How to Tackle Rising Cloud Identity Attacks

Watch Now

To watch this webinar you’ll need an Infosecurity Magazine account. Log in or sign up below.

Log in
Sign up

Get up-to-the-minute news and opinions, plus access to a wide assortment of Information Security resources that will keep you current and informed.

This will be used to identify you if you take part in our online comments.

Your password should:

  • be at least eight characters long
  • be no more than 25 characters long
  • contain at least one uppercase, lowercase and special character
  • contain at least one digit
  • only contain alphanumeric characters or ~!@#$%^&*()_-+=?.

For more information explaining how we use your information please see our privacy policy.

By registering you agree with our terms and conditions.

The growing adoption of cloud platforms and the dynamic nature of environments within them have put organizations’ critical systems and data highly vulnerable to identity-based attacks.

In this environment, access management, especially privileged access management (PAM) measures, need to evolve. Legacy PAMs are not able to support modern technologies efficiently. They create blind spots, operational inefficiencies and delays in access provisioning, all the while being expensive.

In this webinar, an expert panel will discuss the importance of modernizing PAM strategies against rising targeting of the cloud. They will set out the ways PAM can be used to keep businesses secure as well as support ever evolving enterprise needs and help achieve ROI.

Sign up to learn:

  • How attackers are targeting sensitive data in the cloud, and weaknesses in current security approaches
  • How a modern PAM strategy can ensure your business is resilient against cyber-attacks
  • The tools and processes to ensure PAM measures have the necessary capabilities to protect cloud environments

Speakers

Photo of James Coker

James Coker

Deputy Editor, Infosecurity Magazine

Photo of Saketh Machavarapu

Saketh Machavarapu

Head of Engineering, SSH Communications Security

Photo of Matthew Maynard

Matthew Maynard

Security Operations Specialist, BJC Healthcare

Photo of Josh Schmidt

Josh Schmidt

Partner, Advisory, BPM

Brought to you by

This webinar is brought to you by SSH Communications Security. By participating in/attending this webinar, you agree that your details will be shared with SSH Communications Security who may contact you in relation to similar products and services which may be of interest. You can read more in SSH Communications Security’s Privacy Policy, including how to unsubscribe.