Hi [[ session.user.profile.firstName ]]

Three steps to achieving TRUE cloud security

Achieving security in the cloud is an ever-moving target, making it challenging for security and cloud infrastructure teams to keep up with current risks, much less learn about new approaches. Over the past few years, too many global enterprises have fallen victim to hacks, attacks, and breaches, in many cases attributable to poor implementation of security policies and to the rise of human and non-human identities with excessive high-risk cloud permissions.

Current approaches, such as traditional Role-based Access Controls (RBAC) and other labor-intensive manual processes were early attempts to stay one step ahead of breaches due to accidental misuse and malicious exploitation of permissions. But they simply don’t work in the cloud!

In this webinar Michael Raggo of CloudKnox, will take a look at Gartner’s newly defined category called Cloud Infrastructure Entitlements Management (CIEM). CIEM defines the next generation of solutions for managing access to permissions and enforcing least privilege in the cloud.

In this webinar, you will learn how to:

• Discover who (identities) is doing what, where (resources) and when across your cloud infrastructure
• Manage risk by giving identities just-enough and just-in-time permissions to perform their daily tasks and nothing more
• Monitor identity activity changes and prioritize alerts based on risk level associated with anomalous behavior
Recorded Dec 17 2020 49 mins
Your place is confirmed,
we'll send you email reminders
Presented by
Mike Raggo, CISSP, NSA-IAM, ACE, CSI: Cloud Security Expert at CloudKnox
Presentation preview: Three steps to achieving TRUE cloud security

Network with like-minded attendees

  • [[ session.user.profile.displayName ]]
    Add a photo
    • [[ session.user.profile.displayName ]]
    • [[ session.user.profile.jobTitle ]]
    • [[ session.user.profile.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(session.user.profile) ]]
  • [[ card.displayName ]]
    • [[ card.displayName ]]
    • [[ card.jobTitle ]]
    • [[ card.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(card) ]]
  • Channel
  • Channel profile
  • Fireside Chat: A Zero Trust approach to Cloud Infrastructure Feb 10 2021 5:00 pm UTC 30 mins
    CloudKnox Security and Horsley Bridge Partners
    Join Jon Roller, CIO of Horsley Bridge Partners, and Joshua Kirkes, Director of Technology and
    Cybersecurity at Horsley Bridge Partners as they speak with CloudKnox Security on the latest cloud infrastructure security trends and predictions for 2021. Topic include, Cloud Infrastructure Entitlement Management (CIEM), and Zero Trust Access, amongst others.
  • The Magic Behind Cloud Infrastructure Security Recorded: Jan 12 2021 43 mins
    Mike Raggo: Cloud Security Expert at CloudKnox, Mario Campisano: Sr. Security Engineer at GuidePoint, Mark Byrne: Magician
    Be dazzled by a brilliant magician while CloudKnox Security and GuidePoint Security discuss:

    - How to minimize your risk of exposing your organization to permissions misuse and abuse
    - What the top 5 cloud permissions risks are and how to remediate them to avoid mass destruction
    - How to uncover your cloud identity and access management risks to avoid insider threats and external attacks
  • Fast facts: Over-permission identities in the Cloud Recorded: Jan 6 2021
    CloudKnox
    Less than 1% of permissions granted are actually used, thus creating a huge delta and leaving cloud infrastructures vulnerable to attacks. We call this the Cloud Permissions Gap. Check out cloudknox.io to learn more.
  • Three steps to achieving TRUE cloud security Recorded: Dec 17 2020 49 mins
    Mike Raggo, CISSP, NSA-IAM, ACE, CSI: Cloud Security Expert at CloudKnox
    Achieving security in the cloud is an ever-moving target, making it challenging for security and cloud infrastructure teams to keep up with current risks, much less learn about new approaches. Over the past few years, too many global enterprises have fallen victim to hacks, attacks, and breaches, in many cases attributable to poor implementation of security policies and to the rise of human and non-human identities with excessive high-risk cloud permissions.

    Current approaches, such as traditional Role-based Access Controls (RBAC) and other labor-intensive manual processes were early attempts to stay one step ahead of breaches due to accidental misuse and malicious exploitation of permissions. But they simply don’t work in the cloud!

    In this webinar Michael Raggo of CloudKnox, will take a look at Gartner’s newly defined category called Cloud Infrastructure Entitlements Management (CIEM). CIEM defines the next generation of solutions for managing access to permissions and enforcing least privilege in the cloud.

    In this webinar, you will learn how to:

    • Discover who (identities) is doing what, where (resources) and when across your cloud infrastructure
    • Manage risk by giving identities just-enough and just-in-time permissions to perform their daily tasks and nothing more
    • Monitor identity activity changes and prioritize alerts based on risk level associated with anomalous behavior
  • Uncover 5 Hidden Risks that Can Expand Your Cloud Infrastructure Attack Surface Recorded: Oct 7 2020 30 mins
    Mora Gozani, Head of Marketing at CloudKnox, Jim Nowak, Cloud Security Expert, Neil Walker Cloud Security Expert
    You know your cloud environment is only as secure as your ability to properly assign, manage, and monitor your machine and human identity permissions. But, did you know that the delta between permissions granted and permissions used is sometimes as high as 99%? CloudKnox Security calls this the Cloud Permissions Gap, and sufficiently addressing the gap means tackling the hidden risks that are creating it or making it worse.
Your Cloud Permissions Management Content in ONE Place
Learn how to continuous protect of your critical cloud resources from accidents and malicious insiders.

Embed in website or blog

Successfully added emails: 0
Remove all
  • Title: Three steps to achieving TRUE cloud security
  • Live at: Dec 17 2020 4:00 pm
  • Presented by: Mike Raggo, CISSP, NSA-IAM, ACE, CSI: Cloud Security Expert at CloudKnox
  • From:
Your email has been sent.
or close