Cloud Security Strategies


A framework for developing a robust cloud security strategy.


June 12, 2020


9:00am-5:00pm CST


7 CPE / 0.7 CEU / CISSP / 7 PDU Credits Awarded


Conference location: Online




Independent analysts show that through 2020, 95% of cloud security failures will be the fault of the end-user customer.


In this one day conference, attendees will learn tips, strategies and tactics for developing a robust cloud security strategy.

What You Will Learn


In this one day conference attendees will learn:

  • Involve all key stakeholders
  • Identify cloud vulnerabilities
  • Prioritize data privacy
  • Use a layered approach to data security
  • Flag pitfalls in due diligence and ongoing governance
  • Understand where lines of demarcation exist in the relationship with the cloud provider and customer
  • Have a policy to enforce that all aspects of applications are deployed in a certain way
  • Identify the top 3 risks for your cloud
  • Spend your time on security controls that give you the best ROI
  • Articulate the top three cloud configuration errors in language the business can understand


Conference Price: $0.00 per person


Each attendee will receive a certificate awarding 7 CPE credits for CISSP continuing education, in addition to 0.7 CEUs and 7 PDUs. CISSP is a registered certification mark of (ISC)², Inc.

9:00am-9:50am: Building Blocks for a Cloud Native Security and DR Strategy


Annur Sumar, Chief Technology Officer, MaeTech


This session will explore the business challenges and issues related to security and management through various different standards and solutions. It will provide an analysis and architecture for incorporating different security schemes, techniques and protocols for cloud computing, with a focus on hybrid IaaS and PaaS systems and how to achieve security and governance for successful adoption.



9:50am -10:20am: Refreshment Break

10:20am-11:10am: Farewell to the Old Guard


James Christiansen, Vice President, Cloud Security Transformation, Netskope


Until now, the information security industry has failed to deliver business empowering security solutions, which enable organizations to quickly and securely transform digitally. Security today is too complicated and draws from a 20-year-old playbook. It needs to be re-written and based on approaches that protect and empower the business.


In this session, we will:


Topics that will be covered include:

  • Share how many of the Fortune 100 are redefining their cloud, network and data security programs
  • Discuss the steps and architectures that are the key to transformation
  • Reimagine your approach to enterprise security, building a new blueprint that can be used for years to come



11:10am-12:00pm: Managing Security Vulnerabilities: Enterprise to Cloud


Matt Johnson, Systems Engineer, Illumio


Managing vulnerabilities in any organization can be overwhelming. Enterprise environments add scale and diversity that overwhelm many IT security and operations organizations. Cloud adoption as well as and the increasing speed with which all organizations must deliver systems, applications, and features to both their internal and external customers, can make security seem unachievable.


In this session, attendees will learn how to:

  • Manage assets successfully and analyze and prioritize vulnerabilities
  • Determine which reports are most effective
  • Mature your program and think differently about vulnerability management.




12:00pm – 12:50pm:  Protecting Sensitive Data in Your Cloud Data Warehouse


Doug Wick, VP Product & Marketing, ALTR


There is no wonder why organizations are turning to cloud data warehouses for advanced analytics and data visualizations. Solutions like Snowflake, Amazon Redshift, Google BigQuery, and more provide immediate value with secure and easy access to any data with near-infinite scalability. By enabling seamless consumption and collaboration of shared data across the enterprise, organizations can make better business decisions while saving valuable time and money.

In order to truly protect your data and prevent privacy and compliance exposures, organizations must journey all the way to the query level.



12:50pm – 1:50pm Luncheon

1:50pm-2:40pm: Cloud Watch Points- Security Stumbling Blocks to Watch Out For


Derek Milroy, Sr. Security Engineer, U.S. Cellular


In this session, Derek Milroy, at CAMP IT regular speaker will share his thoughts on the security stumbling blocks to be aware of when going through a Migration.





2:40pm – 3:10pm: Refreshment Break

3:10pm-4:00pm: Cyber Security & AI: Protecting Against AI-Enhanced Malware


Nabil Zoldjalali, Director of Cloud Security, Darktrace


Among rapidly evolving technological advancements, the emergence of AI-enhanced malware is making cyber-attacks exponentially more dangerous and harder to identify. In the near future, we will begin to see supercharged, AI-powered cyber-attacks leveraged at scale. To protect against Offensive AI attacks, organizations are turning to defensive cyber AI, which can identify and neutralize emerging malicious activity, no matter when, or where, it strikes.


In this session, learn about:


  • Paradigm shifts in the cyber landscape
  • Advancements in offensive AI attack techniques
  • Real-world examples of emerging threats that were stopped with Cyber AI



4:00pm-5:00pm: Cloud Security and Working from Home – How Security Leaders are Adjusting (Panel Discussion)


George Finney, Chief Security Officer, Southern Methodist University
and other professionals from IT departments sharing strategies, tactics and lessons learned


In this session, attendees learn how organizations are adapting and what new security controls they have to put in place.




Conference Price: $0.00 per person


Each attendee will receive a certificate awarding 7 CPE credits for CISSP continuing education, in addition to 0.7 CEUs and 7 PDUs. CISSP is a registered certification mark of (ISC)², Inc.



As is always the case at CAMP IT Conferences events, the talks will not include product presentations.  During the breaks, you will have the opportunity to informally meet representatives from the following sponsoring companies, who have solutions in the area of the conference.