Hi [[ session.user.profile.firstName ]]

Pillars of Cloud Security: Prevent Problems or Fix Them Fast

The best cloud security teams have a clear categorization of their environments, craft policies and controls appropriate to each, and then handle the alerts that come when controls detect problems. The idea of “Prevent Problems or Fix Them Fast” is to add as much automation as possible to both to remediate problems that are detected or prevent them from occurring in the first place. Just as the controls are adapted to each swimlane of activity, so must the remediation or prevention.

This webinar, presented by Dan Woods, technology analyst and founder of Early Adopter Research, and Eric Kedrosky, Director of Cloud Security Research and CISO of Sonrai Security, explains how to expand automation of both prevention and remediation so that the impact of vulnerabilities is minimized or even eliminated.

∙ What is the ideal process to speed up remediations and maximize prevention
∙ What does a high level security operations model look like?
∙ How best to apply different policies and frameworks to the categories of your cloud?
∙ What new forms of automation for remediation and prevention are being adopted?
∙ How do Remediation, Prevention, and Block Code bots work?
∙ What mechanisms are used in the development and staging process to block code promotion?
∙ Why would your company benefit from a “prevent problems or fix it fast” mindset?
∙ What tactics can help prevent problems or fix them fast?
Recorded Aug 18 2020 34 mins
Your place is confirmed,
we'll send you email reminders
Presented by
Eric Kedrosky, Director of Cloud Security Research, Sonrai Security & Dan Woods, Principal Analyst, Early Adopter Research
Presentation preview: Pillars of Cloud Security: Prevent Problems or Fix Them Fast
  • Channel
  • Channel profile
  • AWS Checklist for 2021: Expert Advice on Security and Risk Priorities Oct 26 2021 4:00 pm UTC 39 mins
    Eric Kedrosky, Director of Cloud Security Research, Sonrai Security & Michael Osterman, Principal Analyst, Osterman Research
    Many organizations have accelerated their digital transformation in recent months, often out of necessity to keep operations running from rapid WFH growth. In turn, this transformation has seen AWS adoption grow exponentially.

    There are many benefits to using AWS, but how do you manage security, compliance, and access risk within the AWS environment? Ignoring security gaps and relying on a single vendor dramatically increases risk, but with many cloud and security teams being asked to reduce costs in the challenging economic climate, taking a single vendor approach can be tempting.

    Join this webinar to learn more about the security risks, compliance considerations, and access considerations in AWS and how you can implement strategies to mitigate them.

    Key Takeaways:

    - Understand the common security and access risks associated with AWS
    - Learn how to ensure security for identities and data in your AWS environment
    - Best practices for compliance to protect critical data and identity access
  • Orphaned Accounts & * Permissions: A Cloud Security Horror Story Recorded: Oct 20 2021 32 mins
    Eric Kedrosky & Nathan Schmidt
    Everyone enjoys a good scare, but there’s nothing more frightening than the risks that are lurking in your cloud! Effective permission chaining, orphaned accounts, unrestricted data movement, platform misconfigurations; these issues and more are still plaguing companies despite countless examples of cloud data breaches that should have been a wake up call to us all.

    More than a decade into cloud security, even the most advanced companies are struggling with basic security risk in the cloud. Some don’t know where the problems lie, and others don’t have the right tools to remediate new security and compliance risks. Approaches from the on-prem world, like traditional IAM, don’t cut it anymore. Teams need new methods for managing data, identity and cloud platform risks.

    Join Eric Kedrosky, CISO and Director of Cloud Research at Sonrai Security and Nathan Schmidt, Principal Security Architect at Sonrai Security for this haunting exploration of the “Tales from the Field”, an event focused on the first hand account of security risks that have bedeviled companies in the public cloud.

    Attendees will learn:
    * How the complexity of the cloud created new security risks that we’re failing to address
    * Examples of recent cloud data breaches & the causes that might be hiding in your cloud
    * The best practices teams can adopt to avoid identity, data and platform risks and put these ghouls to rest, once and for all
  • Azure Security Checklist: Governance, Identities, and Compliance Priorities Recorded: Oct 14 2021 43 mins
    Eric Kedrosky, CISO, Sonrai Security & Jeff Moncrief, Director of Sales Engineering at Sonrai Security
    Deploying an application on Azure is fast, easy, and cost-effective, leading many organizations to rapidly increase their Azure footprint in recent months. Throw in the forced adoption of work from home we saw in 2020 and many organizations are facing digital chaos with much larger clouds than before. The good news is that this chaos is manageable if you know what to look for.

    How do you manage security, compliance, and access risk in a scalable way within the Azure environment? Ignoring security gaps and relying on a single vendor dramatically increases risk, but with many cloud and security teams being asked to reduce costs in the challenging economic climate, taking a single vendor approach can be tempting.

    This checklist is intended to help enterprises think through various operational security considerations as they deploy sophisticated enterprise applications on Azure. It can also be used to help you build a secure cloud migration and operation strategy for your organization.
    Join Eric Kedrosky, CISO and Director of Cloud Research at Sonrai Security, to learn more about the security risks, compliance considerations, and access considerations in Azure.

    Key Takeaways:

    - Understand the common security and access risks associated with Azure
    - Learn how to ensure security for identities and data in your Azure environment
    - Best practices for compliance to protect critical data and identity access
  • Building Secure Cloud Foundations in AWS with Sonrai & World Fuel Services Recorded: Sep 29 2021 23 mins
    Sandy Bird, CTO, Sonrai Security & Avi Boru, World Fuel Services
    During a cloud migration, it’s very important to choose the right tools and resources to make your transformation seamless and secure. When World Fuel Services decided they were going to reduce their data centers from 22 to 2 in under two years, they sought more than just a security solution, they looked for a partner who could help them build a strong foundation and mature cloud operating model. In choosing Sonrai, they knew it wasn’t just technology they needed, but expertise in process, security and governance to help them scale in a new technological frontier.

    Watch this session from The Cube AWS Startup Showcase featuring Avi Boru, Director of Cloud Engineering at World Fuel Services, and Sandy Bird, CTO & Cofounder of Sonrai Security as they talk about important considerations in moving from the data center to the cloud, and how cloud technologies have literally turned the security world upside down. This 25 minute discussion covers:
    * How the cloud gives us opportunities to “redo security” and be more secure than we ever were on prem
    * The benefits of decentralizing security across your cloud, development and operations teams
    * Why identity is the new perimeter, replacing firewalls in the cloud, and
    * The absolute importance of having a strong cloud security governance model to put an end to security “whack-a-mole”
  • What Security Folks Are Afraid To Ask: Data, Identity & Infrastructure Recorded: Sep 15 2021 26 mins
    Johna Till Johnson, CEO, Nemertes & Eric Kedrosky, Research Director & CISO, Sonrai Security
    We’re years into the cloud era, yet companies are still making the same mistakes. Week after
    week, we’re still seeing the same “breach headlines”. The issues have been so well documented—
    what are people missing?

    The truth is, security teams are using outdated paradigms that lead them to repeat old mistakes.
    Join Nemertes CEO Johna Till Johnson and Eric Kedrosky, Research Director & Chief
    Information Security Officer at Sonrai Security as they discuss "Top Five Ways To Get Cloud Security Right" in a lively, interactive discussion. They’ll sketch out the challenges and highlight the steps that enterprise security technologists need to take to get cloud security right.

    Participants will learn what they’re missing in next-generation cloud security, and how to tackle the
    knotty issues of cloud identity, access management, and policy enforcement.
  • Supercharge your AWS security posture using identity and data controls Recorded: Aug 24 2021 36 mins
    Jeff Moncrief, Field CTO & Director of Solutions Engineering
    Identity and data permissions in AWS, properly used, will allow you to deliver security far superior to anything possible in a data center world. However, many organizations are struggling to securely manage all of these identities and the risks to their cloud. In turn, malicious actors are acutely aware of the gaps and are actively exploiting them. Learn how least privilege, least access, separation of duties, privilege escalations, executed properly, can be quickly and easily enforced where it actually matters in your cloud.

    Join our session where we will answer the following:
    * How Sonrai’s Intelligent CSPM provides visibility and remediation inside your AWS environments
    * How your organization can apply appropriate security controls to enhance identity security and data protection
    * What specific frameworks and policies are necessary to identify and reduce risk across your environment
  • Data Classification Program in AWS & Azure Deep Dive Recorded: Aug 18 2021 47 mins
    Eric Kedrosky, Director of Cloud Security Research, Sonrai Security & Dave Shackleford, Founder & Principal, Voodoo Security
    Questions about public cloud data get complex answers. “Where is my data?” is subject to dynamic and ephemeral compute changing the definition of a “location.” “What is my data?” isn’t any simpler: classifying and tagging sensitive data can be as hard as locating it and tracking its movements.

    In part 3 of our Data Security in Public Cloud series, we’re taking a deep dive into data classification: the critical step in sustainable data protection. With the seemingly infinite scale of cloud, discerning what data sensitive and what isn’t becomes a bigger problem - and leveraging automation is necessary to limit the demand on your security team. There's more tooling than ever to implement custom classification unique to your company or industry - but the challenge to keep the program

    Sonrai CISO Eric Kedrosky & Voodoo Security Founder Dave Shackleford lay out how to run a durable data classification scheme built for cloud. Join them to learn about:
    -Data lifecycle and compliance considerations for classification
    -How to migrate or start a cloud data classification practice
    -Managing standard vs. custom classifiers
    -Building a tagging program
    -Advanced techniques & tooling for maintaining data standards
  • 5 Data Access Challenges and How to Solve Them in 30 minutes Recorded: Aug 5 2021 32 mins
    Eric Kedrosky, Director of Cloud Security Research, Sonrai Security & Michael Osterman, Principal Analyst, Osterman Research
    Organizations are gaining access to huge volumes of information every day. However, most of this data is wrapped in a complex ephemeral world of identities and resources.

    For the data to be protected organizations must aggregate, structure, normalize, and see all the information. Only then can they tag, classify, and index the data before finally enforcing controls and governance policies. However, many organizations struggle with determining when and how to manage access to data consistently, and how and when to modulate controls to ensure continuous security, governance, and compliance to prevent data loss. In this webinar, we will discuss best practices for data access and movement for AWS, Azure, GCP, and Kubernetes.

    This webinar is intended for cloud administrators and security teams who are looking for robust data access and movement strategy to protect data in the cloud running on AWS, Azure, or Google Cloud instances. We’ll look at some of the best practices and use cases for data access prevention and governance.
  • Find, Classify, Secure: Data Recon in AWS & Azure Recorded: Jul 21 2021 47 mins
    Eric Kedrosky, CISO, Sonrai Security; Dave Shackleford, Founder, Voodoo Security
    Do you know where your data is? It seems like such a simple question. Many security teams think they do, because they have a map and a plan of where data is **supposed** to be. Seeing where data actually is in the cloud requires more than a static plan - you need the capacity for dynamic reconnaissance. You also need a deep understanding of how data can be accessed to assign it a true ‘location’ to harden.

    Couple this complexity with the ever-growing scale of cloud, and data classification becomes critical: with an ever-growing cloud footprint, vulnerabilities need to be prioritized by sensitivity. PII in a public bucket is a much bigger problem than SOC compliance issues in a staging environment. They both need attention, but you’ll never have the resources to cover off every issue with the same speed.

    Securing data starts with seeing data, and seeing it clearly. Where it lives, how sensitive it is, and how it can be accessed are the first pieces of information to gather to prioritize your security tasks. Then you can start the work of hardening the most vulnerable positions, adjusting posture management, and limiting access.

    This is the first webcast in a series on securing data in the public cloud. Sonrai CISO Eric Kedrosky and Voodoo Security Founder’s Dave Shackleford team up to discuss the challenges of data reconnaissance and scanning in the cloud, covering topics like:
    -Common data visibility issues
    -Data classification: issues, best practices, and automation techniques
    -Mapping out a risk management strategy based on data intel
    -Securing the objects and locations where sensitive data lies with posture management and other governance strategies

    For the rest of the upcoming Securing Data in Public Cloud series, subscribe to our channel.
  • Cloud Infrastructure Entitlement Management (CIEM): Yet Another Security Acronym Recorded: Jun 23 2021 49 mins
    Eric Kedrosky, CISO & Director of Research, Sonrai Security and Dave Shackleford, Principal, Voodoo Security
    In the effort to keep your cloud secure, are you monitoring all your cloud identities - person and non-person - and their entitlements? Probably not, as gaining effective visibility into your cloud is notoriously complex. That lack of visibility and control over identity access and entitlements to your resources and assets is almost surely putting your crown-jewel resources and cloud security posture at risk.

    Analysts, like Gartner and Forrester Research, see the ability to govern identities and mitigate risk as essential for any enterprise with a large cloud infrastructure footprint. “Cloud Infrastructure & Entitlement Management” (CIEM) is what’s proposed to tackle this problem.

    Yes, yet another acronym. We'll decode where it overlaps with existing solutions (like CSPM), what's truly new about it, and what security concepts it addresses are most important.

    Sonrai CISO and Director of Cloud Research Eric Kedrosky and is joined by security veteran David Shackleford (Founder & Principal of Voodoo Security) to parse through the hype and figure out why identity security is becoming more critical to the public cloud.
  • Pillars of Cloud Security: Achieving and Maintaining Least Privilege Recorded: May 26 2021 58 mins
    Eric Kedrosky, Director of Cloud Security Research, Sonrai Security & Dan Woods, Principal Analyst, Early Adopter Research
    Least privilege, the state in which identities have access to only what they need and no more, is the ideal state for a cloud security environment. This goal is more complex and requires deeper analysis than most people realize. Taking a data-driven approach is fundamental to monitor IAM permissions as well as data access to achieve and maintain least privilege. The key is being able to determine the effective permissions completely, including all direct and indirect access paths from both people and non-people identities.

    This webinar, presented by Dan Woods, technology analyst and founder of Early Adopter Research, and Eric Kedrosky, Director of Cloud Security Research and CISO of Sonrai Security, explains the latest methods for bringing least privilege to life, answering questions such as:

    • What is least privilege and how has it changed in the cloud?
    • Why is it that least privilege cannot be achieved without knowing effective permissions?
    • Why must maintaining least privilege configurations be automated?
    • What are the risks and benefits?
  • It’s Probably Your Fault: 2021’s Worst Cloud Data Breaches Explained Recorded: May 13 2021 29 mins
    Eric Kedrosky, CISO & Director of Cloud Security Research, Sonrai Security
    The past 12 months have been a year of shocking cloud security data breaches - shocking, in that they were preceded by a year of high-profile preventable breaches… which were preceded by a previous year of preventable breaches, which… well, you get the point.

    Gartner recently updated their evaluation of cloud security and concluded “Through 2025, 99% of cloud security failures will be the customer’s fault.” Why are well-informed, experienced cloud security experts getting hit with breach after breach, when cautionary examples are right in front of them?

    The answer is: it’s a complicated, hard job, growing more complex with every new cloud service and an ever-expanding multi-cloud footprint. You can’t prevent every bad thing from happening at once. Keeping up to date with the most common (and the most interesting) data breach paths and how to secure them is key when it comes to defending your identities and data access.

    Let’s get up to date on the latest breach tactics. (Un)luckily we have an abundance of examples to dissect from 2021. Join Eric Kedrosky, CISO and Director of Cloud Research at Sonrai Security, as he breaks down the anatomy of 2021’s most notorious cloud data breaches and how they could’ve been avoided.

    We'll hit topics like:

    -AWS and Azure cloud misconfigurations
    -Key and secret management
    -Overprivileged identities
    -Malicious Bad Actors
    And more.
  • Enterprise Cloud Security: The Good, The Bad, The Ugly Recorded: Apr 20 2021 41 mins
    Michael Osterman, President of Osterman Research & Eric Kedrosky, CISO and Director of Cloud Research
    The Osterman Research white paper, "The State of Enterprise Cloud Security: The Good, The Bad, And The Ugly,” highlighted both the criticality and the challenges of security public clouds. Backed by Sonrai Security, the new cloud security research clearly illustrates the key contributors to cloud breaches -- many related to identity security, data security, misconfiguration, and executive strategy.

    We welcome back Michael Osterman, industry analyst and president of Osterman Research, and Eric Kedrosky, CISO and Director of Cloud Research for a 45-minute review of the State of Enterprise Cloud Security.

    Join our webinar on April 20 at 1:00 PM ET / 10:00 AM PT to get a firsthand view of research-based insights on the cloud security, identity risk, data challenges, and executive response posed by today’s complex cloud environments.

    Our experts and researchers will have an honest conversation about the state of enterprise cloud security. We will talk about the obvious risks and uncover some new challenges, including:

    - Overprivileged Identities: Identities with significantly more privileges and access than are required to carry out the duties assigned to them introduces a significant risk to the cloud.

    - Human Error: Human mistakes will happen and will not be deliberate at times, but these errors can still wreak havoc in an organization.

    - Unauthorized Access: Due to the complex nature of cloud environments, having visibility into which identities have access to data and resources is increasingly difficult. Organizations need to secure all crown jewel data and enforce policies to prevent unauthorized access to the cloud environment.

    - Executive Support & Spend: Our survey reveals spend and full-time resources dedicated to securing data, identities, and platforms. We uncovered big areas of executive risk in organizations' cloud strategy.
  • Identify and Eliminate Risks on AWS IAM and Secure Data Stores Using Sonrai Dig Recorded: Apr 13 2021 44 mins
    Adam Blackington, Partner Solutions Architect, Amazon Web Services and Jeff Moncrief, Director of Engineering, Sonrai
    In the effort to keep your cloud secure, are you looking at all your identities — human and non-human — and their effective permissions? It's likely you can’t, as end-to-end visibility is notoriously lacking in complex enterprise multi-cloud environments. And yet, that lack of visibility over identity access to your pieces of compute, data stores, containers, and assets is almost surely jeopardizing your crown-jewel data and cloud security posture.

    Join Sonrai Security and AWS to discover how to strengthen your identity and data security by understanding how to govern identities -human and non-human - effectively. We understand that managing risk across the ephemeral cloud means gaining control over users, data, identities, and access for secure infrastructure governance. The sheer number of interlocking entities, permissions, roles, and privileges presents many opportunities for unintentional paths to data via compromised identities. You will also learn how to manage effective permissions to prevent privilege escalations, toxic identity combinations, improper separation of duties, and other identity abuse concepts.

    In this virtual discussion, AWS and Sonrai Security will provide actionable insights for redefining your identity strategy. Presenters will cover the following key insights:

    ● Review abuse concepts and prevention of identity security risks like privilege escalations, toxic identity combinations, improper separation of duties, and more
    ● Learn how to continuously monitor for data and identity mistakes that make identity escalation attacks possible
    ● Understand how to use Sonrai Security to automate and prevent these attacks
    ● See live examples of identity exploits, like escalation attacks, permission chaining, and identity risks
  • Securing Non-Human Identities Part 3: Azure Recorded: Apr 7 2021 30 mins
    Sandy Bird, CTO, Sonrai Security & Eric Kedrosky, Director of Cloud Security Research, Sonrai Security
    Identities in a modern enterprise public cloud deployment are numerous and critical to securing your data. Non-human identities - like servers, VMs, serverless functions, applications, etc. - are being created at a rapid pace, sometimes by services without a person ever involved.

    Azure has given us tools to help govern access, but rapid innovation breeds complexity. Governance requires a new approach that meets this reality of ephemeral compute and complex webs of permission combinations.

    This is the third in a multi-part series on nonhuman identities. This session focuses on Azure but touches elements of multicloud management as well. We'll discuss:
    -Recap of what non-human identities are
    -Examples of Azure-specific risks
    -Best practices for managing them
    -Immediate steps anyone can take today to secure the identities
  • Live Hack- Common Paths to Breach from One Compromised AWS Identity Recorded: Mar 30 2021 60 mins
    Jeff Moncrief, Director Solutions Sonrai; Dave Shackleford, Principal, Voodoo Security
    The greatest risk to data security in the public cloud is its own complexity and scale. Breach tactics remain, on the whole, mundane: bad actors simply take advantage of the labyrinth of identity structures within the public cloud infrastructure. The sheer number of interlocking entities, permissions, roles, and privileges in a modern enterprise cloud presents many opportunities for unintentional paths to data via compromised identities.

    The best way to visualize this is to actually see it from a hacker’s perspective - so we’re doing this live in the cloud to show the most common paths to a data breach in AWS. We’re using simple command-line arguments to compromise an identity in a typical s3 bucket and make our way to sensitive data. We’ll go through how bad actors can easily abuse concepts like:
    •Privilege escalations
    •Trust relationships
    •Toxic identity combinations
    •Improper separation of duties

    *This webinar was originally broadcast in partnership with SANS.*
  • Azure Security Checklist: Governance, Identities, and Compliance Priorities Recorded: Mar 23 2021 43 mins
    Eric Kedrosky, CISO, Sonrai Security & Jeff Moncrief, Director of Sales Engineering at Sonrai Security
    Deploying an application on Azure is fast, easy, and cost-effective, leading many organizations to rapidly increase their Azure footprint in recent months. Throw in the forced adoption of work from home we saw in 2020 and many organizations are facing digital chaos with much larger clouds than before. The good news is that this chaos is manageable if you know what to look for.

    How do you manage security, compliance, and access risk in a scalable way within the Azure environment? Ignoring security gaps and relying on a single vendor dramatically increases risk, but with many cloud and security teams being asked to reduce costs in the challenging economic climate, taking a single vendor approach can be tempting.

    This checklist is intended to help enterprises think through various operational security considerations as they deploy sophisticated enterprise applications on Azure. It can also be used to help you build a secure cloud migration and operation strategy for your organization.
    Join Eric Kedrosky, CISO and Director of Cloud Research at Sonrai Security, to learn more about the security risks, compliance considerations, and access considerations in Azure.

    Key Takeaways:

    - Understand the common security and access risks associated with Azure
    - Learn how to ensure security for identities and data in your Azure environment
    - Best practices for compliance to protect critical data and identity access
  • Securing Non-Human Identities Part 2: AWS and Privilege Escalation Recorded: Mar 17 2021 30 mins
    Sandy Bird, CTO, Sonrai Security & Eric Kedrosky, Director of Cloud Security Research, Sonrai Security
    Identities in a modern enterprise public cloud deployment are numerous and critical to securing your data. Non-human identities - like servers, VMs, serverless functions, applications, etc. - are being created at a rapid pace, sometimes by services without a person ever involved.

    AWS has given us tools to help govern access, but rapid innovation breeds complexity. Governance requires a new approach that meets this reality of ephemeral compute and complex webs of permission combinations.

    This is the second in a multi-part series on nonhuman identities. This session focuses on AWS but touches elements of multicloud management as well. We'll discuss:
    -Recap of what non-human identities are
    -Examples of AWS-specific risks
    -Best practices for managing them
    -Immediate steps anyone can take today to secure the identities
  • Compliance Risks in the Shared Responsibility Model: Solutions for AWS & Azure Recorded: Feb 23 2021 45 mins
    Michael Osterman, President of Osterman Research
    How does the AWS Shared Responsibility Model change under compliance regulations? The short answer – it doesn’t. AWS is responsible for securing the underlying infrastructure that supports the cloud and the services provided, while AWS customers are responsible for any data they put in the cloud. This shared model can help relieve the IT operational burden, but if you aren’t aware of your responsibility, it can create compliance chaos.

    In this webinar, Michael Osterman, President of Osterman Research, will cover what it means to share the responsibility of data in the cloud - including the certifications, regulations, and frameworks AWS aligns with to support compliance - like GDPR, PCI DSS, HIPAA, SOC, and other regulatory requirements.

    Key Takeaways:

    ∙ Review the shared responsibility model and data compliance issues
    ∙ Understand how to act as a data controller or data processor within AWS environment
    ∙ Help you realize data protection by avoiding the common security and data access risks
    ∙ Find ways to meet your compliance goals on AWS
    ∙ Review data governance, like data retention, data classification, defensible deletion, and more.
  • Securing Non-Human Identities in AWS and Azure: Part 1 Recorded: Feb 17 2021 19 mins
    Sandy Bird, CTO, Sonrai Security & Eric Kedrosky, Director of Cloud Security Research, Sonrai Security
    Identities in a modern enterprise public cloud deployment are innumerate and critical to securing your data. Non-human identities - like servers, VMs, serverless functions, applications, etc. - are being created at a rapid pace, sometimes by services without a person ever involved.

    Cloud providers like Azure, AWS, and GCP have given us tools to help govern access, but they can be made insecure by simple configuration errors or omissions - and they're very different approaches, creating complexity for multicloud deployments. Governance requires a new approach that meets this new reality of ephemeral compute and complex webs of permission combinations.

    This is the first in a two part series on nonhuman identities. this session, we discuss:
    -What we mean by non-human identities
    -What problems these identities cause
    -Best practices for managing them
    -Immediate steps anyone can take today to secure the identities
Live monthly webcasts on Public Cloud security and risks.
Sonrai Security delivers an enterprise identity and data governance platform for AWS, Azure, Google Cloud, and Kubernetes.

Embed in website or blog

Successfully added emails: 0
Remove all
  • Title: Pillars of Cloud Security: Prevent Problems or Fix Them Fast
  • Live at: Aug 18 2020 7:00 pm
  • Presented by: Eric Kedrosky, Director of Cloud Security Research, Sonrai Security & Dan Woods, Principal Analyst, Early Adopter Research
  • From:
Your email has been sent.
or close