No Sales Pitches, Just Cloud Pros Talking Shop

Get the 411 on tactics and strategies from security leaders that you can use to meet your own cloud security goals tomorrow.


Keynote 10:00AM (EST)

Accelerate Identity Security Maturity in the Cloud

Chad Lorenc Amazon

Identity Security on-premises has been well understood for decades, but the cloud flips the script with new identity types, dynamic permissions and tools that do not migrate well to this new world.  Join this session to learn how you can mature your identity security strategy in the cloud - whether you are just getting started or have an established program.

Chad Lorenc

Amazon US West Security Delivery Manager

Session 10:30AM(EST)

Strategy to Execution: How to Close the Identity Security Gaps in the Cloud

Chris Kirschke AlbertsonsKaren Levy Sonrai Security

Chris Kirschke, Head of Cloud Security at Albertsons will walk through his approach to closing security gaps in the cloud using a combination of technology, people and process.  Learn his approach to identifying gaps, prioritizing budget and evaluating solutions and how Albertsons measures success.

Chris Kirschke

Chris Kirschke

Albertsons Head of Cloud Security

Karen Levy

Karen Levy

Sonrai Security VP of Product Marketing

Session 11:00AM(EST)

Closing the Security Void left by PAM and IGA in the Cloud?

Simon Gooch Accenture Johan Lund Accenture Sandy Bird Sonrai Security

Do you know what data is still vulnerable to attack after you’ve deployed your best privilege account management and identity governance tools in your cloud? Learn from the team at Accenture, who will explain the unmet critical requirements for securing identities in the cloud based on firsthand experience securing their clients’ clouds from compromise.

Simon Gooch

Accenture Director of Cyber Security & Global Digital Identity Lead for the CIO

Johan Lund

Accenture Security Consulting Senior Manager

Sandy Bird

Sonrai Security CTO and Co-Founder

Session 11:30AM(EST)

Identity 101: From Human to Machine and Everything In Between

Ashish Rajan Kaizenteq Ltd

An identity in the cloud extends far beyond the traditional definition of a human user, which is why traditional on-premises IAM approaches leave a gap in cloud security and why cloud-native tools don’t catch it all. Join this session to learn the many types of identities in your cloud and how to secure them based on their unique characteristics.

Ashish Rajan

Kaizenteq Ltd CISO & Host of Cloud Security Podcast

Break 12:00PM(EST)

Meditation Break: No More Cloudy Minds

Ben Painter WholeSchool Mindfulness

Work can be mentally exhausting. Join our meditation break with Ben Painter, co-founder of WholeSchool Mindfulness, allowing us all to take a step back from work to relax and calm our minds.

Ben Painter

WholeSchool Mindfulness Co-Founder and Partner

Session 12:30PM(EST)

Live Hack: Anatomy of A Cloud Attack

Jeff Moncrief Sonrai Security

In this live hack, we’ll open up the command line and show how an attacker can bypass traditional cloud security controls to execute everything from a ransom attack to cloudjacking to simply stealing all your data.

Jeff Moncrief

Sonrai Security Field CTO

Session 1:00PM(EST)

Mapping The Battlefield By Untangling Cloud IAM

Joe South Volkswagen Financial Services

Think of cloud security like a round of capture the flag in your favorite video game. In capture the flag, the battlefield is laden with intricate mazes and unpredictable challenges. In the cloud, our data is the coveted flag, with countless paths that attackers try to exploit. How do we apply similar defenses and strategies from the game to safeguard our cloud assets? Dive into this session to discover how to protect your data’s identity and access to keep your flag safe.

Joe South

Volkswagen Financial Services Principal Cloud Security Engineer

Session 1:30PM(EST)

5 Tips to Build an Identity
Strategy Your CISO will Love

Eric Kedrosky Sonrai Security

As security practitioners, we’re tasked with doing what’s best to secure our company. In the cloud, there’s no denying that identity plays an important role in security. More often than not, the shiny new vulnerability takes our eye off the ball, when it’s not actually the most important priority. In this session, Eric Kedrosky, CISO and security practitioner for over a decade, will walk you through how to get your CISO onboard with focusing on identity (or really anything you care about).

Eric Kedrosky

Sonrai Security CISO

Nicole Landry

EQ Bank, Equitable Bank Director, Identity and Access Management (IAM)

Break 2:00PM(EST)

From Stand-up to Cloud Stacks:
A Comedic Break

John Hedrick

Cloud security is hard, so it’s time to take a break from talking about cloud infrastructure and security. Join our NYC-based comedian as he navigates the clouds with a humorous twist. Whether you're a seasoned cloud expert or just seeking a break, this comedic break promises plenty of laughter.

John Hedrick


Session 2:30PM(EST)

CISO vs Security Architect: Battling to Secure the Cloud

Amanda Fennell Prove Inc.Darian Lewis Prove Inc.

Who wins when a CISO and a Security Architect go head-to-head on cloud security best practices? You do! In this dynamic session that puts the thinking of a CISO against the hands-on know-how of a Security Architect. This isn’t just a theoretical debate; it’s a practical exploration of colleagues who work together to do what it takes to truly secure the cloud, especially when it concerns protecting sensitive data. Gain comprehensive insights and learn how the duo educates each other and works together to secure the cloud.

Amanda Fennell

Prove Inc. CISO & CIO

Darian Lewis

Prove Inc. Sr. Systems Architect

Session 3:00PM(EST)

To Be Announced

Session 3:30PM(EST)

To Be Announced

Session 4:00PM(EST)

To Be Announced


Networking Session

Open Invitation to All Attendees

Register Today!

Register once for the summit and gain access to all of the sessions.
After submitting, you’ll receive an email to make your own agenda and add sessions to your calendar.

We won’t spam you or sell your data


I registered before the agenda was released; do I need to register again?

Yes, by filling out the registration ahead of time, you were the first to receive the agenda release, but you still must register for the event. Not sure if you registered? To be safe, fill out the form again, and you’ll get a confirmation email with your custom link.

Is it free? Why?

Yes, registration is completely free. We believe identity, access, and permissions are often overlooked yet crucial to a more secure cloud. Why is it free? One of our presenters said it best, “I wish I had this kind of help in my career, so now I’m giving back and sharing what I know.”

What is ACCESS?

Don’t worry; ACCESS isn’t another acronym. We believe securing the cloud is all about controlling access; in the cloud, you have to manage identities and permissions for that to be possible. At this virtual summit, expect to learn about everything related to securing the cloud with a focus on identity, access, and permissions.

When and where is the event taking place?

ACCESS is a virtual event scheduled for October 12th. Sessions will be accessible online from anywhere in the world.

Who should attend this summit?

Anyone looking to create a more secure cloud, especially those tired of the status quo. So far we’ve seen cloud leaders, CISOs, security professionals, IAM leaders, Security Architects, Engineering leaders, IT Managers, Developers, and more ranging from the Fortune 10 to startups.

How do I register for ACCESS?

Register for ACCESS by filling out the form above and clicking the “Register Now” button. After registering, you’ll receive an email with your personal link to log into the event, create your agenda, and connect with other attendees/presenters.

How do I access the sessions, create my agenda, add to my calendar, and more?

Registered participants will receive an email with login instructions to access the virtual event platform. The link you receive in that email is your custom login link. If you lose the link, chat with our team and we can resend the email or search your email for “ACCESS Summit.”

Will sessions be recorded?

Yes, all sessions will be recorded and made available after the event. You must register to gain access to any of the event material.

Can I interact with the speakers?

Absolutely, we encourage interaction through Q&A sessions, chat rooms, and social media channels.

I’m having technical issues; how do I get help?

Our team is available via chat Monday through Friday, 9 am ET to 5 pm ET. Click the chat button in the bottom right corner for questions.