Security Architecture Strategies: Chicago (Rosemont/O’Hare), Illinois


Strategies to secure business driven enterprise architecture.


October 20, 2022




7 CPE / 0.7 CEU / CISSP / 7 PDU Credits Awarded


Conference location: Donald E. Stephens Convention Center Rosemont (O’Hare) Illinois





In order to build and run applications securely there are key architectural components that need to be in place. Without infrastructure components like proper encryption, standard authentication methods and logging standards developers are challenged to build secure applications. Without proper pre-production testing and event logging / analysis knowing if an application is under attack and should you worry when it is becomes virtually impossible. With the advent of containers and the ability to scale application across different platforms the problem only gets compounded.


This conference will present the key architectural components your company should have in place that will allow you to build, run and monitor applications more securely.

What You Will Learn


The C-suite understands that security policies and controls have a direct impact on the ability of organizations to respond to business disruption.


In this one day in-person conference, attendees will learn:

  • Developing an Award Winning Security Program – Lessons Learned
  • Security Architecture and Business Resiliency
  • How Cybersecurity Myths Persist and What to Do Instead
  • How Enterprise IT Security Executives are Bolstering Their Architecture (Panel Discussion)
  • Security Architecture Review Process – Trust/IDs/Applications
  • How to Modernize Your Security Architecture


Conference Price: $299.00 per person


Each attendee will receive a certificate awarding 7 CPE credits for CISSP continuing education, in addition to 0.7 CEUs and 7 PDUs. CISSP is a registered certification mark of (ISC)², Inc.

9:00am-10:00am:  Security Architecture and Business Resiliency


Patrick Benson, Systems Engineer, Veeam

Kevin Finch, Senior Business Continuity Architect, Sayers



Security and Infrastructure need to cooperate in order to ensure business resiliency, but many organizations fail to unite the two, leaving them vulnerable. Worse yet, some organizations unwittingly encourage opposition between the two. We will briefly discuss the importance of working together in those areas, and highlight some specific strategies companies can use to keep different areas of the business in alignment for better security, and better continuity of operations.




Benson                                             Finch



10:00am-10:30am: Refreshment Break

10:30am-11:30am: Fireside Chat:  Security Architecture Review Process – Trust/IDs/Applications


Ryan Radtke, Director, Information Security Architecture, AbbVie




11:30am-12:30pm: How Enterprise IT Security Executives are Bolstering Their Architecture (Panel Discussion)


In this session, attendees will go through five crucial steps for an effective Security Architecture:

  1. Assess your current security situation.
  2. Analyze security insights (strategic and technical).
  3. Develop the logical security layer of the architecture.
  4. Design the EISA implementation.
  5. Treat architecture as an ongoing process


Moderator: Marc Kreppel, Manager, Zerto


Panelists include:

  • Adam Kohnke, IT Cyber Security Architect, Charter Next Generation
  • Ron Versetto, Executive Director – IT, University of Illinois at Chicago
  • Keith Conlee, Chief Security Officer, IT, College of DuPage
  • Other Security Architecture Executives sharing best practices and lessons learned





Kreppel                                              Kohnke                                Versetto                         Conlee


12:30pm-1:30pm:  Lunch Session, Special Fireside Chat — Developing an Award Winning Security Program – Lessons Learned


Dean Sharp, Global Director of Information Security Architecture and Engineering, ManpowerGroup





1:30pm-2:30pm: Suspension of Disbelief: How Cybersecurity Myths Persist and What to Do Instead


Paul Jespersen, VP Worldwide Sales & Business Development, Sandfly Security


Sometimes its easier to hope for the magic bullet solutions, or MORE solutions, but instead of just accepting many of the current myths at face value, there are a few things we can do to make sure we have the right priorities in our operations, resources, and budgets.






2:30pm-3:00pm:  Refreshment Break

3:00pm-4:00pm: Breakout Session – How to Modernize Your Security Architecture


In this session, attendees will breakout into groups and discuss:

  • How to Build Resilience into Your Cybersecurity Program
  • Ideas of New Approaches and Technology Architectures that will be needed to securely enable the business
  • How to Collaborate with C-suite leaders and provide education where necessary to garner understanding and support
  • Different Approaches to Data Protection
  • How to Build a Zero Trust Philosophy Throughout the Organization
  • How to Tie In Disaster Recovery & Business Continuity with Your Security Architecture




As is always the case at CAMP IT Conferences events, the talks will not include product presentations. During the continental breakfast, coffee breaks, and the luncheon break you will have the opportunity to informally meet representatives from the following sponsoring companies, who have solutions in the area of the conference.