Feedback from Attendees

Upcoming  2017 Events

July 12, 2017
Enterprise Architecture Strategies
Info
Chicago, IL

Sept. 7, 2017
IT Infrastructure/Operations Management (Data Center)
Info
Chicago, IL

Sept. 19, 2017
Enterprise Risk/Security Management
Info
Dallas, TX

Oct. 4, 2017
Enterprise Risk/Security Management
Info
Chicago, IL

Oct. 18, 2017
IT Leadership Strategies
Info
Chicago, IL

Oct. 26, 2017
Enterprise Architecture Strategies
Info
Chicago, IL

Nov. 1-2, 2017
IT PMO/Portfolio Management
Info
Dallas, TX

Nov. 15, 2017
DR/BC - Resilient Infrastructure
Info
Chicago, IL

Nov. 30, 2017
Business Intelligence/Big Data/Analytics
Info
Chicago, IL

Dec. 7, 2017
Data Breaches: Preparing and Responding
Info
Chicago, IL

Upcoming  2018 Events

Feb. 1, 2018
Enterprise Risk/Security Management
Info
Dallas, TX

Feb. 20, 2018
Enterprise Risk/Security Management
Info
Chicago, IL

Mar. 1, 2018
IT Leadership Strategies
Info
Chicago, IL

Mar. 7, 2018
Enterprise Architecture Strategies
Info
Chicago, IL

April 12, 2018
Business Intelligence/Big Data/Analytics
Info
Chicago, IL

May 2, 2018
Data Breaches: Preparing and Responding
Info
Chicago, IL

May 15, 2018
IT Infrastructure/Operations Management (Data Center)
Info
Chicago, IL

May 31, 2018
Enterprise Risk/Security Management
Info
Minneapolis, MN

June 7, 2018
Enterprise Risk/Security Management
Info
Chicago, IL

June 20-21, 2018
IT PMO/Portfolio Management
Info
Chicago, IL

July 11, 2018
Enterprise Architecture Strategies
Info
Chicago, IL

Sept. 6, 2018
IT Infrastructure/Operations Management (Data Center)
Info
Chicago, IL

Sept. 18, 2018
Enterprise Risk/Security Management
Info
Dallas, TX

Oct. 3, 2018
Enterprise Risk/Security Management
Info
Chicago, IL

Oct. 17, 2018
IT Leadership Strategies
Info
Chicago, IL

Oct. 25, 2018
Enterprise Architecture Strategies
Info
Chicago, IL

Nov. 1-2, 2018
IT PMO/Portfolio Management
Info
Dallas, TX

Nov. 14, 2018
DR/BC - Resilient Infrastructure
Info
Chicago, IL

Nov. 29, 2018
Business Intelligence/Big Data/Analytics
Info
Chicago, IL

Dec. 6, 2018
Data Breaches: Preparing and Responding
Info
Chicago, IL

(Click here to add any of our upcoming events to your calendar)

 

 

Conferences that solve current IT challenges

Mobile/Cloud/IoT Security Strategies for the New Area

Strategies to help your organization increase security and reduce risk in this new era of disruptive technologies

December 10, 2015

9:00am-5:00pm

7 CPE / 0.7 CEU / CISSP / 7 PDU Credits Awarded

Register

Conference location: Donald E. Stephens Convention Center Rosemont (O'Hare) Illinois

Overview

The convergence of IoT, Cloud and Mobility are transforming the way organizations are doing business. From healthcare to banking to hospitality organizations are delivering greater value by being closer to their customers. At the same time, enterprises embracing these initiatives need to be aware of the security risks involved.  In this one day session, attendees will learn strategies to manage the risks associated with this approach.

Topics that will be discussed

  • IoT, Cloud & Mobility Driving Business Value

  • IoT: Will This Be the Next Security Apocalypse?

  • IoT and Frameworks: How to Create a Sustainable Framework for Governing Data Protection

  • IoT Mobile/WLAN Authentication Strategy & Execution

  • Mobile/Cloud/IoT Steps to Secure the Next Generation

  • Planning & Preparing: How IT Organizations are Getting Ahead of the Mobile/Cloud/IoT Threats

Conference Program

8:00am - 9:00am - Registration and Continental Breakfast

 

9:00am-10:00am

IoT, Cloud & Mobility Driving Business Value

 

The Internet of Things is transforming business and entire industries as companies shift to creating products that are smart and connected. The IoT wave is here now - enabled by low cost hardware, pervasive connectivity and established cloud services to collapse implementation efforts.
In this session, attendees will learn how IoT, Cloud and Mobility come together to enable competitive advantage for the enterprise.






10:00am -10:30am - Refreshment Break

Rushing

10:30am-11:30am

IoT: Will This Be the Next Security Apocalypse?

Richard Rushing, CISO, Motorola Mobility

The internet of things, is a loose group of devices that use networks to send or receive information. Most of this device started life without being design with security in mind. Now with billions of devices, new devices being added every day. It not when or what can go wrong, but is going wrong today on the internet of things. We take a look at the issues plaguing the devices, the applications, the servers and the data collected. We look to see if we must repeat the last 30 years of security matters, or learn from our mistakes and create a secure network of things. We will look at several problems and solutions for the "Internet of Things" that can dramatically increase the level of security.








 

11:30am-12:30pm

IoT and Frameworks: How to Create a Sustainable Framework for Governing Data Protection

 

New emerging technologies can drive considerable business value, but also pose significant risks. What frameworks can you use as your organization ventures into this new era?

In this session attendees will be provided with the following:

  • An overview of the NIST Security Framework /OTA IoT Trust Framework
  • How to overcome challenges in addressing the convergence of security and privacy in IoT?
  • How to take a comprehensive view of IoT devices and services, including security, privacy and long-term sustainability?
  • An understanding of the plans in place for regulating IoT activity
  • What efforts are in place and what are the incentives?
  • Is legislation required to ensure security, or can this be accomplished through self-regulation?
  • Will a certification program be created for IoT devices?










12:30pm - 1:30pm Luncheon

Lundgren

1:30pm-2:30pm

IoT Mobile/WLAN Authentication Strategy & Execution

Bill Lundgren, Systems Engineer, Aerohive Networks

WLAN authentication has traditionally been handled by either RADIUS 802.1x or by standard Preshared Keys (PSK) like we all use in our homes. RADIUS is very secure and powerful, but complicated and not all devices understand it - especially those of the IoT variety. PSKs are easy to setup, but not particularly secure, do not allow for granular policy control and must be changed across all devices when one goes missing. MAC authentication can improve on PSK security, but is very labor intensive.

This presentation will give you network security strategies that you can put to work to manage the challenges that IoT authentication poses.








2:30pm - 3:00pm - Refreshment Break

Kalka

3:00pm-4:00pm

Mobile/Cloud/IoT 4 Steps to Secure the Next Generation

Bob Kalka, Vice President, IBM Security Business Unit

Working with over 9,000 customers, IBM and Cognalytix have found that 4 key steps are fundamental to securing the next generation. They are:

  1. Optimizing the security program -- reducing overall IT costs through intrinsic security instead of adding to IT costs with extrinsic systems;
  2. Stopping advanced threats -- discerning the significant from the noise with a strong analytics capability;
  3. Protecting critical assets -- aligning development and security to control who has access to what, and how they access it;
  4. Safeguarding Cloud & Mobile -- providing security intelligence that covers the distribution and delivery of IT Services, from the processing-point to the end-point.

And IBM and Cognalytix has seen that the companies taking these steps are investing in 13 key security controls.

These 4 steps and 13 security controls are getting the majority of investment, globally.

Cognalytix will discuss these 13 key security controls and how they're enabling the 4 steps to securing the next generation.











4:00pm-5:00pm

Sumar

Pero

McCallister

Planning & Preparing: How IT Organizations are Getting Ahead of the Mobile/Cloud/IoT Threats

Moderator:
Annur Sumar, Regional Director, Concurrency
Panelists:
Carlos Pero, ‎Head of Application Security Americas, Zurich Insurance Company Ltd.
Seth McCallister, Head of Global Information Security, Beam Suntory
and other  professionals from IT departments

And other Security/Risk Leaders sharing experiences and lessons learned
In this session, attendees will learn how IT organizations are preparing for the threats ahead in this new era.

Topics covered:

  • How are they are working with the line of business to understand IoT applications
  • How they are protecting the enterprise from risks associated with emerging technologies and solutions like IoT
  • How they are involving IoT into their current Mobile & Cloud Security plans





Conference Price: $289.00 per person


Each attendee will receive a certificate awarding 7 CPE credits for CISSP continuing education, in addition to 0.7 CEUs and 7 PDUs. CISSP is a registered certification mark of (ISC), Inc.

Exhibits

As is always the case at CAMP IT Conferences events, the talks will not include product presentations.  During the continental breakfast, coffee breaks, and the luncheon break you will have the opportunity to informally meet representatives from the following sponsoring companies, who have solutions in the area of the conference.