Manage and Secure Identity Across Clouds
Learn how to safely manage identities and user access across multiple cloud environments.
Cyber Risk Management and Compliance
Gain effective strategies to keep track of all your IT and data assets as well as what’s needed to assess risk and maintain compliance.
Cloud Controls and Cyber Attack Prevention
Discover best practices, technology and other helpful guidelines to protect your organization’s cloud environment.
Featured ESG Keynote:
Securing the Identity Perimeter with Defense in Depth
The core tenet of a zero trust strategy is least-privilege access. Yet, organizations continue to rely on user and machine identities that are susceptible to compromise, abuse and misuse, and theft. Risk is compounded by over-permissive, static access rights that provide little to no visibility into who and what is using access…
Featured Panel Discussions:
Identity Management Is Essential to Cloud Security
Digital transformation and the evolution of identity in the workplace — spurred by decentralization, cloud adoption and remote work — have exposed the fact that old methods of identity and access management have outgrown traditional security protections, posing major risks. Adaptable and agile security architectures with a spotlight on identity are a…
Build a Multi-cloud Strategy that Supports Governance and Compliance
Spreading operations across more than one cloud enables organizations to choose from a variety of cloud services to cut costs, improve operations and improve scalability. However, operating complex environments across multiple platforms requires a comprehensive strategy to handle connectivity, applications, data and security. In this panel, experts will discuss how organizations can…
A special thank you to our Sponsors!
CISOs, CIOs, CTOs, MDs, Heads, EVPs, SVPs, VPs, Directors, Managers, Advisors, Partners and Consultants within:
IT / IT Security / IT Operations
Network Security / Systems Engineering
Internal Audit / Compliance / IT Risk
Security / Information Security / Information Assurance
Data Privacy / Data Security
Cloud Security / Solutions Architecture
Cybersecurity / Cyber Intelligence
Breach / Threat Detection
BrightTALK Cloud Security Summit Audience by Numbers (since 2019):