Conferences that solve current IT challenges

Mobile/Cloud/IoT Security – Strategies for the New Area

Strategies to help your organization increase security and reduce risk in this new era of disruptive technologies

April 26, 2016

9:00am-5:00pm

7 CPE / 0.7 CEU / CISSP / 7 PDU Credits Awarded

Conference location: Donald E. Stephens Convention Center Rosemont (O'Hare) Illinois

Overview

The convergence of IoT, Cloud and Mobility are transforming the way organizations are doing business. From healthcare to banking to hospitality organizations are delivering greater value by being closer to their customers. At the same time, enterprises embracing these initiatives need to be aware of the security risks involved.  In this one day session, attendees will learn strategies to manage the risks associated with this approach.

Topics that will be discussed

  • IoT, Cloud & Mobility – Driving Business Value

  • IoT: Will This Be the Next Security Apocalypse?

  • Compliance and Security Best Practices for Cloud Computing Environments

  • IoT Mobile/WLAN Authentication Strategy & Execution

  • Mobile/Cloud/IoT – Steps to Secure the Next Generation

  • Planning & Preparing: How IT Organizations are Getting Ahead of the Mobile/Cloud/IoT Threats

Conference Program

8:00am - 9:00am - Registration and Continental Breakfast

 

9:00am-10:00am

IoT: Will This Be the Next Security Apocalypse?

 

The internet of things, is a loose group of devices that use networks to send or receive information. Most of this device started life without being design with security in mind. Now with billions of devices, new devices being added every day. It not when or what can go wrong, but is going wrong today on the internet of things. We take a look at the issues plaguing the devices, the applications, the servers and the data collected. We look to see if we must repeat the last 30 years of security matters, or learn from our mistakes and create a secure network of things. We will look at several problems and solutions for the "Internet of Things" that can dramatically increase the level of security.






10:00am -10:30am - Refreshment Break

 

10:30am-11:30am

Connect & Protect: Building a Trust-Based Network for Business-Critical Apps and IoT/Mobility

 

With the surge of smart and IoT devices connecting to enterprise networks, conventional security methods for secure mobile access are not enough. Discover why technologies like deep packet inspection, firewalls, MDM and network access control must work together to ensure accurate policy enforcement for Wi-Fi and wired.  In this session, you will learn about how all security components working together will play a pivotal role in connecting and protecting the diverse range of devices that make up today’s mobile enterprise. We will also review advanced network policy management tools for interrogating IoT devices, defining user and device privileges, and determine whether or not they should be who and what are allowed to connect - in the office and out.









Sweet

11:30am-12:30pm

Compliance and Security Best Practices for Cloud Computing Environments

Carson Sweet, Co-founder and Chief Strategy Officer, CloudPassage

In order to maximize the tremendous opportunity cloud computing represents, customers must address the unique security challenges posed by cloud computing, especially when organizations have the need to comply with regulations such as PCI, SOX, or HIPAA. In this session, you will learn about the security challenges of moving your data and running your applications in the cloud and the best practices and technologies available to mitigate those risks.










12:30pm - 1:30pm Luncheon

 

1:30pm-2:30pm

IoT Mobile/WLAN Authentication Strategy & Execution

 

WLAN authentication has traditionally been handled by either RADIUS 802.1x or by standard Preshared Keys (PSK) like we all use in our homes. RADIUS is very secure and powerful, but complicated and not all devices understand it - especially those of the IoT variety. PSKs are easy to setup, but not particularly secure, do not allow for granular policy control and must be changed across all devices when one goes missing. MAC authentication can improve on PSK security, but is very labor intensive.

This presentation will give you network security strategies that you can put to work to manage the challenges that IoT authentication poses.








2:30pm - 3:00pm - Refreshment Break

 

3:00pm-4:00pm

Mobile/Cloud/IoT – 4 Steps to Secure the Next Generation

 

We have found that 4 key steps are fundamental to securing the next generation. They are:

  1. Optimizing the security program -- reducing overall IT costs through intrinsic security instead of adding to IT costs with extrinsic systems;
  2. Stopping advanced threats -- discerning the significant from the noise with a strong analytics capability;
  3. Protecting critical assets -- aligning development and security to control who has access to what, and how they access it;
  4. Safeguarding Cloud & Mobile -- providing security intelligence that covers the distribution and delivery of IT Services, from the processing-point to the end-point.







4:00pm-5:00pm

Kwong

Planning & Preparing: How IT Organizations are Getting Ahead of the Mobile/Cloud/IoT Threats

Panelists:
Fred Kwong, PhD., Director, Security Architecture & Strategy, Farmers Insurance
and other professionals from IT departments

And other Security/Risk Leaders sharing experiences and lessons learned
In this session, attendees will learn how IT organizations are preparing for the threats ahead in this new era.

Topics covered:

  • How are they are working with the line of business to understand IoT applications
  • How they are protecting the enterprise from risks associated with emerging technologies and solutions like IoT
  • How they are involving IoT into their current Mobile & Cloud Security plans





Conference Price: $289.00 per person


Each attendee will receive a certificate awarding 7 CPE credits for CISSP continuing education, in addition to 0.7 CEUs and 7 PDUs. CISSP is a registered certification mark of (ISC)², Inc.

Exhibits

As is always the case at CAMP IT Conferences events, the talks will not include product presentations.  During the continental breakfast, coffee breaks, and the luncheon break you will have the opportunity to informally meet representatives from the following sponsoring companies, who have solutions in the area of the conference.