[vc_row row_type=”row” use_row_as_full_screen_section=”no” type=”full_width” text_align=”left” background_image=”348335″ box_shadow_on_row=”no”][vc_column css=”.vc_custom_1509976289581{padding-top: 200px !important;padding-bottom: 199px !important;}”][vc_column_text]
PAST EVENTS
[/vc_column_text][/vc_column][/vc_row][vc_row row_type=”row” use_row_as_full_screen_section=”no” type=”grid” text_align=”left” box_shadow_on_row=”no”][vc_column][vc_column_text css=”.vc_custom_1590004229763{padding-top: 25px !important;padding-bottom: 25px !important;}”]Cloud Security Strategies
A framework for developing a robust cloud security strategy.
June 12, 2020
9:00am-5:00pm CST
7 CPE / 0.7 CEU / CISSP / 7 PDU Credits Awarded
Conference location: Online[/vc_column_text][/vc_column][/vc_row][vc_row row_type=”row” use_row_as_full_screen_section=”no” type=”grid” text_align=”left” box_shadow_on_row=”no”][vc_column width=”1/2″][vc_column_text][/vc_column_text][/vc_column][vc_column width=”1/2″][vc_column_text] [/vc_column_text][/vc_column][/vc_row][vc_row row_type=”row” use_row_as_full_screen_section=”no” type=”grid” text_align=”left” box_shadow_on_row=”no”][vc_column][vc_column_text css=”.vc_custom_1585586032336{padding-top: 25px !important;padding-bottom: 25px !important;}”]
Overview
Independent analysts show that through 2020, 95% of cloud security failures will be the fault of the end-user customer.
In this one day conference, attendees will learn tips, strategies and tactics for developing a robust cloud security strategy.
What You Will Learn
In this one day conference attendees will learn:
- Involve all key stakeholders
- Identify cloud vulnerabilities
- Prioritize data privacy
- Use a layered approach to data security
- Flag pitfalls in due diligence and ongoing governance
- Understand where lines of demarcation exist in the relationship with the cloud provider and customer
- Have a policy to enforce that all aspects of applications are deployed in a certain way
- Identify the top 3 risks for your cloud
- Spend your time on security controls that give you the best ROI
- Articulate the top three cloud configuration errors in language the business can understand
Conference Price: $0.00 per person
Each attendee will receive a certificate awarding 7 CPE credits for CISSP continuing education, in addition to 0.7 CEUs and 7 PDUs. CISSP is a registered certification mark of (ISC)², Inc.
[/vc_column_text][/vc_column][/vc_row][vc_row row_type=”row” use_row_as_full_screen_section=”no” type=”grid” text_align=”left” box_shadow_on_row=”no”][vc_column][vc_column_text css=”.vc_custom_1632325667254{padding-top: 25px !important;padding-bottom: 25px !important;}”]9:00am-9:50am: Building Blocks for a Cloud Native Security and DR Strategy
Annur Sumar, Chief Technology Officer, MaeTech
This session will explore the business challenges and issues related to security and management through various different standards and solutions. It will provide an analysis and architecture for incorporating different security schemes, techniques and protocols for cloud computing, with a focus on hybrid IaaS and PaaS systems and how to achieve security and governance for successful adoption.
Sumar
9:50am -10:20am: Refreshment Break
10:20am-11:10am: Farewell to the Old Guard
James Christiansen, Vice President, Cloud Security Transformation, Netskope
Until now, the information security industry has failed to deliver business empowering security solutions, which enable organizations to quickly and securely transform digitally. Security today is too complicated and draws from a 20-year-old playbook. It needs to be re-written and based on approaches that protect and empower the business.
In this session, we will:
Topics that will be covered include:
- Share how many of the Fortune 100 are redefining their cloud, network and data security programs
- Discuss the steps and architectures that are the key to transformation
- Reimagine your approach to enterprise security, building a new blueprint that can be used for years to come
Christiansen
11:10am-12:00pm: Managing Security Vulnerabilities: Enterprise to Cloud
Matt Johnson, Systems Engineer, Illumio
Managing vulnerabilities in any organization can be overwhelming. Enterprise environments add scale and diversity that overwhelm many IT security and operations organizations. Cloud adoption as well as and the increasing speed with which all organizations must deliver systems, applications, and features to both their internal and external customers, can make security seem unachievable.
In this session, attendees will learn how to:
- Manage assets successfully and analyze and prioritize vulnerabilities
- Determine which reports are most effective
- Mature your program and think differently about vulnerability management.
Johnson
12:00pm – 12:50pm: Protecting Sensitive Data in Your Cloud Data Warehouse
Doug Wick, VP Product & Marketing, ALTR
There is no wonder why organizations are turning to cloud data warehouses for advanced analytics and data visualizations. Solutions like Snowflake, Amazon Redshift, Google BigQuery, and more provide immediate value with secure and easy access to any data with near-infinite scalability. By enabling seamless consumption and collaboration of shared data across the enterprise, organizations can make better business decisions while saving valuable time and money.
In order to truly protect your data and prevent privacy and compliance exposures, organizations must journey all the way to the query level.
Wick
12:50pm – 1:50pm Luncheon
1:50pm-2:40pm: Cloud Watch Points- Security Stumbling Blocks to Watch Out For
Derek Milroy, Sr. Security Engineer, U.S. Cellular
In this session, Derek Milroy, at CAMP IT regular speaker will share his thoughts on the security stumbling blocks to be aware of when going through a Migration.
Milroy
2:40pm – 3:10pm: Refreshment Break
3:10pm-4:00pm: Cyber Security & AI: Protecting Against AI-Enhanced Malware
Nabil Zoldjalali, Director of Cloud Security, Darktrace
Among rapidly evolving technological advancements, the emergence of AI-enhanced malware is making cyber-attacks exponentially more dangerous and harder to identify. In the near future, we will begin to see supercharged, AI-powered cyber-attacks leveraged at scale. To protect against Offensive AI attacks, organizations are turning to defensive cyber AI, which can identify and neutralize emerging malicious activity, no matter when, or where, it strikes.
In this session, learn about:
- Paradigm shifts in the cyber landscape
- Advancements in offensive AI attack techniques
- Real-world examples of emerging threats that were stopped with Cyber AI
Zoldjalali
4:00pm-5:00pm: Cloud Security and Working from Home – How Security Leaders are Adjusting (Panel Discussion)
Panelists:
George Finney, Chief Security Officer, Southern Methodist University
and other professionals from IT departments sharing strategies, tactics and lessons learned
In this session, attendees learn how organizations are adapting and what new security controls they have to put in place.
Finney
Conference Price: $0.00 per person
Each attendee will receive a certificate awarding 7 CPE credits for CISSP continuing education, in addition to 0.7 CEUs and 7 PDUs. CISSP is a registered certification mark of (ISC)², Inc.
Exhibits
As is always the case at CAMP IT Conferences events, the talks will not include product presentations. During the breaks, you will have the opportunity to informally meet representatives from the following sponsoring companies, who have solutions in the area of the conference.
[/vc_column_text][/vc_column][/vc_row][vc_section][vc_row row_type=”row” use_row_as_full_screen_section=”no” type=”full_width” text_align=”left” box_shadow_on_row=”no” css=””][vc_column][vc_column_text]
CONFERENCE CO-SPONSORS
[/vc_column_text][vc_empty_space image_repeat=”no-repeat”][/vc_column][/vc_row][vc_row row_type=”row” use_row_as_full_screen_section=”no” type=”grid” text_align=”left” box_shadow_on_row=”no”][vc_column width=”1/3″][vc_single_image image=”355015″ img_size=”full” alignment=”center” onclick=”custom_link” img_link_target=”_blank” link=”http://www.altr.com”][/vc_column][vc_column width=”1/3″][vc_single_image image=”354874″ img_size=”full” alignment=”center” onclick=”custom_link” img_link_target=”_blank” link=”http://www.darktrace.com”][/vc_column][vc_column width=”1/3″][vc_single_image image=”351451″ img_size=”full” alignment=”center” onclick=”custom_link” img_link_target=”_blank” link=”http://www.illumio.com”][/vc_column][/vc_row][vc_row row_type=”row” use_row_as_full_screen_section=”no” type=”full_width” text_align=”left” box_shadow_on_row=”no”][vc_column][vc_empty_space image_repeat=”no-repeat”][/vc_column][/vc_row][vc_row row_type=”row” use_row_as_full_screen_section=”no” type=”grid” text_align=”left” box_shadow_on_row=”no”][vc_column width=”1/3″][/vc_column][vc_column width=”1/3″][vc_single_image image=”352093″ img_size=”full” alignment=”center” onclick=”custom_link” img_link_target=”_blank” link=”https://www.netskope.com/”][/vc_column][vc_column width=”1/3″][/vc_column][/vc_row][vc_row row_type=”row” use_row_as_full_screen_section=”no” type=”full_width” text_align=”left” box_shadow_on_row=”no”][vc_column][vc_empty_space image_repeat=”no-repeat”][/vc_column][/vc_row][/vc_section]