FREE In-Person Event
SANS CloudSecNext Summit Solutions Track 2022
SANS is pleased to announce that this year's CloudSecNext Summit Solutions Track is LIVE! Join us in beautiful San Diego, CA on Wednesday, May 4th for an action-packed day of incredible Cloud Security content with SANS Chairperson, AJ Yawn, and invited experts of the leading Cloud Security organizations.
It's likely that your organization stores sensitive data and resources in the cloud. Protecting these assets is top of mind for executives and security professionals. The speed and simplicity of the cloud allow companies to build applications faster than ever before. Unfortunately, this speed often comes with a cost - a lack of focus on security.
Security in the cloud shouldn't slow down the business. Companies must move fast to keep up with their competition, and security professionals must develop automated solutions to stay ahead of threats. Attackers are finding new ways to exploit weaknesses in the cloud, which requires companies to implement innovative solutions to protect their customers' data.
Who Should Attend?
- Security personnel who are tasked with securing virtualization and private cloud infrastructure
- Network and systems administrators who need to understand how to architect, secure and maintain virtualization and cloud technologies
- Technical auditors and consultants who need to gain a deeper understanding of cloud computing and security concerns
- Security and IT leaders who need to understand the risks of cloud computing and advise business management of the risks and various approaches involved
Why should you join us In-Person for the CloudSecNext Summit Solutions Track? Here are a few benefits of joining us In-Person:
- Content that provides you with actionable takeaways you can apply at work the very next day
- Free breakfast, lunch, AND happy hour
- Prize Giveaways
- Oculus Quest 2 VR Headset
- Holy Stone GPS Drone
- Hundreds of $$ in Amazon Gift Cards
- Face-to-face interaction with security professionals
- Immediate access to tools from over a dozen cloud security industry leaders
SANS Solutions Expo
- Free handcrafted and made to order breakfast
- Free buffet style lunch including assorted carving stations and sweet treats
- Happy hour reception with complimentary beer, wine, and small bites
- Prize giveaways:
- Oculus Quest 2 VR Headset
- Holy Stone GPS Drone
- Hundreds of $$ in Amazon Gift Cards
- And More!
Come join us at the SANS CloudSecNext Solutions Expo to meet, in-person, with leading companies in the cloud industry. Attendees will have the opportunity to discuss the latest products and services available to help them with their day-to-day security operations.
Attendees will receive the following perks at the Solutions Expo:
Agenda | May 4, 2022 | 8:00AM - 6:00 PM PDT
Check-In Opens (and goes ALL DAY)
LOCATION IN HOTEL: HARBOR BALLROOMS G, H, I
Get checked in for the action-packed full day ahead and grab a bite to eat during our morning networking event and free breakfast!
FREE Breakfast Includes:
Welcome & Opening Remarks
AJ Yawn, SANS Instructor & Subject Matter Expert
The Largest Threat to Your Data You’re Not Aware of is Lurking in the Shadows
Shadow data is the new shadow IT and it's leaving undue risk and breaches in its wake. CISO anxiety comes from the fear of the unknown and data security teams have lost visibility to where their sensitive data is in the cloud. In this session you will learn...
Andy Smith, Chief Marketing Officer, Laminar
Understanding the 3 Essential Pillars: Cloud Native Security
With many organizations now deploying cloud native applications based on micro-services, using containers, VMs and serverless functions, they are faced with new security challenges and threats. Based on Aqua's experience with hundreds of cloud native implementations since 2016, we've come to the realization that any cloud native security strategy must address these three areas - the build phase of applications, the infrastructure on which applications run, and the workloads themselves. In this talk we will show how this holistic approach creates an opportunity to automate and improve security to previously unattainable levels, and the agility and acceleration it enables to drive digital transformation and cloud enablement initiatives.
Paul Romanek, Solution Architect, Aqua Security
Refreshments and Snacks Served:
You’re Not Looking for a Ransomware Solution
Ransomware has become one of the biggest challenges for every organization, and is now one of the most talked-about topics in the security industry. IT and security teams are being asked about how they’re protecting against ransomware, but the answer isn’t always straightforward. This is because there is no one silver bullet solution for taking on ransomware. Join Hank Schless from Lookout as he takes a step back and looks at the ransomware problem from a pragmatic standpoint. By breaking down the killchain and aligning its steps with broader initiatives you’re already working on, you can take care of this challenge piece by piece without feeling overwhelmed with questions from your executives and noise from the market.
Hank Schless, Sr. Security Solutions Manager, Lookout
Effective API Security Demands Application Context and Behavioral Analysis
Micro-services, cloud-native architectures, and API-driven applications have not only changed the speed of business innovation, they’ve changed what it takes to properly secure your applications. It’s no longer enough to secure apps by observing from the outside (like doctor’s did in Colonial times). Highly effective API security requires deeper knowledge about the applications and its users. Join Dan Gordon, API Security Evangelist @ Traceable AI to learn how to effectively secure against API attacks at scale.
Dan Gordon, Technical Evangelist, Traceable AI
Extending Endpoint Detection and Response to the Cloud
With the rapid adoption of cloud computing, cloud workloads are in the crosshairs like never before. To protect cloud assets, SecOps teams need to expand their traditional scope to also monitor cloud activity, block cloud attacks, and speed enterprise-wide investigation and response. Attend this session to learn how leading SecOps teams secure corporate resources across a dynamic and distributed environment.
Josh Zelonis, Field CTO & Evangelist, Palo Alto Networks
Converse with fellow cybersecurity attendees over a delicious lunch including assorted carving stations and sweet treats!
FREE Lunch Includes:
The Remote Access Security Landscape
With the rapid transition to remote work, the industry is racing to meet a variety of use-cases and requirements. Whether users connect over VPNs, zero-trust portals, or to public cloud applications, the expectations rarely change: responsive applications, efficient sign-on, and consistent access. This session will explore how remote workers are connecting to resources and the many ways the industry is securing those connections.
Christian Clasen, Technical Leader - Cloud Security, Cisco Secure
Why Wait? Find Cloud Risks and Threats in Real Time with Stream Detection
Cloud service providers offer cost effective and efficient collection and storage of cloud logs, which is a rich source of data for devops and security teams. Copying logs out of the cloud to query them later is expensive and complex to manage. With stream detection you can find risks and threats in real time and fix issues faster while saving time and money. Join us to learn how you can utilize Falco's real-time telemetry in your cloud native environment to enable smarter alerts faster and stay ahead of bad actors and malicious attacks.
Alexander Lawrence, Principal Security Architect, Sysdig
IT/OT Convergence: How to Leverage and Secure Cyber Physical Systems in the Cloud
Migrating IT applications to the cloud has become a relatively routine process, but, as more and more critical infrastructure becomes automated and digitized, cloud hosting and security of cyber physical data and applications pose different challenges. Data from Industrial IoT processes, surveillance cameras, point of sale systems, medical instruments or other process sensors and actuators can benefit from cloud-level economies of scale, but raise different sets of issues and benefits. After this session, you’ll walk away with an understanding of how to leverage and secure cyber physical systems and data in the cloud.
Gary Kinghorn, Senior Director, Nozomi Networks
Refreshments and Snacks Served:
Real world Use Cases for NDR in the Cloud
As we’ve learned from events like Sunburst and Log4Shell, network telemetry provides essential evidence for catching threats that other tools miss. Join us as we dive into real world use cases from the research team at Corelight -- the creators and maintainers of Zeek. You'll learn how the collection and analysis of cloud network traffic leads to better threat detection and faster response.
Vijit Nair, Senior Director of Product - Cloud Security, Corelight
Understanding and Prioritizing "True" Risks From an Attackers' Perspective
If you have a few hundred workloads running in the cloud, then you are most likely dealing with thousands of vulnerabilities and hundreds of misconfigurations. Given the volume of these security findings, it has become very challenging to prioritize the remediations. A single-dimensional view - the severity of the finding - is insufficient and will not reduce the overall risk of an asset. For example, fixing a remote code vulnerability on an asset not exposed to the internet may not reduce your risk. You need a multidimensional approach that combines threat vectors and asset relationships for effective prioritization. This session will discuss two concepts - external attack surface and attack path - that provide attackers’ view of your security. We will also discuss how you use these concepts for prioritizing your security findings.
Parag Bajaria, VP Cloud and Container Security, Qualys
Wrap-UpAJ Yawn, SANS Instructor & Subject Matter Expert
Happy Hour Reception
Enjoy some beverages (adult and otherwise) and small bites on us! Chat with fellow attendees and invited industry experts from the CloudSecNext and Security West events and enter for prize giveaways!
FREE Drinks & Food Served:
Manchester Grand Hyatt
Explore Southern California’s vibrant culture and natural beauty from this waterfront hotel in downtown San Diego. Experience spacious rooms, stunning views, and upscale amenities steps from the city’s top attractions. Guests enjoy easy access to San Diego’s best beaches, restaurants, shops, entertainment venues, and more.
Hotel Special Rates and Reservations
A special discounted rate of $251.00 S/D plus applicable taxes will be honored based on space availability.
A limited number of Government Per Diem rooms at the prevailing rate are available with proper ID.
These rates include Internet in your room and are only available through Friday, April 15, 2022.
To make a regular reservation, please visit this link.
To make a government per diem reservation, please visit this link.
Travel Arrangements and Directions
Please visit the hotel’s website or contact them directly at 619-232-1234 for prevailing parking rates that are subject to change prior to the official meeting dates.
From San Diego International Airport (SAN): Approximately 3.4 miles.
Experience San Diego
3 Fun Facts about San Diego
- WD-40 was invented in San Diego in 1953.
- The first drive-in restaurant in the US was opened in San Diego by the man who later founded Jack In The Box.
- San Diego is home to the world’s oldest sailing ship, The Star of India.
Local Attractions to Visit in San Diego
USS Midway Museum
San Diego Zoo
Historic Gaslamp Quarter
SANS Security West 2022
When: Thu, May 5 - Tue, May 10, 2022
Where: San Diego, CA or Virtual
Learn real-world cyber security skills from top industry experts during SANS Security West 2022. Join us Live Online or in San Diego, CA to experience interactive training with hands-on labs, practice your skills during NetWars Tournaments, and network with your peers in real-time.