vs. investment tradeoffs
  • Planning DR strategies for maximum protection
  • Measuring ROI from security initiatives

12:30pm – 1:30pm: Lunch and Exhibit Break


1:30pm – 2:30pm: Improving Security and Governance through Cloud Management

Cloud environments introduce both opportunities and risks. This session focuses on leveraging cloud management to enhance security and governance.

Includes:

  • Cloud-native security controls and monitoring
  • Governance frameworks for multi-cloud environments
  • Mitigating cloud-specific breach risks

2:30pm – 3:00pm: Refreshment Break


3:00pm – 4:00pm: Panel: Baking Application Security into the Software Development Lifecycle

Securing applications early reduces vulnerabilities. This panel shares strategies for integrating security into development practices.

Includes:

  • DevSecOps and secure coding practices
  • Aligning developers and security teams
  • Real-world examples of proactive application security

4:00pm – 5:00pm: Panel: Cyber Threats, Breaches, and Ransomware – How CISOs Are Responding

Panelists will include Enterprise Identity Executives sharing the strategies, tactics, and lessons learned.

This interactive panel brings together CISOs and security leaders to discuss responses to current threats, breach handling, and ransomware recovery.

Includes:

  • Strategies for effective incident response
  • Coordinating cross-functional breach management
  • Lessons learned from recent security incidents

 


Conference Price: $349.00 per person

Each attendee will receive a certificate awarding 7 CPE credits for CISSP continuing education, in addition to 0.7 CEUs and 7 PDUs. CISSP is a registered certification mark of (ISC)², Inc.


Exhibits

As is always the case at CAMP IT Conferences events, the talks will not include product presentations. During the continental breakfast, coffee breaks, and the luncheon break you will have the opportunity to informally meet representatives from the following sponsoring companies, who have solutions in the area of the conference