Multi-Cloud Identity Security: Combating a Wide Open Gate

Logo
Presented by

Charles Chu, CyberArk; Yuval Shchory, AWS; Ben Cole, TechTarget

About this talk

How do you balance risk reduction and engineering velocity? In this panel discussion, leaders in cloud security are joining together to discuss how to ‘move fast and break things’ – securely. We plan to cover: • Increased attack surface: Compatibility accommodations for lift and shift migrations plus maintaining the hundreds of services offered by cloud service providers now require a greater variety of identities and credentials. This has increased complexity and a need for governance. • Zero Standing Privileges: Managing risk while maintaining velocity (and customer relationships) is complex. Elevating the right access, at the right time, with the right entitlements is required to securely deliver software on time. • Entitlements sprawl: Every relationship between components deployed within the cloud is controlled by entitlements mapped to roles. These entitlements and roles vary greatly across cloud providers. Learn best practices to keep up with the constant changes that make up the dynamic nature of the cloud. • Misconfigurations: These identity blind spots can cause big risk. In fact, the NSA suggests that misconfigurations are the most common and easiest entry point into a cloud for an attacker. Lock down your access then reduce your entitlements. Speakers: Charles Chu – GM Cloud Security at CyberArk Damon McDougald – Global Digital Identity Lead at Accenture Yuval Shchory - Head of Global Partnerships, Identity and Access Management at AWS Moderator: Ben Cole, TechTarget
Related topics:

More from this channel

Upcoming talks (1)
On-demand talks (52)
Subscribers (7412)
Centered on intelligent privilege controls, CyberArk provides the most comprehensive security offering for any identity - seamlessly securing human and machine identities accessing workloads from hybrid to multi-cloud, and flexibly automates the identity lifecycle all with continuous threat detection and prevention – protecting organization’s identities and most critical assets by enabling Zero Trust and enforcing least privilege.