Skip to content

[vc_row row_type=”row” use_row_as_full_screen_section=”no” type=”full_width” text_align=”left” background_image=”348335″ box_shadow_on_row=”no”][vc_column css=”.vc_custom_1509976289581{padding-top: 200px !important;padding-bottom: 199px !important;}”][vc_column_text]

PAST EVENTS

[/vc_column_text][/vc_column][/vc_row][vc_row row_type=”row” use_row_as_full_screen_section=”no” type=”grid” text_align=”left” box_shadow_on_row=”no”][vc_column][vc_column_text css=”.vc_custom_1623157681008{padding-top: 25px !important;padding-bottom: 25px !important;}”]Security Architecture Strategies

 

Strategies to secure business driven enterprise architecture.

 

July 8, 2021

 

9:00am-5:00pm CST; 10:00am-6:00pm EST

 

7 CPE / 0.7 CEU / CISSP / 7 PDU Credits Awarded

 

Conference location: ONLINE[/vc_column_text][/vc_column][/vc_row][vc_row row_type=”row” use_row_as_full_screen_section=”no” type=”grid” text_align=”left” box_shadow_on_row=”no”][vc_column width=”1/2″][vc_column_text][/vc_column_text][/vc_column][vc_column width=”1/2″][vc_column_text]      [/vc_column_text][/vc_column][/vc_row][vc_row row_type=”row” use_row_as_full_screen_section=”no” type=”grid” text_align=”left” box_shadow_on_row=”no”][vc_column][vc_column_text css=”.vc_custom_1624985323771{padding-top: 25px !important;padding-bottom: 25px !important;}”]


Overview

 

In order to build and run applications securely there are key architectural components that need to be in place. Without infrastructure components like proper encryption, standard authentication methods and logging standards developers are challenged to build secure applications. Without proper pre-production testing and event logging / analysis knowing if an application is under attack and should you worry when it is becomes virtually impossible. With the advent of containers and the ability to scale application across different platforms the problem only gets compounded.

 

This conference will present the key architectural components your company should have in place that will allow you to build, run and monitor applications more securely.


What You Will Learn

 

The C-suite understands that security policies and controls have a direct impact on the ability of organizations to respond to business disruption.

 

In this one day virtual conference, attendees will learn:

  • My Zero Trust Journey- From Conception to Design and Implementation
  • Scaling App, Service and API Authorization Governance
  • API MythBusters: Crushing Five Security Myths that are Crushing Your Safety
  • What You Don’t Know Will Hurt You: Why ESM is Vital to Your EA Program
  • Zero Trust is Not Hard… if You’re Pragmatic
  • Cyber Warfare: How CISOs are Refining their Security Framework (Panel discussion)

 

Conference Price: $0.00 per person

 

Each attendee will receive a certificate awarding 7 CPE credits for CISSP continuing education, in addition to 0.7 CEUs and 7 PDUs. CISSP is a registered certification mark of (ISC)², Inc.


[/vc_column_text][/vc_column][/vc_row][vc_row row_type=”row” use_row_as_full_screen_section=”no” type=”grid” text_align=”left” box_shadow_on_row=”no” css=”.vc_custom_1513895163165{padding-top: 25px !important;padding-bottom: 25px !important;}”][vc_column][vc_column_text css=”.vc_custom_1625677133716{padding-top: 25px !important;padding-bottom: 25px !important;}”]


Conference Program


8:30am – 9:00am CDT: Open Networking


9:00am-10:00am CDT: My Zero Trust Journey- From Conception to Design and Implementation

 

 

Moderator:
Annur Sumar, CTO, Maetech
Featured Speakers:
Ricardo Lafosse, Chief Information Security Officer, Kraft Heinz
Mitch Christian, Information Security Officer – Global, Synergy Global Housing

 

In this session, we will hear from Ricardo Lafosse and Mitch Christian as to how went about designing and implementing Zero Trust in his environment.  They will share strategies, tactics, and pitfalls to avoid.

 

 

       
Lafosse      Christian     Sumar


10:00am -10:30am CDT: Networking Break


10:30am-11:30am CDT: Scaling App, Service and API Authorization Governance 

 

Nathanael Coffing, Founder and Chief Strategist, Cloudentity

 

In this session, Nathanael will explore:

  • Current Authorization Challenges
  • Why to externalize Authorization policy management and controls
  • Declarative Authorization; what, how, where for legacy and k8s
  • Consent Based Authorization; privacy consent as a self-service
  • Automating API / service visibility and on-boarding
  • Fine-grained authorization policy and transactional enforcement
  • Governance and reporting of APIs, Identity and Authorization

 

 


Coffing


11:30am-12:30pm CDT: API MythBusters: Crushing Five Security Myths that are Crushing Your Safety

 

Sean Boulter, Solution Architect, Salt Security

 

Digital transformation and application modernization are exponentially driving up the use of APIs. We’re using more APIs than ever, and they’re more functional than ever. They’re also more attractive to hackers than ever, but lots of organizations are hanging onto old ways of thinking about API security.

 

Join our lively discussion on the top five common industry myths surrounding API security. You’ll learn the pitfalls of some misguided API security approaches, cut through the hype around a few security trends, and get recommendations on how to improve your organization’s API security strategy.

 

Key takeaways:

  • The impact trends such as zero trust, cloud migration, containerization, and shift-left are having on API security
  • The role of traditional security controls in API security – what they deliver and where they fall short
  • The value of a full lifecycle approach in grappling with API security
  • How to deploy dedicated API security that fits today’s automated, agile, and cloud-first environments

 


Boulter


12:30pm – 1:30pm CDT: Lunch Break


1:30pm-2:30pm CDT: What You Don’t Know Will Hurt You: Why ESM is Vital to Your EA Program

 

Michael Lines, Head of Product Security, LeanIX, Inc.

 

Many Enterprise Architecture programs fail to fully consider SaaS as a part of the asset portfolio, and as a result do not have a sufficient understanding of where and how SaaS is being used to properly guide digital transformation and business enablement. In this session, Michael will review why SaaS needs to be a part of the EA practice, and the key challenges in Enterprise SaaS Management.

 


Lines


2:30pm – 3:00pm CDT: Networking Break


3:00pm-4:00pm CDT: Zero Trust is Not Hard… if You’re Pragmatic 

 

Vivian Tero, Senior Product Marketing Manager, Illumio

 

Zero Trust has been in Illumio’s DNA since its inception- even before the security strategy/philosophy became the security buzzword du jour. Illumio was founded to enable enterprises to execute least-privilege security controls, reduce the attack surface, and obstruct the lateral spread of malware and ransomware.

 

There’s been a ton of “zero-trust washing” in the last 12 months. This session is intended to clear up some of this confusion. Here, you will learn:

  • How to make sense of NIST 800-207 (Zero Trust Architecture)
  • Critical capabilities of Zero Trust Systems
  • Top 5 practical steps that Illumio’s enterprise and federal customers have done to design, build, and advance their zero trust architectures
  • Key lessons learned from Illumio’s own zero trust journey.

 


Tero


 

Conference Price: $0.00 per person

 

Each attendee will receive a certificate awarding 7 CPE credits for CISSP continuing education, in addition to 0.7 CEUs and 7 PDUs. CISSP is a registered certification mark of (ISC)², Inc.

 

Exhibits

As is always the case at CAMP IT Conferences events, the talks will not include product presentations. During the breaks, you will have the opportunity to informally meet representatives from the following sponsoring companies, who have solutions in the area of the conference.


[/vc_column_text][/vc_column][/vc_row][vc_row row_type=”row” use_row_as_full_screen_section=”no” type=”full_width” text_align=”left” box_shadow_on_row=”no”][vc_column css=”.vc_custom_1623082994110{padding-bottom: 50px !important;}”][vc_column_text]

CONFERENCE CO-SPONSORS

[/vc_column_text][/vc_column][/vc_row][vc_row row_type=”row” use_row_as_full_screen_section=”no” type=”grid” text_align=”left” box_shadow_on_row=”no”][vc_column width=”1/3″ css=”.vc_custom_1623083217711{padding-top: 25px !important;}”][vc_single_image image=”357207″ img_size=”full” alignment=”center” onclick=”custom_link” img_link_target=”_blank” link=”https://cloudentity.com/”][/vc_column][vc_column width=”1/3″][vc_single_image image=”357249″ img_size=”full” alignment=”center” onclick=”custom_link” img_link_target=”_blank” link=”https://www.cohesity.com”][vc_single_image image=”357251″ img_size=”full” alignment=”center” onclick=”custom_link” img_link_target=”_blank” link=”https://www.hpe.com”][/vc_column][vc_column width=”1/3″ css=”.vc_custom_1623780207833{padding-top: 25px !important;}”][vc_single_image image=”357208″ img_size=”full” alignment=”center” onclick=”custom_link” img_link_target=”_blank” link=”https://www.illumio.com”][/vc_column][/vc_row][vc_row row_type=”row” use_row_as_full_screen_section=”no” type=”full_width” text_align=”left” box_shadow_on_row=”no”][vc_column][vc_empty_space image_repeat=”no-repeat”][/vc_column][/vc_row][vc_row row_type=”row” use_row_as_full_screen_section=”no” type=”grid” text_align=”left” box_shadow_on_row=”no”][vc_column width=”1/3″][vc_single_image image=”355497″ img_size=”full” alignment=”center” onclick=”custom_link” img_link_target=”_blank” link=”https://www.leanix.com”][/vc_column][vc_column width=”1/3″ css=”.vc_custom_1624031769253{padding-top: 25px !important;}”][vc_single_image image=”357302″ img_size=”full” alignment=”center” onclick=”custom_link” img_link_target=”_blank” link=”https://www.nonamesecurity.com”][/vc_column][vc_column width=”1/3″][vc_single_image image=”356918″ img_size=”full” alignment=”center” onclick=”custom_link” img_link_target=”_blank” link=”https://www.redapt.com”][/vc_column][/vc_row][vc_row row_type=”row” use_row_as_full_screen_section=”no” type=”full_width” text_align=”left” box_shadow_on_row=”no”][vc_column][vc_empty_space image_repeat=”no-repeat”][/vc_column][/vc_row][vc_row row_type=”row” use_row_as_full_screen_section=”no” type=”grid” text_align=”left” box_shadow_on_row=”no”][vc_column width=”1/4″][/vc_column][vc_column width=”1/4″][vc_single_image image=”355453″ img_size=”full” alignment=”center” onclick=”custom_link” img_link_target=”_blank” link=”https://www.salt.security”][/vc_column][vc_column width=”1/4″][vc_single_image image=”357357″ img_size=”full” alignment=”center” onclick=”custom_link” img_link_target=”_blank” link=”https://www.sonatype.com/”][/vc_column][vc_column width=”1/4″][/vc_column][/vc_row][vc_row row_type=”row” use_row_as_full_screen_section=”no” type=”full_width” text_align=”left” box_shadow_on_row=”no”][vc_column][vc_empty_space image_repeat=”no-repeat”][/vc_column][/vc_row]