UPCOMING EVENTS
Cloud Security Strategies: Chicago (Rosemont/O’Hare), Illinois
A framework for developing a robust cloud security strategy.
June 25, 2026
9:00am-5:00pm
7 CPE / 0.7 CEU / CISSP / 7 PDU Credits Awarded
Conference location: Donald E. Stephens Convention Center Rosemont (O’Hare) Illinois
Overview
Independent analysts show that through 2024, 94% of cloud security failures will be the fault of the end-user customer.
Attendees will learn tips, strategies and tactics for developing a robust cloud security strategy.
What You Will Learn
In this one day conference attendees will learn:
- eBPF 101 – The Evolution from Packet Capture to Kernel Capture, and What it Means for Cloud Security
- Building Blocks for a Cloud Native Security and DR Strategy
- Security Optimization and the Cloud
- How IT the Business Can Work Together to Bolster Cloud Security (Panel Discussion)
- Cloud IT Blind Spots – Overlooked Architecture for Cloud Security and Resilience
- Cloud Security and Cloud Disaster Recovery – How Security Leaders are Responding to Sophisticated Cyber Attacks (Panel Discussion)
Conference Price: $349.00 per person
Each attendee will receive a certificate awarding 7 CPE credits for CISSP continuing education, in addition to 0.7 CEUs and 7 PDUs. CISSP is a registered certification mark of (ISC)², Inc.
CONFERENCE AGENDA
8:00am – 9:00am: Registration and Continental Breakfast
9:00am – 10:00am Why Most Cloud Security Fails: Lessons from Real-World Incidents
Independent analysts show that 94% of cloud security failures are caused by customer misconfiguration or decision-making. This session explores the root causes of these failures and how organizations can proactively reduce risk.
Includes:
- Common customer-driven cloud security mistakes
- Misaligned cloud practices that increase risk
- Preventive strategies to avoid costly failures
10:00 AM – 10:30 AM — Sponsor & Networking Break
10:30 AM – 11:30 AM eBPF 101: From Packet Capture to Kernel-Level Observability
Cloud-native environments demand deeper visibility. This session introduces eBPF, showing how kernel-level insights can enhance security monitoring, threat detection, and response.
Includes:
- How eBPF differs from traditional packet capture
- Security and observability use cases in cloud-native systems
- Architectural considerations for eBPF adoption
11:30 AM – 12:30 PM Closing the Cloud IT Blind Spots
Many organizations overlook architectural, operational, and governance blind spots that create risk. This session identifies common pitfalls and strategies to close them before they become incidents.
Includes:
- Hidden risks in cloud architecture and deployment patterns
- Misconfigurations, overlooked identities, and permissions issues
- Tools and processes to continuously detect blind spots
12:30 PM – 1:30 PM — Lunch & Exhibits
1:30 PM – 2:30 PM Building Blocks of Cloud Security and Disaster Recovery
Security and resilience must be designed together to protect against sophisticated attacks. This session explores integrated approaches to cloud-native security and disaster recovery.
Includes:
- Designing security and DR together, not in silos
- Resilience patterns for cloud-native workloads
- Preparing for ransomware, destructive attacks, and supply chain risks
2:30 PM – 3:00 PM — Sponsor Break
3:00 PM – 4:00 PM Optimizing Cloud Security Without Slowing Innovation
Organizations often over-secure or misalign security controls, slowing business agility. This session shows how to optimize security architecture and operations while maintaining performance and speed.
Includes:
- Balancing security, cost, and operational efficiency
- Reducing redundant controls and alert fatigue
- Metrics and KPIs to measure security effectiveness
4:00 PM – 5:00 PM Panel: How IT and the Business Work Together to Bolster Cloud Security
Cloud security requires collaboration across IT, security, and business teams. This interactive panel highlights best practices, lessons learned, and strategies for shared accountability.
Includes:
- Aligning business priorities with cloud security initiatives
- Communicating risk to executives effectively
- Incident response coordination between IT, security, and business
- Audience Q&A
Exhibits
As is always the case at CAMP IT Conferences events, the talks will not include product presentations. During the continental breakfast, coffee breaks, and the luncheon break you will have the opportunity to informally meet representatives from the following sponsoring companies, who have solutions in the area of the conference.