UPCOMING EVENTS

Security Architecture Strategies: Chicago (Rosemont/O’Hare), Illinois

 

Strategies to secure business driven enterprise architecture.

 

October 20, 2022

 

9:00am-5:00pm

 

7 CPE / 0.7 CEU / CISSP / 7 PDU Credits Awarded

 

Conference location: Donald E. Stephens Convention Center Rosemont (O’Hare) Illinois

  

    


Overview

 

In order to build and run applications securely there are key architectural components that need to be in place. Without infrastructure components like proper encryption, standard authentication methods and logging standards developers are challenged to build secure applications. Without proper pre-production testing and event logging / analysis knowing if an application is under attack and should you worry when it is becomes virtually impossible. With the advent of containers and the ability to scale application across different platforms the problem only gets compounded.

 

This conference will present the key architectural components your company should have in place that will allow you to build, run and monitor applications more securely.


What You Will Learn

 

The C-suite understands that security policies and controls have a direct impact on the ability of organizations to respond to business disruption.

 

In this one day in-person conference, attendees will learn:

  • Cybersecurity in the Era of Digital Transformation
  • Confidential Computing is Coming for You – Whether You are Ready or Not
  • Cloud Disaster Recovery Architecture – Building Blocks for Your Cyber Security Program
  • How to Build an Adaptable Security Architecture
  • Transformational Security Strategy — How to Develop a Plan That is Effective
  • How Enterprise IT Security Executives are Bolstering Their Architecture (Panel Discussion)

Conference Price: $299.00 per person

 

Each attendee will receive a certificate awarding 7 CPE credits for CISSP continuing education, in addition to 0.7 CEUs and 7 PDUs. CISSP is a registered certification mark of (ISC)², Inc.


9:00am-10:00am: 5 Steps to Start Zero Trust Journey

 

Changes in the security landscape and ineffectiveness of current architectures have created significant interest in zero trust security architectures.

This presentation will pragmatically explore zero trust and zero trust networking and extend these concepts to operating systems, applications, users and data. We will cover NIST architectures for zero trust as well as technologies.

 


10:00am-10:30am: Refreshment Break


10:30am-11:30am: How to Build Your Information Security Architecture 

 

In this session, attendees will go through five crucial steps for an effective Security Architecture:

 

  • Assess your current security situation.
  • Analyze security insights (strategic and technical).
  • Develop the logical security layer of the architecture.
  • Design the EISA implementation.
  • Treat architecture as an ongoing process.

 


11:30am-12:30pm: How Enterprise IT Security Executives are Bolstering Their Architecture (Panel Discussion)

 

In this session, attendees will go through five crucial steps for an effective Security Architecture:

  1. Assess your current security situation.
  2. Analyze security insights (strategic and technical).
  3. Develop the logical security layer of the architecture.
  4. Design the EISA implementation.
  5. Treat architecture as an ongoing process

 

Moderator: Marc Kreppel, Manager, Zerto

 

Panelists include:

  • Adam Kohnke, IT Cyber Security Architect, Charter Next Generation
  • Ron Versetto, Executive Director – IT, University of Illinois at Chicago
  • Other Security Architecture Executives sharing best practices and lessons learned

 

 

 

 

Kreppel                             Kohnke               Versetto

 


12:30pm-1:30pm:  Lunch Break


1:30pm-2:30pm:  Cybersecurity in the Era of Digital Transformation

 

Digital transformation helped organizations reach new heights, but not without new security challenges. The threat landscape has evolved to take advantage of increasing IT complexity and fragmentation, inflicting tremendous damage to businesses around the world. Security teams need a different approach to achieve a stronger, more agile cybersecurity posture. In this session, you will learn why transparency across your digital estate and managing your attack surface are the cornerstones to cyber resiliency.

 


2:30pm-3:00pm:  Refreshment Break


3:00pm-4:00pm: Cloud Disaster Recovery Architecture – Building Blocks for Your Cyber Security Program

 

In this session, attendees will learn how to build a robust BC/DR architecture to align with the security needs of the organization.

 


4:00pm-5:00pm:  How to Build a Secure Software Development Lifecycle

 

In this session you will learn the steps to turn your SLDC into an effective mechanism for securing applications, without going over your budget.

 


Exhibits

As is always the case at CAMP IT Conferences events, the talks will not include product presentations. During the continental breakfast, coffee breaks, and the luncheon break you will have the opportunity to informally meet representatives from the following sponsoring companies, who have solutions in the area of the conference.


CONFERENCE CO-SPONSORS