UPCOMING EVENTS
Cloud Security Strategies: Chicago (Rosemont/O’Hare), Illinois
A framework for developing a robust cloud security strategy.
June 3, 2025
9:00am-5:00pm
7 CPE / 0.7 CEU / CISSP / 7 PDU Credits Awarded
Conference location: Donald E. Stephens Convention Center Rosemont (O’Hare) Illinois
Overview
Independent analysts show that through 2024, 95% of cloud security failures will be the fault of the end-user customer.
Attendees will learn tips, strategies and tactics for developing a robust cloud security strategy.
What You Will Learn
- Emerging Threats in Cloud Security: Navigating the New Landscape
- Zero Trust Architecture in the Cloud: Redefining Perimeter Security
- Best Practices for Securing Multi-Cloud Environments
- Cloud Security Automation: Using AI and Machine Learning for Threat Detection
- Cloud Compliance Challenges: Navigating Regulatory Requirements in the Cloud
- Panel Discussion: Future-Proofing Cloud Security in an Evolving Threat Landscape
Conference Price: $349.00 per person
Each attendee will receive a certificate awarding 7 CPE credits for CISSP continuing education, in addition to 0.7 CEUs and 7 PDUs. CISSP is a registered certification mark of (ISC)², Inc.
CONFERENCE AGENDA
8:00am – 9:00am: Registration and Continental Breakfast
9:00am – 10:00am: The Emboldened Threat Actor: Our Cloud Identity Under Siege
Keith Johnson, Executive Vice President, Obviam
As organizations increasingly rely on cloud platforms like Microsoft 365, emboldened threat actors are shifting their tactics to target the core of cloud security: identity. Multi-factor authentication (MFA) is no longer a silver bullet. Sophisticated attackers are bypassing it and hijacking authentication tokens to silently access sensitive environments, often without triggering alerts.
In this keynote, we’ll explore how and why threat actors are escalating their focus on cloud identity, and how the rapid evolution of tools, including AI-driven automation, is lowering the barrier to entry for devastating attacks. Real-world examples will illustrate the techniques being used, the gaps they exploit, and what organizations can do to get ahead of them.
Attendees will leave with a deeper understanding of the identity-based attack surface in cloud environments, and a set of strategic and practical actions to strengthen defenses and build lasting resilience.
Johnson
10:00am – 10:30am: Refreshment & Exhibit Break
10:30am – 11:30am: Securing the Software Supply Chain in Cloud-Native Environments
Modern applications increasingly rely on open-source components, containers, and CI/CD pipelines—all of which introduce new attack surfaces. In this session, we’ll dive into how to secure your software supply chain in cloud-native environments. We’ll cover SBOMs, dependency management, code signing, and runtime protection strategies to reduce the risk of compromise from third-party code or misconfigurations.
11:30am – 12:30pm: Managing Cloud Misconfigurations: Detection, Remediation, and Prevention
Misconfigurations remain one of the most common causes of cloud data breaches. This session provides an in-depth look at how to proactively manage and remediate cloud misconfigurations at scale. Attendees will learn about CSPM (Cloud Security Posture Management), IaC (Infrastructure as Code) security scanning, and how to integrate these tools into their DevSecOps workflows for continuous compliance and risk reduction.
12:30pm – 1:30pm: Lunch & Exhibit Break
1:30pm – 2:30pm: Cloud Identity and Access Management (CIAM): Controlling the Chaos
Identity is the new perimeter—but in the cloud, managing who can access what becomes exponentially more complex. This session will unpack best practices for implementing and scaling cloud IAM strategies, including role-based access control (RBAC), attribute-based access control (ABAC), privilege elevation policies, and federation across multiple clouds and SaaS environments. Walk away with actionable guidance for taming IAM sprawl and enhancing access governance.
2:30pm – 3:00pm: Refreshment & Exhibit Break
3:00pm – 4:00pm: Incident Response in the Cloud: Building a Modern Playbook
Traditional incident response models often break down in the cloud. This session helps organizations adapt and modernize their response playbooks to align with cloud environments. Learn how to use cloud-native tools and logging, create effective detection and response workflows, and coordinate with cloud service providers during an incident. We’ll also cover the importance of simulations and tabletop exercises tailored for cloud-specific threats.
4:00pm – 5:00pm: Protecting Data Across Multi-Cloud Environments: Policies, Encryption, and Visibility – Panel Discussion
Panelists will include CISOs/Information Security Executives sharing strategies, tactics and lessons learned
Data is scattered across IaaS, PaaS, SaaS—and the risks are just as distributed. This session focuses on how to secure sensitive data as it moves across multi-cloud and hybrid infrastructures. Topics include data classification, DLP (Data Loss Prevention), encryption at rest/in transit/in use, and unified data access policies. Learn how to gain the visibility and control needed to protect data and meet compliance requirements without slowing innovation.
Conference Price: $349.00 per person
Each attendee will receive a certificate awarding 7 CPE credits for CISSP continuing education, in addition to 0.7 CEUs and 7 PDUs. CISSP is a registered certification mark of (ISC)², Inc.
Exhibits
As is always the case at CAMP IT Conferences events, the talks will not include product presentations. During the continental breakfast, coffee breaks, and the luncheon break you will have the opportunity to informally meet representatives from the following sponsoring companies, who have solutions in the area of the conference.