Skip to content

PAST EVENTS


 

 

 Cloud Security Strategies: Chicago (Rosemont/O’Hare), Illinois

 

A framework for developing a robust cloud security strategy.

 

May 18, 2023

 

9:00am-5:00pm

 

7 CPE / 0.7 CEU / CISSP / 7 PDU Credits Awarded

 

Conference location: Donald E. Stephens Convention Center Rosemont (O’Hare) Illinois

     

 


Overview

 

Independent analysts show that through 2022, 93% of cloud security failures will be the fault of the end-user customer.

 

In this one day conference, attendees will learn tips, strategies and tactics for developing a robust cloud security strategy.


What You Will Learn

 

In this one day conference attendees will learn:

  • Cloud IT Blind Spots – How to Close Visibility Gaps in Multicloud Environments
  • Building Blocks for a Cloud Native Security and DR Strategy
  • Cloud Security Posture Questions CISOs Should Answer
  • Reducing Security Risks Associated with 3rd Party Actors
  • How to Evaluate Security as a Service Providers
  • Managing Security Vulnerabilities: Enterprise to Cloud
  • The Golden Thread: Detect Threats in the Arc of Productivity
  • Cloud Security in a Hybrid Work World – How Security Leaders are Adjusting (Panel Discussion)

Conference Price: $299.00 per person

Each attendee will receive a certificate awarding 7 CPE credits for CISSP continuing education, in addition to 0.7 CEUs and 7 PDUs. CISSP is a registered certification mark of (ISC)², Inc.

 


CONFERENCE AGENDA


8:00am – 9:00am: Registration and Continental Breakfast


9:00am – 9:50am: How to Evaluate Security as a Service Providers

 

Trent Ridgway, Head of Cloud Infrastructure & Security, Anning-Johnson Company

 

Ridgway

 


9:50am – 10:20am: Refreshment and Exhibit Break


10:20am – 11:10am: Cloud IT Blind Spots – Overlooked Architecture for Cloud Security and Resilience

 

Ken Wisniewski, Sr.  Cybersecurity Security Architect, Sayers

Matthew Berrey, Enterprise System Engineer, Veeam

 

 

This session will explore the business challenges and issues related to security and resilience through various solutions. It will provide an analysis and architecture for incorporating different schemes, techniques and protocols for cloud computing, with a focus on hybrid IaaS and PaaS systems and how to achieve security and resilience for successful adoption.

 

Wisniewski                   Berrey

 


11:10am – 12:00pm: The Golden Thread: Detect Threats in the Arc of Productivity

 

Sudarsan Kannan, Director, Cloud Security, Uptycs

 

The Golden Thread ties rich security data across your developer laptops, source code repositories, identity providers, and into your cloud infrastructure. This correlation across attack surfaces serves as an early warning system to protect your environment before it’s too late.

 

When a threat actor compromises a laptop or source code repository as an entry point, reducing time to detection is vital to carving out malicious files and blocking further lateral movement.

 

Learn how to weave the golden thread throughout your environment and identify malicious activity early.

 

 

Kannan

 

 


12:00pm – 12:40pm: Lunch and Exhibit Break


12:40pm – 1:30pm: Managing Security Vulnerabilities: Enterprise to Cloud

 

Daniel Ryken, Senior Systems Engineer, Secureworks

 

 

Managing vulnerabilities in any organization can be overwhelming. Enterprise environments add scale and diversity that overwhelm many IT security and operations organizations. Cloud adoption as well as and the increasing speed with which all organizations must deliver systems, applications, and features to both their internal and external customers, can make security seem unachievable.

 

 

In this session, attendees will learn how to:

  • Manage assets successfully and analyze and prioritize vulnerabilities
  • Determine which reports are most effective
  • Mature your program and think differently about vulnerability management

 

 

 

Ryken

 


1:30pm – 2:20pm: Don’t Just Shift Left, Shift Up! Building a Modern Cyber Defense Program, In the Cloud, For the Cloud

 

Chas Clawson, Field CTO, Security Solutions, Sumo Logic

 

Securing modern applications and cloud workloads is becoming increasingly complex. The “shift-left” approach has helped by incorporating security into applications and operations at the earliest stages, but is that enough? In this talk we will review the three major disciplines of Development, Design & Detection as they are used within the modern enterprise to secure critical assets. Each of these can level-up with automation as we move into an “everything as code” world.

 

Topics include:

  • Security Minded Development: DevSecOps, Observability & OpenTelemetry
  • Secure Architectural Design: Using Security Reference Architectures, ZeroTrust & Infrastructure as Code
  • Modern Detection & Response:  Playbooks and Security Orchestration Automation and Response (SOAR)

 

 

Clawson

 


2:20pm – 3:00pm: Strongpoint Defense for Your Cloud

 

Micki Boland, Global Cybersecurity Architect and Check Point Evangelist, Check Point Software Technologies, Ltd.

 

 

Leveraging Strongpoint Defense principles you will take and hold the high ground, remove your organization’s cloud assets from the adversary’s target list, use proactive defense to predict, plan, deter, defend, interdict, and contain attacks against your cloud strongpoints.

 

 

Boland

 

 


3:00pm – 3:30pm: Refreshment and Exhibit Break


3:30pm – 4:10pm: Building Blocks for a Cloud Native Security and DR Strategy

 

Prakash Sinha, Sr. Director & Technology Evangelist, Application Security & Delivery, Radware

 

 

To develop a cloud-native security and disaster recovery (DR) strategy, organizations need to consider several essential components. These include a zero-trust approach to access, as well as network, infrastructure, and application protection against cybersecurity threats. Additionally, the strategy must ensure high availability and rapid recovery in case of outages or disasters. By integrating these building blocks, organizations can create a secure and resilient cloud environment that is well-protected against potential threats and can quickly recover from any disaster.

 

Attendees will gain a better understanding of the key considerations for building a secure and resilient cloud-native environment, including the critical role of disaster recovery planning.

 

Key topics covered include:

 

  • Overview of cloud-native environments and the need for a robust security and disaster recovery (DR) strategy
  • Common use cases and building blocks for security and availability
  • Best practices to harden your network, infrastructure, and application security and availability posture

 

 

Sinha

 

 


4:10pm – 5:00pm: Cloud Security and Cloud Disaster Recovery – How Security Leaders are Responding to Sophisticated Cyber Attacks (Panel Discussion)

 

Moderated by: Annur Sumar, Chief Technology Officer, Cloud Unity

 

Panelists include:

  • Patrick Kinard, Senior Server Enterprise Operations Manager, Chicago Public Schools
  • Nathan Borg, Enterprise Architect, Joliet Junior College
  • Armando D’Onorio, Senior Consultant & CISO, Higher Ed
  • Nicos Digrindakis, Disaster Recovery Manager, University of Chicago
  • IT Executives sharing strategies, tactics, and lessons learned

 

     

        Sumar                      Kinard                      Borg                        D’Onorio         Digrindakis

 

 

 


Conference Price: $299.00 per person

Each attendee will receive a certificate awarding 7 CPE credits for CISSP continuing education, in addition to 0.7 CEUs and 7 PDUs. CISSP is a registered certification mark of (ISC)², Inc.

 

Exhibits

As is always the case at CAMP IT Conferences events, the talks will not include product presentations. During the continental breakfast, coffee breaks, and the luncheon break you will have the opportunity to informally meet representatives from the following sponsoring companies, who have solutions in the area of the conference.


CONFERENCE SPONSORS

[/vc_column_text][/vc_column][/vc_row][vc_row row_type=”row” use_row_as_full_screen_section=”no” type=”full_width” text_align=”left” box_shadow_on_row=”no”][vc_column][vc_empty_space height=”64px” image_repeat=”no-repeat”][/vc_column][/vc_row][vc_row row_type=”row” use_row_as_full_screen_section=”no” type=”grid” text_align=”left” box_shadow_on_row=”no”][vc_column width=”1/3″][vc_single_image image=”364026″ img_size=”medium” onclick=”custom_link” img_link_target=”_blank” link=”https://www.checkpoint.com/”][/vc_column][vc_column width=”1/3″][vc_single_image image=”362362″ img_size=”medium” alignment=”center” onclick=”custom_link” img_link_target=”_blank” link=”https://www.radware.com/”][/vc_column][vc_column width=”1/3″][vc_single_image image=”364047″ img_size=”medium” alignment=”right” onclick=”custom_link” img_link_target=”_blank” link=”https://www.secureworks.com/”][/vc_column][/vc_row][vc_row row_type=”row” use_row_as_full_screen_section=”no” type=”full_width” text_align=”left” box_shadow_on_row=”no”][vc_column][vc_empty_space height=”128px” image_repeat=”no-repeat”][/vc_column][/vc_row][vc_row row_type=”row” use_row_as_full_screen_section=”no” type=”grid” text_align=”left” box_shadow_on_row=”no”][vc_column width=”1/2″][vc_single_image image=”362277″ img_size=”medium” alignment=”center” onclick=”custom_link” img_link_target=”_blank” link=”https://www.sayers.com/”][/vc_column][vc_column width=”1/2″][vc_single_image image=”364019″ img_size=”medium” alignment=”center” onclick=”custom_link” img_link_target=”_blank” link=”https://www.veeam.com/”][/vc_column][/vc_row][vc_row row_type=”row” use_row_as_full_screen_section=”no” type=”full_width” text_align=”left” box_shadow_on_row=”no”][vc_column][vc_empty_space height=”128px” image_repeat=”no-repeat”][/vc_column][/vc_row][vc_row row_type=”row” use_row_as_full_screen_section=”no” type=”grid” text_align=”left” box_shadow_on_row=”no”][vc_column width=”1/3″][vc_single_image image=”363992″ img_size=”medium” onclick=”custom_link” img_link_target=”_blank” link=”https://www.sumologic.com/”][/vc_column][vc_column width=”1/3″][vc_single_image image=”363879″ img_size=”medium” alignment=”center” onclick=”custom_link” img_link_target=”_blank” link=”https://www.uptycs.com/”][/vc_column][vc_column width=”1/3″][vc_single_image image=”362265″ img_size=”large” alignment=”right” onclick=”custom_link” img_link_target=”_blank” link=”https://www.wiz.io/”][/vc_column][/vc_row][vc_row row_type=”row” use_row_as_full_screen_section=”no” type=”full_width” text_align=”left” box_shadow_on_row=”no”][vc_column][vc_empty_space height=”64px” image_repeat=”no-repeat”][/vc_column][/vc_row]