Featured
Enterprise Strategy Group: Modernizing Cloud Security with Identity for AWS
Tony Palmer, Practice Director, Enterprise Strategy Group; Chris Smith, Product Marketing Director, DevSecOps, CyberArk
96% of organizations have shifted existing workloads to the cloud or are in the initial stages of doing so, according to Enterprise Strategy Group. Additionally, with software releases entering production faster than ever, security teams lack the visibility and control in the development process to adequately reduce risk.
Join us in this webinar featuring Tony Palmer, Practice Director, Enterprise Strategy Group and Chris Smith, Product Marketing Director, DevSecOps, CyberArk as they discuss how to optimize cloud security for all identities – human and machine – across the enterprise with CyberArk on AWS.
You will learn about:
• What steps you should take to improve security over your cloud environments
• The spectrum of identities that CyberArk secures for your business
• Why centralizing secrets management is key to eliminating risk
All episodes
-
4 Key Steps to Eliminate Vault Sprawl Across AWS Applications
Robert Sawyer, Sr. Director, DevSecOps, Chris Smith – Director, Product Marketing, DevSecOps, CyberArk | Jack Poller, ESG
As businesses increasingly rely on rapidly deploying innovative apps, running at scale to meet market demand, attackers are relentlessly looking to exploit any weakness. And while security teams can meet the challenge of securing apps at scale, is it possible for security teams to stop asking developers to do things they really don’t want to do?
Security teams need comprehensive tools to secure the credentials and identities used by various applications. To get high levels of developer adoption, security teams must use tools that meet developers where they are—for example, integrating with the existing cloud security tools they already use, such as AWS Secrets Manager.
For security professionals, developers, DevOps, and DevSecOps concerned about securing application secrets, join this panel to discover how CyberArk has partnered with AWS to provide simple and effective secrets management that meets the needs of developers and cybersecurity teams.
Gain practical insights on:
-The challenges security teams face managing and securing application secrets.
-The gap between development teams and security teams requirements for secrets management.
-Approaches for avoiding vault sprawl across projects and achieving security best practices for secrets management.
-How to satisfy developers and security teams using CyberArk Secrets Hub and AWS Secrets Manager simply and effectively. -
Multi-Cloud Identity Security: Combating a Wide Open Gate
Charles Chu, CyberArk; Yuval Shchory, AWS; Ben Cole, TechTarget
How do you balance risk reduction and engineering velocity? In this panel discussion, leaders in cloud security are joining together to discuss how to ‘move fast and break things’ – securely.
We plan to cover:
• Increased attack surface: Compatibility accommodations for lift and shift migrations plus maintaining the hundreds of services offered by cloud service providers now require a greater variety of identities and credentials. This has increased complexity and a need for governance.
• Zero Standing Privileges: Managing risk while maintaining velocity (and customer relationships) is complex. Elevating the right access, at the right time, with the right entitlements is required to securely deliver software on time.
• Entitlements sprawl: Every relationship between components deployed within the cloud is controlled by entitlements mapped to roles. These entitlements and roles vary greatly across cloud providers. Learn best practices to keep up with the constant changes that make up the dynamic nature of the cloud.
• Misconfigurations: These identity blind spots can cause big risk. In fact, the NSA suggests that misconfigurations are the most common and easiest entry point into a cloud for an attacker. Lock down your access then reduce your entitlements.Speakers:
Charles Chu – GM Cloud Security at CyberArk
Damon McDougald – Global Digital Identity Lead at Accenture
Yuval Shchory - Head of Global Partnerships, Identity and Access Management at AWSModerator:
Ben Cole, TechTarget -
Building PHI Compliant Apps in the Cloud: Identity Security Best Practices
CyberArk
Join this panel of cloud security experts from AWS, CyberArk, and Healthfirst to uncover critical Identity Security steps to achieve PHI compliance and other key standards for new and existing cloud-hosted apps.
Learning Objectives
The panel will deliver insights and practical guidance on topics including:Access control requirements in HIPAA, NHS and other healthcare compliance frameworks
Identity Security considerations to satisfy HIPAA Privacy and Security rule requirements.
People, processes, and technology recommendations for secure application development
Strategies for ensuring compliance across both lift-and-shift applications and net-new software projects.
Practical steps to make progress towards the ideal states of Zero Trust and Zero Standing Privileges -
Securing Tomorrow: A Comprehensive Approach to Identity Security through the Cloud
CyberArk X AWS X Accenture
Join this panel of experts from AWS, Accenture and CyberArk as they share their advanced experiences and discuss navigating the intricate landscape against evolving cyberthreats and how every identity, both human and nonhuman, needs the right level of intelligent privilege controls to be secure.
This panel will deliver insights and practical guidance on topics including:
- Staying compliant with future trends and emerging technologies;
- Cloud security best practices;
- People, processes and technology recommendations for secure application development;
- Practical steps to make progress toward the ideal states of zero trust and zero standing privileges.Speakers:
Charles Chu
General Manager, PAM & Cloud Security, CyberArk
Bin Du
Senior Manager, Accenture Security - Cloud & Application Security
Dudi Matot
AWS Security Segment Business Lead
-
Accenture, AWS and CyberArk: Why the Future of Security Is Identity
CyberArk X AWS X Accenture
The rise in identities, cloud migration, and sophisticated attacks have led to a surge in identity-based cyberattacks. Experts suggest that with more identities, organizations can achieve more with less.
Sunil Patel of Accenture advises using "just-in-time" identity creation to eliminate threats. Matt Girdharry from AWS highlights the need to secure both human and machine identities. Brandon Traffanstedt of CyberArk notes the importance of prioritizing identities, coining the term "Skittle-sorting conundrum."In their RSA Conference 2024 interview, Patel, Girdharry, and Traffanstedt discuss how attackers now log in instead of hacking, the use of generative AI in identity security, and the need for every identity to access data across diverse resources.
-
Securing AWS Workloads: Safeguarding Secrets and Machine Identities
CyberArk X AWS
In this episode of Identity Security Insights Live, Kurt Sand, CyberArk's GM of DevSecOps, and Ritesh Desai, Amazon's GM of Secrets Manager for Amazon Web Services (AWS) dive deep into the critical areas that organizations should focus on to secure machine identities and protect their sensitive information.
-
Enterprise Strategy Group: Modernizing Cloud Security with Identity for AWS
Tony Palmer, Practice Director, Enterprise Strategy Group; Chris Smith, Product Marketing Director, DevSecOps, CyberArk
96% of organizations have shifted existing workloads to the cloud or are in the initial stages of doing so, according to Enterprise Strategy Group. Additionally, with software releases entering production faster than ever, security teams lack the visibility and control in the development process to adequately reduce risk.
Join us in this webinar featuring Tony Palmer, Practice Director, Enterprise Strategy Group and Chris Smith, Product Marketing Director, DevSecOps, CyberArk as they discuss how to optimize cloud security for all identities – human and machine – across the enterprise with CyberArk on AWS.
You will learn about:
• What steps you should take to improve security over your cloud environments
• The spectrum of identities that CyberArk secures for your business
• Why centralizing secrets management is key to eliminating risk