Featured

Multi-Cloud Identity Security: Combating a Wide Open Gate
Charles Chu, CyberArk; Yuval Shchory, AWS; Ben Cole, TechTarget
How do you balance risk reduction and engineering velocity? In this panel discussion, leaders in cloud security are joining together to discuss how to ‘move fast and break things’ – securely.
We plan to cover:
• Increased attack surface: Compatibility accommodations for lift and shift migrations plus maintaining the hundreds of services offered by cloud service providers now require a greater variety of identities and credentials. This has increased complexity and a need for governance.
• Zero Standing Privileges: Managing risk while maintaining velocity (and customer relationships) is complex. Elevating the right access, at the right time, with the right entitlements is required to securely deliver software on time.
• Entitlements sprawl: Every relationship between components deployed within the cloud is controlled by entitlements mapped to roles. These entitlements and roles vary greatly across cloud providers. Learn best practices to keep up with the constant changes that make up the dynamic nature of the cloud.
• Misconfigurations: These identity blind spots can cause big risk. In fact, the NSA suggests that misconfigurations are the most common and easiest entry point into a cloud for an attacker. Lock down your access then reduce your entitlements.
Speakers:
Charles Chu – GM Cloud Security at CyberArk
Damon McDougald – Global Digital Identity Lead at Accenture
Yuval Shchory - Head of Global Partnerships, Identity and Access Management at AWS
Moderator:
Ben Cole, TechTarget
All episodes
-
4 Key Steps to Eliminate Vault Sprawl Across AWS Applications
Robert Sawyer, Sr. Director, DevSecOps, Chris Smith – Director, Product Marketing, DevSecOps, CyberArk | Jack Poller, ESG
As businesses increasingly rely on rapidly deploying innovative apps, running at scale to meet market demand, attackers are relentlessly looking to exploit any weakness. And while security teams can meet the challenge of securing apps at scale, is it possible for security teams to stop asking developers to do things they really don’t want to do?
Security teams need comprehensive tools to secure the credentials and identities used by various applications. To get high levels of developer adoption, security teams must use tools that meet developers where they are—for example, integrating with the existing cloud security tools they already use, such as AWS Secrets Manager.
For security professionals, developers, DevOps, and DevSecOps concerned about securing application secrets, join this panel to discover how CyberArk has partnered with AWS to provide simple and effective secrets management that meets the needs of developers and cybersecurity teams.
Gain practical insights on:
-The challenges security teams face managing and securing application secrets.
-The gap between development teams and security teams requirements for secrets management.
-Approaches for avoiding vault sprawl across projects and achieving security best practices for secrets management.
-How to satisfy developers and security teams using CyberArk Secrets Hub and AWS Secrets Manager simply and effectively. -
Multi-Cloud Identity Security: Combating a Wide Open Gate
Charles Chu, CyberArk; Yuval Shchory, AWS; Ben Cole, TechTarget
How do you balance risk reduction and engineering velocity? In this panel discussion, leaders in cloud security are joining together to discuss how to ‘move fast and break things’ – securely.
We plan to cover:
• Increased attack surface: Compatibility accommodations for lift and shift migrations plus maintaining the hundreds of services offered by cloud service providers now require a greater variety of identities and credentials. This has increased complexity and a need for governance.
• Zero Standing Privileges: Managing risk while maintaining velocity (and customer relationships) is complex. Elevating the right access, at the right time, with the right entitlements is required to securely deliver software on time.
• Entitlements sprawl: Every relationship between components deployed within the cloud is controlled by entitlements mapped to roles. These entitlements and roles vary greatly across cloud providers. Learn best practices to keep up with the constant changes that make up the dynamic nature of the cloud.
• Misconfigurations: These identity blind spots can cause big risk. In fact, the NSA suggests that misconfigurations are the most common and easiest entry point into a cloud for an attacker. Lock down your access then reduce your entitlements.Speakers:
Charles Chu – GM Cloud Security at CyberArk
Damon McDougald – Global Digital Identity Lead at Accenture
Yuval Shchory - Head of Global Partnerships, Identity and Access Management at AWSModerator:
Ben Cole, TechTarget