UPCOMING EVENTS
Cloud Security Strategies: Chicago (Rosemont/O’Hare), Illinois
A framework for developing a robust cloud security strategy.
November 12, 2025
9:00am-5:00pm
7 CPE / 0.7 CEU / CISSP / 7 PDU Credits Awarded
Conference location: Donald E. Stephens Convention Center Rosemont (O’Hare) Illinois
Overview
Independent analysts show that through 2024, 94% of cloud security failures will be the fault of the end-user customer.
Attendees will learn tips, strategies and tactics for developing a robust cloud security strategy.
What You Will Learn
In this one-day conference attendees will learn:
- eBPF 101 – The Evolution from Packet Capture to Kernel Capture, and What it Means for Cloud Security
- Building Blocks for a Cloud Native Security and DR Strategy
- Security Optimization and the Cloud
- How IT the Business Can Work Together to Bolster Cloud Security (Panel Discussion)
- Cloud IT Blind Spots – Overlooked Architecture for Cloud Security and Resilience
- Cloud Security and Cloud Disaster Recovery – How Security Leaders are Responding to Sophisticated Cyber Attacks (Panel Discussion)
CONFERENCE AGENDA
8:00am – 9:00am: Registration and Continental Breakfast
9:00am – 10:00am: How to Communicate with the Board and Stakeholders on Cloud Security Initiatives
Trent Ridgway, Head of IT, Infrastructure and Cloud, CISO, Anson Industries
In today’s digital-first enterprises, cloud security is no longer a technical concern—it’s a business imperative. Yet, many security leaders still struggle to effectively convey the importance, risks, and ROI of cloud security initiatives to executive leadership and board members. This keynote will bridge that gap by offering practical guidance on how to translate complex security strategies into clear, compelling business value. Attendees will learn how to align cloud security objectives with organizational priorities, communicate risk in terms of impact and probability, and foster a shared sense of accountability across the C-suite and beyond.
Attendees will gain:
- How to frame cloud security in business, operational, and reputational terms that resonate with non-technical stakeholders.
- Techniques for presenting cloud risk in a language that drives understanding and action at the board level.
- How to develop metrics and dashboards that connect security performance to business outcomes.
- Strategies for overcoming skepticism and building executive confidence in cloud security investments.
- Case examples of how leading organizations have successfully secured board buy-in for cloud transformation initiatives.
Ridgway
10:00am – 10:30am: Refreshment & Exhibit Break
10:30am – 11:30am: Too Many Findings, Too Few Fixes: Scaling Cloud Remediation Operations in the AI Era
Sunil Gottumukkala, CEO, Averlon
As cloud environments grow more distributed and development velocity accelerates, security teams face a widening exposure window — the gap between how quickly attackers exploit new vulnerabilities and how long it takes organizations to fix them. Traditional remediation operations, built around manual triage, ticket queues, fragmented tooling, competing developer priorities, and disconnected workflows, can no longer keep pace in the AI era.
This session explores practical ways to shrink that window. Attendees will learn how leading organizations are evolving remediation operations, rethinking prioritization, and introducing automation safely and responsibly in the AI era. The discussion will highlight frameworks for operational scale, cross-team collaboration, and guardrails that maintain trust while accelerating response.
Gottumukkala
11:30am – 12:30pm: Securing Data Across Multi-Cloud and Hybrid Environments
Protecting sensitive data in multi-cloud and hybrid environments is increasingly complex. Explore encryption strategies, key management, and policy enforcement approaches to maintain security, compliance, and data integrity across diverse infrastructures.
Attendees will gain:
-
Multi-cloud encryption and key management solutions
-
Consistent policy enforcement across environments
-
Compliance and regulatory best practices
12:30pm – 1:30pm: Lunch & Exhibit Break
1:30pm – 2:30pm: Identity & Access Management: Beyond the Basics
Effective IAM is critical as cloud services proliferate. Discover advanced strategies including federated identities, privilege escalation prevention, and auditing for cloud environments. Gain practical steps to strengthen access controls and reduce security risk.
Attendees will gain:
-
Advanced IAM techniques for cloud security
-
Monitoring and auditing access effectively
-
Tools for enforcing least-privilege policies
2:30pm – 3:00pm: Refreshment & Exhibit Break
3:00pm – 4:00pm: DevSecOps: Embedding Security into Cloud Development
Security cannot be an afterthought in cloud-native development. Learn how to integrate security into DevOps workflows, from secure coding and automated testing to continuous compliance monitoring. Understand how DevSecOps enables faster development cycles without compromising safety.
Attendees will gain:
-
Automating security checks in CI/CD pipelines
-
Shifting security left in development
-
Examples of successful DevSecOps adoption
4:00pm – 5:00pm: End-User Insights Panel: Real-World Cloud Security Lessons (Panel Discussion)
IT leaders from end-user organizations share their experiences securing cloud environments. Panelists will discuss challenges, successes, and lessons learned in incident response, compliance, and risk management. Gain peer-driven insights to inform your cloud security strategy.
Attendees will gain:
-
Real-world cloud security challenges and solutions
-
Lessons from incident response and risk mitigation
-
Peer recommendations for effective cloud governance
Moderator: TBD
Panelists will include:
-
Johnny Burton, Vice President of IT and Security Officer, The Family Institute at Northwestern University
- Ryan Devlin, Director CLoud Security, CNA
- Mouncef Elalamy, Director, Cloud and Data Center Infrastructure, HUB International Limited
- Additional IT executives sharing experiences and lessons learned
Burton Devlin Elalamy
Conference Price: $349.00 per person
Each attendee will receive a certificate awarding 7 CPE credits for CISSP continuing education, in addition to 0.7 CEUs and 7 PDUs. CISSP is a registered certification mark of (ISC)², Inc.
Exhibits
As is always the case at CAMP IT Conferences events, the talks will not include product presentations. During the continental breakfast, coffee breaks, and the luncheon break you will have the opportunity to informally meet representatives from the following sponsoring companies, who have solutions in the area of the conference.