Skip to content

UPCOMING EVENTS


Cloud Security Strategies: Chicago (Rosemont/O’Hare), Illinois

A framework for developing a robust cloud security strategy.

June 25, 2026

9:00am-5:00pm

7 CPE / 0.7 CEU / CISSP / 7 PDU Credits Awarded

Conference location: Donald E. Stephens Convention Center Rosemont (O’Hare) Illinois

  

 

Overview

Independent analysts show that through 2024, 94% of cloud security failures will be the fault of the end-user customer.

Attendees will learn tips, strategies and tactics for developing a robust cloud security strategy.


What You Will Learn

In this one day conference attendees will learn:

  • eBPF 101 – The Evolution from Packet Capture to Kernel Capture, and What it Means for Cloud Security
  • Building Blocks for a Cloud Native Security and DR Strategy
  • Security Optimization and the Cloud
  • How IT the Business Can Work Together to Bolster Cloud Security (Panel Discussion)
  • Cloud IT Blind Spots – Overlooked Architecture for Cloud Security and Resilience
  • Cloud Security and Cloud Disaster Recovery – How Security Leaders are Responding to Sophisticated Cyber Attacks (Panel Discussion)

 


CONFERENCE AGENDA


8:00am – 9:00am: Registration and Continental Breakfast


9:00am – 10:00am Cloud Security Leadership: Driving Business Impact Beyond Technology
Trent Ridgway, Head of IT, Infrastructure and Cloud, CISO,  Anson Industries

Cloud security is no longer viewed solely as a technical function — it has become a critical business enabler that directly influences operational resilience, customer trust, compliance, and organizational growth. As companies continue expanding cloud adoption, leadership teams are looking for security professionals who can align security strategy with broader business objectives.

In this session, Trent Ridgeway will discuss how modern cloud security leaders can move beyond managing controls and compliance to driving measurable business impact. Through real-world examples and leadership insights, Trent will explore how security decisions affect revenue protection, business continuity, risk reduction, innovation, and executive confidence in cloud initiatives.

Attendees will learn how security leaders can strengthen their influence within the organization by translating technical priorities into business outcomes that executives, boards, and stakeholders understand and value.

Key Takeaways:

  • Positioning cloud security as a business enabler rather than a cost center
  • Aligning cloud security strategy with organizational goals and risk management priorities
  • Improving operational resilience and business continuity through stronger cloud security practices
  • Communicating security initiatives in terms executives and business leaders understand
  • Building cross-functional partnerships between security, infrastructure, operations, and business teams
  • Demonstrating measurable business value from cloud security investments

             Ridgway


10:00 AM – 10:30 AM — Sponsor & Networking Break

 


10:30 AM – 11:30 AM   eBPF 101: From Packet Capture to Kernel-Level Observability

Cloud-native environments demand deeper visibility. This session introduces eBPF, showing how kernel-level insights can enhance security monitoring, threat detection, and response.

Includes:

  • How eBPF differs from traditional packet capture
  • Security and observability use cases in cloud-native systems
  • Architectural considerations for eBPF adoption

11:30 AM – 12:30 PM    AI, Cyber Recovery, and Data Protection: Separating Signal from Hype
Justin Nordeste, Sr Product Manager, Data Protection, 11:11 Systems

Abstract: AI is reshaping the cyber threat landscape faster than most organizations can adapt, and the pressure on IT and security leaders to “do something with AI” has never been higher. But what does meaningful AI adoption actually look like in data protection and recovery? And how do you separate the signal from the hype?
In this session, I will share how AI is being put to work across real infrastructure environments today, and what that means for how you think about resilience, recovery, and risk.

We’ll discuss:

  • What AI-powered threats actually look like in practice, and why traditional recovery assumptions no longer hold
  • Where AI delivers genuine value in detection, anomaly identification, and recovery automation, and where it doesn’t
  • How to set realistic expectations internally and build a framework for AI adoption that keeps human judgment where it belongs

         Nordeste


12:30 PM – 1:30 PM — Lunch & Exhibits


1:30 PM – 2:30 PM  Building Blocks of Cloud Security and Disaster Recovery

Security and resilience must be designed together to protect against sophisticated attacks. This session explores integrated approaches to cloud-native security and disaster recovery.

Includes:

  • Designing security and DR together, not in silos
  • Resilience patterns for cloud-native workloads
  • Preparing for ransomware, destructive attacks, and supply chain risks

2:30 PM – 3:00 PM — Sponsor Break


3:00 PM – 4:00 PM  Optimizing Cloud Security Without Slowing Innovation

Organizations often over-secure or misalign security controls, slowing business agility. This session shows how to optimize security architecture and operations while maintaining performance and speed.

Includes:

  • Balancing security, cost, and operational efficiency
  • Reducing redundant controls and alert fatigue
  • Metrics and KPIs to measure security effectiveness

4:00 PM – 5:00 PM  Panel: How IT and the Business Work Together to Bolster Cloud Security

Cloud security requires collaboration across IT, security, and business teams. This interactive panel highlights best practices, lessons learned, and strategies for shared accountability.

Includes:

  • Aligning business priorities with cloud security initiatives
  • Communicating risk to executives effectively
  • Incident response coordination between IT, security, and business
  • Audience Q&A

    Panelists will include:

    • Victor Hsiang, CISO, GATX
    • Other CISOs & InfoSec Executives sharing the strategies, tactics, and lessons learned.

           Hsiang


Conference Price: $349.00 per person

Each attendee will receive a certificate awarding 7 CPE credits for CISSP continuing education, in addition to 0.7 CEUs and 7 PDUs. CISSP is a registered certification mark of (ISC)², Inc.


Exhibits

As is always the case at CAMP IT Conferences events, the talks will not include product presentations. During the continental breakfast, coffee breaks, and the luncheon break you will have the opportunity to informally meet representatives from the following sponsoring companies, who have solutions in the area of the conference.

11:11 Systems