Webinar: Securing IAM: The New Cloud Perimeter is Broken
Aug 
30th
–
Aug 
31st
Join Us
Text goes here
X
Link Text
Text goes here
X
Register Now
Text goes here
X
About
Webinar: Securing IAM: The New Cloud Perimeter is Broken
08
/
30
 – 
08
/
31
Register
Text goes here
X

Historically, defense in depth was mostly performed through network-layer controls. While network security controls remain an important component of cloud security, an additional layer of identity and access management (IAM) governance is now needed as organizations continue to scale their cloud presence. Similar to scanning applications for vulnerabilities, IAM policies across all cloud accounts must be constantly monitored and evaluated to determine the risk impact to the business.


We will present breaking research from the Unit 42 Threat Intelligence team and how one simple IAM misconfiguration allowed researchers to compromise an entire massively-scaled cloud environment and bypass just about every security control.


We will also deep dive into the complex topic of identity security, exploring the methods attackers use to silently perform reconnaissance, common threat actors and tangible steps organizations can take to build a cloud security program based upon IAM best practices.

Speaker:

Ashley Ward

Technical Director, Office of the CTO

Palo Alto Networks

Thank You

[confirmation_headline]
[confirmation_messaging]

Historically, defense in depth was mostly performed through network-layer controls. While network security controls remain an important component of cloud security, an additional layer of identity and access management (IAM) governance is now needed as organizations continue to scale their cloud presence. Similar to scanning applications for vulnerabilities, IAM policies across all cloud accounts must be constantly monitored and evaluated to determine the risk impact to the business.


We will present breaking research from the Unit 42 Threat Intelligence team and how one simple IAM misconfiguration allowed researchers to compromise an entire massively-scaled cloud environment and bypass just about every security control.


We will also deep dive into the complex topic of identity security, exploring the methods attackers use to silently perform reconnaissance, common threat actors and tangible steps organizations can take to build a cloud security program based upon IAM best practices.

PSE Associate Platform Prep and Online Testing

We look forward to seeing you in

The Final Countdown!
Time left for the event days hours minutes seconds
The countdown doesn't work if the event start date is set to TBD

PSE Associate Platform Prep and Online Testing

© 2020 Palo Alto Networks, Inc. All Rights Reserved.

Privacy
Text goes here
X
Contact Us
Text goes here
X
Terms of Use
Text goes here
X

Self-parking validation tickets available at event registration upon check-in

Registration is complimentary for all attendees. Justification Letter for Cloud Security Summit. Palo Alto Networks, Inc.'s internal policies strictly limit the types of amenities it can provide to federal, state and local government, and education customers. These policies are in place to ensure that all business sectors are undertaken with the utmost respect to the applicable laws and regulations surrounding the provision of amenities to those customers. By accepting any item of value in connection with this event, you are specifically representing that Palo Alto Networks' offering and your acceptance of it is in copmliance with your organizations' legal and ethical guidelines. This event is not open to K-12 or Library customers. Should you ahve any questions in regard to this event, please contact your Palo Alto Networks sales representative.

Share with Friends
Facebook
Twitter
LinkedIn
Link
CONTACT THE ORGANIZER
Google   Outlook   iCal   Yahoo

RSVP

Google Icon
Google
Outlook Icon
Outlook
Apple Icon
Apple
Yahoo Icon
Yahoo