Security Architecture Strategies: Chicago (Rosemont/O’Hare), Illinois
Strategies to secure business driven enterprise architecture.
October 20, 2022
9:00am-5:00pm
7 CPE / 0.7 CEU / CISSP / 7 PDU Credits Awarded
Conference location: Donald E. Stephens Convention Center Rosemont (O’Hare) Illinois
Overview
In order to build and run applications securely there are key architectural components that need to be in place. Without infrastructure components like proper encryption, standard authentication methods and logging standards developers are challenged to build secure applications. Without proper pre-production testing and event logging / analysis knowing if an application is under attack and should you worry when it is becomes virtually impossible. With the advent of containers and the ability to scale application across different platforms the problem only gets compounded.
This conference will present the key architectural components your company should have in place that will allow you to build, run and monitor applications more securely.
What You Will Learn
The C-suite understands that security policies and controls have a direct impact on the ability of organizations to respond to business disruption.
In this one day in-person conference, attendees will learn:
Conference Price: $299.00 per person
Each attendee will receive a certificate awarding 7 CPE credits for CISSP continuing education, in addition to 0.7 CEUs and 7 PDUs. CISSP is a registered certification mark of (ISC)², Inc.
9:00am-10:00am: Security Architecture and Business Resiliency
Patrick Benson, Systems Engineer, Veeam
Kevin Finch, Senior Business Continuity Architect, Sayers
Security and Infrastructure need to cooperate in order to ensure business resiliency, but many organizations fail to unite the two, leaving them vulnerable. Worse yet, some organizations unwittingly encourage opposition between the two. We will briefly discuss the importance of working together in those areas, and highlight some specific strategies companies can use to keep different areas of the business in alignment for better security, and better continuity of operations.
Benson Finch
10:00am-10:30am: Refreshment Break
10:30am-11:30am: Fireside Chat: Security Architecture Review Process – Trust/IDs/Applications
Ryan Radtke, Director, Information Security Architecture, AbbVie
Radtke
11:30am-12:30pm: How Enterprise IT Security Executives are Bolstering Their Architecture (Panel Discussion)
In this session, attendees will go through five crucial steps for an effective Security Architecture:
Moderator: Marc Kreppel, Manager, Zerto
Panelists include:
Kreppel Kohnke Versetto Conlee
12:30pm-1:30pm: Lunch Session, Special Fireside Chat — Developing an Award Winning Security Program – Lessons Learned
Dean Sharp, Global Director of Information Security Architecture and Engineering, ManpowerGroup
Sharp
1:30pm-2:30pm: Suspension of Disbelief: How Cybersecurity Myths Persist and What to Do Instead
Paul Jespersen, VP Worldwide Sales & Business Development, Sandfly Security
Sometimes its easier to hope for the magic bullet solutions, or MORE solutions, but instead of just accepting many of the current myths at face value, there are a few things we can do to make sure we have the right priorities in our operations, resources, and budgets.
Jespersen
2:30pm-3:00pm: Refreshment Break
3:00pm-4:00pm: Breakout Session – How to Modernize Your Security Architecture
In this session, attendees will breakout into groups and discuss:
Exhibits
As is always the case at CAMP IT Conferences events, the talks will not include product presentations. During the continental breakfast, coffee breaks, and the luncheon break you will have the opportunity to informally meet representatives from the following sponsoring companies, who have solutions in the area of the conference.