Conferences that solve current IT challenges

Mobile/Cloud/IoT Security Strategies for the New Area

Strategies to help your organization increase security and reduce risk in this new era of disruptive technologies

December 10, 2015


7 CPE / 0.7 CEU / CISSP / 7 PDU Credits Awarded


Conference location: Donald E. Stephens Convention Center Rosemont (O'Hare) Illinois


The convergence of IoT, Cloud and Mobility are transforming the way organizations are doing business. From healthcare to banking to hospitality organizations are delivering greater value by being closer to their customers. At the same time, enterprises embracing these initiatives need to be aware of the security risks involved.  In this one day session, attendees will learn strategies to manage the risks associated with this approach.

Topics that will be discussed

  • IoT, Cloud & Mobility Driving Business Value

  • IoT: Will This Be the Next Security Apocalypse?

  • IoT and Frameworks: How to Create a Sustainable Framework for Governing Data Protection

  • IoT Mobile/WLAN Authentication Strategy & Execution

  • Mobile/Cloud/IoT Steps to Secure the Next Generation

  • Planning & Preparing: How IT Organizations are Getting Ahead of the Mobile/Cloud/IoT Threats

Conference Program

8:00am - 9:00am - Registration and Continental Breakfast



IoT, Cloud & Mobility Driving Business Value


The Internet of Things is transforming business and entire industries as companies shift to creating products that are smart and connected. The IoT wave is here now - enabled by low cost hardware, pervasive connectivity and established cloud services to collapse implementation efforts.
In this session, attendees will learn how IoT, Cloud and Mobility come together to enable competitive advantage for the enterprise.

10:00am -10:30am - Refreshment Break



IoT: Will This Be the Next Security Apocalypse?

Richard Rushing, CISO, Motorola Mobility

The internet of things, is a loose group of devices that use networks to send or receive information. Most of this device started life without being design with security in mind. Now with billions of devices, new devices being added every day. It not when or what can go wrong, but is going wrong today on the internet of things. We take a look at the issues plaguing the devices, the applications, the servers and the data collected. We look to see if we must repeat the last 30 years of security matters, or learn from our mistakes and create a secure network of things. We will look at several problems and solutions for the "Internet of Things" that can dramatically increase the level of security.



IoT and Frameworks: How to Create a Sustainable Framework for Governing Data Protection


New emerging technologies can drive considerable business value, but also pose significant risks. What frameworks can you use as your organization ventures into this new era?

In this session attendees will be provided with the following:

  • An overview of the NIST Security Framework /OTA IoT Trust Framework
  • How to overcome challenges in addressing the convergence of security and privacy in IoT?
  • How to take a comprehensive view of IoT devices and services, including security, privacy and long-term sustainability?
  • An understanding of the plans in place for regulating IoT activity
  • What efforts are in place and what are the incentives?
  • Is legislation required to ensure security, or can this be accomplished through self-regulation?
  • Will a certification program be created for IoT devices?

12:30pm - 1:30pm Luncheon



IoT Mobile/WLAN Authentication Strategy & Execution

Bill Lundgren, Systems Engineer, Aerohive Networks

WLAN authentication has traditionally been handled by either RADIUS 802.1x or by standard Preshared Keys (PSK) like we all use in our homes. RADIUS is very secure and powerful, but complicated and not all devices understand it - especially those of the IoT variety. PSKs are easy to setup, but not particularly secure, do not allow for granular policy control and must be changed across all devices when one goes missing. MAC authentication can improve on PSK security, but is very labor intensive.

This presentation will give you network security strategies that you can put to work to manage the challenges that IoT authentication poses.

2:30pm - 3:00pm - Refreshment Break



Mobile/Cloud/IoT 4 Steps to Secure the Next Generation

Bob Kalka, Vice President, IBM Security Business Unit

Working with over 9,000 customers, IBM and Cognalytix have found that 4 key steps are fundamental to securing the next generation. They are:

  1. Optimizing the security program -- reducing overall IT costs through intrinsic security instead of adding to IT costs with extrinsic systems;
  2. Stopping advanced threats -- discerning the significant from the noise with a strong analytics capability;
  3. Protecting critical assets -- aligning development and security to control who has access to what, and how they access it;
  4. Safeguarding Cloud & Mobile -- providing security intelligence that covers the distribution and delivery of IT Services, from the processing-point to the end-point.

And IBM and Cognalytix has seen that the companies taking these steps are investing in 13 key security controls.

These 4 steps and 13 security controls are getting the majority of investment, globally.

Cognalytix will discuss these 13 key security controls and how they're enabling the 4 steps to securing the next generation.





Planning & Preparing: How IT Organizations are Getting Ahead of the Mobile/Cloud/IoT Threats

Annur Sumar, Regional Director, Concurrency
Carlos Pero, ‎Head of Application Security Americas, Zurich Insurance Company Ltd.
Seth McCallister, Head of Global Information Security, Beam Suntory
and other  professionals from IT departments

And other Security/Risk Leaders sharing experiences and lessons learned
In this session, attendees will learn how IT organizations are preparing for the threats ahead in this new era.

Topics covered:

  • How are they are working with the line of business to understand IoT applications
  • How they are protecting the enterprise from risks associated with emerging technologies and solutions like IoT
  • How they are involving IoT into their current Mobile & Cloud Security plans

Conference Price: $289.00 per person

Each attendee will receive a certificate awarding 7 CPE credits for CISSP continuing education, in addition to 0.7 CEUs and 7 PDUs. CISSP is a registered certification mark of (ISC), Inc.


As is always the case at CAMP IT Conferences events, the talks will not include product presentations.  During the continental breakfast, coffee breaks, and the luncheon break you will have the opportunity to informally meet representatives from the following sponsoring companies, who have solutions in the area of the conference.