Cloud Security

Webinar Today: How to Reduce Cloud Identity Risk

Please the fireside chat as Phil Bues, Cloud Research Manager at IDC, discusses the challenges and best practices for cybersecurity leaders managing cloud identities.

Please join Lacework and SecurityWeek today for a fireside chat as Phil Bues, Cloud Research Manager at IDC, discusses the challenges and best practices for cybersecurity leaders managing cloud identities. We’ll cover common challenges businesses face with identity management, like over-privileging and a lack of visibility, and why those challenges exist — plus the best practices for companies trying to reduce their identity risk in the cloud. Phil will also share industry trends and IDC research about zero trust, automation, and more.

Join us today at 1PM ET to learn more about:

  • How to reduce risk with a least-privileged approach
  • Actionable steps to achieve good application, infrastructure, and data hygiene
  • Key trends like Zero Trust and Generative AI – and how they relate to managing cloud identity risk

Related Content

Cloud Security

Cloud security specialists found data exposure risk associated with Azure, AWS, and Google Cloud command-line tools.

Cloud Security

New Ahoi attacks Heckler and WeSee target AMD SEV-SNP and Intel TDX with malicious interrupts to hack confidential VMs.

CISO Strategy

You're invited join SecurityWeek and Gutsy for the webinar, "From Protector to Influencer: CISO Strategies for Boardroom Success," as we address the emerging responsibilities for...

Malware & Threats

A new malware campaign has been observed targeting misconfigured Apache Hadoop, Confluence, Docker, and Redis instances.

ICS/OT

Join Honeywell and SecurityWeek to gain valuable insights from professionals who will guide you through the intricacies of industrial cybersecurity.

Cloud Security

An active cloud account takeover campaign has impacted dozens of Azure environments and compromised hundreds of user accounts.

Network Security

A "frictionless defense” is about integrating security measures seamlessly into the digital landscape to safeguard against threats while ensuring a positive user experience.

Cloud Security

While applications and cloud infrastructure present different risk profiles and require different security assessments, they must not be viewed separately with regards to enterprise...

Copyright © 2024 SecurityWeek ®, a Wired Business Media Publication. All Rights Reserved.

Exit mobile version