Feedback from Attendees

Upcoming  2017 Events

July 12, 2017
Enterprise Architecture Strategies
Info
Chicago, IL

Sept. 7, 2017
IT Infrastructure/Operations Management (Data Center)
Info
Chicago, IL

Sept. 19, 2017
Enterprise Risk/Security Management
Info
Dallas, TX

Oct. 4, 2017
Enterprise Risk/Security Management
Info
Chicago, IL

Oct. 18, 2017
IT Leadership Strategies
Info
Chicago, IL

Oct. 26, 2017
Enterprise Architecture Strategies
Info
Chicago, IL

Nov. 1-2, 2017
IT PMO/Portfolio Management
Info
Dallas, TX

Nov. 15, 2017
DR/BC - Resilient Infrastructure
Info
Chicago, IL

Nov. 30, 2017
Business Intelligence/Big Data/Analytics
Info
Chicago, IL

Dec. 7, 2017
Data Breaches: Preparing and Responding
Info
Chicago, IL

Upcoming  2018 Events

Feb. 1, 2018
Enterprise Risk/Security Management
Info
Dallas, TX

Feb. 20, 2018
Enterprise Risk/Security Management
Info
Chicago, IL

Mar. 1, 2018
IT Leadership Strategies
Info
Chicago, IL

Mar. 7, 2018
Enterprise Architecture Strategies
Info
Chicago, IL

April 12, 2018
Business Intelligence/Big Data/Analytics
Info
Chicago, IL

May 2, 2018
Data Breaches: Preparing and Responding
Info
Chicago, IL

May 15, 2018
IT Infrastructure/Operations Management (Data Center)
Info
Chicago, IL

May 31, 2018
Enterprise Risk/Security Management
Info
Minneapolis, MN

June 7, 2018
Enterprise Risk/Security Management
Info
Chicago, IL

June 20-21, 2018
IT PMO/Portfolio Management
Info
Chicago, IL

July 11, 2018
Enterprise Architecture Strategies
Info
Chicago, IL

Sept. 6, 2018
IT Infrastructure/Operations Management (Data Center)
Info
Chicago, IL

Sept. 18, 2018
Enterprise Risk/Security Management
Info
Dallas, TX

Oct. 3, 2018
Enterprise Risk/Security Management
Info
Chicago, IL

Oct. 17, 2018
IT Leadership Strategies
Info
Chicago, IL

Oct. 25, 2018
Enterprise Architecture Strategies
Info
Chicago, IL

Nov. 1-2, 2018
IT PMO/Portfolio Management
Info
Dallas, TX

Nov. 14, 2018
DR/BC - Resilient Infrastructure
Info
Chicago, IL

Nov. 29, 2018
Business Intelligence/Big Data/Analytics
Info
Chicago, IL

Dec. 6, 2018
Data Breaches: Preparing and Responding
Info
Chicago, IL

(Click here to add any of our upcoming events to your calendar)

 

 

Conferences that solve current IT challenges

Mobile/Cloud/IoT Security – Strategies for the New Area

Strategies to help your organization increase security and reduce risk in this new era of disruptive technologies

April 26, 2016

9:00am-5:00pm

7 CPE / 0.7 CEU / CISSP / 7 PDU Credits Awarded

Conference location: Donald E. Stephens Convention Center Rosemont (O'Hare) Illinois

Overview

The convergence of IoT, Cloud and Mobility are transforming the way organizations are doing business. From healthcare to banking to hospitality organizations are delivering greater value by being closer to their customers. At the same time, enterprises embracing these initiatives need to be aware of the security risks involved.  In this one day session, attendees will learn strategies to manage the risks associated with this approach.

Topics that will be discussed

  • Risk Framework: Managing the Risk of New Technologies – Identity, Mobility and Cloud

  • IoT: Will This Be the Next Security Apocalypse?

  • Compliance and Security Best Practices for Cloud Computing Environments

  • Mobile/Cloud/IoT – 4 Steps to Secure the Next Generation

  • Security/Risk Metrics: How IT Security/Risk Executives are Leveraging Metrics for Mobile/Cloud/IoT Security

  • Planning & Preparing: How IT Organizations are Getting Ahead of the Mobile/Cloud/IoT Threats

Conference Program

8:00am - 9:00am - Registration and Continental Breakfast

Sumar

9:00am-10:00am

Risk Framework: Managing the Risk of New Technologies – Identity, Mobility and Cloud

Annur Sumar, Microsoft MVP, Former Vice President of IT D&P

The change of pace in new cloud technologies is overwhelming at times. While the advances being made can lead to great advantages for the business, the security risks also increase significantly.

In this session, attendees will learn how to develop a framework to assess and mitigate the risk when implementing new technologies such as Cloud based Identity and Mobility in the enterprise.








10:00am -10:30am - Refreshment Break

 

10:30am-11:30am

Connect & Protect: Building a Trust-Based Network for Business-Critical Apps and IoT/Mobility

 

With the surge of smart and IoT devices connecting to enterprise networks, conventional security methods for secure mobile access are not enough. Discover why technologies like deep packet inspection, firewalls, MDM and network access control must work together to ensure accurate policy enforcement for Wi-Fi and wired.  In this session, you will learn about how all security components working together will play a pivotal role in connecting and protecting the diverse range of devices that make up today’s mobile enterprise. We will also review advanced network policy management tools for interrogating IoT devices, defining user and device privileges, and determine whether or not they should be who and what are allowed to connect - in the office and out.









Sweet

11:30am-12:30pm

Compliance and Security Best Practices for Cloud Computing Environments

Carson Sweet, Co-founder and Chief Technology Officer, CloudPassage

In order to maximize the tremendous opportunity cloud computing represents, customers must address the unique security challenges posed by cloud computing, especially when organizations have the need to comply with regulations such as PCI, SOX, or HIPAA. In this session, you will learn about the security challenges of moving your data and running your applications in the cloud and the best practices and technologies available to mitigate those risks.










12:30pm - 1:30pm Luncheon

Kwong

1:30pm-2:30pm

Mobile/Cloud/IoT – 4 Steps to Secure the Next Generation

Fred Kwong, PhD., Director, Security Architecture & Strategy, Farmers Insurance

We have found that 4 key steps are fundamental to securing the next generation. They are:

  1. Optimizing the security program -- reducing overall IT costs through intrinsic security instead of adding to IT costs with extrinsic systems;
  2. Stopping advanced threats -- discerning the significant from the noise with a strong analytics capability;
  3. Protecting critical assets -- aligning development and security to control who has access to what, and how they access it;
  4. Safeguarding Cloud & Mobile -- providing security intelligence that covers the distribution and delivery of IT Services, from the processing-point to the end-point.







 

2:30pm - 3:00pm - Refreshment Break

Marchewka

3:00pm-4:00pm

Security/Risk Metrics: How IT Security/Risk Executives are Leveraging Metrics for Mobile/Cloud/IoT Security

Edward Marchewka, Director IT, Gift of Hope

In this session, Edward Marchewka, Director IT, Gift of Hope will share the key risk-based security metrics used most often to help gauge the effectiveness of their overall risk/security efforts.

Areas that will be covered include:

  • How to use metrics oriented towards higher order outcomes
  • How to track proactive metrics
  • How to show a reduction in data breaches
  • How to articulate the reduction in unplanned system downtime
  • How to evaluate the length of time to contain security breaches and exploit









4:00pm-5:00pm

Sumar

Kwong

Williams

Marchewka

Planning & Preparing: How IT Organizations are Getting Ahead of the Mobile/Cloud/IoT Threats

Morderator:
Annur Sumar, Microsoft MVP, Former Vice President of IT D&P
Panelists:
Fred Kwong, PhD., Director, Security Architecture & Strategy, Farmers Insurance
Clayton Williams, Jr., Director, Information Technology Security & Compliance, Heidrick & Struggles
Edward Marchewka, Director IT, Gift of Hope
and other professionals from IT departments

And other Security/Risk Leaders sharing experiences and lessons learned
In this session, attendees will learn how IT organizations are preparing for the threats ahead in this new era.

Topics covered:

  • How are they are working with the line of business to understand IoT applications
  • How they are protecting the enterprise from risks associated with emerging technologies and solutions like IoT
  • How they are involving IoT into their current Mobile & Cloud Security plans











Conference Price: $289.00 per person


Each attendee will receive a certificate awarding 7 CPE credits for CISSP continuing education, in addition to 0.7 CEUs and 7 PDUs. CISSP is a registered certification mark of (ISC)², Inc.

Exhibits

As is always the case at CAMP IT Conferences events, the talks will not include product presentations.  During the continental breakfast, coffee breaks, and the luncheon break you will have the opportunity to informally meet representatives from the following sponsoring companies, who have solutions in the area of the conference.