5 Cloud Security Considerations for CISOs

Logo
Presented by

Adam Bosnian, EVP Global Business Development, CyberArk

About this talk

Skyrocketing cloud adoption, fast-tracked digital transformation initiatives, geographically dispersed and mobile workforces have created a perfect storm for cyberattacks. Their target has remained the same, privileged credentials with access and permissions to an organization’s most critical systems and data. In this new reality, traditional network security boundaries have all but disappeared and digital defenses have shifted from network security to identity security. Now, any identity can become privileged under certain conditions, underscoring the need to secure privileged access everywhere it exists. Join us as we discuss: o The impact of 68% of CIOs doubling down on cloud services in COVID-19’s wake o Growth of cloud user, application and machine identities that require powerful privileges o Challenges your organization faces in managing cloud access and identities o Let’s talk access, privileges and permissions: what you can do versus how it is enforced o Five critical questions to ask yourself today to help meet cloud identity challenges tomorrow
Related topics:

More from this channel

Upcoming talks (0)
On-demand talks (117)
Subscribers (7629)
CyberArk channel offers you regular insights and latest news on Privilege Access Management from the global undisputed leader in privileged access management. You'll find here live webinars, on demand webinars and videos!