Feedback from Attendees

Upcoming  2016 Events

Sep 22, 2016
Enterprise Risk/Security Management
Info
Dallas, TX

Oct 6, 2016
Enterprise Risk/Security Management
Info
Chicago, IL

Oct 20, 2016
IT Leadership Strategies
Info
Chicago, IL

Oct 26, 2016
Data Breaches: Defending Against and Responding to
Info
Chicago, IL

Nov 2-3, 2016
IT PMO/Portfolio Management
Info
Dallas, TX

Nov 15, 2016
Enterprise Risk/Security Management
Atlanta, GA
Info

Dec 1, 2016
Business Intelligence/Big Data/Analytics
Info
Chicago, IL

Dec 8, 2016
Data Breaches: Defending Against and Responding to
Info
Chicago, IL

Upcoming  2017 Events

Feb. 2, 2017
Enterprise Risk/Security Management
Info
Dallas, TX

Feb. 16, 2017
Enterprise Risk/Security Management
Info
Chicago, IL

March 2, 2017
IT Leadership Strategies
Info
Chicago, IL

March 8, 2017
IT Architecture Strategies
Info
Chicago, IL

April 20, 2017
Business Intelligence/Big Data/Analytics
Info
Chicago, IL

April 24-25, 2017
Enterprise Risk/Security Management
Info
Las Vegas, NV

May 4, 2017
Data Breaches: Preparing and Responding
Info
Chicago, IL

May 16, 2017
IT Infrastructure/Operations Management (Data Center)
Info
Chicago, IL

June 1, 2017
Enterprise Risk/Security Management
Info
Minneapolis, MN

June 8, 2017
Enterprise Risk/Security Management
Info
Chicago, IL

June 21-22, 2017
IT PMO/Portfolio Management
Info
Chicago, IL

Sept. 7, 2017
IT Infrastructure/Operations Management (Data Center)
Info
Chicago, IL

Sept. 19, 2017
Enterprise Risk/Security Management
Info
Dallas, TX

Oct. 4, 2017
Enterprise Risk/Security Management
Info
Chicago, IL

Oct. 11, 2017
IT Architecture Strategies
Info
Chicago, IL

Oct. 19, 2017
IT Leadership Strategies
Info
Chicago, IL

Nov. 1-2, 2017
IT PMO/Portfolio Management
Info
Dallas, TX

Nov. 15, 2017
Enterprise Risk/Security Management
Info
Atlanta, GA

Nov. 30, 2017
Business Intelligence/Big Data/Analytics
Info
Chicago, IL

Dec. 7, 2017
Data Breaches: Preparing and Responding
Info
Chicago, IL

 

 

 

(Click here to add any of our upcoming events to your calendar)

 

 

Conferences that solve current IT challenges

Mobile/Cloud/IoT Security – Strategies for the New Area

Strategies to help your organization increase security and reduce risk in this new era of disruptive technologies

December 10, 2015

9:00am-5:00pm

7 CPE / 0.7 CEU / CISSP / 7 PDU Credits Awarded

Conference location: Donald E. Stephens Convention Center Rosemont (O'Hare) Illinois

Overview

The convergence of IoT, Cloud and Mobility are transforming the way organizations are doing business. From healthcare to banking to hospitality organizations are delivering greater value by being closer to their customers. At the same time, enterprises embracing these initiatives need to be aware of the security risks involved.  In this one day session, attendees will learn strategies to manage the risks associated with this approach.

Topics that will be discussed

  • IoT, Cloud & Mobility – Driving Business Value

  • IoT: Will This Be the Next Security Apocalypse?

  • Compliance and Security Best Practices for Cloud Computing Environments

  • IoT Mobile/WLAN Authentication Strategy & Execution

  • Mobile/Cloud/IoT – Steps to Secure the Next Generation

  • Planning & Preparing: How IT Organizations are Getting Ahead of the Mobile/Cloud/IoT Threats

Conference Program

8:00am - 9:00am - Registration and Continental Breakfast

Rushing

9:00am-10:00am

IoT: Will This Be the Next Security Apocalypse?

Richard Rushing, CISO, Motorola Mobility

The internet of things, is a loose group of devices that use networks to send or receive information. Most of this device started life without being design with security in mind. Now with billions of devices, new devices being added every day. It not when or what can go wrong, but is going wrong today on the internet of things. We take a look at the issues plaguing the devices, the applications, the servers and the data collected. We look to see if we must repeat the last 30 years of security matters, or learn from our mistakes and create a secure network of things. We will look at several problems and solutions for the "Internet of Things" that can dramatically increase the level of security.






10:00am -10:30am - Refreshment Break

King

10:30am-11:30am

Connect & Protect: Building a Trust-Based Network for Business-Critical Apps and IoT/Mobility

Chris King, Manager, Systems Engineering, Aruba, a Hewlett Packard Enterprise company

With the surge of smart and IoT devices connecting to enterprise networks, conventional security methods for secure mobile access are not enough. Discover why technologies like deep packet inspection, firewalls, MDM and network access control must work together to ensure accurate policy enforcement for Wi-Fi and wired.  In this session, you will learn about how all security components working together will play a pivotal role in connecting and protecting the diverse range of devices that make up today’s mobile enterprise. We will also review advanced network policy management tools for interrogating IoT devices, defining user and device privileges, and determine whether or not they should be who and what are allowed to connect - in the office and out.









Kwong

11:30am-12:30pm

Compliance and Security Best Practices for Cloud Computing Environments

Fred Kwong, Head of Privilege Access Control, Farmers Insurance

In order to maximize the tremendous opportunity cloud computing represents, customers must address the unique security challenges posed by cloud computing, especially when organizations have the need to comply with regulations such as PCI, SOX, or HIPAA. In this session, you will learn about the security challenges of moving your data and running your applications in the cloud and the best practices and technologies available to mitigate those risks.










12:30pm - 1:30pm Luncheon

Lundgren

1:30pm-2:30pm

IoT Mobile/WLAN Authentication Strategy & Execution

Bill Lundgren, Team Lead, Systems Engineer, Aerohive Networks

WLAN authentication has traditionally been handled by either RADIUS 802.1x or by standard Preshared Keys (PSK) like we all use in our homes. RADIUS is very secure and powerful, but complicated and not all devices understand it - especially those of the IoT variety. PSKs are easy to setup, but not particularly secure, do not allow for granular policy control and must be changed across all devices when one goes missing. MAC authentication can improve on PSK security, but is very labor intensive.

This presentation will give you network security strategies that you can put to work to manage the challenges that IoT authentication poses.








2:30pm - 3:00pm - Refreshment Break

Welder

3:00pm-4:00pm

Mobile/Cloud/IoT – 4 Steps to Secure the Next Generation

Frank Welder, Sr. Consultant, Avnet Technology Solutions

Working with over 9,000 customers, IBM and Cognalytix have found that 4 key steps are fundamental to securing the next generation. They are:

  1. Optimizing the security program -- reducing overall IT costs through intrinsic security instead of adding to IT costs with extrinsic systems;
  2. Stopping advanced threats -- discerning the significant from the noise with a strong analytics capability;
  3. Protecting critical assets -- aligning development and security to control who has access to what, and how they access it;
  4. Safeguarding Cloud & Mobile -- providing security intelligence that covers the distribution and delivery of IT Services, from the processing-point to the end-point.

And IBM and Cognalytix has seen that the companies taking these steps are investing in 13 key security controls.

These 4 steps and 13 security controls are getting the majority of investment, globally.

Cognalytix will discuss these 13 key security controls and how they're enabling the 4 steps to securing the next generation.











4:00pm-5:00pm

Sumar

Pero

McCallister

Planning & Preparing: How IT Organizations are Getting Ahead of the Mobile/Cloud/IoT Threats

Moderator:
Annur Sumar, Regional Director, Concurrency
Panelists:
Carlos Pero, ‎Head of Application Security – Americas, Zurich Insurance Company Ltd.
Seth McCallister, Head of Global Information Security, Beam Suntory
and other  professionals from IT departments

And other Security/Risk Leaders sharing experiences and lessons learned
In this session, attendees will learn how IT organizations are preparing for the threats ahead in this new era.

Topics covered:

  • How are they are working with the line of business to understand IoT applications
  • How they are protecting the enterprise from risks associated with emerging technologies and solutions like IoT
  • How they are involving IoT into their current Mobile & Cloud Security plans





Conference Price: $289.00 per person


Each attendee will receive a certificate awarding 7 CPE credits for CISSP continuing education, in addition to 0.7 CEUs and 7 PDUs. CISSP is a registered certification mark of (ISC)², Inc.

Exhibits

As is always the case at CAMP IT Conferences events, the talks will not include product presentations.  During the continental breakfast, coffee breaks, and the luncheon break you will have the opportunity to informally meet representatives from the following sponsoring companies, who have solutions in the area of the conference.