At our largest Chicago event to date, attendees will gain practical, real-world knowledge to strengthen their organization’s security posture today and well into the future.”
Chicago (PRWEB) October 23, 2014
SC Congress Chicago, the premier cybersecurity event produced by SC Magazine, announced today that the third annual conference will take place on Nov. 18 at Revel (Fulton Market). Due to an increased demand from vendors and attendees, the highly regarded industry gathering is moving to a dynamic new location.
“In just three years, we have seen SC Congress Chicago expand to become one of the premier cybersecurity events in the Midwest,” said Illena Armstrong, VP of editorial at SC Magazine. “To accommodate the increasing demand for better education and awareness of today’s most pressing security challenges, we are moving SC Congress Chicago to a new and larger venue. At the larger event, attendees will gain practical, real-world knowledge to strengthen their organization’s security posture today and well into the future.”
There is an increasing enterprise risk today from the evolving nature of cybersecurity threats and the sheer number of actors targeting organizations. SC Congress Chicago will bring valuable insight and innovative solutions for securing the Internet of Things, staying ahead of tomorrow’s threats, incident response preparedness and how to tackle identity and access management with a mobile workforce.
Keynote sessions at 2014 SC Congress Chicago include:
Bracing For the Internet of Things
Adoption of the “Internet of Things” will skyrocket throughout 2015. As with all such disruptive technologies, the question is: “Are we ready for it?” Many IT security professionals would argue that we are not. Multiple proof-of-concept attacks have already been performed, including those that targeted home appliances. This keynote session will discuss how the Internet of Things will affect organizations and, more importantly, what security professionals can do to fortify it.
Mike Zachman, CISO, Caterpillar
Lance James, head of cyber intelligence, Deloitte & Touche
BadUSB & Beyond: Threats Hiding Inside the Enterprise
BadUSB has opened eyes around the world to the risks of unprotected, user updatable devices. This keynote will demonstrate the impact of thumb drives with modified firmware and discuss the implications for the enterprise environment.
Adam Caudill, independent security researcher
Brandon Wilson, independent security researcher
Other highly anticipated sessions include:
Security Awareness, Social Media and your Employees
With National Cyber Security Awareness month coming and going in October, the question becomes, how do you use that momentum for your organization. Social media attacks and phishing are among the different risks organizations face on a daily basis. So how can you use the latest in security awareness tools and gimmicks to keep your employees vigilant?
Shadrack Roberts, CISO, global risk and compliance, chief privacy official, Army Sustainment Command
While many are focused on the latest “threat of the hour,” in order to stay ahead of tomorrow’s emerging threats this session will instead help IT security professionals focus on what is likely to come. This panel of experts will share what concerns them right now and what they are preparing for – so attendees can also prepare.
Erik Hart, VP, director, information security and infrastructures solutions, The Leo Burnett Group/Arc Worldwide
Michael Eisenberg, VP, global chief information security officer, Aon
Identity and Access Management Redux
Identity and access management is an issue that many IT security professionals thought they solved long ago with technology and policies. Yet, it is once again rearing its ugly head across enterprises. The growing need for consultants, vendors and customers to have access to an organization’s network resources is greatly increasing the number of remote users. With devices of all types and varieties connecting to the network, identity and access management has once again become a major challenge. This session will provide attendees with the knowledge and skills for securing their IdM policies and protecting their networks.
Jim O'Conner, CISO, Cargill
Incident Response: A Reality Check
Given the state of cybersecurity threats and the sheer number of actors targeting organizations today, odds are high that your organization will need to execute an incident response plan at some point. This session will leverage the knowledge and expertise of professionals with extensive experience creating and executing incident response plans to help attendees improve their readiness when such an event occurs.
Ricardo Lafosse, CISO, Cook County Government
Jacob Springer, division counsel, global privacy office, Abbott Laboratories
To register for SC Congress Chicago, view the agenda and see a full list of regularly updated speakers, media partners and sponsors visit: http://congress.scmagazine.com/.
About SC Magazine
SC Magazine provides IT security professionals with in-depth and unbiased information through timely news, comprehensive analysis, cutting-edge features, contributions from thought leaders and the best, most extensive collection of product reviews in the business. By offering a consolidated view of IT security through independent product tests and well-researched editorial content that provides the contextual backdrop for how these IT security tools will address larger demands put on businesses today, SC Magazine enables IT security pros to make the right security decisions for their companies. The brand’s portfolio includes the SC Congress (and Expo) Series (New York, Chicago, Toronto, London), SC Magazine Awards, SC Directory, SC Magazine Newswire and SC Magazine IT Security Executives Forums
Fan us on Facebook: http://www.facebook.com/SCMag
Follow us on Twitter: http://twitter.com/scmagazine
Join us on LinkedIn: http://www.linkedin.com/groups?gid=4006984&trk=my_groups-b-grp-v