Skip to content
Register
Cloud Security Architecture:
Designing a Trusted Framework
October 14, 2021 11AM – 4PM EST
(8AM – 1PM PST)
Cloud Security Architecture:
Designing a Trusted Framework
Numerous factors are converging to weaken the castle-and-moat approach to cloud security. In its place, zero trust architectures are becoming increasingly popular to help companies defend against diverse attack vectors including insider threats. But where is the line between zero trust and overburdening users? This virtual trade show will feature a range of keynotes, presentations, and educational content to help you design a trusted cloud security framework.

October 14, 2021
11:00 AM – 4:00 PM EST
8:00 AM – 1:00 PM PST

AGENDA

KEYNOTE 1
The Era of Zero Trust and New Security Paradigms:
Findings from the latest AFCOM State of the Data Center Report
Presented by: Bill Kleyman, EVP of Digital Solutions, Switch, and Contributing Editor, ITPro Today

When we talk about the new normal, we’re talking about the vast distribution of users and data. Over the past few months, we’ve seen incredible fallout from some of the world’s largest data breaches. Findings from the 2021 AFCOM State of the Data Center report highlight the security challenges that come in a distributed market.

In this keynote, we’ll discuss the zero trust security model, how distributed users and applications have created new challenges for businesses, and what leaders are doing to drive true security and infrastructure modernization efforts. Further, we’ll review the latest findings from the AFCOM State of the Data Center report including security, robotics, automation, and balancing new workforce requirements.

Specifically, we’ll cover:
  • The winds of security are changing: a review of recent security events
  • Why zero trust security models need to become the default security architecture
  • How users are changing
  • Key findings from the AFCOM State of the Data Center report
Presented by
Bill Kleyman
EVP of Digital Solutions, Switch, and
Contributing Editor,
ITPro Today
Sponsored by

Fireside Chat

With: Jason Williams, Product Marketing Manager, Prisma Cloud and Scott Wotring, Content Director, ITPro Today
NETWORKING BREAK
Networking Break

Sponsored by: Fortinet

Jason Williams
Product Marketing Manager,
Prisma Cloud
KEYNOTE 2
Microsoft Conditional Access Policies:
What You Should Know

Presented by: Brien Posey

Microsoft conditional access gives organizations a set of policies and configurations to control which devices get access to various apps and data. But to make effective use of Microsoft conditional access, organizations must first determine which types of conditional access policies to implement. In this keynote, we’ll share key considerations for devising the right conditional access policies for your business.

Sponsored by
Presented by

Brien Posey
Microsoft MVP
& Technical Writer

NETWORKING BREAK

Networking Break

Sponsored by: Sponsored By

PREMIER SESSION

You Can’t Phish an Empty Pond
Presented by:
Richard Archdeacon, Advisory CISO, Duo Security | Josh Green, Technical Marketing Engineer, Duo Security

We have all heard how important zero-trust is to our organizational security, but most of us are still carrying around some baggage from a past relationship: the password. Let’s talk about how to get that obstacle out of your Zero-Trust path. Where does passwordless fit logically? How, and importantly, where will it work?

Join Duo Advisory CISO Richard Archdeacon and Technical Marketing Engineer Josh Green for answers to these questions and more.

Sponsored by
Presented by
Richard Archdeacon
Advisory CISO
Duo Security
Josh Green
Technical Marketing Engineer
Duo Security

PREMIER SESSION

Securing the Distributed Workforce: How to Establish Trust in a Zero Trust World
Presented by: Ryan Terry, Sr. Solutions Product Marketing Manager, Okta

It’s no longer news that we need to support and secure increasingly distributed organizations. As companies look for long-term solutions for their hybrid and fully remote workforces, one thing is clear – identity is the new perimeter for businesses today.

An identity-first approach to security reduces today’s cybersecurity risks and provides the foundation for a zero trust security strategy. A modern Identity solution can also help you tie the complexities of protecting people and assets together in a seamless way.

Join this session to learn:
  • How to enable and secure a hybrid workforce
  • How identity can lay the foundation for any zero trust security initiative
  • What zero trust projects your peers are thinking about now and into the next 12-18 months
Sponsored by
Presented by
Ryan Terry
Sr. Solutions Product Marketing Manager
Okta
NETWORKING BREAK
Networking Break
Sponsored by: Sponsored by…

PREMIER SESSION

Getting Hybrid Clouds, Security and Networking Right

Presented by: Jonathan Nguyen-Duy, Vice President, Field CISO Team, Fortinet

Rapid adoption of hybrid clouds means networks are now more distributed than ever before and business values are shifting toward agility, innovation, and software, leading to the rise of the software-defined enterprise.

Hybrid cloud adoption is also driving three strategic technology trends:  zero trust, SD-WAN and SASE.  Going forward, IT teams must grapple with these key trends, while managing a combination of in-house and service-provider solutions and balancing risk management with business objectives and customer experiences. How should we think about computing, networking, and security when enterprises own less infrastructure, platform, and software?

In this session, you’ll learn:

  • Strategies to deploy adaptive cloud security, zero trust, SD-WAN and SASE in an integrated fashion
  • Practical strategies to secure hybrid clouds
  • How to deliver better outcomes and experiences.
Presented by

Jonathan Nguyen-Duy
VP, Field CISO Team,
Fortinet

Sponsored by

PREMIER SESSION

Autonomy vs Centralization: Addressing Cloud Security Challenges Across the Modern Enterprise

Presented by: Sandy Bird, Co-founder and CTO of Sonrai Security

Digital transformation has brought many organizations to the cloud, eager to take advantage of opportunities for rapid innovation, productivity gains, and cost savings that can help sustain an edge over the competition. But this new world of software development also requires new ways of thinking about security, and is as much a cultural change as a technology shift.

In order to realize the benefits of the cloud, developers need the autonomy to produce code and product as they see fit. This requires agility and speed that cannot be slowed down by security and compliance measures. So how do we build cloud architectures that still foster this independence but can also provide centralized governance to protect cloud workloads, platforms,and data?

Join Sandy Bird, CTO and co-founder of Sonrai Security, for this presentation focused on helping you design a secure cloud framework.

Attendees will learn:

  • Why the complexities of identity & data management in cloud environments create new risks we may not be aware of
  • Ways to build a culture where autonomy is preserved and cloud risk management is still respected
  • How to detect risks such as policy violations, misconfigurations, data drift and toxic combinations without harming productivity
Sandy Bird
Co-founder and CTO,
Sonrai Security
Sponsored by
SPOTLIGHT SESSION
Securing Containers with a Dynamic Image Analysis Sandbox
Presented by:
Gal Revach, Product Manager, and Keith Mokris, Director of Product Marketing, Prisma Cloud

DevOps and Infrastructure operations teams have taken to containers to scale their applications in ways never before thought possible. These teams are deploying with increasing release velocities, in times measured in seconds and minutes as opposed to days and weeks.

With increased release velocities also comes heightened security requirements for integrated security checks and controls into recurring DevOps workflows. This helps organizations identify vulnerabilities or compliance issues before a container is deployed into production. But, what about runtime security posture?

With the latest enhancements to Cloud Workload Protection in Prisma Cloud, development, DevOps, and cloud infrastructure practitioners can now see runtime risks before ever deploying into production with Prisma Cloud’s dynamic image analysis sandbox capabilities.

In this webinar, join Prisma Cloud Product Manager Gal Revach and Director of Product Marketing Keith Mokris to learn more about:
  • The latest trends in container adoption and security
  • A demo of the latest capabilities from Prisma Cloud’s image analysis sandbox
  • An overview of our latest Cloud Workload Protection enhancements
Sponsored by
Presented by
Gal Revach
Product Manager
Prisma Cloud
Keith Mokris
Dir. of Product Marketing
Prisma Cloud
NETWORKING BREAK
Networking Break
Sponsored by: Sponsored by…
PREMIER SESSIONS

Kubernetes-Native Security: Enable Kubernetes Adoption While Securing Your Workloads

Presented by: Michael Foster, Sr. Product Marketing Manager, Red Hat

Container technology has altered the way we develop, manage, and run our applications. With the massive adoption of containers and Kubernetes, how we secure our containerized technologies has also shifted. Kubernetes deploys, manages, and scales container workloads efficiently, and our security solutions need to accommodate this change if we want to leverage its fullest potential.

Red Hat Advanced Cluster Security (Formerly StackRox) is designed to tackle the security challenges of Kubernetes. In this session, we’ll discuss the changes to how we prioritize risk, manage Kubernetes configuration challenges and integrate security policies into our existing workflows and tools.

Specifically, we’ll cover:

  • What is Kubernetes-native security?
  • Security challenges with Kubernetes and how to identify them
  • Prioritizing issues and setting organizational policies
  • How to enable developers with best practices and collaboration
Presented by
Michael Foster
Sr. Product Marketing Manager,
Red Hat
Sponsored by

Prizes & Interaction

Attend the live conference on October 14th, 2021 and win! The more you participate, the more points you earn! It’s that simple. You’ll earn prize points for each activity you participate in throughout the virtual conference. Points will be calculated at the end of the live event day.

*Giveaways are limited to North American residents only. Winners are limited to one prize per calendar year for Informa Tech sponsored events.

Explorer Giveaway

30 Points

Session Viewed

25 Points

Zone Visits

20 Points

Location Chat Attended

10 Points

Documents Viewed

5 Points

Exchanged vCards

Keynote Sponsor

Prisma by Palo Alto
Premier Sponsors
DUO
Fortinet
Okta
sonrai security
Red-Hatv2
Cloud Security Architecture: Designing a Trusted Framework

October 14, 2021
11:00 AM – 4:00 PM EST | 8:00 AM – 1:00 PM PST

Natalie Silvanovich
Security Researcher,
Google

Natalie Silvanovich is a security researcher on Google Project Zero. Her current focus is messaging applications and video conferencing. Previously, she worked in mobile security on the Android Security Team at Google and as a team lead of the Security Research Group at BlackBerry, where her work included finding security issues in mobile software and improving the security of mobile platforms. Outside of work, Natalie enjoys applying her hacking and reverse engineering skills to unusual targets and has spoken at several conferences on the subject of Tamagotchi hacking.

[ifso id="1980"]

Bill Kleyman
Executive VP of Digital Solutions, Switch, and Contributing Editor, ITPro Today

Bill brings more than 15 years of experience to his role as Executive Vice President of Digital Solutions at Switch. Using the latest innovations, such as AI, machine learning, data center design, DevOps, cloud, and advanced technologies, Bill delivers solutions to customers that help them achieve their business goals and remain competitive in their market. An active member in the technology industry, he was ranked #16 globally in the Onalytica study that reviewed the top 100 most influential individuals in the cloud landscape; and #4 in another Onalytica study that reviewed the industry’s top Data Security Experts.

Jason Williams
Product Marketing Manager,
Prisma Cloud

Jason is a product marketing manager for Prisma Cloud and software Next Generation Firewalls at Palo Alto Networks, covering cloud network security.

Previously, he held technical product positions focused on software defined networks, zero trust, and microsegmentation at Cisco and Illumio.

Brien Posey
Technology Author & Microsoft MVP

As an international best-selling technology author and 18-time Microsoft MVP, Brien Posey has written or contributed to dozens of books, and created numerous video training courses on a variety of IT and space-related topics. Brien has published more than 7,000 technical articles and whitepapers for various websites and periodicals. He has received Microsoft’s MVP award numerous times for his work in Windows Server, IIS, Exchange Server, File Systems / Storage, Cloud and Datacenter Management, and Windows and Devices for IT. Brien was previously CIO for a national chain of hospitals and healthcare facilities, and served as lead network engineer for the U.S. Department of Defense at Fort Knox. In addition to his ongoing work in IT, Posey is training as a commercial astronaut candidate in preparation to study polar mesospheric clouds from space.

Richard Archdeacon
Product Marketing Manager,
Duo Security

Richard is the Advisory CISO for the EMEA region. He was previously with DXC – HPE – where he was a Chief Technologist in the Security Practice working with clients across all industries and regions. Prior to that, he worked for Symantec for many years. He has also held posts with security industry organisations such as IAAC and the IISP, and has worked on cyber resilience reports with the World Economic Forum.

Josh Green
Technical Marketing Engineer,
Duo Security

Josh Green is the Technical Marketing Engineer for Duo Security’s London office, providing pre-sales engineering support for organizations of all sizes. He works closely with everyone from CIOs, CISOs, IT Security, IT management and staff on product education, planning and deployment of Duo Security products.

Josh has been working in the cybersecurity space for the past 7 years dealing with Identity Management, Vulnerability Management, and Authentication. He speaks 4 languages, and in his spare time, enjoys learning new ones.

Ryan Terry
Sr. Solutions Product Marketing Manager,
Okta

Ryan Terry is a Sr. Solutions Product Marketing Manager at Okta, focused on security solutions. Ryan brings more than 8 years of experience in cybersecurity and previously worked at Proofpoint and Symantec. Ryan has a Master’s of Business Administration (MBA) from Brigham Young University.

Jonathan Nguyen-Duy
Field CISO, Fortinet

Jonathan Nguyen-Duy is a Field CISO at Fortinet where he focuses on advising carriers, service providers and systems integrators on multi-domain risk management. With extensive experience in securing complex networks and hybrid-architectures, Jonathan is responsible for developing innovative solutions addressing the challenges of digital transformation – from edge-based computing to multi-cloud ecosystems. He specializes in security and governance issues pertaining to zero trust, insider threats, privacy, resilience and managed services.

Prior to joining Fortinet, Jonathan served as the Security CTO at Verizon Enterprise Solutions where he was responsible for strategic technology partnerships, the Verizon Cyber Intelligence Center, and the data science team that produces the annual Verizon Data Breach Investigations Report. His research experience spans root cause analysis of over 12,000 data breaches – providing great insight on effective risk management strategies.

Prior to his work in the private sector, Jonathan served with the U.S. Foreign Service in Central America working on economic development and disarmament initiatives. He has more than 20 years of cybersecurity and business continuity experience – working through many business challenges including armed conflict, civil strife, labor strikes, natural disasters, terrorist attacks, network outages and a wide range of cybersecurity incidents.

Sandy Bird
Co-founder & CTO
Sonrai Security

Sandy Bird is the co-founder and CTO of Sonrai Security, helping enterprises secure their data in the cloud. Sandy was the co-founder and CTO of Q1 Labs, which was acquired by IBM in 2011.

At IBM, Sandy became the CTO for the global security business and worked closely with research, development, marketing and sales to develop new and innovative solutions to help the IBM Security business grow to ~$2B in annual revenue.

Michael Foster
Sr. Product Marketing Manager
Red Hat

Michael Foster is a Sr. Product Marketing Manager at Red Hat (Formerly StackRox) with over five years working with Kubernetes and various cloud native technologies.

Michael is a passionate tech enthusiast and open-source advocate with a multidisciplinary background. His work allows him to review, discuss, and contribute to the CNCF ecosystem through various media forms. Michael enjoys helping people and organizations become more security-focused during their cloud native journey.