- Cloud Security Platform
- By Use Case
Get the 411 on tactics and strategies from security leaders that you can use to meet your own cloud security goals tomorrow.
Identity Security on-premises has been well understood for decades, but the cloud flips the script with new identity types, dynamic permissions and tools that do not migrate well to this new world. Join this session to learn how you can mature your identity security strategy in the cloud - whether you are just getting started or have an established program.
Amazon US West Security Delivery Manager
Chris Kirschke, Head of Cloud Security at Albertsons will walk through his approach to closing security gaps in the cloud using a combination of technology, people and process. Learn his approach to identifying gaps, prioritizing budget and evaluating solutions and how Albertsons measures success.
Albertsons Head of Cloud Security
Sonrai Security VP of Product Marketing
Do you know what data is still vulnerable to attack after you’ve deployed your best privilege account management and identity governance tools in your cloud? Learn from the team at Accenture, who will explain the unmet critical requirements for securing identities in the cloud based on firsthand experience securing their clients’ clouds from compromise.
Accenture Director of Cyber Security & Global Digital Identity Lead for the CIO
Accenture Security Consulting Senior Manager
Sonrai Security CTO and Co-Founder
An identity in the cloud extends far beyond the traditional definition of a human user, which is why traditional on-premises IAM approaches leave a gap in cloud security and why cloud-native tools don’t catch it all. Join this session to learn the many types of identities in your cloud and how to secure them based on their unique characteristics.
Kaizenteq Ltd CISO & Host of Cloud Security Podcast
Work can be mentally exhausting. Join our meditation break with Ben Painter, co-founder of WholeSchool Mindfulness, allowing us all to take a step back from work to relax and calm our minds.
WholeSchool Mindfulness Co-Founder and Partner
In this live hack, we’ll open up the command line and show how an attacker can bypass traditional cloud security controls to execute everything from a ransom attack to cloudjacking to simply stealing all your data.
Sonrai Security Field CTO
Think of cloud security like a round of capture the flag in your favorite video game. In capture the flag, the battlefield is laden with intricate mazes and unpredictable challenges. In the cloud, our data is the coveted flag, with countless paths that attackers try to exploit. How do we apply similar defenses and strategies from the game to safeguard our cloud assets? Dive into this session to discover how to protect your data’s identity and access to keep your flag safe.
Volkswagen Financial Services Principal Cloud Security Engineer
As security practitioners, we’re tasked with doing what’s best to secure our company. In the cloud, there’s no denying that identity plays an important role in security. More often than not, the shiny new vulnerability takes our eye off the ball, when it’s not actually the most important priority. In this session, Eric Kedrosky, CISO and security practitioner for over a decade, will walk you through how to get your CISO onboard with focusing on identity (or really anything you care about).
Sonrai Security CISO
EQ Bank, Equitable Bank Director, Identity and Access Management (IAM)
Cloud security is hard, so it’s time to take a break from talking about cloud infrastructure and security. Join our NYC-based comedian as he navigates the clouds with a humorous twist. Whether you're a seasoned cloud expert or just seeking a break, this comedic break promises plenty of laughter.
Who wins when a CISO and a Security Architect go head-to-head on cloud security best practices? You do! In this dynamic session that puts the thinking of a CISO against the hands-on know-how of a Security Architect. This isn’t just a theoretical debate; it’s a practical exploration of colleagues who work together to do what it takes to truly secure the cloud, especially when it concerns protecting sensitive data. Gain comprehensive insights and learn how the duo educates each other and works together to secure the cloud.
Prove Inc. CISO & CIO
Prove Inc. Sr. Systems Architect
Register once for the summit and gain access to all of the sessions.
After submitting, you’ll receive an email to make your own agenda and add sessions to your calendar.
We won’t spam you or sell your data
Yes, by filling out the registration ahead of time, you were the first to receive the agenda release, but you still must register for the event. Not sure if you registered? To be safe, fill out the form again, and you’ll get a confirmation email with your custom link.
Yes, registration is completely free. We believe identity, access, and permissions are often overlooked yet crucial to a more secure cloud. Why is it free? One of our presenters said it best, “I wish I had this kind of help in my career, so now I’m giving back and sharing what I know.”
Don’t worry; ACCESS isn’t another acronym. We believe securing the cloud is all about controlling access; in the cloud, you have to manage identities and permissions for that to be possible. At this virtual summit, expect to learn about everything related to securing the cloud with a focus on identity, access, and permissions.
ACCESS is a virtual event scheduled for October 12th. Sessions will be accessible online from anywhere in the world.
Anyone looking to create a more secure cloud, especially those tired of the status quo. So far we’ve seen cloud leaders, CISOs, security professionals, IAM leaders, Security Architects, Engineering leaders, IT Managers, Developers, and more ranging from the Fortune 10 to startups.
Register for ACCESS by filling out the form above and clicking the “Register Now” button. After registering, you’ll receive an email with your personal link to log into the event, create your agenda, and connect with other attendees/presenters.
Registered participants will receive an email with login instructions to access the virtual event platform. The link you receive in that email is your custom login link. If you lose the link, chat with our team and we can resend the email or search your email for “ACCESS Summit.”
Yes, all sessions will be recorded and made available after the event. You must register to gain access to any of the event material.
Absolutely, we encourage interaction through Q&A sessions, chat rooms, and social media channels.
Our team is available via chat Monday through Friday, 9 am ET to 5 pm ET. Click the chat button in the bottom right corner for questions.