2018 Annual Information Technology Security Conference

2018 Annual Information Technology Security Conference

Sheraton Harrisburg-Hershey
4650 Lindle Road | Harrisburg, PA 17111
Thursday, May 17, 2018 | 8:30 am to 3 pm
(Registration begins at 8 am)

Member Price: $350 | Non-Member Price: $400

Register to attend

Online registration for this event is not yet available.


View Agenda

Sponsor | Exhibit

Information on pricing, promotional benefits and registration.

Learn More

Event Description

Data breaches and malicious attacks from both external and internal sources continue to be the highest priority for IT professionals…and top management.

IT professionals know that only half the battle is having the right equipment in place.  The other half is understanding what’s going on around you.  The challenge is staying out front on what’s coming from bad guys that are ever-evolving their attacks to be more sophisticated and advanced. 

That’s where we come in—bringing informed and dynamic experts that will help explain what’s happening out there and provide the skill set and knowledge to defend your company.  The Pennsylvania Chamber’s 2018 Annual Information Technology Security Conference will cover the most significant and wide-spread threats facing IT today, with real-world examples and solutions illustrating steps and precautions to keep you on top of current and emerging threats.

What You’ll Learn

  • Five Best Practices to Combat the Insider Threat—CERT’s team assists organizations in improving their security posture and incident response capability by researching technical threat areas, developing and conducting information security assessments, and helping companies detect and prevent illicit activity. They will present the latest data concerning insider threats, and real-world case studies of companies that have been attacked by insiders, and the five best practices that companies should take to prevent the problem.
  • Global IT Security Threats and How Businesses Should Prepare—no system has 100 percent foolproof defense, yet the threats are ever-present and growing.  We’ve invited the vice president of security for Unisys to describe the current global IT threat landscape, identifying threats and the risks, and the potential for large scale and systemic disruptions and current and next generation protection mechanisms.
  • Using the FFIEC Cyber Security Assessment Tool to Determine Your Regulatory Compliance—using this tool as a baseline template, organizations can build their information security capability around a single framework that encapsulates the requirements called out in numerous laws and regulations regarding IT and electronic device processes. 
  • Ransomware Mitgation:  Going Through It Step-by-Step—this interactive session presents a hypothetical ransomware scenario, and leads participants through the simulated attack and mitigation step-by-step, highlighting the legal implications and considerations at every stage of the process.  We will also cover details on how to manage a data breach in which information is being held for ransom or has been stolen, and proactive safeguards.

Event Highlight

Insights From the 2018 Verizon Data Breach Investigations Report

The straight story on what is really occurring out there.  Presenting an early look at what many consider cyber security’s most comprehensive investigations report, the Verizon Data Breach Investigations Report.  For 2017, the report was based on analysis of over 40,000 incidents, including 1,935 confirmed data breaches and the collective experience of 65 organizations. Of these, 61 percent of data breach victims were businesses with under 1,000 employees; 88 percent of breaches fell into nine patterns; and 95 percent of phishing attacks that led to a breach were followed by some sort of software installation.  The report included a breakdown of breaches by attack classifications and types of industry, as well as in-depth analysis of these security incidents.  It also featured incidents affecting organizations in numerous countries and across a myriad of industries.  No system is 100% secure, but understanding specifics on the threats you face will help you improve your security.

Continuing Education Credits

Certification group type of credits No. of credits
Pennsylvania State Board of Accountancy CPEs(PX177225) - Group Study 5
Continuing Legal Education Board CLEs 5
(ISC)2 Americas Continuing Professional Education (CPE) 5

Event Venue

Sheraton Harrisburg-Hershey

Physical Address: 4650 Lindle Road | Harrisburg, PA 17111

Visit Venue Website

The Sheraton has blocked rooms at a special rate of $155 for conference attendees.  Call 800.325.3535 to make your overnight room reservations, and advise the booking agent that you are attending the PA Chamber’s Conference and that you get the preferred rate.  The Sheraton’s regular phone number is 717.564.551.  You can also book your overnight room reservation on-line by simply going to the Sheraton’s website at  Put in your desired dates of stay and click Search.  Then, scroll down to where it asks for Corporate Account Holders.  Enter the PA Chamber’s SET Code of 388117 and click Search.  Now you should see the PA Chamber Preferred rate of $155.  Then just click on the room type desired and continue with the reservation as normal. 

View Map and Directions