PAST EVENTS
Security Architecture Strategies: Chicago (Rosemont/O’Hare), Illinois
Strategies to secure business driven enterprise architecture.
June 30, 2022
9:00am-5:00pm
7 CPE / 0.7 CEU / CISSP / 7 PDU Credits Awarded
Conference location: Donald E. Stephens Convention Center Rosemont (O’Hare) Illinois
Overview
In order to build and run applications securely there are key architectural components that need to be in place. Without infrastructure components like proper encryption, standard authentication methods and logging standards developers are challenged to build secure applications. Without proper pre-production testing and event logging / analysis knowing if an application is under attack and should you worry when it is becomes virtually impossible. With the advent of containers and the ability to scale application across different platforms the problem only gets compounded.
This conference will present the key architectural components your company should have in place that will allow you to build, run and monitor applications more securely.
What You Will Learn
The C-suite understands that security policies and controls have a direct impact on the ability of organizations to respond to business disruption.
In this one day in-person conference, attendees will learn:
- Cybersecurity in the Era of Digital Transformation
- Confidential Computing is Coming for You – Whether You are Ready or Not
- Cloud Disaster Recovery Architecture – Building Blocks for Your Cyber Security Program
- How to Build an Adaptable Security Architecture
- Transformational Security Strategy — How to Develop a Plan That is Effective
- How Enterprise IT Security Executives are Bolstering Their Architecture (Panel Discussion)
Conference Price: $299.00 per person
Each attendee will receive a certificate awarding 7 CPE credits for CISSP continuing education, in addition to 0.7 CEUs and 7 PDUs. CISSP is a registered certification mark of (ISC)², Inc.
9:00am-10:00am: How to Build an Adaptable Security Architecture
Conversation with Laszlo Gonc, Founder, Next Era Transformation Group
Learn what’s working, what’s challenging, and what companies might want to consider when designing and building an adaptable security Architecture.
Gonc
10:00am-10:30am: Refreshment Break
10:30am-11:30am: 5 Steps to Success with Information Security Architecture – Breakout Session
In this session, attendees will go through five crucial steps for an effective Security Architecture:
- Assess your security posture when each of the following arise: a merger, acquisition, and a downsizing event
- Analyze security insights – is it an Incident or a Breach?
- Develop the logical security layer of the architecture
- Design the EISA implementation
- How to treat the architecture as an ongoing process
11:30am-12:30pm: Confidential Computing is Coming for You – Whether You are Ready or Not
Daniel Charboneau, CISO and Solutions Engineer & Strategist, Anjuna
Charboneau
12:30pm-1:30pm: Lunch Break
1:30pm-2:30pm: Cybersecurity in the Era of Digital Transformation
Jay DeWitt, Sr. Director, vArmour
Digital transformation helped organizations reach new heights, but not without new security challenges. The threat landscape has evolved to take advantage of increasing IT complexity and fragmentation, inflicting tremendous damage to businesses around the world. Security teams need a different approach to achieve a stronger, more agile cybersecurity posture. In this session, you will learn why transparency across your digital estate and managing your attack surface are the cornerstones to cyber resiliency.
DeWitt
2:30pm-3:00pm: Refreshment Break
3:00pm-4:00pm: Cloud Disaster Recovery Architecture – Building Blocks for Your Cyber Security Program
Annur Sumar, Chief Technology Officer, Cloud Unity
Sumar
4:00pm-5:00 pm: How Enterprise IT Security Executives are Bolstering Their Architecture (Panel Discussion)
In this session, learn from a group of Senior Executives as to how they are working through the challenges.
Moderator: Kishan Patel, Area Vice President – East, Anjuna
Panelists include:
- Dr. Michael Chahino, CIO, Elgin Community College
- Phil Burnett, EVP – Security Operations/CISO, High Wire Networks
- James Kleckner, Security Architect, CUNA Mutual Group
- Patrick Kinard, Sr Server Operations Manager, Chicago Public Schools
- Other Security Executives sharing strategies, tactics, and lessons learned
Patel Chahino Burnett Kleckner Kinard
[/vc_column_text][/vc_column][/vc_row][vc_row row_type=”row” use_row_as_full_screen_section=”no” type=”grid” text_align=”left” box_shadow_on_row=”no”][vc_column][vc_column_text]Conference Price: $299.00 per person
Each attendee will receive a certificate awarding 7 CPE credits for CISSP continuing education, in addition to 0.7 CEUs and 7 PDUs. CISSP is a registered certification mark of (ISC)², Inc.
Exhibits
As is always the case at CAMP IT Conferences events, the talks will not include product presentations. During the continental breakfast, coffee breaks, and the luncheon break you will have the opportunity to informally meet representatives from the following sponsoring companies, who have solutions in the area of the conference.
[/vc_column_text][/vc_column][/vc_row][vc_row row_type=”row” use_row_as_full_screen_section=”no” type=”grid” text_align=”left” box_shadow_on_row=”no”][vc_column][vc_empty_space image_repeat=”no-repeat”][/vc_column][/vc_row][vc_row row_type=”row” use_row_as_full_screen_section=”no” type=”grid” text_align=”left” box_shadow_on_row=”no”][vc_column][vc_column_text]
CONFERENCE SPONSORS
[/vc_column_text][/vc_column][/vc_row][vc_row row_type=”row” use_row_as_full_screen_section=”no” type=”full_width” text_align=”left” box_shadow_on_row=”no”][vc_column][vc_empty_space height=”64px” image_repeat=”no-repeat”][/vc_column][/vc_row][vc_row row_type=”row” use_row_as_full_screen_section=”no” type=”grid” text_align=”left” box_shadow_on_row=”no”][vc_column width=”1/2″][vc_single_image image=”361467″ img_size=”medium” onclick=”custom_link” img_link_target=”_blank” link=”https://www.anjuna.io/”][/vc_column][vc_column width=”1/2″][vc_single_image image=”361538″ img_size=”medium” alignment=”center” onclick=”custom_link” img_link_target=”_blank” link=”https://www.varmour.com/”][/vc_column][/vc_row][vc_row row_type=”row” use_row_as_full_screen_section=”no” type=”full_width” text_align=”left” box_shadow_on_row=”no”][vc_column][vc_empty_space height=”64px” image_repeat=”no-repeat”][/vc_column][/vc_row][vc_row row_type=”row” use_row_as_full_screen_section=”no” type=”grid” text_align=”left” box_shadow_on_row=”no”][vc_column][vc_single_image image=”360915″ img_size=”medium” alignment=”center” onclick=”custom_link” img_link_target=”_blank” link=”https://www.wiz.io/”][/vc_column][/vc_row][vc_row row_type=”row” use_row_as_full_screen_section=”no” type=”full_width” text_align=”left” box_shadow_on_row=”no”][vc_column][vc_empty_space height=”64px” image_repeat=”no-repeat”][/vc_column][/vc_row]