Meeting the Identity and Access Challenges in a Multi-Cloud World

Webinar
Meeting the Identity and Access Challenges in a Multi-Cloud World

The webinar took place on Tuesday, October 19, 2021
Webinar Presentation Paul Fisher
Webinar Presentation Brian Chappell

Watch the Recording

Join this webinar to:

  • Understand the most pressing cloud security risks.
  • Identify the identity access challenges of multi-cloud deployments.
  • Understand the role and importance of IAM and PAM in cloud security.
  • Discover how to address the gaps in security left by native toolsets.
  • Learn how to implement cloud security best practices with PAM.
  • Get answers to your questions about cloud security.

How to use IAM and PAM to secure cloud environments

Multi-cloud deployments are becoming increasingly common as organizations seek to remain competitive in the digital economy and address demands for increased remote working. But while cloud migration is enabling business success, it is not without its identity and access challenges.

Join experts from KuppingerCole Analysts and Beyond Trust for a discussion about the risks associated with cloud environments and how to use IAM and PAM to protect this expanded attack surface against threat actors.

Speakers Contribution

Paul Fisher, Senior Analyst at KuppingerCole will outline the identity and access challenges associated with multi-cloud deployments. He will explain why IAM is essential, and why PAM is also important in terms of traditional privileged access management and secrets management.

Brian Chappell, Deputy CTO at Beyond Trust will highlight the need to address the complexity and interoperability issues arising from siloed identity stores, native toolsets, and conflicting shared responsibility models. He will also outline the benefits of standardizing management and security controls across the IT ecosystem, and other cloud security best practices.

 Never Miss Another Webinar

Enter your email to subscribe:

Brian Chappell is Deputy Chief Technology Officer at BeyondTrust. Brian has more than 30 years of IT and cybersecurity experience in a career that has spanned system integrators, PC and Software vendors, and high-tech multi-nationals. He has held senior roles in both the vendor and the...

Paul Fisher is a Senior Analyst who researches primarily on cybersecurity and identity and access management (IAM). He also studies trends in AI, IoT and data governance for different industry sectors including automotive. Paul is responsible for managing relevant quantitative research at...

Lead Sponsor

         FAQ

Join this combined presentation to gain quick insights and hands-on solutions from a KuppingerCole analyst and selected industry expert, finishing with by a comprehensive Q&A for your individual business challenges.

To register for the webinar, you need to log in to your KuppingerCole User first. If you do not have a KuppingerCole User yet, you can sign up here. After logging in, please enter your requested personal data which is necessary for the further administration of your registration. Once registered, a booking confirmation will be sent to your indicated email address.

Our webinars last approximately 50-60 minutes.

If you didn’t receive the booking confirmation in your inbox, please check your spam folder. If you cannot find the booking confirmation in your spam folder, please contact us. We will get back to you within one business day.

We use the "GoToWebinar" software for the webinars. Simply click on "Join the webinar" in the registration confirmation. GoToWebinar will check directly on your computer if the software is already installed. If not, the installation process will start automatically, and you only need to confirm it.

To participate, you need a computer or a laptop with Internet access. If you want to use the sound transmission via the computer, you will need headphones (headset) or speakers. You do not need a webcam or microphone. A combination of computer and telephone is also possible - you then follow the webinar via your Internet connection on the computer and dial in at the same time via telephone to listen to the moderator's explanations. You can type in questions in the chat window. In the registration confirmation you will also receive a link that allows you to test the technical requirements in advance.

Our webinars are generally free of charge.

The recordings and presentation slides will be available on the website shortly after the webinar. An email will be sent to all registered users. In order to access the materials, you will need to log in to your KuppingerCole User first.

Yes, the recordings and presentation slides are made available to all users that registered for the webinar, regardless if they attended live or were tied up with business. You do not need to deregister.

In some companies there are - mostly due to restrictive IT policies - problems with the installation. We regret this, of course, but cannot provide support in these cases. But no problem: You will receive the recording after the webinar, which you can watch in a normal web browser.