The cloud ushers in a lot of change. Gone are the days of traditional network security boundaries. Identity is the new perimeter in the cloud, but how do we secure it?
Like peanut butter & jelly, tomato & basil, and salt & pepper, PAM and IDaaS are two great solutions that work great together to secure cloud infrastructure.
Join us as we discuss:
o New dynamics of cloud environments and what this means for security
o Key stakeholders needed in cloud security to ensure a collaborative cross functional approach
o Securing the entire cloud with consistent controls for:
o Cloud Management Consoles and CLIs
o Cloud IaaS
o Cloud Native Apps (PaaS and FaaS)
o SaaS Apps
o Cloud Permissions and Entitlements
o The importance of JIT and automation in the cloud