Skip to content

[vc_row row_type=”row” use_row_as_full_screen_section=”no” type=”full_width” text_align=”left” background_image=”348335″ box_shadow_on_row=”no”][vc_column css=”.vc_custom_1509976289581{padding-top: 200px !important;padding-bottom: 199px !important;}”][vc_column_text]

PAST EVENTS

[/vc_column_text][/vc_column][/vc_row][vc_row row_type=”row” use_row_as_full_screen_section=”no” type=”grid” text_align=”left” box_shadow_on_row=”no”][vc_column][vc_column_text css=”.vc_custom_1634742851902{padding-top: 25px !important;padding-bottom: 25px !important;}”]Cloud Security Strategies

 

A framework for developing a robust cloud security strategy.

 

October 21, 2021

 

9:00am-4:00pm CDT; 10:00am-5:00pm EDT

 

7 CPE / 0.7 CEU / CISSP / 7 PDU Credits Awarded

 

Conference location: ONLINE [/vc_column_text][/vc_column][/vc_row][vc_row row_type=”row” use_row_as_full_screen_section=”no” type=”grid” text_align=”left” box_shadow_on_row=”no”][vc_column width=”1/2″][vc_column_text][/vc_column_text][/vc_column][vc_column width=”1/2″][vc_column_text]      [/vc_column_text][/vc_column][/vc_row][vc_row row_type=”row” use_row_as_full_screen_section=”no” type=”grid” text_align=”left” box_shadow_on_row=”no”][vc_column][vc_column_text]


Overview

 

Independent analysts show that through 2020, 95% of cloud security failures will be the fault of the end-user customer.

 

In this one day conference, attendees will learn tips, strategies and tactics for developing a robust cloud security strategy.


What You Will Learn

 

In this one day conference attendees will learn:

  • Cloud IT Blind Spots – How to Close Visibility Gaps in Multicloud Environments
  • Farewell to the Old Guard
  • Cloud Native Applications and Container Orchestration – What does it mean for security?
  • 7 Habits of Highly Effective Cybersecurity Operators
  • Cyber Security & AI: Protecting Against AI-Enhanced Malware
  • Cloud Security and Working from Home – How Security Leaders are Adjusting

Conference Price: $0.00 per person

 

Each attendee will receive a certificate awarding 7 CPE credits for CISSP continuing education, in addition to 0.7 CEUs and 7 PDUs. CISSP is a registered certification mark of (ISC)², Inc.[/vc_column_text][/vc_column][/vc_row][vc_row row_type=”row” use_row_as_full_screen_section=”no” type=”grid” text_align=”left” box_shadow_on_row=”no”][vc_column][vc_column_text css=”.vc_custom_1634826235184{padding-top: 25px !important;padding-bottom: 25px !important;}”]


9:00am-10:00am: Cloud IT Blind Spots – How to Close Visibility Gaps in Multicloud Environments

 

Mike Stacy, Global Cloud and Information Protection Director, Proofpoint

 

 

This session will explore the business challenges and issues related to security and management through various different standards and solutions. It will provide an analysis and architecture for incorporating different security schemes, techniques and protocols for cloud computing, with a focus on hybrid IaaS and PaaS systems and how to achieve security and governance for successful adoption.

 

 

Stacy


10:00am-10:30am: Refreshment Break

 


10:30am-11:30am: Cloud Security – Risk Based Visibility and Ransomware Containment

 

Nathanael Iversen, Chief Evangelist, Illumio

 

 

Iversen


11:30am-12:30pm: Cloud Native Applications and Container Orchestration – What does it mean for security?

 

Rory McCune, Cloud Security Advocate, Aqua Security

 

Configuring applications based on the container in which they will run to keep interactions between containers secure is a best practice. However, with containers and container orchestration technologies like Docker and Kubernetes, there can be a lot of buzzwords that obscure what’s going on from a security standpoint.

 

This talk will describe the technical underpinning of how containers operate, and:

  • Some of the common security pitfalls in both Docker and Kubernetes
  • Why they’re essentially Remote Code Execution as a service
  • How to avoid the most common mistakes in deploying and securing containers

 

 

McCune

 


12:30pm-1:30pm: Luncheon 

 


1:30pm-2:30pm: 7 Habits of Highly Effective Cybersecurity Operators

 

Ricardo Villadiego, Founder & CEO, Lumu Technologies

 

In the era of high impact ransomware attacks combined with the unpredictable nature of the cybersecurity analyst’s job makes the day-to-day challenging to say the least. Too many alerts, too many tools to keep up with, and too much pressure to get it all right. There are powerful lessons that can make the daily job of the operator more beneficial to the organization and can lead to personal change. This session presents a holistic, integrated approach for solving the pressing problems, adapting a growing attack surface and taking advantage of opportunities created by change.

 

 

Villadiego

 


2:30pm-3:00pm: Refreshment Break

 


3:00pm-4:00pm: Cloud Security and Working from Home – How Security Leaders are Adjusting (Panel Discussion)

 

Moderator:

Annur Sumar, Chief Technology Officer, Maetech

Panelists include:

Keith Conlee, JD, MS/BS, PCIP, CISSP, CISA, CBCP, Chief Security Officer, IT, College of DuPage

Humza Yasin, Senior Managing Director, Dallas College

Liz Ogunti, Chief Information Security Officer, JBT Corp.

 

In this session, attendees learn how organizations are adapting and what new security controls they have to put in place.

 

 

Conlee       Sumar       Yasin          Ogunti


Conference Price: $0.00 per person

 

Each attendee will receive a certificate awarding 7 CPE credits for CISSP continuing education, in addition to 0.7 CEUs and 7 PDUs. CISSP is a registered certification mark of (ISC)², Inc.

 

Exhibits

As is always the case at CAMP IT Conferences events, the talks will not include product presentations.  During the breaks, you will have the opportunity to informally meet representatives from the following sponsoring companies, who have solutions in the area of the conference.


[/vc_column_text][/vc_column][/vc_row][vc_row row_type=”row” use_row_as_full_screen_section=”no” type=”full_width” text_align=”left” box_shadow_on_row=”no”][vc_column][vc_column_text]

CONFERENCE CO-SPONSORS

[/vc_column_text][/vc_column][/vc_row][vc_row row_type=”row” use_row_as_full_screen_section=”no” type=”full_width” text_align=”left” box_shadow_on_row=”no”][vc_column][vc_empty_space image_repeat=”no-repeat”][/vc_column][/vc_row][vc_row row_type=”row” use_row_as_full_screen_section=”no” type=”grid” text_align=”center” box_shadow_on_row=”no”][vc_column width=”1/3″][vc_single_image image=”358581″ img_size=”full” alignment=”center” onclick=”custom_link” img_link_target=”_blank” link=”https://www.aquasec.com/”][/vc_column][vc_column width=”1/3″][vc_single_image image=”357886″ img_size=”full” alignment=”center” onclick=”custom_link” img_link_target=”_blank” link=”https://lumu.io/”][/vc_column][vc_column width=”1/3″][vc_single_image image=”351675″ img_size=”full” alignment=”center” onclick=”custom_link” img_link_target=”_blank” link=”https://www.proofpoint.com/us”][/vc_column][/vc_row][vc_row row_type=”row” use_row_as_full_screen_section=”no” type=”full_width” text_align=”left” box_shadow_on_row=”no”][vc_column][vc_empty_space image_repeat=”no-repeat”][/vc_column][/vc_row][vc_row row_type=”row” use_row_as_full_screen_section=”no” type=”grid” text_align=”left” box_shadow_on_row=”no”][vc_column width=”1/6″][/vc_column][vc_column width=”1/6″][/vc_column][vc_column width=”1/6″][vc_single_image image=”358533″ img_size=”full” onclick=”custom_link” img_link_target=”_blank” link=”https://www.illumio.com/”][/vc_column][vc_column width=”1/6″][vc_single_image image=”358530″ alignment=”center” onclick=”custom_link” img_link_target=”_blank” link=”https://www.nexuminc.com/”][/vc_column][vc_column width=”1/6″][/vc_column][vc_column width=”1/6″][/vc_column][/vc_row][vc_row row_type=”row” use_row_as_full_screen_section=”no” type=”full_width” text_align=”left” box_shadow_on_row=”no”][vc_column][vc_empty_space image_repeat=”no-repeat”][/vc_column][/vc_row]