Skip to content

PAST EVENTS


Cloud Security Strategies: Chicago (Rosemont/O’Hare), Illinois

 

A framework for developing a robust cloud security strategy.

 

November 9, 2022

 

9:00am-5:00pm

 

7 CPE / 0.7 CEU / CISSP / 7 PDU Credits Awarded

 

Conference location: Donald E. Stephens Convention Center Rosemont (O’Hare) Illinois    

     

 


Overview

 

Independent analysts show that through 2021, 95% of cloud security failures will be the fault of the end-user customer.

 


What You Will Learn

 

In this one day conference, attendees will learn tips, strategies and tactics for developing a robust cloud security strategy, including:

  • A Fundamental Approach to Cloud Security: A CISO Interview
  • Cloud IT Blind Spots – How to Close Visibility Gaps in Multi-Cloud Environments
  • Cloud Native Applications and Container Orchestration – What Does It Mean for Security?
  • How IT and the Business Can Work Together to Bolster Cloud Security
  • Achieving Governance and Security through Cloud Management
  • Cloud Security: How CISOs/InfoSec Leaders Have Adjusted to the Cloud World (Panel Discussion)

Conference Price: $299.00 per person

 

Each attendee will receive a certificate awarding 7 CPE credits for CISSP continuing education, in addition to 0.7 CEUs and 7 PDUs. CISSP is a registered certification mark of (ISC)², Inc.


Conference Program


8:00am – 9:00am: Registration and Continental Breakfast


9:00am – 10:00am: Fireside Chat: Cloud Security Posture Questions CISOs Should Answer

 

Mitch Christian, CISO, Synergy Global Housing

 

 

As cloud adoption continues to accelerate, CISOs must help their organizations keep pace with evolving cloud solutions, especially when it comes their security posture.

 

In this session, we will cover:

  • Does your risk appetite align to your cloud strategy?
  • Is your cybersecurity model mature enough for cloud?
  • Have you shifted your cybersecurity model left?
  • What happens if you decide to leave the cloud and bring things back on prem?

 

 

Christian

10:00am – 10:30am: Refreshment Break


10:30am – 11:30am: Fireside Chat: How to Handle Security When Transitioning from On-Premises to the Cloud

 

John Kellerhals, vCISO, DOT Security; Former Security Operations Manager, CF Industries

 

 

Kellerhals

 


11:30am – 12:30pm: How to Think Like a Threat Actor in the Cloud

 

Julian Wayte, Solutions Engineering Manager, Uptycs

 

 

Organizations can meet compliance/regulatory responsibilities in the cloud, but still be susceptible to a threat actor escalating privileges, exfiltrating data, targeting you for ransomware. Threat actors today have become cloud experts. Their TTPs are evolving quicker than most want to believe. Therefore it’s time we start thinking like them and mimicking detection on their attack behavior. In this session, Sudarsan Kannan of Uptycs will explain how organizations can detect and respond to attacker tactics and techniques in the cloud.

 

Wayte

 

 


12:30pm – 1:30pm: Luncheon and Exhibit Break


1:30pm – 2:30pm: How The Business and IT Team Can Bolster Cloud Security By Working Together

 

Harry Holmes, Solutions Engineer, Acronis

 

The ever changing threat landscape complicates the management of our cloud and internal network security, processes, and procedures from the C suite to the end user. While large security breaches always make the news, the true cost of the breach and millions of other smaller instances go unnoticed with potential catastrophic repercussions. How do we change the optics of security? How do we bridge the knowledge gap? How does this provide us a stronger security posture for both SMBs and Corporate interests? We all know the traditional route of training and testing which help, at least in part, manage some of the risk from the user domain and other potential threat vectors. As MSPs we are unable to maintain a constant presence so how do you provide the needed protection, training, and testing while managing customer needs?

 


Holmes

 

 


2:30pm – 3:00pm Refreshment Break


3:00pm – 4:00pm: Breakout Session: Cloud Security: Best Practices

 


4:00pm – 5:00pm: Cloud Security: How CISOs/InfoSec Leaders Have Adjusted to the Cloud World (Panel Discussion)

 

Moderator: Dan Horwich, President and Executive Director, CAMP IT Conferences 

 

Panelists will include:

  • Michael Neuman, Chief Information Security Officer, Backstop Solutions Group
  • Tom Kaczmarek, Director Graduate Studies and Director for Center for CyberSecurity Awareness and Cyber Defense, Marquette University
  • Brad Bilotta, Division IT Manager, Magnaflux
  • Neba Ambe, Director of Information Systems, City of Chicago
  • Other Cloud Security Executives sharing strategies, tactics and lessons learned

 

 

 

Neuman                      Kaczmarek                      Bilotta                      Ambe

 


Conference Price: $299.00 per person

 

Each attendee will receive a certificate awarding 7 CPE credits for CISSP continuing education, in addition to 0.7 CEUs and 7 PDUs. CISSP is a registered certification mark of (ISC)², Inc.

 

Exhibits

As is always the case at CAMP IT Conferences events, the talks will not include product presentations. During the continental breakfast, coffee breaks, and the luncheon break you will have the opportunity to informally meet representatives from the following sponsoring companies, who have solutions in the area of the conference.


 

[/vc_column_text][/vc_column][/vc_row][vc_row row_type=”row” use_row_as_full_screen_section=”no” type=”full_width” text_align=”left” box_shadow_on_row=”no”][vc_column][vc_empty_space image_repeat=”no-repeat”][/vc_column][/vc_row][vc_row row_type=”row” use_row_as_full_screen_section=”no” type=”grid” text_align=”left” box_shadow_on_row=”no”][vc_column][vc_column_text]

CONFERENCE CO-SPONSORS

[/vc_column_text][/vc_column][/vc_row][vc_row row_type=”row” use_row_as_full_screen_section=”no” type=”full_width” text_align=”left” box_shadow_on_row=”no”][vc_column][vc_empty_space height=”128px” image_repeat=”no-repeat”][/vc_column][/vc_row][vc_row row_type=”row” use_row_as_full_screen_section=”no” type=”grid” text_align=”left” box_shadow_on_row=”no”][vc_column width=”1/2″][vc_single_image image=”362447″ alignment=”center” onclick=”custom_link” img_link_target=”_blank” link=”https://www.acronis.com/en-us/”][/vc_column][vc_column width=”1/2″][vc_single_image image=”361848″ img_size=”medium” alignment=”center” onclick=”custom_link” img_link_target=”_blank” link=”https://www.infoblox.com/”][/vc_column][/vc_row][vc_row row_type=”row” use_row_as_full_screen_section=”no” type=”full_width” text_align=”left” box_shadow_on_row=”no”][vc_column][vc_empty_space height=”128px” image_repeat=”no-repeat”][/vc_column][/vc_row][vc_row row_type=”row” use_row_as_full_screen_section=”no” type=”grid” text_align=”left” box_shadow_on_row=”no”][vc_column][vc_single_image image=”362362″ img_size=”medium” alignment=”center” onclick=”custom_link” img_link_target=”_blank” link=”https://www.radware.com/”][/vc_column][/vc_row][vc_row row_type=”row” use_row_as_full_screen_section=”no” type=”full_width” text_align=”left” box_shadow_on_row=”no”][vc_column][vc_empty_space height=”128px” image_repeat=”no-repeat”][/vc_column][/vc_row][vc_row row_type=”row” use_row_as_full_screen_section=”no” type=”grid” text_align=”left” box_shadow_on_row=”no”][vc_column width=”1/2″][vc_single_image image=”362410″ img_size=”medium” alignment=”center” onclick=”custom_link” img_link_target=”_blank” link=”https://www.uptycs.com/”][/vc_column][vc_column width=”1/2″][vc_single_image image=”362265″ img_size=”large” alignment=”center” onclick=”custom_link” img_link_target=”_blank” link=”http://https://www.wiz.io/”][/vc_column][/vc_row][vc_row row_type=”row” use_row_as_full_screen_section=”no” type=”full_width” text_align=”left” box_shadow_on_row=”no”][vc_column][vc_empty_space height=”64px” image_repeat=”no-repeat”][/vc_column][/vc_row]