Skip to content
Register
Cloud Security Architecture:
Designing a Trusted Framework
October 14, 2021 11AM – 4PM EST
(8AM – 1PM PST)
Cloud Security Architecture:
Designing a Trusted Framework
Numerous factors are converging to weaken the castle-and-moat approach to cloud security. In its place, zero trust architectures are becoming increasingly popular to help companies defend against diverse attack vectors including insider threats. But where is the line between zero trust and overburdening users? This virtual trade show will feature a range of keynotes, presentations, and educational content to help you design a trusted cloud security framework.

October 14, 2021
11:00 AM – 4:00 PM EST
8:00 AM – 1:00 PM PST

AGENDA

KEYNOTE 1
The Era of Zero Trust and New Security Paradigms:
Findings from the latest AFCOM State of the Data Center Report
Presented by: Bill Kleyman, EVP of Digital Solutions, Switch, and Contributing Editor, ITPro Today

When we talk about the new normal, we’re talking about the vast distribution of users and data. Over the past few months, we’ve seen incredible fallout from some of the world’s largest data breaches. Findings from the 2021 AFCOM State of the Data Center report highlight the security challenges that come in a distributed market.

In this keynote, we’ll discuss the zero trust security model, how distributed users and applications have created new challenges for businesses, and what leaders are doing to drive true security and infrastructure modernization efforts. Further, we’ll review the latest findings from the AFCOM State of the Data Center report including security, robotics, automation, and balancing new workforce requirements.

Specifically, we’ll cover:
  • The winds of security are changing: a review of recent security events
  • Why zero trust security models need to become the default security architecture
  • How users are changing
  • Key findings from the AFCOM State of the Data Center report
Presented by
Bill Kleyman
EVP of Digital Solutions, Switch, and
Contributing Editor,
ITPro Today
Sponsored by

Fireside Chat

With: Jason Williams, Product Marketing Manager, Prisma Cloud and Scott Wotring, Content Director, ITPro Today
NETWORKING BREAK
Networking Break

Sponsored by: Fortinet

Jason Williams
Product Marketing Manager,
Prisma Cloud
KEYNOTE 2
Microsoft Conditional Access Policies:
What You Should Know

Presented by: Brien Posey

Microsoft conditional access gives organizations a set of policies and configurations to control which devices get access to various apps and data. But to make effective use of Microsoft conditional access, organizations must first determine which types of conditional access policies to implement. In this keynote, we’ll share key considerations for devising the right conditional access policies for your business.

Sponsored by
Presented by

Brien Posey
Microsoft MVP
& Technical Writer

NETWORKING BREAK

Networking Break

Sponsored by: Sponsored By

PREMIER SESSION

You Can’t Phish an Empty Pond
Presented by:
Richard Archdeacon, Advisory CISO, Duo Security | Josh Green, Technical Marketing Engineer, Duo Security

We have all heard how important zero-trust is to our organizational security, but most of us are still carrying around some baggage from a past relationship: the password. Let’s talk about how to get that obstacle out of your Zero-Trust path. Where does passwordless fit logically? How, and importantly, where will it work?

Join Duo Advisory CISO Richard Archdeacon and Technical Marketing Engineer Josh Green for answers to these questions and more.

Sponsored by
Presented by
Richard Archdeacon
Advisory CISO
Duo Security
Josh Green
Technical Marketing Engineer
Duo Security

PREMIER SESSION

Securing the Distributed Workforce: How to Establish Trust in a Zero Trust World
Presented by: Ryan Terry, Sr. Solutions Product Marketing Manager, Okta

It’s no longer news that we need to support and secure increasingly distributed organizations. As companies look for long-term solutions for their hybrid and fully remote workforces, one thing is clear – identity is the new perimeter for businesses today.

An identity-first approach to security reduces today’s cybersecurity risks and provides the foundation for a zero trust security strategy. A modern Identity solution can also help you tie the complexities of protecting people and assets together in a seamless way.

Join this session to learn:
  • How to enable and secure a hybrid workforce
  • How identity can lay the foundation for any zero trust security initiative
  • What zero trust projects your peers are thinking about now and into the next 12-18 months
Sponsored by
Presented by
Ryan Terry
Sr. Solutions Product Marketing Manager
Okta
NETWORKING BREAK
Networking Break
Sponsored by: Sponsored by…

PREMIER SESSION

Getting Hybrid Clouds, Security and Networking Right

Presented by: Jonathan Nguyen-Duy, Vice President, Field CISO Team, Fortinet

Rapid adoption of hybrid clouds means networks are now more distributed than ever before and business values are shifting toward agility, innovation, and software, leading to the rise of the software-defined enterprise.

Hybrid cloud adoption is also driving three strategic technology trends:  zero trust, SD-WAN and SASE.  Going forward, IT teams must grapple with these key trends, while managing a combination of in-house and service-provider solutions and balancing risk management with business objectives and customer experiences. How should we think about computing, networking, and security when enterprises own less infrastructure, platform, and software?

In this session, you’ll learn:

  • Strategies to deploy adaptive cloud security, zero trust, SD-WAN and SASE in an integrated fashion
  • Practical strategies to secure hybrid clouds
  • How to deliver better outcomes and experiences.
Presented by

Jonathan Nguyen-Duy
VP, Field CISO Team,
Fortinet

Sponsored by

PREMIER SESSION

Autonomy vs Centralization: Addressing Cloud Security Challenges Across the Modern Enterprise

Presented by: Sandy Bird, Co-founder and CTO of Sonrai Security

Digital transformation has brought many organizations to the cloud, eager to take advantage of opportunities for rapid innovation, productivity gains, and cost savings that can help sustain an edge over the competition. But this new world of software development also requires new ways of thinking about security, and is as much a cultural change as a technology shift.

In order to realize the benefits of the cloud, developers need the autonomy to produce code and product as they see fit. This requires agility and speed that cannot be slowed down by security and compliance measures. So how do we build cloud architectures that still foster this independence but can also provide centralized governance to protect cloud workloads, platforms,and data?

Join Sandy Bird, CTO and co-founder of Sonrai Security, for this presentation focused on helping you design a secure cloud framework.

Attendees will learn:

  • Why the complexities of identity & data management in cloud environments create new risks we may not be aware of
  • Ways to build a culture where autonomy is preserved and cloud risk management is still respected
  • How to detect risks such as policy violations, misconfigurations, data drift and toxic combinations without harming productivity
Sandy Bird
Co-founder and CTO,
Sonrai Security
Sponsored by
SPOTLIGHT SESSION
Securing Containers with a Dynamic Image Analysis Sandbox
Presented by:
Gal Revach, Product Manager, and Keith Mokris, Director of Product Marketing, Prisma Cloud

DevOps and Infrastructure operations teams have taken to containers to scale their applications in ways never before thought possible. These teams are deploying with increasing release velocities, in times measured in seconds and minutes as opposed to days and weeks.

With increased release velocities also comes heightened security requirements for integrated security checks and controls into recurring DevOps workflows. This helps organizations identify vulnerabilities or compliance issues before a container is deployed into production. But, what about runtime security posture?

With the latest enhancements to Cloud Workload Protection in Prisma Cloud, development, DevOps, and cloud infrastructure practitioners can now see runtime risks before ever deploying into production with Prisma Cloud’s dynamic image analysis sandbox capabilities.

In this webinar, join Prisma Cloud Product Manager Gal Revach and Director of Product Marketing Keith Mokris to learn more about:
  • The latest trends in container adoption and security
  • A demo of the latest capabilities from Prisma Cloud’s image analysis sandbox
  • An overview of our latest Cloud Workload Protection enhancements
Sponsored by
Presented by
Gal Revach
Product Manager
Prisma Cloud
Keith Mokris
Dir. of Product Marketing
Prisma Cloud
NETWORKING BREAK
Networking Break
Sponsored by: Sponsored by…
PREMIER SESSIONS

Kubernetes-Native Security: Enable Kubernetes Adoption While Securing Your Workloads

Presented by: Michael Foster, Sr. Product Marketing Manager, Red Hat

Container technology has altered the way we develop, manage, and run our applications. With the massive adoption of containers and Kubernetes, how we secure our containerized technologies has also shifted. Kubernetes deploys, manages, and scales container workloads efficiently, and our security solutions need to accommodate this change if we want to leverage its fullest potential.

Red Hat Advanced Cluster Security (Formerly StackRox) is designed to tackle the security challenges of Kubernetes. In this session, we’ll discuss the changes to how we prioritize risk, manage Kubernetes configuration challenges and integrate security policies into our existing workflows and tools.

Specifically, we’ll cover:

  • What is Kubernetes-native security?
  • Security challenges with Kubernetes and how to identify them
  • Prioritizing issues and setting organizational policies
  • How to enable developers with best practices and collaboration
Presented by
Michael Foster
Sr. Product Marketing Manager,
Red Hat
Sponsored by

Prizes & Interaction

Attend the live conference on October 14th, 2021 and win! The more you participate, the more points you earn! It’s that simple. You’ll earn prize points for each activity you participate in throughout the virtual conference. Points will be calculated at the end of the live event day.

*Giveaways are limited to North American residents only. Winners are limited to one prize per calendar year for Informa Tech sponsored events.

Explorer Giveaway

30 Points

Session Viewed

25 Points

Zone Visits

20 Points

Location Chat Attended

10 Points

Documents Viewed

5 Points

Exchanged vCards

Keynote Sponsor

Prisma by Palo Alto
Premier Sponsors
DUO
Fortinet
Okta
sonrai security
Red-Hatv2
Cloud Security Architecture: Designing a Trusted Framework

October 14, 2021
11:00 AM – 4:00 PM EST | 8:00 AM – 1:00 PM PST

Natalie Silvanovich
Security Researcher,
Google

Natalie Silvanovich is a security researcher on Google Project Zero. Her current focus is messaging applications and video conferencing. Previously, she worked in mobile security on the Android Security Team at Google and as a team lead of the Security Research Group at BlackBerry, where her work included finding security issues in mobile software and improving the security of mobile platforms. Outside of work, Natalie enjoys applying her hacking and reverse engineering skills to unusual targets and has spoken at several conferences on the subject of Tamagotchi hacking.

[ifso id="1980"]