PAST EVENTS
Cloud Security Strategies: Chicago (Rosemont/O’Hare), Illinois
A framework for developing a robust cloud security strategy.
May 18, 2023
9:00am-5:00pm
7 CPE / 0.7 CEU / CISSP / 7 PDU Credits Awarded
Conference location: Donald E. Stephens Convention Center Rosemont (O’Hare) Illinois
Overview
Independent analysts show that through 2022, 93% of cloud security failures will be the fault of the end-user customer.
In this one day conference, attendees will learn tips, strategies and tactics for developing a robust cloud security strategy.
What You Will Learn
In this one day conference attendees will learn:
- Cloud IT Blind Spots – How to Close Visibility Gaps in Multicloud Environments
- Building Blocks for a Cloud Native Security and DR Strategy
- Cloud Security Posture Questions CISOs Should Answer
- Reducing Security Risks Associated with 3rd Party Actors
- How to Evaluate Security as a Service Providers
- Managing Security Vulnerabilities: Enterprise to Cloud
- The Golden Thread: Detect Threats in the Arc of Productivity
- Cloud Security in a Hybrid Work World – How Security Leaders are Adjusting (Panel Discussion)
Conference Price: $299.00 per person
Each attendee will receive a certificate awarding 7 CPE credits for CISSP continuing education, in addition to 0.7 CEUs and 7 PDUs. CISSP is a registered certification mark of (ISC)², Inc.
CONFERENCE AGENDA
8:00am – 9:00am: Registration and Continental Breakfast
9:00am – 9:50am: How to Evaluate Security as a Service Providers
Trent Ridgway, Head of Cloud Infrastructure & Security, Anning-Johnson Company
Ridgway
9:50am – 10:20am: Refreshment and Exhibit Break
10:20am – 11:10am: Cloud IT Blind Spots – Overlooked Architecture for Cloud Security and Resilience
Ken Wisniewski, Sr. Cybersecurity Security Architect, Sayers
Matthew Berrey, Enterprise System Engineer, Veeam
This session will explore the business challenges and issues related to security and resilience through various solutions. It will provide an analysis and architecture for incorporating different schemes, techniques and protocols for cloud computing, with a focus on hybrid IaaS and PaaS systems and how to achieve security and resilience for successful adoption.
Wisniewski Berrey
11:10am – 12:00pm: The Golden Thread: Detect Threats in the Arc of Productivity
Sudarsan Kannan, Director, Cloud Security, Uptycs
The Golden Thread ties rich security data across your developer laptops, source code repositories, identity providers, and into your cloud infrastructure. This correlation across attack surfaces serves as an early warning system to protect your environment before it’s too late.
When a threat actor compromises a laptop or source code repository as an entry point, reducing time to detection is vital to carving out malicious files and blocking further lateral movement.
Learn how to weave the golden thread throughout your environment and identify malicious activity early.
Kannan
12:00pm – 12:40pm: Lunch and Exhibit Break
12:40pm – 1:30pm: Managing Security Vulnerabilities: Enterprise to Cloud
Daniel Ryken, Senior Systems Engineer, Secureworks
Managing vulnerabilities in any organization can be overwhelming. Enterprise environments add scale and diversity that overwhelm many IT security and operations organizations. Cloud adoption as well as and the increasing speed with which all organizations must deliver systems, applications, and features to both their internal and external customers, can make security seem unachievable.
In this session, attendees will learn how to:
- Manage assets successfully and analyze and prioritize vulnerabilities
- Determine which reports are most effective
- Mature your program and think differently about vulnerability management
Ryken
1:30pm – 2:20pm: Don’t Just Shift Left, Shift Up! Building a Modern Cyber Defense Program, In the Cloud, For the Cloud
Chas Clawson, Field CTO, Security Solutions, Sumo Logic
Securing modern applications and cloud workloads is becoming increasingly complex. The “shift-left” approach has helped by incorporating security into applications and operations at the earliest stages, but is that enough? In this talk we will review the three major disciplines of Development, Design & Detection as they are used within the modern enterprise to secure critical assets. Each of these can level-up with automation as we move into an “everything as code” world.
Topics include:
- Security Minded Development: DevSecOps, Observability & OpenTelemetry
- Secure Architectural Design: Using Security Reference Architectures, ZeroTrust & Infrastructure as Code
- Modern Detection & Response: Playbooks and Security Orchestration Automation and Response (SOAR)
Clawson
2:20pm – 3:00pm: Strongpoint Defense for Your Cloud
Micki Boland, Global Cybersecurity Architect and Check Point Evangelist, Check Point Software Technologies, Ltd.
Leveraging Strongpoint Defense principles you will take and hold the high ground, remove your organization’s cloud assets from the adversary’s target list, use proactive defense to predict, plan, deter, defend, interdict, and contain attacks against your cloud strongpoints.
Boland
3:00pm – 3:30pm: Refreshment and Exhibit Break
3:30pm – 4:10pm: Building Blocks for a Cloud Native Security and DR Strategy
Prakash Sinha, Sr. Director & Technology Evangelist, Application Security & Delivery, Radware
To develop a cloud-native security and disaster recovery (DR) strategy, organizations need to consider several essential components. These include a zero-trust approach to access, as well as network, infrastructure, and application protection against cybersecurity threats. Additionally, the strategy must ensure high availability and rapid recovery in case of outages or disasters. By integrating these building blocks, organizations can create a secure and resilient cloud environment that is well-protected against potential threats and can quickly recover from any disaster.
Attendees will gain a better understanding of the key considerations for building a secure and resilient cloud-native environment, including the critical role of disaster recovery planning.
Key topics covered include:
- Overview of cloud-native environments and the need for a robust security and disaster recovery (DR) strategy
- Common use cases and building blocks for security and availability
- Best practices to harden your network, infrastructure, and application security and availability posture
Sinha
4:10pm – 5:00pm: Cloud Security and Cloud Disaster Recovery – How Security Leaders are Responding to Sophisticated Cyber Attacks (Panel Discussion)
Moderated by: Annur Sumar, Chief Technology Officer, Cloud Unity
Panelists include:
- Patrick Kinard, Senior Server Enterprise Operations Manager, Chicago Public Schools
- Nathan Borg, Enterprise Architect, Joliet Junior College
- Armando D’Onorio, Senior Consultant & CISO, Higher Ed
- Nicos Digrindakis, Disaster Recovery Manager, University of Chicago
- IT Executives sharing strategies, tactics, and lessons learned
Sumar Kinard Borg D’Onorio Digrindakis
Conference Price: $299.00 per person
Each attendee will receive a certificate awarding 7 CPE credits for CISSP continuing education, in addition to 0.7 CEUs and 7 PDUs. CISSP is a registered certification mark of (ISC)², Inc.
Exhibits
As is always the case at CAMP IT Conferences events, the talks will not include product presentations. During the continental breakfast, coffee breaks, and the luncheon break you will have the opportunity to informally meet representatives from the following sponsoring companies, who have solutions in the area of the conference.
CONFERENCE SPONSORS
[/vc_column_text][/vc_column][/vc_row][vc_row row_type=”row” use_row_as_full_screen_section=”no” type=”full_width” text_align=”left” box_shadow_on_row=”no”][vc_column][vc_empty_space height=”64px” image_repeat=”no-repeat”][/vc_column][/vc_row][vc_row row_type=”row” use_row_as_full_screen_section=”no” type=”grid” text_align=”left” box_shadow_on_row=”no”][vc_column width=”1/3″][vc_single_image image=”364026″ img_size=”medium” onclick=”custom_link” img_link_target=”_blank” link=”https://www.checkpoint.com/”][/vc_column][vc_column width=”1/3″][vc_single_image image=”362362″ img_size=”medium” alignment=”center” onclick=”custom_link” img_link_target=”_blank” link=”https://www.radware.com/”][/vc_column][vc_column width=”1/3″][vc_single_image image=”364047″ img_size=”medium” alignment=”right” onclick=”custom_link” img_link_target=”_blank” link=”https://www.secureworks.com/”][/vc_column][/vc_row][vc_row row_type=”row” use_row_as_full_screen_section=”no” type=”full_width” text_align=”left” box_shadow_on_row=”no”][vc_column][vc_empty_space height=”128px” image_repeat=”no-repeat”][/vc_column][/vc_row][vc_row row_type=”row” use_row_as_full_screen_section=”no” type=”grid” text_align=”left” box_shadow_on_row=”no”][vc_column width=”1/2″][vc_single_image image=”362277″ img_size=”medium” alignment=”center” onclick=”custom_link” img_link_target=”_blank” link=”https://www.sayers.com/”][/vc_column][vc_column width=”1/2″][vc_single_image image=”364019″ img_size=”medium” alignment=”center” onclick=”custom_link” img_link_target=”_blank” link=”https://www.veeam.com/”][/vc_column][/vc_row][vc_row row_type=”row” use_row_as_full_screen_section=”no” type=”full_width” text_align=”left” box_shadow_on_row=”no”][vc_column][vc_empty_space height=”128px” image_repeat=”no-repeat”][/vc_column][/vc_row][vc_row row_type=”row” use_row_as_full_screen_section=”no” type=”grid” text_align=”left” box_shadow_on_row=”no”][vc_column width=”1/3″][vc_single_image image=”363992″ img_size=”medium” onclick=”custom_link” img_link_target=”_blank” link=”https://www.sumologic.com/”][/vc_column][vc_column width=”1/3″][vc_single_image image=”363879″ img_size=”medium” alignment=”center” onclick=”custom_link” img_link_target=”_blank” link=”https://www.uptycs.com/”][/vc_column][vc_column width=”1/3″][vc_single_image image=”362265″ img_size=”large” alignment=”right” onclick=”custom_link” img_link_target=”_blank” link=”https://www.wiz.io/”][/vc_column][/vc_row][vc_row row_type=”row” use_row_as_full_screen_section=”no” type=”full_width” text_align=”left” box_shadow_on_row=”no”][vc_column][vc_empty_space height=”64px” image_repeat=”no-repeat”][/vc_column][/vc_row]