UPCOMING EVENTS
Cloud Security Strategies: Chicago (Rosemont/O’Hare), Illinois
A framework for developing a robust cloud security strategy.
June 25, 2026
9:00am-5:00pm
7 CPE / 0.7 CEU / CISSP / 7 PDU Credits Awarded
Conference location: Donald E. Stephens Convention Center Rosemont (O’Hare) Illinois
Overview
Independent analysts show that through 2024, 94% of cloud security failures will be the fault of the end-user customer.
Attendees will learn tips, strategies and tactics for developing a robust cloud security strategy.
What You Will Learn
In this one day conference attendees will learn:
- eBPF 101 – The Evolution from Packet Capture to Kernel Capture, and What it Means for Cloud Security
- Building Blocks for a Cloud Native Security and DR Strategy
- Security Optimization and the Cloud
- How IT the Business Can Work Together to Bolster Cloud Security (Panel Discussion)
- Cloud IT Blind Spots – Overlooked Architecture for Cloud Security and Resilience
- Cloud Security and Cloud Disaster Recovery – How Security Leaders are Responding to Sophisticated Cyber Attacks (Panel Discussion)
CONFERENCE AGENDA
8:00am – 9:00am: Registration and Continental Breakfast
9:00am – 10:00am Why Most Cloud Security Fails: Lessons from Real-World Incidents
Independent analysts show that 94% of cloud security failures are caused by customer misconfiguration or decision-making. This session explores the root causes of these failures and how organizations can proactively reduce risk.
Includes:
- Common customer-driven cloud security mistakes
- Misaligned cloud practices that increase risk
- Preventive strategies to avoid costly failures
10:00 AM – 10:30 AM — Sponsor & Networking Break
10:30 AM – 11:30 AM eBPF 101: From Packet Capture to Kernel-Level Observability
Cloud-native environments demand deeper visibility. This session introduces eBPF, showing how kernel-level insights can enhance security monitoring, threat detection, and response.
Includes:
- How eBPF differs from traditional packet capture
- Security and observability use cases in cloud-native systems
- Architectural considerations for eBPF adoption
11:30 AM – 12:30 PM AI, Cyber Recovery, and Data Protection: Separating Signal from Hype
Justin Nordeste, Sr Product Manager, Data Protection, 11:11 Systems
Abstract: AI is reshaping the cyber threat landscape faster than most organizations can adapt, and the pressure on IT and security leaders to “do something with AI” has never been higher. But what does meaningful AI adoption actually look like in data protection and recovery? And how do you separate the signal from the hype?
In this session, I will share how AI is being put to work across real infrastructure environments today, and what that means for how you think about resilience, recovery, and risk.
We’ll discuss:
- What AI-powered threats actually look like in practice, and why traditional recovery assumptions no longer hold
- Where AI delivers genuine value in detection, anomaly identification, and recovery automation, and where it doesn’t
- How to set realistic expectations internally and build a framework for AI adoption that keeps human judgment where it belongs

Nordeste
12:30 PM – 1:30 PM — Lunch & Exhibits
1:30 PM – 2:30 PM Building Blocks of Cloud Security and Disaster Recovery
Security and resilience must be designed together to protect against sophisticated attacks. This session explores integrated approaches to cloud-native security and disaster recovery.
Includes:
- Designing security and DR together, not in silos
- Resilience patterns for cloud-native workloads
- Preparing for ransomware, destructive attacks, and supply chain risks
2:30 PM – 3:00 PM — Sponsor Break
3:00 PM – 4:00 PM Optimizing Cloud Security Without Slowing Innovation
Organizations often over-secure or misalign security controls, slowing business agility. This session shows how to optimize security architecture and operations while maintaining performance and speed.
Includes:
- Balancing security, cost, and operational efficiency
- Reducing redundant controls and alert fatigue
- Metrics and KPIs to measure security effectiveness
4:00 PM – 5:00 PM Panel: How IT and the Business Work Together to Bolster Cloud Security
Cloud security requires collaboration across IT, security, and business teams. This interactive panel highlights best practices, lessons learned, and strategies for shared accountability.
Includes:
- Aligning business priorities with cloud security initiatives
- Communicating risk to executives effectively
- Incident response coordination between IT, security, and business
- Audience Q&A
Conference Price: $349.00 per person
Each attendee will receive a certificate awarding 7 CPE credits for CISSP continuing education, in addition to 0.7 CEUs and 7 PDUs. CISSP is a registered certification mark of (ISC)², Inc.
Exhibits
As is always the case at CAMP IT Conferences events, the talks will not include product presentations. During the continental breakfast, coffee breaks, and the luncheon break you will have the opportunity to informally meet representatives from the following sponsoring companies, who have solutions in the area of the conference.