From Chaos to Confidence: Establishing Trust in Every Cloud Interaction

Watch Now

To watch this webinar you’ll need an Infosecurity Magazine account. Log in or sign up below.

Log in
Sign up

Get up-to-the-minute news and opinions, plus access to a wide assortment of Information Security resources that will keep you current and informed.

This will be used to identify you if you take part in our online comments.

Your password should:

  • be at least eight characters long
  • be no more than 25 characters long
  • contain at least one uppercase, lowercase and special character
  • contain at least one digit
  • only contain alphanumeric characters or ~!@#$%^&*()_-+=?.

For more information explaining how we use your information please see our privacy policy.

By registering you agree with our terms and conditions.

This session was part of the Cloud Security Virtual Summit, click here to explore the full event agenda here.

In today’s complex, data-driven cloud environments, the greatest risk isn’t just a data breach—it’s a breach of trust. As organizations shift more applications and sensitive data to the cloud, identity has emerged as the new control plane for securing access.

Yet many still face challenges: siloed identity systems, inconsistent access policies, and a growing landscape of threats—from misconfigurations to AI-driven fraud.

Join Rob Otto, EMEA CTO at Ping Identity, to learn how global enterprises are using identity-first security strategies to re-establish control, simplify cloud access, and protect critical data—without compromising user experience. This session will explore how adaptive identity can underpin a resilient cloud posture, empower zero trust initiatives, and build confidence in every digital interaction.

Key learnings:

  • Why identity is critical to securing multi-cloud and hybrid environments—and how to get it right.
  • How to use AI-driven identity threat protection to counter deep fakes, account takeover and API-based attacks.
  • Practical ways to unify identity across users, apps and ecosystems to reduce risk and improve agility.

Speakers

Photo of Rob Otto

Rob Otto

EMEA Field CTO, Ping Identity

Brought to you by

Should you watch this webinar your information may be shared with the sponsors indicated above. Please see the privacy policy for Ping Identity here: https://www.pingidentity.com/en-us/docs/legal/privacy. Please see Infosecurity Magazine’s privacy policy for more information.