Sept 19, 2024 | Virtual Summit

Access Registration


Enhancing Cloud Security with Cloud Pros Talking Shop

Get the 411 on tactics and strategies from security leaders to meet your own cloud security goals.

AGENDA

|
SESSION 10:00am ET Register Now

Navigating the Challenges of Cloud Permissions: Ownership, Maturity, and Centralized Control

Sandy Bird | SONRAI SECURITY Alex Shulman | EY

Explore the challenges of least privilege and who should own this critical issue. Delve into the three phases of maturity for addressing the problem and master strategies to centralize permissions management to lighten the load on developers. Walk away with specific policies you can implement today to protect the most powerful permissions in your cloud.

Sandy Bird

Sandy Bird

Co-Founder and CTO Sonrai Security

Alex Shulman

Alex Shulman

Cloud Cybersecurity Leader EY

SESSION 10:45am ET Register Now

Permissions Boundaries and SCPs: The Cloud IAM Invariants

Rich Mogull | Securosis

Join us as we unravel the complexities of permissions boundaries and Service Control Policies and discover their power in preventing privilege escalation while supporting delegated administration. Through real-world examples and clear explanations, you'll gain practical knowledge to enhance your cloud security and streamline your IAM strategy.

Rich Mogull

Rich Mogull

Researcher and CEO Securosis

SESSION 11:30am ET Register Now

What Everyone Should Know About Cloud Permissions

Nigel Sood | Sonrai Security MATT CARLE | Sonrai Security

Dive into the current state of cloud permissions and identities, focusing on strategies to identify and mitigate risks. Review the latest analysis on the scale of cloud permissions in typical environments, gain insights into newly introduced risky permissions by cloud providers and learn effective measures to address these risks.

Nigel Sood

Nigel Sood

Cloud Security Researcher Sonrai Security

MATT CARLE

MATT CARLE

Head of Product Sonrai Security

SESSION 12:15pm ET Register Now

IAM in the Cloud: Successes, Pitfalls, and Lessons Learned

Chad Lorenc | Amazon Web Services

Learn how companies of all sizes and maturity levels have addressed the complexities of managing identities in the cloud to reduce risk. Through real-world examples and expert insights, this session reveals both successes and pitfalls in cloud IAM. Gain practical strategies today to elevate your organization's cloud identity security.

Chad Lorenc

Chad Lorenc

Security Delivery Manager Amazon Web Services

SESSION 1:00Pm ET Register Now

What is a Cloud Permissions Firewall Anyway?

Jeff Moncrief | Sonrai Security

Discover the Cloud Permissions Firewall concept and its role in modern cloud identity security. This session explores achieving least privilege at scale with a default-deny model that works, delving into real-world applications and benefits. See it in action to gain an understanding of how implementing a permissions firewall will solve the overpermissioned and unused identity problem in your cloud.

Jeff moncrief

Jeff Moncrief

Field CTO Sonrai Security

SESSION 1:45Pm ET Register Now

Privilege Escalation Deconstructed: Attacks and How to Stop Them

Christophe Limpalair | Cybr

Discover how IAM Privilege Escalation attacks work and how threat actors commonly exploit misconfigurations. This session will explain what privilege escalations are, go through a live environment escalating privilege, and discuss common techniques used in the wild. We'll then explain and demonstrate how to find potential PrivEsc paths in the cloud to prevent and detect ongoing attacks.

christophe limpalair

Christophe Limpalair

Founder & Trainer Cybr

SESSION 2:30Pm ET Register Now

JIT vs. Long-Lived Roles: Evaluating Cloud Security Strategies

James Berthoty | Latio Tech

JIT permissioning is often hailed as a silver bullet for cloud access, yet its security benefits beyond privilege escalation are hard to quantify. This session delves into the dynamics of JIT roles versus long-lived roles, evaluating their true value and exploring practical implementation strategies to maximize security and efficiency in cloud environments.

James Berthoty

James Berthoty

Cloud Security
Architect & Founder Latio Tech

SESSION 3:15Pm ET Register Now

From Manual to Automated: Implementing Least Privilege in AWS with SCPs

Cole Horsman | Global Atlantic Financial Group

Learn first hand about the journey of achieving least privilege in the cloud using Service Control Policies (SCPs) in AWS. This case study will start by showcasing the manual approach, detailing the design and implementation with cloud-native tools. Then, the discussion will focus on leveraging automation tools to streamline the process, significantly reducing time and effort. Take away practical advice to apply to your own least privilege journey in the cloud.

Cole Horsman

Cole Horsman

AVP, Security Operations Global Atlantic Financial Group


Register Today!


Register once for the summit and gain access to all of the sessions.
After submitting, you’ll receive an email to make your own agenda and add sessions to your calendar.


We won’t spam you or sell your data