Eric Kedrosky, Director of Cloud Security Research, Sonrai Security & Dan Woods, Principal Analyst, Early Adopter Research
An effective security program is rooted in a strong operational foundation. As evidenced by a number of high profile data breaches, successful attacks on cloud services were most commonly the result of customer misconfiguration, mismanagement, and mistakes according to Gartner. Without clean operations, your security operations model is destined to fail. As such, IT, Security, and Risk Management leaders must invest in Cloud Security Posture Management (CSPM) processes and tools to proactively and reactively identify and remediate risks.
Digital transformation is putting pressure on every function inside the enterprise – especially IT, Security, and Cloud Operations Teams. Whether it’s utilizing short-lived technology like containers, assessing the state of public cloud environments, or maintaining the security of applications, the modern attack surface presents a growing challenge to security and cloud leaders looking to accurately understand and reduce identity and data risk.
This webinar, presented by Dan Woods, technology analyst and founder of Early Adopter Research, and Eric Kedrosky, Director of Cloud Security Research and CISO of Sonrai Security, will be an informative session on how enterprises can secure their public cloud with an identity approach. The webcast will answer the following topics:
∙ How does CSPM provide enterprises with visibility into the state of public cloud infrastructure?
∙ What specific steps are being used to create effective operations and security programs to identify and reduce risk across cloud environments?
∙ What are best practices and tips for utilizing CSPM in the public cloud?
∙ What ways can you use controls to enhance identity and data governance?
∙ Where does CSPM fit into a cloud security model? And what else is needed?