Cloud Security Strategies
A framework for developing a robust cloud security strategy.
June 12, 2020
9:00am-5:00pm CST
7 CPE / 0.7 CEU / CISSP / 7 PDU Credits Awarded
Conference location: Online
Overview
Independent analysts show that through 2020, 95% of cloud security failures will be the fault of the end-user customer.
In this one day conference, attendees will learn tips, strategies and tactics for developing a robust cloud security strategy.
What You Will Learn
In this one day conference attendees will learn:
Conference Price: $0.00 per person
Each attendee will receive a certificate awarding 7 CPE credits for CISSP continuing education, in addition to 0.7 CEUs and 7 PDUs. CISSP is a registered certification mark of (ISC)², Inc.
9:00am-9:50am: Building Blocks for a Cloud Native Security and DR Strategy
Annur Sumar, Chief Technology Officer, MaeTech
This session will explore the business challenges and issues related to security and management through various different standards and solutions. It will provide an analysis and architecture for incorporating different security schemes, techniques and protocols for cloud computing, with a focus on hybrid IaaS and PaaS systems and how to achieve security and governance for successful adoption.
Sumar
9:50am -10:20am: Refreshment Break
10:20am-11:10am: Farewell to the Old Guard
James Christiansen, Vice President, Cloud Security Transformation, Netskope
Until now, the information security industry has failed to deliver business empowering security solutions, which enable organizations to quickly and securely transform digitally. Security today is too complicated and draws from a 20-year-old playbook. It needs to be re-written and based on approaches that protect and empower the business.
In this session, we will:
Topics that will be covered include:
Christiansen
11:10am-12:00pm: Managing Security Vulnerabilities: Enterprise to Cloud
Matt Johnson, Systems Engineer, Illumio
Managing vulnerabilities in any organization can be overwhelming. Enterprise environments add scale and diversity that overwhelm many IT security and operations organizations. Cloud adoption as well as and the increasing speed with which all organizations must deliver systems, applications, and features to both their internal and external customers, can make security seem unachievable.
In this session, attendees will learn how to:
Johnson
12:00pm – 12:50pm: Protecting Sensitive Data in Your Cloud Data Warehouse
Doug Wick, VP Product & Marketing, ALTR
There is no wonder why organizations are turning to cloud data warehouses for advanced analytics and data visualizations. Solutions like Snowflake, Amazon Redshift, Google BigQuery, and more provide immediate value with secure and easy access to any data with near-infinite scalability. By enabling seamless consumption and collaboration of shared data across the enterprise, organizations can make better business decisions while saving valuable time and money.
In order to truly protect your data and prevent privacy and compliance exposures, organizations must journey all the way to the query level.
Wick
12:50pm – 1:50pm Luncheon
1:50pm-2:40pm: Cloud Watch Points- Security Stumbling Blocks to Watch Out For
Derek Milroy, Sr. Security Engineer, U.S. Cellular
In this session, Derek Milroy, at CAMP IT regular speaker will share his thoughts on the security stumbling blocks to be aware of when going through a Migration.
Milroy
2:40pm – 3:10pm: Refreshment Break
3:10pm-4:00pm: Cyber Security & AI: Protecting Against AI-Enhanced Malware
Nabil Zoldjalali, Director of Cloud Security, Darktrace
Among rapidly evolving technological advancements, the emergence of AI-enhanced malware is making cyber-attacks exponentially more dangerous and harder to identify. In the near future, we will begin to see supercharged, AI-powered cyber-attacks leveraged at scale. To protect against Offensive AI attacks, organizations are turning to defensive cyber AI, which can identify and neutralize emerging malicious activity, no matter when, or where, it strikes.
In this session, learn about:
Zoldjalali
4:00pm-5:00pm: Cloud Security and Working from Home – How Security Leaders are Adjusting (Panel Discussion)
Panelists:
George Finney, Chief Security Officer, Southern Methodist University
and other professionals from IT departments sharing strategies, tactics and lessons learned
In this session, attendees learn how organizations are adapting and what new security controls they have to put in place.
Finney
Conference Price: $0.00 per person
Each attendee will receive a certificate awarding 7 CPE credits for CISSP continuing education, in addition to 0.7 CEUs and 7 PDUs. CISSP is a registered certification mark of (ISC)², Inc.
Exhibits
As is always the case at CAMP IT Conferences events, the talks will not include product presentations. During the breaks, you will have the opportunity to informally meet representatives from the following sponsoring companies, who have solutions in the area of the conference.