Featured
Unlocking Cloud Security: The Zero Standing Privilege Solution
Charles Chu, General Manager of Cloud Privilege Security at CyberArk
In an era where the Cloud's possibilities are limitless, its attack surface has also grown exponentially. AWS, Azure, and GCP collectively offer a staggering 1,400+ native services, each guarded by over 40,000 access controls. These numbers aren't just statistics; they're the real-world complexities you face daily.
What's more, the Cloud has revolutionized the roles within your organization. Cloud-native developers, Lift & Shift workload admins, and professionals from diverse backgrounds now possess powerful tools for innovation. This transformation is both a blessing and a challenge. How can you enforce identity security without slowing down the velocity demanded by your business?
Charles Chu, General Manager of Cloud Privilege Security at CyberArk, is here to guide you through this complex landscape. This enlightening webinar delves into the why and how of new security methods. Explore the art of provisioning on-the-fly entitlements, crafted for the right person in the right situation. It's not just about security; it's about maintaining the critical balance between security and operational velocity.
Key topics:
- Cloud's Expanding Attack Surface: Gain insights into the exponential growth of native services and access controls on AWS, Azure, and GCP.
- The explosion of New 'Admins': Understand the paradigm shift where new users become admins with access to powerful set of tools to create, and innovate.
- Balancing Identity Security and Business Velocity: Uncover strategies to meet the challenge posed by the ever-increasing need for velocity.
- Practical Steps for Improved Identity Security: Learn actionable strategies, best practices, and tools to enhance your identity security hygiene.
Who is this relevant for?
- IT Security Leaders
- Cloud Architects and Engineers
- CISOs, CTOs and CIOs
- IT Managers and Directors
Language spoken: English
Don't miss this great opportunity to learn from a top industry expert.
All episodes
-
Endpoint Privilege Manager – Hvorfor er det nyttig?
Benjamin Jørgensen, Information Security Advisor at Kommando
Among the greatest risks to data today is the threat of ransomware attacks. The impact and likelihood of ransomware can be significantly reduced with a comprehensive endpoint privilege manager. Such a tool can eliminate local admin rights and guided by policies, elevate specific programs or tasks transparently. Instead of completely stripping users of all privileges, potentially hindering their work, CyberArk EPM facilitates automated policy-driven and ad hoc workflows for on-demand privilege elevation, ensuring no disruption to the end-user experience or burden on support teams.
Benjamin Jørgensen, Information Security Advisor at Kommando, will lead an exploration into the WHYs and HOWs of Endpoint Privilege Management. He will provide a foundational understanding of its importance, showcase how CyberArk addresses the challenges of endpoint privilege security, and demonstrate two practical scenarios that resonate in real-world contexts.
Who should attend?
- IT Security Leaders
- Cloud Architects and Engineers
- CISOs, CTOs, and CIOs
- IT Managers and DirectorsLanguage spoken: Norwegian
Don’t miss this short but informative session that will hopefully help you along your Least Privilege Enforcement journey.
-
Unlocking Cloud Security: The Zero Standing Privilege Solution
Charles Chu, General Manager of Cloud Privilege Security at CyberArk
In an era where the Cloud's possibilities are limitless, its attack surface has also grown exponentially. AWS, Azure, and GCP collectively offer a staggering 1,400+ native services, each guarded by over 40,000 access controls. These numbers aren't just statistics; they're the real-world complexities you face daily.
What's more, the Cloud has revolutionized the roles within your organization. Cloud-native developers, Lift & Shift workload admins, and professionals from diverse backgrounds now possess powerful tools for innovation. This transformation is both a blessing and a challenge. How can you enforce identity security without slowing down the velocity demanded by your business?Charles Chu, General Manager of Cloud Privilege Security at CyberArk, is here to guide you through this complex landscape. This enlightening webinar delves into the why and how of new security methods. Explore the art of provisioning on-the-fly entitlements, crafted for the right person in the right situation. It's not just about security; it's about maintaining the critical balance between security and operational velocity.
Key topics:
- Cloud's Expanding Attack Surface: Gain insights into the exponential growth of native services and access controls on AWS, Azure, and GCP.
- The explosion of New 'Admins': Understand the paradigm shift where new users become admins with access to powerful set of tools to create, and innovate.
- Balancing Identity Security and Business Velocity: Uncover strategies to meet the challenge posed by the ever-increasing need for velocity.
- Practical Steps for Improved Identity Security: Learn actionable strategies, best practices, and tools to enhance your identity security hygiene.Who is this relevant for?
- IT Security Leaders
- Cloud Architects and Engineers
- CISOs, CTOs and CIOs
- IT Managers and DirectorsLanguage spoken: English
Don't miss this great opportunity to learn from a top industry expert.