Hi [[ session.user.profile.firstName ]]

Why WFH and Cloud Will Permanently Change Security: 5 Changes You Can Make Now

Organizations around the world have recently been forced to rapidly shift to a mandatory work from home (WFH) arrangement. Even for those already operating with remote teams, this shift is causing disruption that likely changes how we approach information security moving forward. Join us as Dan Woods, technology analyst and founder of Early Adopter Research, and Eric Kedrosky, Director of Cloud Security Research and CISO of Sonrai Security, pinpoint five areas that must be addressed so these security problems can be prevented.

The webinar will address questions such as:
• How WFH is built-in for companies who have properly implemented public cloud
• How does remote working impact security practices and what has been learned so far?
• Why have practices such as segregation of duties become more important?
• Should remote working accelerate and broaden zero trust implementations?
• What best practices companies can put into place to secure their infrastructure to make WFH seamless
Recorded Apr 23 2020 62 mins
Your place is confirmed,
we'll send you email reminders
Presented by
Eric Kedrosky, Director of Cloud Security Research, Sonrai Security & Dan Woods, Principal Analyst, Early Adopter Research
Presentation preview: Why WFH and Cloud Will Permanently Change Security: 5 Changes You Can Make Now
  • Channel
  • Channel profile
  • Data Classification Program in AWS & Azure Deep Dive Aug 18 2021 5:30 pm UTC 45 mins
    Eric Kedrosky, Director of Cloud Security Research, Sonrai Security & Dave Shackleford, Founder & Principal, Voodoo Security
    Questions about public cloud data get complex answers. “Where is my data?” is subject to dynamic and ephemeral compute changing the definition of a “location.” “What is my data?” isn’t any simpler: classifying and tagging sensitive data can be as hard as locating it and tracking its movements.

    In part 3 of our Data Security in Public Cloud series, we’re taking a deep dive into data classification: the critical step in sustainable data protection. With the seemingly infinite scale of cloud, discerning what data sensitive and what isn’t becomes a bigger problem - and leveraging automation is necessary to limit the demand on your security team. There's more tooling than ever to implement custom classification unique to your company or industry - but the challenge to keep the program

    Sonrai CISO Eric Kedrosky & Voodoo Security Founder Dave Shackleford lay out how to run a durable data classification scheme built for cloud. Join them to learn about:
    -Data lifecycle and compliance considerations for classification
    -How to migrate or start a cloud data classification practice
    -Managing standard vs. custom classifiers
    -Building a tagging program
    -Advanced techniques & tooling for maintaining data standards
  • 5 Data Access Challenges and How to Solve Them in 30 minutes Recorded: Aug 5 2021 32 mins
    Eric Kedrosky, Director of Cloud Security Research, Sonrai Security & Michael Osterman, Principal Analyst, Osterman Research
    Organizations are gaining access to huge volumes of information every day. However, most of this data is wrapped in a complex ephemeral world of identities and resources.

    For the data to be protected organizations must aggregate, structure, normalize, and see all the information. Only then can they tag, classify, and index the data before finally enforcing controls and governance policies. However, many organizations struggle with determining when and how to manage access to data consistently, and how and when to modulate controls to ensure continuous security, governance, and compliance to prevent data loss. In this webinar, we will discuss best practices for data access and movement for AWS, Azure, GCP, and Kubernetes.

    This webinar is intended for cloud administrators and security teams who are looking for robust data access and movement strategy to protect data in the cloud running on AWS, Azure, or Google Cloud instances. We’ll look at some of the best practices and use cases for data access prevention and governance.
  • Find, Classify, Secure: Data Recon in AWS & Azure Recorded: Jul 21 2021 47 mins
    Eric Kedrosky, CISO, Sonrai Security; Dave Shackleford, Founder, Voodoo Security
    Do you know where your data is? It seems like such a simple question. Many security teams think they do, because they have a map and a plan of where data is **supposed** to be. Seeing where data actually is in the cloud requires more than a static plan - you need the capacity for dynamic reconnaissance. You also need a deep understanding of how data can be accessed to assign it a true ‘location’ to harden.

    Couple this complexity with the ever-growing scale of cloud, and data classification becomes critical: with an ever-growing cloud footprint, vulnerabilities need to be prioritized by sensitivity. PII in a public bucket is a much bigger problem than SOC compliance issues in a staging environment. They both need attention, but you’ll never have the resources to cover off every issue with the same speed.

    Securing data starts with seeing data, and seeing it clearly. Where it lives, how sensitive it is, and how it can be accessed are the first pieces of information to gather to prioritize your security tasks. Then you can start the work of hardening the most vulnerable positions, adjusting posture management, and limiting access.

    This is the first webcast in a series on securing data in the public cloud. Sonrai CISO Eric Kedrosky and Voodoo Security Founder’s Dave Shackleford team up to discuss the challenges of data reconnaissance and scanning in the cloud, covering topics like:
    -Common data visibility issues
    -Data classification: issues, best practices, and automation techniques
    -Mapping out a risk management strategy based on data intel
    -Securing the objects and locations where sensitive data lies with posture management and other governance strategies

    For the rest of the upcoming Securing Data in Public Cloud series, subscribe to our channel.
  • Cloud Infrastructure Entitlement Management (CIEM): Yet Another Security Acronym Recorded: Jun 23 2021 49 mins
    Eric Kedrosky, CISO & Director of Research, Sonrai Security and Dave Shackleford, Principal, Voodoo Security
    In the effort to keep your cloud secure, are you monitoring all your cloud identities - person and non-person - and their entitlements? Probably not, as gaining effective visibility into your cloud is notoriously complex. That lack of visibility and control over identity access and entitlements to your resources and assets is almost surely putting your crown-jewel resources and cloud security posture at risk.

    Analysts, like Gartner and Forrester Research, see the ability to govern identities and mitigate risk as essential for any enterprise with a large cloud infrastructure footprint. “Cloud Infrastructure & Entitlement Management” (CIEM) is what’s proposed to tackle this problem.

    Yes, yet another acronym. We'll decode where it overlaps with existing solutions (like CSPM), what's truly new about it, and what security concepts it addresses are most important.

    Sonrai CISO and Director of Cloud Research Eric Kedrosky and is joined by security veteran David Shackleford (Founder & Principal of Voodoo Security) to parse through the hype and figure out why identity security is becoming more critical to the public cloud.
  • Pillars of Cloud Security: Achieving and Maintaining Least Privilege Recorded: May 26 2021 58 mins
    Eric Kedrosky, Director of Cloud Security Research, Sonrai Security & Dan Woods, Principal Analyst, Early Adopter Research
    Least privilege, the state in which identities have access to only what they need and no more, is the ideal state for a cloud security environment. This goal is more complex and requires deeper analysis than most people realize. Taking a data-driven approach is fundamental to monitor IAM permissions as well as data access to achieve and maintain least privilege. The key is being able to determine the effective permissions completely, including all direct and indirect access paths from both people and non-people identities.

    This webinar, presented by Dan Woods, technology analyst and founder of Early Adopter Research, and Eric Kedrosky, Director of Cloud Security Research and CISO of Sonrai Security, explains the latest methods for bringing least privilege to life, answering questions such as:

    • What is least privilege and how has it changed in the cloud?
    • Why is it that least privilege cannot be achieved without knowing effective permissions?
    • Why must maintaining least privilege configurations be automated?
    • What are the risks and benefits?
  • It’s Probably Your Fault: 2021’s Worst Cloud Data Breaches Explained Recorded: May 13 2021 29 mins
    Eric Kedrosky, CISO & Director of Cloud Security Research, Sonrai Security
    The past 12 months have been a year of shocking cloud security data breaches - shocking, in that they were preceded by a year of high-profile preventable breaches… which were preceded by a previous year of preventable breaches, which… well, you get the point.

    Gartner recently updated their evaluation of cloud security and concluded “Through 2025, 99% of cloud security failures will be the customer’s fault.” Why are well-informed, experienced cloud security experts getting hit with breach after breach, when cautionary examples are right in front of them?

    The answer is: it’s a complicated, hard job, growing more complex with every new cloud service and an ever-expanding multi-cloud footprint. You can’t prevent every bad thing from happening at once. Keeping up to date with the most common (and the most interesting) data breach paths and how to secure them is key when it comes to defending your identities and data access.

    Let’s get up to date on the latest breach tactics. (Un)luckily we have an abundance of examples to dissect from 2021. Join Eric Kedrosky, CISO and Director of Cloud Research at Sonrai Security, as he breaks down the anatomy of 2021’s most notorious cloud data breaches and how they could’ve been avoided.

    We'll hit topics like:

    -AWS and Azure cloud misconfigurations
    -Key and secret management
    -Overprivileged identities
    -Malicious Bad Actors
    And more.
  • Enterprise Cloud Security: The Good, The Bad, The Ugly Recorded: Apr 20 2021 41 mins
    Michael Osterman, President of Osterman Research & Eric Kedrosky, CISO and Director of Cloud Research
    The Osterman Research white paper, "The State of Enterprise Cloud Security: The Good, The Bad, And The Ugly,” highlighted both the criticality and the challenges of security public clouds. Backed by Sonrai Security, the new cloud security research clearly illustrates the key contributors to cloud breaches -- many related to identity security, data security, misconfiguration, and executive strategy.

    We welcome back Michael Osterman, industry analyst and president of Osterman Research, and Eric Kedrosky, CISO and Director of Cloud Research for a 45-minute review of the State of Enterprise Cloud Security.

    Join our webinar on April 20 at 1:00 PM ET / 10:00 AM PT to get a firsthand view of research-based insights on the cloud security, identity risk, data challenges, and executive response posed by today’s complex cloud environments.

    Our experts and researchers will have an honest conversation about the state of enterprise cloud security. We will talk about the obvious risks and uncover some new challenges, including:

    - Overprivileged Identities: Identities with significantly more privileges and access than are required to carry out the duties assigned to them introduces a significant risk to the cloud.

    - Human Error: Human mistakes will happen and will not be deliberate at times, but these errors can still wreak havoc in an organization.

    - Unauthorized Access: Due to the complex nature of cloud environments, having visibility into which identities have access to data and resources is increasingly difficult. Organizations need to secure all crown jewel data and enforce policies to prevent unauthorized access to the cloud environment.

    - Executive Support & Spend: Our survey reveals spend and full-time resources dedicated to securing data, identities, and platforms. We uncovered big areas of executive risk in organizations' cloud strategy.
  • Identify and Eliminate Risks on AWS IAM and Secure Data Stores Using Sonrai Dig Recorded: Apr 13 2021 44 mins
    Adam Blackington, Partner Solutions Architect, Amazon Web Services and Jeff Moncrief, Director of Engineering, Sonrai
    In the effort to keep your cloud secure, are you looking at all your identities — human and non-human — and their effective permissions? It's likely you can’t, as end-to-end visibility is notoriously lacking in complex enterprise multi-cloud environments. And yet, that lack of visibility over identity access to your pieces of compute, data stores, containers, and assets is almost surely jeopardizing your crown-jewel data and cloud security posture.

    Join Sonrai Security and AWS to discover how to strengthen your identity and data security by understanding how to govern identities -human and non-human - effectively. We understand that managing risk across the ephemeral cloud means gaining control over users, data, identities, and access for secure infrastructure governance. The sheer number of interlocking entities, permissions, roles, and privileges presents many opportunities for unintentional paths to data via compromised identities. You will also learn how to manage effective permissions to prevent privilege escalations, toxic identity combinations, improper separation of duties, and other identity abuse concepts.

    In this virtual discussion, AWS and Sonrai Security will provide actionable insights for redefining your identity strategy. Presenters will cover the following key insights:

    ● Review abuse concepts and prevention of identity security risks like privilege escalations, toxic identity combinations, improper separation of duties, and more
    ● Learn how to continuously monitor for data and identity mistakes that make identity escalation attacks possible
    ● Understand how to use Sonrai Security to automate and prevent these attacks
    ● See live examples of identity exploits, like escalation attacks, permission chaining, and identity risks
  • Securing Non-Human Identities Part 3: Azure Recorded: Apr 7 2021 30 mins
    Sandy Bird, CTO, Sonrai Security & Eric Kedrosky, Director of Cloud Security Research, Sonrai Security
    Identities in a modern enterprise public cloud deployment are numerous and critical to securing your data. Non-human identities - like servers, VMs, serverless functions, applications, etc. - are being created at a rapid pace, sometimes by services without a person ever involved.

    Azure has given us tools to help govern access, but rapid innovation breeds complexity. Governance requires a new approach that meets this reality of ephemeral compute and complex webs of permission combinations.

    This is the third in a multi-part series on nonhuman identities. This session focuses on Azure but touches elements of multicloud management as well. We'll discuss:
    -Recap of what non-human identities are
    -Examples of Azure-specific risks
    -Best practices for managing them
    -Immediate steps anyone can take today to secure the identities
  • Live Hack- Common Paths to Breach from One Compromised AWS Identity Recorded: Mar 30 2021 60 mins
    Jeff Moncrief, Director Solutions Sonrai; Dave Shackleford, Principal, Voodoo Security
    The greatest risk to data security in the public cloud is its own complexity and scale. Breach tactics remain, on the whole, mundane: bad actors simply take advantage of the labyrinth of identity structures within the public cloud infrastructure. The sheer number of interlocking entities, permissions, roles, and privileges in a modern enterprise cloud presents many opportunities for unintentional paths to data via compromised identities.

    The best way to visualize this is to actually see it from a hacker’s perspective - so we’re doing this live in the cloud to show the most common paths to a data breach in AWS. We’re using simple command-line arguments to compromise an identity in a typical s3 bucket and make our way to sensitive data. We’ll go through how bad actors can easily abuse concepts like:
    •Privilege escalations
    •Trust relationships
    •Toxic identity combinations
    •Improper separation of duties

    *This webinar was originally broadcast in partnership with SANS.*
  • Azure Security Checklist: Governance, Identities, and Compliance Priorities Recorded: Mar 23 2021 43 mins
    Eric Kedrosky, CISO, Sonrai Security & Jeff Moncrief, Director of Sales Engineering at Sonrai Security
    Deploying an application on Azure is fast, easy, and cost-effective, leading many organizations to rapidly increase their Azure footprint in recent months. Throw in the forced adoption of work from home we saw in 2020 and many organizations are facing digital chaos with much larger clouds than before. The good news is that this chaos is manageable if you know what to look for.

    How do you manage security, compliance, and access risk in a scalable way within the Azure environment? Ignoring security gaps and relying on a single vendor dramatically increases risk, but with many cloud and security teams being asked to reduce costs in the challenging economic climate, taking a single vendor approach can be tempting.

    This checklist is intended to help enterprises think through various operational security considerations as they deploy sophisticated enterprise applications on Azure. It can also be used to help you build a secure cloud migration and operation strategy for your organization.
    Join Eric Kedrosky, CISO and Director of Cloud Research at Sonrai Security, to learn more about the security risks, compliance considerations, and access considerations in Azure.

    Key Takeaways:

    - Understand the common security and access risks associated with Azure
    - Learn how to ensure security for identities and data in your Azure environment
    - Best practices for compliance to protect critical data and identity access
  • Securing Non-Human Identities Part 2: AWS and Privilege Escalation Recorded: Mar 17 2021 30 mins
    Sandy Bird, CTO, Sonrai Security & Eric Kedrosky, Director of Cloud Security Research, Sonrai Security
    Identities in a modern enterprise public cloud deployment are numerous and critical to securing your data. Non-human identities - like servers, VMs, serverless functions, applications, etc. - are being created at a rapid pace, sometimes by services without a person ever involved.

    AWS has given us tools to help govern access, but rapid innovation breeds complexity. Governance requires a new approach that meets this reality of ephemeral compute and complex webs of permission combinations.

    This is the second in a multi-part series on nonhuman identities. This session focuses on AWS but touches elements of multicloud management as well. We'll discuss:
    -Recap of what non-human identities are
    -Examples of AWS-specific risks
    -Best practices for managing them
    -Immediate steps anyone can take today to secure the identities
  • Compliance Risks in the Shared Responsibility Model: Solutions for AWS & Azure Recorded: Feb 23 2021 45 mins
    Michael Osterman, President of Osterman Research
    How does the AWS Shared Responsibility Model change under compliance regulations? The short answer – it doesn’t. AWS is responsible for securing the underlying infrastructure that supports the cloud and the services provided, while AWS customers are responsible for any data they put in the cloud. This shared model can help relieve the IT operational burden, but if you aren’t aware of your responsibility, it can create compliance chaos.

    In this webinar, Michael Osterman, President of Osterman Research, will cover what it means to share the responsibility of data in the cloud - including the certifications, regulations, and frameworks AWS aligns with to support compliance - like GDPR, PCI DSS, HIPAA, SOC, and other regulatory requirements.

    Key Takeaways:

    ∙ Review the shared responsibility model and data compliance issues
    ∙ Understand how to act as a data controller or data processor within AWS environment
    ∙ Help you realize data protection by avoiding the common security and data access risks
    ∙ Find ways to meet your compliance goals on AWS
    ∙ Review data governance, like data retention, data classification, defensible deletion, and more.
  • Securing Non-Human Identities in AWS and Azure: Part 1 Recorded: Feb 17 2021 19 mins
    Sandy Bird, CTO, Sonrai Security & Eric Kedrosky, Director of Cloud Security Research, Sonrai Security
    Identities in a modern enterprise public cloud deployment are innumerate and critical to securing your data. Non-human identities - like servers, VMs, serverless functions, applications, etc. - are being created at a rapid pace, sometimes by services without a person ever involved.

    Cloud providers like Azure, AWS, and GCP have given us tools to help govern access, but they can be made insecure by simple configuration errors or omissions - and they're very different approaches, creating complexity for multicloud deployments. Governance requires a new approach that meets this new reality of ephemeral compute and complex webs of permission combinations.

    This is the first in a two part series on nonhuman identities. this session, we discuss:
    -What we mean by non-human identities
    -What problems these identities cause
    -Best practices for managing them
    -Immediate steps anyone can take today to secure the identities
  • AWS Checklist for 2021: Expert Advice on Security and Risk Priorities Recorded: Jan 26 2021 39 mins
    Eric Kedrosky, Director of Cloud Security Research, Sonrai Security & Michael Osterman, Principal Analyst, Osterman Research
    Many organizations have accelerated their digital transformation in recent months, often out of necessity to keep operations running from rapid WFH growth. In turn, this transformation has seen AWS adoption grow exponentially.

    There are many benefits to using AWS, but how do you manage security, compliance, and access risk within the AWS environment? Ignoring security gaps and relying on a single vendor dramatically increases risk, but with many cloud and security teams being asked to reduce costs in the challenging economic climate, taking a single vendor approach can be tempting.

    Join this webinar to learn more about the security risks, compliance considerations, and access considerations in AWS and how you can implement strategies to mitigate them.

    Key Takeaways:

    - Understand the common security and access risks associated with AWS
    - Learn how to ensure security for identities and data in your AWS environment
    - Best practices for compliance to protect critical data and identity access
  • Privilege Escalation Attacks in AWS: How They Work, How To Stop Them Recorded: Jan 21 2021 57 mins
    Sandy Bird, CTO and Co-founder, Sonrai Security & Dan Woods, Principal Analyst, Early Adopter Research
    AWS, like every advanced cloud platform, has well-known security flaws that can lead to catastrophic problems if you are not paying careful attention. One of the most dangerous allows innocuous accounts usually granted to developers to be given admin access. Such attacks work because a sequence of seemingly unimportant missteps in configuring different parts of AWS allows the escalation to occur. This webinar will show how these attacks work and how to be diligent about monitoring to make sure such attacks never succeed on your watch.

    This webinar will cover:

    The general nature of escalation attacks
    * How AWS is specifically vulnerable
    * What to do to monitor for mistakes that make these escalation attacks possible
    * How to use Sonrai Security to automate such monitoring
  • The CIA, Scripts, Hook-Ups: 2020's Worst Cloud Security Data Breaches Explained Recorded: Dec 15 2020 52 mins
    Eric Kedrosky, Director of Cloud Security Research, Sonrai Security & Dan Woods, Principal Analyst, Early Adopter Research
    2020 has been full of surprises - and cloud security data breaches have been no exception. From hotel chains to dating apps and video conferencing, misconfigurations and mistakes have left many organizations with exposed data. Knowing how data breaches happen and how to prevent them from happening is key when it comes to defending your identities and data access.

    In this webinar, Dan Woods, Principal Analyst at Early Adopter Research, and Eric Kedrosky, CISO and Director of Cloud Research of Sonrai Security, countdown the top ten notorious cloud data breaches, breaking down how each was caused and how they could have been prevented. This webinar will detail the anatomy of each type of breach, what we can learn, what allowed the breach to happen, and the preventative measures. The cloud is undeniably the future, and it can be secured with a bit of wisdom and some best practices that are newly evolving as this technology matures.

    Join us as we dissect the year’s most notorious cloud data breaches to share a bit of wisdom from our research, including:
    ○ Identity and authentication for data storage
    ○ Public cloud misconfiguration
    ○ Key and secret management
    ○ Overprivilege identities
    ○ Malicious Bad Actors
    ○ And more
  • Pillars of Cloud Security: Achieving and Maintaining Least Privilege Recorded: Dec 10 2020 57 mins
    Eric Kedrosky, Director of Cloud Security Research, Sonrai Security & Dan Woods, Principal Analyst, Early Adopter Research
    Least privilege, the state in which identities have access to only what they need and no more, is the ideal state for a cloud security environment. This goal is more complex and requires deeper analysis than most people realize. Taking a data-driven approach is fundamental to monitor IAM permissions as well as data access to achieve and maintain least privilege. The key is being able to determine the effective permissions completely, including all direct and indirect access paths from both people and non-people identities.

    This webinar, presented by Dan Woods, technology analyst and founder of Early Adopter Research, and Eric Kedrosky, Director of Cloud Security Research and CISO of Sonrai Security, explains the latest methods for bringing least privilege to life, answering questions such as:

    • What is least privilege and how has it changed in the cloud?
    • Why is it that least privilege cannot be achieved without knowing effective permissions?
    • Why must maintaining least privilege configurations be automated?
    • What are the risks and benefits?
  • Moving at Agile Speed: Improve Enterprise FinTech Cloud Security Recorded: Nov 17 2020 38 mins
    Eric Kedrosky, Director of Cloud Security Research, Sonrai Security & Dan Woods, Principal Analyst, Early Adopter Research
    The gap between moving to the cloud and implementing strong security has shrunk as new technologies accelerate the process. But there is a perceived trade between the objective of agile software development and the security that is meant to be achieved in fintech organizations.

    As organizations scale their public cloud implementation and the number of applications deployed, developers are slowed down as they are now forced to deal with security-related components to deploy and manage their application, which at scale, becomes complex. On the other side, the security team still has to maintain security and controls around all the applications, objects, and environments that are deployed.

    This webinar, presented by Dan Woods, a technology analyst and founder of Early Adopter Research, and Eric Kedrosky, Director of Cloud Security Research and CISO of Sonrai Security, will discuss how:

    ∙To effectively achieve the desired result of speed and security.
    ∙To identify the most critical risks and repercussions of following outdated governance policies when migrating to newer technologies.
    ∙To provide a five-step approach that all organizations can use to deliver governance and security across DevOps and security to reduce risk in their public clouds.
  • How CSPM Secures The Modern Healthcare Infrastructure Recorded: Oct 22 2020 46 mins
    Eric Kedrosky, Director of Cloud Security Research, Sonrai Security & Dan Woods, Principal Analyst, Early Adopter Research
    Cloud computing has modernized the way healthcare and life science organizations build, operate, and manage infrastructure and applications. Cloud computing has helped healthcare cloud professionals to quickly spin up or spin down a resource to fulfill the increased demand of new healthcare application workloads. However, when working in a cloud environment, monitoring the security state of multiple workloads while meeting the growing number of Health Insurance Portability and Accountability Act (HIPAA) compliance requirements can be challenging. How do you know if your security posture across all workloads is at the highest-possible level?

    Many hospitals, clinics, nursing homes, and other healthcare providers can’t, and they have turned to Cloud Security Posture Management (CSPM) to help in their modern cloud environments. CSPM brings a new set of tools to bear on the challenge of understanding and managing security in a multi-cloud world. In an important way, CSPM helps security professionals continuously monitor the configuration of their cloud and then use workflows and automation to effectively secure their cloud platforms.

    In this webinar, presented by Dan Woods, technology analyst and founder of Early Adopter Research, and Eric Kedrosky, Director of Cloud Security Research and CISO of Sonrai Security, we’ll share how healthcare organizations are securing their modern cloud application workloads while maintaining control over their compliance and cloud posture. Come to this webinar to learn about:

    • The unique cloud security challenges of Healthcare and Life Sciences
    • Cloud security control patterns and best practices
    • How CSPM helps implement those patterns and best practices
    • How intelligent CSPM help solve complex security problems for Healthcare and Life Sciences
Live monthly webcasts on Public Cloud security and risks.
Sonrai Security delivers an enterprise identity and data governance platform for AWS, Azure, Google Cloud, and Kubernetes.

Embed in website or blog

Successfully added emails: 0
Remove all
  • Title: Why WFH and Cloud Will Permanently Change Security: 5 Changes You Can Make Now
  • Live at: Apr 23 2020 6:00 pm
  • Presented by: Eric Kedrosky, Director of Cloud Security Research, Sonrai Security & Dan Woods, Principal Analyst, Early Adopter Research
  • From:
Your email has been sent.
or close