UPCOMING EVENTS

Cloud Security Strategies: Chicago (Rosemont/O’Hare), Illinois

 

A framework for developing a robust cloud security strategy.

 

May 16, 2024

 

9:00am-5:00pm

 

7 CPE / 0.7 CEU / CISSP / 7 PDU Credits Awarded

 

Conference location: Donald E. Stephens Convention Center Rosemont (O’Hare) Illinois

  


Overview

 

Independent analysts show that through 2023, 95% of cloud security failures will be the fault of the end-user customer.

 

Attendees will learn tips, strategies and tactics for developing a robust cloud security strategy.


What You Will Learn

 

In this one day conference attendees will learn:

  • eBPF 101 – The Evolution from Packet Capture to Kernel Capture, and What it Means for Cloud Security
  • Building Blocks for a Cloud Native Security and DR Strategy
  • Cloud IT Blind Spots – Overlooked Architecture for Cloud Security and Resilience
  • Achieving Governance and Security through Cloud Management
  • How IT and the Business Can Work Together to Bolster Cloud Security
  • Cloud Security and Cloud Disaster Recovery – How Security Leaders are Responding to Sophisticated Cyber Attacks (Panel Discussion)

Conference Price: $299.00 per person

 

Each attendee will receive a certificate awarding 7 CPE credits for CISSP continuing education, in addition to 0.7 CEUs and 7 PDUs. CISSP is a registered certification mark of (ISC)², Inc.


CONFERENCE AGENDA


8:00am – 9:00am: Registration and Continental Breakfast


9:00am – 10:00am: How IT and the Business Can Work Together to Bolster Hybrid-Cloud Security

 

Moderator:
Cordell Crane, Director, NPO USA

Panelists will include:
Mitch Christian, Global Information Security and Infrastructure Officer, Synergy Global Housing
Chris Peluso, Head of Americas, Libraesva
And others…

Join us as we cover:

 

  1. Why working together gives us a stronger security posture
  2. What we can do to change the optics – security is not just for security teams
  3. How we bridge the gap between information technology and non-technical groups
  4. Strategies from e-mail to compliance initiatives

 

 

Christian


10:00am – 10:30am: Refreshment & Exhibit Break


10:30am – 11:30am: Cloud IT Blind Spots – Overlooked Architecture for Cloud Security and Resilience

 

Securing distributed applications can be quite a challenge, especially in multi-cloud setup, where the lack of expertise leads to uncertainty about application security. Differences in environments and tools only add to the complexity. While traditional security measures are still necessary, addressing the impact of outages and shoring up network and infrastructure security and resilience can now be tackled with modern approaches such as zero trust for access, utilizing identity as a perimeter, implementing resilience in servicing user connections implementing security services at network edges.

 

This session will explore the business challenges and issues related to security and resilience through various solutions. It will provide an analysis and architecture for incorporating different schemes, techniques and protocols for cloud computing, with a focus on hybrid IaaS and PaaS systems and how to achieve security and resilience for successful adoption.

 


11:30am – 12:30pm: eBPF 101 – The Evolution from Packet Capture to Kernel Capture, and What it Means for Cloud Security

 

Brian Smith, CTO & Co-Founder, Spyderbat

 

Join Brian Smith for a historical overview of eBPF, as it matured from network packet capture probe to its current state as Linux Kernel monitoring and control powerhouse.  Brian will highlight the current power of eBPF, the vast amount of real time and historical information it provides, and how to take advantage of eBPF insights without getting buried in the details.

 

 

Smith

 


12:30pm – 1:30pm: Lunch and Exhibit Break


1:30pm – 2:30pm:  Security Optimization and the Cloud

 

John Pollack, Consulting Sales Engineer, Gigamon

 

Pollack

 

 


3:00pm – 4:00pm: Building Blocks for a Cloud Native Security and DR Strategy

 

To develop a cloud-native security and disaster recovery (DR) strategy, organizations need to consider several essential components. These include a zero-trust approach to access, as well as network, infrastructure, and application protection against cybersecurity threats. Additionally, the strategy must ensure high availability and rapid recovery in case of outages or disasters. By integrating these building blocks, organizations can create a secure and resilient cloud environment that is well-protected against potential threats and can quickly recover from any disaster.

 

Attendees will gain a better understanding of the key considerations for building a secure and resilient cloud-native environment, including the critical role of disaster recovery planning.

 

Key topics covered include:

  • Overview of cloud-native environments and the need for a robust security and disaster recovery (DR) strategy
  • Common use cases and building blocks for security and availability
  • Best practices to harden your network, infrastructure, and application security and availability posture

 


4:00pm – 5:00pm: Cloud Security and Cloud Disaster Recovery – How Security Leaders are Responding to Sophisticated Cyber Attacks (Panel Discussion)

 

In this session, attendees will learn how Cloud Security and DR Executives are planning for and responding to Cyber attacks.

 

Moderated by: Mike Shishman, VP Alliances and Partners, Xalient

 

Panelists include:

  • Dishant Bulsara, Cloud Security Architect, (Financial Services Company)
  • Ken Getch, Senior Manager- Cloud Infrastructure, Security and DevOps, Authenticx
  • Dan Hanson, Security Architect, RedMane Technology
  • Additional Cloud Security & DR leaders sharing experiences and lessons learned.

 

 

  

Shishman               Bulsara                     Getch                                  Hanson

 

 


Conference Price: $299.00 per person

 

Each attendee will receive a certificate awarding 7 CPE credits for CISSP continuing education, in addition to 0.7 CEUs and 7 PDUs. CISSP is a registered certification mark of (ISC)², Inc.

 

Exhibits

As is always the case at CAMP IT Conferences events, the talks will not include product presentations. During the continental breakfast, coffee breaks, and the luncheon break you will have the opportunity to informally meet representatives from the following sponsoring companies, who have solutions in the area of the conference.


CONFERENCE SPONSORS