Cloud Security Strategies


A framework for developing a robust cloud security strategy.


June 12, 2020




7 CPE / 0.7 CEU / CISSP / 7 PDU Credits Awarded


Conference location: Donald E. Stephens Convention Center Rosemont (O’Hare) Illinois





Independent analysts show that through 2020, 95% of cloud security failures will be the fault of the end-user customer.


In this one day conference, attendees will learn tips, strategies and tactics for developing a robust cloud security strategy.

What You Will Learn


In this one day conference attendees will learn:

  • Involve all key stakeholders
  • Identify cloud vulnerabilities
  • Prioritize data privacy
  • Use a layered approach to data security
  • Flag pitfalls in due diligence and ongoing governance
  • Understand where lines of demarcation exist in the relationship with the cloud provider and customer
  • Have a policy to enforce that all aspects of applications are deployed in a certain way
  • Identify the top 3 risks for your cloud
  • Spend your time on security controls that give you the best ROI
  • Articulate the top three cloud configuration errors in language the business can understand


Conference Price: $299.00 per person


Each attendee will receive a certificate awarding 7 CPE credits for CISSP continuing education, in addition to 0.7 CEUs and 7 PDUs. CISSP is a registered certification mark of (ISC)², Inc.

8:00am – 9:00am: Registration and Continental Breakfast

9:00am-10:00am: Pull Up Your SOCs: Building or Re-building a Security Operations Program


Dimitri McKay, Principal Security Architect, Global Security Specialist Team, Splunk, Inc.





10:00am -10:30am: Refreshment Break

10:30am-11:30am: Farewell to the Old Guard


Lamont Orange, Chief Information Security Officer, Netskope


Until now, the information security industry has failed to deliver business empowering security solutions, which enable organizations to quickly and securely transform digitally. Security today is too complicated and draws from a 20-year-old playbook. It needs to be re-written and based on approaches that protect and empower the business.


In this session, we will:


Topics that will be covered include:

  • Share how many of the Fortune 100 are redefining their cloud, network and data security programs
  • Discuss the steps and architectures that are the key to transformation
  • Reimagine your approach to enterprise security, building a new blueprint that can be used for years to come



11:30am-12:30pm: Managing Security Vulnerabilities: Enterprise to Cloud


Matt Johnson, Systems Engineer, Illumio


Managing vulnerabilities in any organization can be overwhelming. Enterprise environments add scale and diversity that overwhelm many IT security and operations organizations. Cloud adoption as well as and the increasing speed with which all organizations must deliver systems, applications, and features to both their internal and external customers, can make security seem unachievable.


In this session, attendees will learn how to:

  • Manage assets successfully and analyze and prioritize vulnerabilities
  • Determine which reports are most effective
  • Mature your program and think differently about vulnerability management.




12:30pm – 1:30pm Luncheon

1:30pm-2:30pm: Best Practices for Shifting Cloud Security Left


Colin Wood, Sr. Solution Architect, Chef Software


More and more applications and data are moving to the cloud, and while this transition creates tremendous benefits, it also comes with information security challenges.


During this session we will explore these concerns and showcase how a Continuous Audit approach, which helps identify and remediate compliance issues in minutes, can help organizations best plan for, identify, and address cloud security issues.


Items addressed will be:

  • Where your cloud provider’s responsibilities end and your organization’s begin
  • The most impactful cloud security threats
  • How to best address cloud security gaps




2:30pm – 3:00pm: Refreshment Break

3:00pm-4:00pm: Cloud Watch Points- Security Stumbling Blocks to Watch Out For


Derek Milroy, Sr. Security Engineer, U.S. Cellular


In this session, Derek Milroy, at CAMP IT regular speaker will share his thoughts on the security stumbling blocks to be aware of when going through a Migration.



4:00pm-5:00pm: Breakout Session: Real World Scenarios


Leader: JJ Medina, Director, Sumo Logic


In this session, attendees will break out into groups and be presented with real world scenarios that have happened our could happen and how as a team the group needs to respond.



Conference Price: $299.00 per person


Each attendee will receive a certificate awarding 7 CPE credits for CISSP continuing education, in addition to 0.7 CEUs and 7 PDUs. CISSP is a registered certification mark of (ISC)², Inc.



As is always the case at CAMP IT Conferences events, the talks will not include product presentations.  During the continental breakfast, coffee breaks, and the luncheon break you will have the opportunity to informally meet representatives from the following sponsoring companies, who have solutions in the area of the conference.