PAST EVENTS
Security Architecture Strategies: Chicago (Rosemont/O’Hare), Illinois
Strategies to secure business driven enterprise architecture.
October 20, 2022
9:00am-5:00pm
7 CPE / 0.7 CEU / CISSP / 7 PDU Credits Awarded
Conference location: Donald E. Stephens Convention Center Rosemont (O’Hare) Illinois
Overview
In order to build and run applications securely there are key architectural components that need to be in place. Without infrastructure components like proper encryption, standard authentication methods and logging standards developers are challenged to build secure applications. Without proper pre-production testing and event logging / analysis knowing if an application is under attack and should you worry when it is becomes virtually impossible. With the advent of containers and the ability to scale application across different platforms the problem only gets compounded.
This conference will present the key architectural components your company should have in place that will allow you to build, run and monitor applications more securely.
What You Will Learn
The C-suite understands that security policies and controls have a direct impact on the ability of organizations to respond to business disruption.
In this one day in-person conference, attendees will learn:
- Developing an Award Winning Security Program – Lessons Learned
- Security Architecture and Business Resiliency
- How Cybersecurity Myths Persist and What to Do Instead
- How Enterprise IT Security Executives are Bolstering Their Architecture (Panel Discussion)
- Security Architecture Review Process – Trust/IDs/Applications
- How to Modernize Your Security Architecture
Conference Price: $299.00 per person
Each attendee will receive a certificate awarding 7 CPE credits for CISSP continuing education, in addition to 0.7 CEUs and 7 PDUs. CISSP is a registered certification mark of (ISC)², Inc.
9:00am-10:00am: Security Architecture and Business Resiliency
Patrick Benson, Systems Engineer, Veeam
Kevin Finch, Senior Business Continuity Architect, Sayers
Security and Infrastructure need to cooperate in order to ensure business resiliency, but many organizations fail to unite the two, leaving them vulnerable. Worse yet, some organizations unwittingly encourage opposition between the two. We will briefly discuss the importance of working together in those areas, and highlight some specific strategies companies can use to keep different areas of the business in alignment for better security, and better continuity of operations.
Benson Finch
10:00am-10:30am: Refreshment Break
10:30am-11:30am: Fireside Chat: Security Architecture Review Process – Trust/IDs/Applications
Ryan Radtke, Director, Information Security Architecture, AbbVie
Radtke
11:30am-12:30pm: How Enterprise IT Security Executives are Bolstering Their Architecture (Panel Discussion)
In this session, attendees will go through five crucial steps for an effective Security Architecture:
- Assess your current security situation.
- Analyze security insights (strategic and technical).
- Develop the logical security layer of the architecture.
- Design the EISA implementation.
- Treat architecture as an ongoing process
Moderator: Marc Kreppel, Manager, Zerto
Panelists include:
- Adam Kohnke, IT Cyber Security Architect, Charter Next Generation
- Ron Versetto, Executive Director – IT, University of Illinois at Chicago
- Keith Conlee, Chief Security Officer, IT, College of DuPage
- Other Security Architecture Executives sharing best practices and lessons learned
Kreppel Kohnke Versetto Conlee
12:30pm-1:30pm: Lunch Session, Special Fireside Chat — Developing an Award Winning Security Program – Lessons Learned
Dean Sharp, Global Director of Information Security Architecture and Engineering, ManpowerGroup
Sharp
1:30pm-2:30pm: Suspension of Disbelief: How Cybersecurity Myths Persist and What to Do Instead
Paul Jespersen, VP Worldwide Sales & Business Development, Sandfly Security
Sometimes its easier to hope for the magic bullet solutions, or MORE solutions, but instead of just accepting many of the current myths at face value, there are a few things we can do to make sure we have the right priorities in our operations, resources, and budgets.
Jespersen
2:30pm-3:00pm: Refreshment Break
3:00pm-4:00pm: Breakout Session – How to Modernize Your Security Architecture
In this session, attendees will breakout into groups and discuss:
- How to Build Resilience into Your Cybersecurity Program
- Ideas of New Approaches and Technology Architectures that will be needed to securely enable the business
- How to Collaborate with C-suite leaders and provide education where necessary to garner understanding and support
- Different Approaches to Data Protection
- How to Build a Zero Trust Philosophy Throughout the Organization
- How to Tie In Disaster Recovery & Business Continuity with Your Security Architecture
Exhibits
As is always the case at CAMP IT Conferences events, the talks will not include product presentations. During the continental breakfast, coffee breaks, and the luncheon break you will have the opportunity to informally meet representatives from the following sponsoring companies, who have solutions in the area of the conference.