Skip to content

UPCOMING EVENTS


Cloud Security Strategies: Chicago (Rosemont/O’Hare), Illinois

A framework for developing a robust cloud security strategy.

November 5, 2026

9:00am-5:00pm

7 CPE / 0.7 CEU / CISSP / 7 PDU Credits Awarded

Conference location: Donald E. Stephens Convention Center Rosemont (O’Hare) Illinois

  


Overview

Independent analysts show that through 2024, 94% of cloud security failures will be the fault of the end-user customer.

Attendees will learn tips, strategies and tactics for developing a robust cloud security strategy.


What You Will Learn

In this one day conference attendees will learn:

  • eBPF 101 – The Evolution from Packet Capture to Kernel Capture, and What it Means for Cloud Security
  • Building Blocks for a Cloud Native Security and DR Strategy
  • Security Optimization and the Cloud
  • How IT the Business Can Work Together to Bolster Cloud Security (Panel Discussion)
  • Cloud IT Blind Spots – Overlooked Architecture for Cloud Security and Resilience
  • Cloud Security and Cloud Disaster Recovery – How Security Leaders are Responding to Sophisticated Cyber Attacks (Panel Discussion)

CONFERENCE AGENDA


8:00am – 9:00am: Registration and Continental Breakfast


9:00am – 10:00am: eBPF 101: From Packet Capture to Kernel-Level Observability

Cloud-native environments demand deeper visibility. This session introduces eBPF, showing how kernel-level insights enhance security monitoring, threat detection, and response.

Includes:

  • How eBPF differs from traditional packet capture
  • Security and observability use cases in cloud-native systems
  • Architectural considerations for eBPF adoption

10:00am – 10:30am: Sponsor & Refreshment Break


10:30am – 11:30am: Building Blocks for a Cloud-Native Security and DR Strategy

Security and disaster recovery are most effective when planned together. This session explores how to design cloud-native security and resilience programs.

Includes:

  • Core principles of cloud-native security and DR
  • Integrating security into resilience planning
  • Preparing for complex attack scenarios

11:30am – 12:30pm: Cloud IT Blind Spots: Overlooked Architecture for Security and Resilience

Hidden gaps in cloud architecture create risk. This session helps attendees identify and mitigate overlooked areas.

Includes:

  • Identity, access, and network blind spots
  • Data flow vulnerabilities and remediation
  • Lessons learned from real-world failures

12:30pm – 1:30pm: Lunch and Exhibit Break


1:30pm – 2:30pm: Security Optimization in the Cloud

Cloud security should scale with the business. This session covers strategies to optimize controls and reduce complexity without sacrificing protection.

Includes:

  • Risk-based prioritization of security investments
  • Automating repetitive controls
  • Measuring security program effectiveness

2:30pm – 3:00pm: Refreshment Break


3:00pm – 4:00pm:Cloud Security and Disaster Recovery: How Leaders Respond to Sophisticated Attacks

Sophisticated attacks require coordinated security and resilience. This session highlights real-world examples and lessons from security leaders.

Includes:

  • Coordinating cloud security and DR initiatives
  • Incident response strategies for complex attacks
  • Building repeatable lessons into cloud programs

4:00pm – 5:00pm: Panel: How IT and the Business Can Work Together to Bolster Cloud Security

Panelists will include Enterprise Identity Executives sharing the strategies, tactics, and lessons learned.

This interactive panel brings together security, architecture, and business leaders to discuss practical ways to share accountability, align priorities, and strengthen cloud security.

Includes:

  • Building collaboration between IT and business teams
  • Balancing security, compliance, and business agility
  • Audience Q&A

 


Conference Price: $349.00 per person

Each attendee will receive a certificate awarding 7 CPE credits for CISSP continuing education, in addition to 0.7 CEUs and 7 PDUs. CISSP is a registered certification mark of (ISC)², Inc.


Exhibits

As is always the case at CAMP IT Conferences events, the talks will not include product presentations. During the continental breakfast, coffee breaks, and the luncheon break you will have the opportunity to informally meet representatives from the following sponsoring companies, who have solutions in the area of the conference.