Webinar: Pillars of Cloud Security: Achieving and Maintaining Least PrivilegeRegister Now

Webinars

Featured Webinar

Pillars of Cloud Security: Achieving and Maintaining Least Privilege

Least privilege, the state in which identities have access to only what they need and no more, is the ideal state for a cloud security environment. This goal is more complex and requires deeper analysis than most people realize. Taking a data-driven approach is fundamental to monitor IAM permissions as well as data access to achieve and maintain least privilege. The key is being able to determine the effective permissions completely, including all direct and indirect access paths from both people and non-people identities.

This webinar, presented by Dan Woods, technology analyst and founder of Early Adopter Research, and Eric Kedrosky, Director of Cloud Security Research and CISO of Sonrai Security, explains the latest methods for bringing least privilege to life, answering questions such as:

  • What is least privilege and how has it changed in the cloud?
  • Why is it that least privilege cannot be achieved without knowing effective permissions?
  • Why must maintaining least privilege configurations be automated?
  • What are the risks and benefits?

Pillars of Cloud Security: Achieving and Maintaining Least Privilege

View Webinar

Why WFH and Cloud Will Permanently Change Security: 5 Changes You Can Make Now

View Webinar

Identity Governance & Secrets Management: Key to Unlocking Public Cloud ...

View Webinar

Preventing Catastrophic Data Loss in AWS, Azure, and Google Cloud

View Webinar

Managing Non-people Identities in AWS and Azure

View Webinar

Privilege Escalation Attacks in AWS: How They Work, How To Stop Them

View Webinar

How Public Cloud Changes Cybersecurity for the Better

View Webinar

Comparing Public Cloud Security Across AWS, Azure, and GCP: Lessons for Security

View Webinar

Identities Are The New Perimeter For Securing Data In Public Cloud

View Webinar
×