AWS Utilization and Risk Control: How an Ops leader took back control
Register Now
If you’re in charge of Cloud Ops in 2025, you’re probably being asked to make utilization as efficient as possible. Making this happen while building a robust, secure, and responsive development environment is pretty much your job description.
One of the things that seems to get directly in the way of this is IAM and permissions security. In cloud systems like AWS, permissions and access is a byzantine maze of interlayered policies and controls that frustrate and confuse. It’s not your job to be a PhD in IAM. The endgame? Developers end up overprovisioning themselves, the cloud inventory is cluttered with unused elements, and security suffers – and since IAM is what governs access to services, it’s hard to govern future cloud utilization.
Yet AWS IAM can be your friend. If you know some basics about organization-level policies, there are a few techniques to tackle current and future unauthorized cloud spend via permissions control and security tooling. Security and utilization go hand in hand, and certain guardrails can be placed in a way that don’t prevent developers from getting the permissions they need.
TJ Wenger, Director of Cloud Operations for Sonrai Security, runs a large AWS environment that’s grown significantly but kept within security best practices.
In this session, he’ll chat about:
– Top ways he made utilization efficient in 2025
– The intersection of IAM, security, and cloud spend
– Getting closer to the holy grail of a complete, accurate cloud inventory
– Specific security tools and AWS infrastructure he leverages to prevent future unauthorized cloud utilization
Join us!