UPCOMING EVENTS

Cloud Architecture: Chicago (Rosemont/O’Hare), Illinois

 

Strategies for building and refining the architecture.

 

April 20, 2023

 

9:00am-5:00pm

 

7 CPE / 0.7 CEU / CISSP / 7 PDU Credits Awarded

 

Conference location: Donald E. Stephens Convention Center Rosemont (O’Hare) Illinois

  

    


Overview

 

Once your organization’s business needs have been established, you can then create a plan that integrates infrastructure and platform strategy with the supporting cyber resilience.


What You Will Learn

 

In this one day conference attendees will learn:

  • Cloud Architecture: DR in the Cloud, DC Failover in Near Real Time
  • Six Multi-Cloud Architecture Designs for an Effective Cloud Management
  • Designing a Business-Driven Cloud Security Architecture
  • How to Rethink Your Next Generation Cloud Data Architecture
  • Five Steps to Building a Cloud-Ready Application Architecture
  • How IT Executives Build Robust Cloud Architectures (Enterprise IT Panel Discussion)

Conference Price: $299.00 per person

 

Each attendee will receive a certificate awarding 7 CPE credits for CISSP continuing education, in addition to 0.7 CEUs and 7 PDUs. CISSP is a registered certification mark of (ISC)², Inc.


conference agenda


8:00am – 9:00am: Registration and Continental Breakfast


9:00am – 10:00am: Six Multi-Cloud Architecture Designs for an Effective Cloud Management

 

Deploying a multi-tenant application across multiple cloud platforms can be very cumbersome. In this session, attendees will go through 6 multi-cloud architecture designs which can help enterprises build an effective multi-cloud strategy.

 

In this session, attendees will find the pros and cons of the following:

  • Cloudification
  • Multi-Cloud Relocation
  • Multi-Cloud Refactor
  • Multi-Cloud Rebinding
  • Multi-Cloud Rebinding with Cloud Brokerage
  • Multi-Application Modernization

 


10:00am – 10:30am:  Refreshment Break


10:30am – 11:30am: Five Steps to Building a Cloud-Ready Application Architecture

 

Individuals with experience building applications understand that applications designed specifically for the platform on which they’ll run will perform better and are more resilient and easier to manage.

 

Join us as we discuss:

  • How to design the application as a collection of services
  • How to decouple the data
  • How to design applications that optimize communications between application components
  • How to design for performance and scaling
  • How to design security into the application and take advantage of native features of IAM

 

 


11:30am – 12:30pm: Designing a Business-Driven Cloud Security Architecture

 

Joseph Kupiec, Team Lead, Cloud Solutions Group, PSM Partners

 

 

Failure is not an option. Risk must be minimized at all costs. Unfortunately, when defining, creating, and implementing security architectures, we often focus too much on the technology and risk management at the cost of value add to the business. Regardless of whether security architectures succeed or fail technically, ones that neglect to include or downplay the value add to business, will always fail the business.

 

What makes a successful security architecture? Yes, we must manage risk, prevent identity sprawl, move towards Zero-Trust, etc. but, we must also keep one objective in mind throughout the entire security architecture lifecycle – enabling the business. The best security architects, programs, and architectures not only meet or exceed their technical requirements, but more importantly (let me say it again), they all enable the business. Information security professionals and the industry itself (generally speaking) have a bad reputation. Many, if not all of us, have experienced the groans and sighs when walking into a room of our colleagues. “Why don’t they just leave us alone?”, “I bet you they’re going to require ten more characters for our passwords”, “Why don’t they just let us do what we [the business] needs to do?”. How do we move forward?

 

It starts and ends with us. Designing a Business-Driven Cloud Security Architecture is not an easy task. It will require us to change our mindsets, adapt the way we approach issues, modify the way we communicate, and transform our relationships with the business. Some of the important items to be discussed are treating the organization as a single entity rather than a set of cooperating departments, aligning information and communication technologies with business processes, and treating cloud security architecture as a business issue. The application of the 6 W’s to gain a clearer understanding of business requirements for systems will be explained. Upon conclusion of this presentation, you will have the necessary information to change those groans and sighs to cheers and smiles.

 

 

Kupiec

 


12:30pm – 1:30pm: Lunch & Exhibit Break


1:30pm – 2:30pm: Cloud Architecture: DR in the Cloud, DC Failover in Near Real Time

 

Content that will be covered includes

  • New DR trends
  • How to make DR easier
  • How to encourage the business to pay for DR and what should be encompassed
  • Moving DR into the cloud

 


2:30pm-3:00pm: Refreshment Break


3:00pm-4:00pm: Designing a Business-Driven Cloud Security Architecture

 

In this session, attendees will learn how to make sure their security architecture aligns with the ever-changing needs of the business.

 


4:00pm-5:00pm: How IT Executives Build Robust Cloud Architectures (Enterprise IT Panel Discussion)

 

In this session, attendees will learn their peers are building cloud architectures that are exceeding business expectations.

 

Panelists include:

  • Trent Ridgway, Head of Cloud Infrastructure & Security / Senior IT Project Manager, Anning-Johnson Company
  • Val Mushinskiy, Principal and Vice President of Cloud Services, ZS
  • Matt Frye, Senior Cloud Architect, CUNA Mutual Group
  • Jonel Rienton, Manager, Global SAP Basis and Enterprise Databases Global Digital & Information Technology Department, Littlefuse, Inc. 
  • IT Executives sharing strategies, tactics, and lessons learned

 

 

 

Ridgway                   Mushinskiy             Frye                      Rienton

 

 


Conference Price: $299.00 per person

Each attendee will receive a certificate awarding 7 CPE credits for CISSP continuing education, in addition to 0.7 CEUs and 7 PDUs. CISSP is a registered certification mark of (ISC)², Inc.

 

Exhibits

As is always the case at CAMP IT Conferences events, the talks will not include product presentations. During the continental breakfast, coffee breaks, and the luncheon break you will have the opportunity to informally meet representatives from the following sponsoring companies, who have solutions in the area of the conference.


conference sponsors