Featured
Building PHI Compliant Apps in the Cloud: Identity Security Best Practices
CyberArk
Join this panel of cloud security experts from AWS, CyberArk, and Healthfirst to uncover critical Identity Security steps to achieve PHI compliance and other key standards for new and existing cloud-hosted apps.
Learning Objectives
The panel will deliver insights and practical guidance on topics including:
Access control requirements in HIPAA, NHS and other healthcare compliance frameworks
Identity Security considerations to satisfy HIPAA Privacy and Security rule requirements.
People, processes, and technology recommendations for secure application development
Strategies for ensuring compliance across both lift-and-shift applications and net-new software projects.
Practical steps to make progress towards the ideal states of Zero Trust and Zero Standing Privileges
All episodes
-
4 Key Steps to Eliminate Vault Sprawl Across AWS Applications
Robert Sawyer, Sr. Director, DevSecOps, Chris Smith – Director, Product Marketing, DevSecOps, CyberArk | Jack Poller, ESG
As businesses increasingly rely on rapidly deploying innovative apps, running at scale to meet market demand, attackers are relentlessly looking to exploit any weakness. And while security teams can meet the challenge of securing apps at scale, is it possible for security teams to stop asking developers to do things they really don’t want to do?
Security teams need comprehensive tools to secure the credentials and identities used by various applications. To get high levels of developer adoption, security teams must use tools that meet developers where they are—for example, integrating with the existing cloud security tools they already use, such as AWS Secrets Manager.
For security professionals, developers, DevOps, and DevSecOps concerned about securing application secrets, join this panel to discover how CyberArk has partnered with AWS to provide simple and effective secrets management that meets the needs of developers and cybersecurity teams.
Gain practical insights on:
-The challenges security teams face managing and securing application secrets.
-The gap between development teams and security teams requirements for secrets management.
-Approaches for avoiding vault sprawl across projects and achieving security best practices for secrets management.
-How to satisfy developers and security teams using CyberArk Secrets Hub and AWS Secrets Manager simply and effectively. -
Multi-Cloud Identity Security: Combating a Wide Open Gate
Charles Chu, CyberArk; Yuval Shchory, AWS; Ben Cole, TechTarget
How do you balance risk reduction and engineering velocity? In this panel discussion, leaders in cloud security are joining together to discuss how to ‘move fast and break things’ – securely.
We plan to cover:
• Increased attack surface: Compatibility accommodations for lift and shift migrations plus maintaining the hundreds of services offered by cloud service providers now require a greater variety of identities and credentials. This has increased complexity and a need for governance.
• Zero Standing Privileges: Managing risk while maintaining velocity (and customer relationships) is complex. Elevating the right access, at the right time, with the right entitlements is required to securely deliver software on time.
• Entitlements sprawl: Every relationship between components deployed within the cloud is controlled by entitlements mapped to roles. These entitlements and roles vary greatly across cloud providers. Learn best practices to keep up with the constant changes that make up the dynamic nature of the cloud.
• Misconfigurations: These identity blind spots can cause big risk. In fact, the NSA suggests that misconfigurations are the most common and easiest entry point into a cloud for an attacker. Lock down your access then reduce your entitlements.Speakers:
Charles Chu – GM Cloud Security at CyberArk
Damon McDougald – Global Digital Identity Lead at Accenture
Yuval Shchory - Head of Global Partnerships, Identity and Access Management at AWSModerator:
Ben Cole, TechTarget -
Building PHI Compliant Apps in the Cloud: Identity Security Best Practices
CyberArk
Join this panel of cloud security experts from AWS, CyberArk, and Healthfirst to uncover critical Identity Security steps to achieve PHI compliance and other key standards for new and existing cloud-hosted apps.
Learning Objectives
The panel will deliver insights and practical guidance on topics including:Access control requirements in HIPAA, NHS and other healthcare compliance frameworks
Identity Security considerations to satisfy HIPAA Privacy and Security rule requirements.
People, processes, and technology recommendations for secure application development
Strategies for ensuring compliance across both lift-and-shift applications and net-new software projects.
Practical steps to make progress towards the ideal states of Zero Trust and Zero Standing Privileges