Skip to content


 

PAST EVENTS

 Security Architecture Strategies: Chicago (Rosemont/O’Hare), Illinois

 

Strategies to secure business driven enterprise architecture.

 

October 20, 2022

 

9:00am-5:00pm

 

7 CPE / 0.7 CEU / CISSP / 7 PDU Credits Awarded

 

Conference location: Donald E. Stephens Convention Center Rosemont (O’Hare) Illinois    

    

 


Overview

 

In order to build and run applications securely there are key architectural components that need to be in place. Without infrastructure components like proper encryption, standard authentication methods and logging standards developers are challenged to build secure applications. Without proper pre-production testing and event logging / analysis knowing if an application is under attack and should you worry when it is becomes virtually impossible. With the advent of containers and the ability to scale application across different platforms the problem only gets compounded.

 

This conference will present the key architectural components your company should have in place that will allow you to build, run and monitor applications more securely.


What You Will Learn

 

The C-suite understands that security policies and controls have a direct impact on the ability of organizations to respond to business disruption.

 

In this one day in-person conference, attendees will learn:

  • Developing an Award Winning Security Program – Lessons Learned
  • Security Architecture and Business Resiliency
  • How Cybersecurity Myths Persist and What to Do Instead
  • How Enterprise IT Security Executives are Bolstering Their Architecture (Panel Discussion)
  • Security Architecture Review Process – Trust/IDs/Applications
  • How to Modernize Your Security Architecture

 


Conference Price: $299.00 per person

 

Each attendee will receive a certificate awarding 7 CPE credits for CISSP continuing education, in addition to 0.7 CEUs and 7 PDUs. CISSP is a registered certification mark of (ISC)², Inc.


9:00am-10:00am:  Security Architecture and Business Resiliency

 

Patrick Benson, Systems Engineer, Veeam

Kevin Finch, Senior Business Continuity Architect, Sayers

 

 

Security and Infrastructure need to cooperate in order to ensure business resiliency, but many organizations fail to unite the two, leaving them vulnerable. Worse yet, some organizations unwittingly encourage opposition between the two. We will briefly discuss the importance of working together in those areas, and highlight some specific strategies companies can use to keep different areas of the business in alignment for better security, and better continuity of operations.

 

 

 

Benson                                             Finch

 

 


10:00am-10:30am: Refreshment Break


10:30am-11:30am: Fireside Chat:  Security Architecture Review Process – Trust/IDs/Applications

 

Ryan Radtke, Director, Information Security Architecture, AbbVie

 

Radtke

 


11:30am-12:30pm: How Enterprise IT Security Executives are Bolstering Their Architecture (Panel Discussion)

 

In this session, attendees will go through five crucial steps for an effective Security Architecture:

  1. Assess your current security situation.
  2. Analyze security insights (strategic and technical).
  3. Develop the logical security layer of the architecture.
  4. Design the EISA implementation.
  5. Treat architecture as an ongoing process

 

Moderator: Marc Kreppel, Manager, Zerto

 

Panelists include:

  • Adam Kohnke, IT Cyber Security Architect, Charter Next Generation
  • Ron Versetto, Executive Director – IT, University of Illinois at Chicago
  • Keith Conlee, Chief Security Officer, IT, College of DuPage
  • Other Security Architecture Executives sharing best practices and lessons learned

 

 

 

 

Kreppel                                              Kohnke                                Versetto                         Conlee

 


12:30pm-1:30pm:  Lunch Session, Special Fireside Chat — Developing an Award Winning Security Program – Lessons Learned

 

Dean Sharp, Global Director of Information Security Architecture and Engineering, ManpowerGroup

 

 

Sharp

 


1:30pm-2:30pm: Suspension of Disbelief: How Cybersecurity Myths Persist and What to Do Instead

 

Paul Jespersen, VP Worldwide Sales & Business Development, Sandfly Security

 

Sometimes its easier to hope for the magic bullet solutions, or MORE solutions, but instead of just accepting many of the current myths at face value, there are a few things we can do to make sure we have the right priorities in our operations, resources, and budgets.

 

 

Jespersen

 

 


2:30pm-3:00pm:  Refreshment Break


3:00pm-4:00pm: Breakout Session – How to Modernize Your Security Architecture

 

In this session, attendees will breakout into groups and discuss:

  • How to Build Resilience into Your Cybersecurity Program
  • Ideas of New Approaches and Technology Architectures that will be needed to securely enable the business
  • How to Collaborate with C-suite leaders and provide education where necessary to garner understanding and support
  • Different Approaches to Data Protection
  • How to Build a Zero Trust Philosophy Throughout the Organization
  • How to Tie In Disaster Recovery & Business Continuity with Your Security Architecture

 

 


Exhibits

As is always the case at CAMP IT Conferences events, the talks will not include product presentations. During the continental breakfast, coffee breaks, and the luncheon break you will have the opportunity to informally meet representatives from the following sponsoring companies, who have solutions in the area of the conference.


[/vc_column_text][/vc_column][/vc_row][vc_row row_type=”row” use_row_as_full_screen_section=”no” type=”grid” text_align=”left” box_shadow_on_row=”no”][vc_column][vc_column_text]

CONFERENCE CO-SPONSORS

[/vc_column_text][/vc_column][/vc_row][vc_row row_type=”row” use_row_as_full_screen_section=”no” type=”full_width” text_align=”left” box_shadow_on_row=”no”][vc_column][vc_empty_space height=”64px” image_repeat=”no-repeat”][/vc_column][/vc_row][vc_row row_type=”row” use_row_as_full_screen_section=”no” type=”grid” text_align=”left” box_shadow_on_row=”no”][vc_column width=”1/2″][vc_single_image image=”361917″ img_size=”medium” onclick=”custom_link” img_link_target=”_blank” link=”https://www.sandflysecurity.com/”][/vc_column][vc_column width=”1/2″][vc_single_image image=”360658″ img_size=”medium” alignment=”right” onclick=”custom_link” img_link_target=”_blank” link=”https://www.zerto.com/”][/vc_column][/vc_row][vc_row row_type=”row” use_row_as_full_screen_section=”no” type=”full_width” text_align=”left” box_shadow_on_row=”no”][vc_column][vc_empty_space height=”64px” image_repeat=”no-repeat”][/vc_column][/vc_row][vc_row row_type=”row” use_row_as_full_screen_section=”no” type=”grid” text_align=”left” box_shadow_on_row=”no”][vc_column width=”1/2″][vc_single_image image=”362277″ img_size=”full” onclick=”custom_link” img_link_target=”_blank” link=”https://www.sayers.com/”][/vc_column][vc_column width=”1/2″][vc_single_image image=”361103″ img_size=”medium” alignment=”right” onclick=”custom_link” img_link_target=”_blank” link=”https://www.veeam.com/”][/vc_column][/vc_row][vc_row row_type=”row” use_row_as_full_screen_section=”no” type=”full_width” text_align=”left” box_shadow_on_row=”no”][vc_column][vc_empty_space height=”64px” image_repeat=”no-repeat”][/vc_column][/vc_row]