Mastering Identity and Access for Non-Human Cloud Entities

Watch Now

To watch this webinar you’ll need an Infosecurity Magazine account. Log in or sign up below.

Log in
Sign up

Get up-to-the-minute news and opinions, plus access to a wide assortment of Information Security resources that will keep you current and informed.

This will be used to identify you if you take part in our online comments.

Your password should:

  • be at least eight characters long
  • be no more than 25 characters long
  • contain at least one uppercase, lowercase and special character
  • contain at least one digit
  • only contain alphanumeric characters or ~!@#$%^&*()_-+=?.

For more information explaining how we use your information please see our privacy policy.

By registering you agree with our terms and conditions.

This session was part of the Cloud Security Virtual Summit, click here to explore the full event agenda here.

Deploying and maintaining identity and access management in the cloud presents unique challenges, especially when considering non-human identities and service accounts.

These are vulnerable to issues such as account hijacking, lack of visibility, improper provisioning and inadequate access controls that can lead to data breaches and compliance failures.

This session covers why these accounts are prime targets for attackers, the risks inherent in their misuse and how they differ from regular user accounts.

Join the session to:

  • Identify the pitfalls of current practices in managing these identities
  • Understand principles of least privilege and comprehensive permission auditing tailored for service accounts
  • Learn how to implement robust, automated and comprehensive security measures to mitigate potential risks

Speakers

Photo of Nicolas Corrarello

Nicolas Corrarello

Principal Solutions Engineer, StrongDM

Photo of Tal Skverer

Tal Skverer

Leader, OWASP Non-Human Identities Top 10, OWASP

Photo of Mike Small

Mike Small

Senior Analyst, KuppingerCole Analysts

Photo of Mrinal Srivastava

Mrinal Srivastava

Director, Technology and Security, Neurealm

Brought to you by

Should you watch this webinar your information may be shared with the sponsors indicated above. Please see the privacy policy for Ping Identity here: https://www.pingidentity.com/en-us/docs/legal/privacy. Please see the privacy policy for Open Systems here: https://www.open-systems.com/privacy-policy/. Please see Infosecurity Magazine’s privacy policy for more information.