Skip to content

PAST EVENTS


Cloud Security Strategies: Chicago (Rosemont/O’Hare), Illinois

A framework for developing a robust cloud security strategy.

November 29, 2023

9:00am-5:00pm

7 CPE / 0.7 CEU / CISSP / 7 PDU Credits Awarded

Conference location: Donald E. Stephens Convention Center Rosemont (O’Hare) Illinois


Overview

Independent analysts show that through 2022, 94% of cloud security failures will be the fault of the end-user customer.

In this one day conference, attendees will learn tips, strategies and tactics for developing a robust cloud security strategy.


What You Will Learn

In this one day conference attendees will learn:

  • Cloud IT Blind Spots – Overlooked Architecture for Cloud Security and Resilience
  • Achieving Governance and Security through Cloud Management
  • Navigating Cloud Security: Common Misconfigurations and Architectures in Public Cloud Environments
  • Cloud Watch Points – Security Stumbling Blocks to Watch Out For
  • Everything-as-a-Service Supply Chain: The Path of Least Resistance
  • Cloud Security: How CISOs/InfoSec Leaders Have Adjusted to the Cloud World (Panel Discussion)

Conference Price: $299.00 per person

Each attendee will receive a certificate awarding 7 CPE credits for CISSP continuing education, in addition to 0.7 CEUs and 7 PDUs. CISSP is a registered certification mark of (ISC)², Inc.


CONFERENCE AGENDA


8:00am – 9:00am: Registration and Continental Breakfast


9:00am – 10:00am: Cloud Watch Points – Security Stumbling Blocks to Watch Out For

Derek Milroy, Senior Security Architect, U.S. Cellular

In this session, Derek Milroy, a seasoned CAMP IT speaker, will share his thoughts on the security stumbling blocks to be aware of when going through a Migration.

Milroy


10:00am – 10:30am: Refreshment & Exhibit Break


10:30am – 11:30am: Everything-as-a-Service Supply Chain: The Path of Least Resistance

Alex Flores, Sr. Solutions Engineer, Astrix Security

Identity is the new perimeter. But are all identities accounted for? Biometric MFA. Passwordless. Contextual based access policies. These are just some of the emerging controls that are becoming standard for end-user access. But when it comes to non-user, non-human identities (service accounts, API Keys, etc.), security teams are left with no visibility or governance. It is clear from recent breaches – attackers are taking notice.

This session will focus on the non-human identity side of the house and cover:

  • What exactly a non-human identity is
  • How these identities evolved from an IT problem to a business problem
  • How attackers are taking advantage of this ungoverned access
  • How security experts can accommodate for this emerging attack path

Flores


11:30am – 12:30pm:  Cloud IT Blind Spots – Overlooked Architecture for Cloud Security and Resilience

Prakash Sinha, Sr. Director & Technology Evangelist, Application Security & Delivery, Radware

Securing distributed applications can be quite a challenge, especially in multi-cloud setup, where the lack of expertise leads to uncertainty about application security. Differences in environments and tools only add to the complexity. While traditional security measures are still necessary, addressing the impact of outages and shoring up network and infrastructure security and resilience can now be tackled with modern approaches such as zero trust for access, utilizing identity as a perimeter, implementing resilience in servicing user connections implementing security services at network edges.

This session will explore the business challenges and issues related to security and resilience through various solutions. It will provide an analysis and architecture for incorporating different schemes, techniques and protocols for cloud computing, with a focus on hybrid IaaS and PaaS systems and how to achieve security and resilience for successful adoption.

Sinha


12:30pm – 1:30pm: Lunch & Exhibit Break


1:30pm – 2:30pm:  Navigating Cloud Security: Common Misconfigurations and Architectures in Public Cloud Environments

John McDonough, Sr. Cloud Devops Architect, Fortinet

This presentation dives into the landscapes of cloud security, focusing on the prevalent misconfigurations that can jeopardize data integrity and user privacy in public cloud environments. We will explore industry shortcomings, shedding light on the most common pitfalls organizations encounter when managing their cloud security. Join us on this journey to enhance your understanding of cloud security and empower your organization to proactively safeguard its valuable assets in the cloud.

McDonough


2:30pm – 3:00pm: Refreshment & Exhibit Break


3:00pm – 4:00pm:  Achieving Governance and Security through Cloud Management

Annur Sumar, Chief Technology Officer, Cloud Unity

This session will explore the business challenges and issues related to security and management through various different standards and solutions. It will provide an analysis and architecture for incorporating different security schemes, techniques and protocols for cloud computing, with a focus on hybrid IaaS and PaaS systems and how to achieve security and governance for successful adoption.

Sumar


4:00pm – 5:00pm:  Cloud Security: How CISOs/InfoSec Leaders Have Adjusted to the Cloud World (Panel Discussion)

Moderated by: Dan Horwich, President & Executive Director, CAMP IT Conferences

Panelists will include:

  • Derek Milroy, Senior Security Architect, U.S. Cellular
  • Terry Brugger, CTO / CISO, Scalesology
  • Eric Poole, CISO, Federal Home Loan Bank Chicago 
  • Amir Javeri, Senior Manager, Cloud Security, Protiviti Cloud Security
  • Dan Krueger, Senior Manager, Information Security, W.W. Grainger, Inc.
  • Other Cloud Security Executives Sharing Best Practices and Lessons Learned.

    

Horwich                       Milroy                  Brugger                   Poole                      Javeri                       Krueger


Conference Price: $299.00 per person

Each attendee will receive a certificate awarding 7 CPE credits for CISSP continuing education, in addition to 0.7 CEUs and 7 PDUs. CISSP is a registered certification mark of (ISC)², Inc.

Exhibits

As is always the case at CAMP IT Conferences events, the talks will not include product presentations. During the continental breakfast, coffee breaks, and the luncheon break you will have the opportunity to informally meet representatives from the following sponsoring companies, who have solutions in the area of the conference.


CONFERENCE SPONSORS