Skip to content

PAST EVENTS


Cloud Security Strategies: Chicago (Rosemont/O’Hare), Illinois

 

A framework for developing a robust cloud security strategy.

 

April 21, 2022

 

9:00am-5:00pm

 

7 CPE / 0.7 CEU / CISSP / 7 PDU Credits Awarded

 

Conference location: Donald E. Stephens Convention Center Rosemont (O’Hare) Illinois[


Overview

 

Independent analysts show that through 2021, 94% of cloud security failures will be the fault of the end-user customer.

 

In this one day conference, attendees will learn tips, strategies and tactics for developing a robust cloud security strategy.


What You Will Learn

 

In this one day conference attendees will learn:

  • The 7 Cloud Security Best Practices
  • Achieving Governance and Security through Cloud Management
  • Cloud Security & BC/DR: Recovering from Ransomware & Breaches
  • Managing Security Vulnerabilities: Enterprise to Cloud
  • Protecting Sensitive Data in Your Cloud Data Warehouse
  • Cloud Security: How CISOs/InfoSec Leaders Have Adjusted to the Cloud World

 


Conference Price: $299.00 per person

 

Each attendee will receive a certificate awarding 7 CPE credits for CISSP continuing education, in addition to 0.7 CEUs and 7 PDUs. CISSP is a registered certification mark of (ISC)², Inc.

 

Exhibits

As is always the case at CAMP IT Conferences events, the talks will not include product presentations. During the continental breakfast, coffee breaks, and the luncheon break you will have the opportunity to informally meet representatives from the following sponsoring companies, who have solutions in the area of the conference.


Conference Program


9:00am-10:00am: How IT and the Business Can Work Together to Bolster Cloud Security

 

Joseph Kupiec, Team Lead, Cloud Solutions Group, PSM Partners

 

Areas to be Covered:

    1. Why working together gives us a stronger security posture
    2. What we can do to change the optics – security is not just for security teams
    3. How we bridge the gap between information technology and non-technical groups

 

Kupiec

 


10:00am-10:30am: Refreshment Break


10:30am-11:30am: Breakout Session Cloud Security 

 

 


11:30am-12:30pm: “Cluster Wrangling: How to make Kubernetes Clusters Secure and Usable”    (Zoom)

 

Rory McCune, Cloud Native Security Advocate, Aqua Security

 

With the usage of Kubernetes in large companies ever increasing, it is important to get security right early on in the adoption process. As with any new technology best practices are still emerging, so there is no “one true way” to secure a cluster. When it comes to Kubernetes big and small, many mistakes are still made when deployed and these mistakes often come with increased risk at very little cost of putting them right. From years of working with numerous firms on doing k8s the right way, come and learn the best way to deploy clusters, what does and what doesn’t work and more importantly learn how to adopt strategies to help your clusters stay secure. 

 

McCune

 


12:30pm-1:30pm: Lunch Break


1:30pm-2:30pm: Reducing Security Risks Associated with 3rd Party Actors

 

Kyle Kammer, Senior Solutions Engineer, Okta

 

Covering best practices and beyond when securing access from 3rd party actors, such as contractors, sub-processors, etc.

 

Kammer


2:30pm-3:00pm: Refreshment Break


3:00pm-4:00pm: “Encrypt the data, or someone else will!”

 

John Wyss, Vice President of Products, Fortanix

 

Latest best practices for protecting assets across a multi-cloud environment, including encryption, tokenization and key management, with particular focus on rising compliance obligations.

 

Wyss

 


4:00pm-5:00pm: Cloud Security in a Hybrid Work World – How Security Leaders are Adjusting (Panel Discussion)

Panelists will include:

  • Mitch Christian, CISO, Synergy Global Housing
  • John Kellerhals, Security Operations, CF Industries

 

In this session, attendees learn how organizations are adapting and what new security controls they have to put in place.

 

Christian           Kellerhals


Conference Price: $299.00 per person

 

Each attendee will receive a certificate awarding 7 CPE credits for CISSP continuing education, in addition to 0.7 CEUs and 7 PDUs. CISSP is a registered certification mark of (ISC)², Inc.

 

Exhibits

As is always the case at CAMP IT Conferences events, the talks will not include product presentations.  During the breaks, you will have the opportunity to informally meet representatives from the following sponsoring companies, who have solutions in the area of the conference.


[/vc_column_text][/vc_column][/vc_row][vc_row row_type=”row” use_row_as_full_screen_section=”no” type=”grid” text_align=”left” box_shadow_on_row=”no”][vc_column][vc_column_text]

CONFERENCE SPONSORS

[/vc_column_text][/vc_column][/vc_row][vc_row row_type=”row” use_row_as_full_screen_section=”no” type=”full_width” text_align=”left” box_shadow_on_row=”no”][vc_column][vc_empty_space height=”64px” image_repeat=”no-repeat”][/vc_column][/vc_row][vc_row row_type=”row” use_row_as_full_screen_section=”no” type=”grid” text_align=”left” box_shadow_on_row=”no”][vc_column width=”1/2″][vc_single_image image=”360720″ img_size=”medium” alignment=”right” onclick=”custom_link” img_link_target=”_blank” link=”https://www.aquasec.com/”][/vc_column][vc_column width=”1/2″][vc_single_image image=”351002″ img_size=”large” alignment=”center” onclick=”custom_link” img_link_target=”_blank” link=”https://www.okta.com/”][/vc_column][/vc_row][vc_row row_type=”row” use_row_as_full_screen_section=”no” type=”full_width” text_align=”left” box_shadow_on_row=”no”][vc_column][vc_empty_space height=”64px” image_repeat=”no-repeat”][/vc_column][/vc_row][vc_row row_type=”row” use_row_as_full_screen_section=”no” type=”full_width” text_align=”left” box_shadow_on_row=”no”][vc_column width=”1/2″][vc_single_image image=”360843″ img_size=”medium” alignment=”right” onclick=”custom_link” img_link_target=”_blank” link=”https://www.psmpartners.com/”][/vc_column][vc_column width=”1/2″][vc_single_image image=”360600″ img_size=”medium” onclick=”custom_link” img_link_target=”_blank” link=”https://fortanix.com/”][/vc_column][/vc_row][vc_row row_type=”row” use_row_as_full_screen_section=”no” type=”full_width” text_align=”left” box_shadow_on_row=”no”][vc_column][vc_empty_space image_repeat=”no-repeat”][/vc_column][/vc_row][vc_row row_type=”row” use_row_as_full_screen_section=”no” type=”full_width” text_align=”left” box_shadow_on_row=”no”][vc_column width=”1/2″][/vc_column][vc_column width=”1/2″][vc_single_image image=”360915″ img_size=”medium” onclick=”custom_link” img_link_target=”_blank” link=”https://www.wiz.io”][/vc_column][/vc_row][vc_row row_type=”row” use_row_as_full_screen_section=”no” type=”full_width” text_align=”left” box_shadow_on_row=”no”][vc_column][vc_empty_space image_repeat=”no-repeat”][/vc_column][/vc_row]