Cloud Security for a Data-Driven World Virtual Summit

Enterprises have migrated to the cloud at rapid speed with spending on cloud infrastructure skyrocketing. However, there is now a complex web of cloud-related security issues for cybersecurity leaders to tackle and manage including vulnerabilities in public cloud, API security and cloud misconfigurations which can all leave data that is held in the cloud exposed.

Join this Infosecurity Magazine Virtual Summit to learn about the latest cloud security measures, how organizations can safeguard sensitive data held in the cloud and mitigate the risk of data breaches.

Strengthening the enterprise cloud security posture is critical for organizations of all sizes.

Agenda avalaible NOW below.  

Why attend

  • Learn to tackle and manage the complex web of cloud-related security challenges, including vulnerabilities in public cloud, API security, and cloud misconfiguration.
  • Discover the latest cloud security measures to effectively safeguard sensitive data stored in the cloud.
  • Understand how to significantly mitigate the risk of data breaches within your cloud infrastructure.
  • Equip yourself with the knowledge and strategies necessary to critically strengthen your organization's cloud security posture.

Agenda At A Glance 

  • Headline Keynote brought to you by Ping Identity

    From Chaos to Confidence: Establishing Trust in Every Cloud Interaction

    2pm BST/9am EDT

    Speaker: Rob Otto - EMEA Field CTO, Ping Identity

    In today’s complex, data-driven cloud environments, the greatest risk isn’t just a data breach—it’s a breach of trust. As organisations shift more applications and sensitive data to the cloud, identity has emerged as the new control plane for securing access.

    Yet many still face challenges: siloed identity systems, inconsistent access policies, and a growing landscape of threats—from misconfigurations to AI-driven fraud.

    Join Rob Otto, EMEA CTO at Ping Identity, to learn how global enterprises are using identity-first security strategies to re-establish control, simplify cloud access, and protect critical data—without compromising user experience. This session will explore how adaptive identity can underpin a resilient cloud posture, empower zero trust initiatives, and build confidence in every digital interaction.

    Key learnings from this session include:

    • Why identity is critical to securing multi-cloud and hybrid environments—and how to get it right.

    • How to use AI-driven identity threat protection to counter deep fakes, account takeover and API-based attacks.
    • Practical ways to unify identity across users, apps and ecosystems to reduce risk and improve agility.
  • Turning Multi-Cloud Environments from a Security Risk to an Advantage

    2.45pm BST/8.45am EDT 

    Over 78% of organizations use two or more cloud providers, according to Fortinet’s 2025 State of Cloud Security Report. Many others are adopting hybrid cloud models by combining on-premises and public cloud infrastructure.

    This approach to cloud technology offers flexibility. However, these complex setups expand the potential attack surface and make maintaining consistent security policies and managing identities and access across diverse platforms difficult.

    Despite this, they also present an opportunity for organizations to build more resilient and adaptable security frameworks.

    Join this session to understand how to:

     
    • Collaborate with engineering teams to enforce safety guardrails at the implementation state
    • Develop a consistent security policy across multi-cloud environments
    • Adopt a zero-trust security model to enhance access control
    • Centralize visibility and management tools to give your security team a clear view of security across your environment
  • Cloud Security from the Inside with Jukka Seppänen, CIO and CISO, UpCloud
    4pm BST/11am EDT

    In this fireside chat, Jukka Seppänen, CIO and CISO at UpCloud, shares insights from over 25 years in tech leadership, guiding secure growth in cloud-native environments.

    We’ll explore how cloud service providers approach vulnerability management, including the strategic use of bug bounty programs. Jukka will also unpack how evolving regulations like the Cyber Resilience Act are reshaping expectations around transparency and end-user protection.

    If you're a cybersecurity professional navigating cloud environments, this session offers an insight into how a cloud service provider (CSP) actually thinks about security, from the inside out.
  • Managing Software-as-a-Service Applications Securely in the Cloud Age
    4.45pm BST/11.45am EDT
     

    In today's cloud-first world, Software-as-a-Service (SaaS) applications have become indispensable for organizations, driving efficiency and collaboration.

    However, the rapid adoption of SaaS can introduce significant cybersecurity challenges that can leave your organization vulnerable if not managed proactively.

    Just this year, JPMorganChase’s CISO sounded the alarm that the current SaaS delivery model is “quietly enabling cyber attackers.”

    Cybersecurity threats specifically target SaaS environments through sophisticated phishing campaigns, account takeovers and supply chain vulnerabilities.

    Join this session to:

    • Understand the concentration risk and the impact of vendors’ competitive pressures on your security posture
    • Examine how the growth of AI services and agents in SaaS amplifies and rapidly distributes these risks
    • Learn how to work beyond traditional security measures to deploy sophisticated authorization methods, advanced detection capabilities and proactive cybersecurity measures
  • Mastering Identity and Access for Non-Human Cloud Entities
    6pm BST/1pm EDT 
     

    Deploying and maintaining identity and access management in the cloud presents unique challenges, especially when considering non-human identities and service accounts.

    These are vulnerable to issues such as account hijacking, lack of visibility, improper provisioning and inadequate access controls that can lead to data breaches and compliance failures.

    This session covers why these accounts are prime targets for attackers, the risks inherent in their misuse and how they differ from regular user accounts.

    Join the session to:

    • Identify the pitfalls of current practices in managing these identities
    • Understand principles of least privilege and comprehensive permission auditing tailored for service accounts
    • Learn how to implement robust, automated and comprehensive security measures to mitigate potential risks

From Chaos to Confidence: Establishing Trust in Every Cloud Interaction

Turning Multi-Cloud Environments from a Security Risk to an Advantage

Cloud Security from the Inside

Managing Software-as-a-Service Applications Securely in the Cloud Age

Mastering Identity and Access for Non-Human Cloud Entities

Speakers

Sponsors

Infosecurity Magazine
Ping Identity
Open Systems