Multi-Cloud/Multi-Hybrid
Facebook Twitter LinkedIn

Multi-Cloud/Multi-Hybrid

Combined Session
Wednesday, May 11, 2022 11:00—12:00
Location: B05

Demystifying CIEM for an Effective Multi-Cloud Security Enablement

As digital business pushes organizations towards an accelerated multi-cloud adoption, CIEM (Cloud Infrastructure Entitlements Management) emerges as a strong enabler for securing access and entitlements across an increasingly distributed cloud environment. Traditional PAM and IGA tools aren't natively designed to manage cloud infrastructure entitlements and therefore can't be easily re-purposed to discover and remediate excessive cloud permissions across multiple IaaS and PaaS platforms. The confusion arising from un-identically structured CSPs and misaligned cloud terminology is further aggravated by the quest of IAM, PAM and Cloud Security providers to enter CIEM space and capture market share.

In this session, we will focus on how the CIEM market has been evolving over the last few years to manage the critical cloud security gaps left unaddressed by CSPM (Cloud Security Posture Management) and CWP (Cloud Workload Protection) tools, and how CIEM complements these tools to offer a wholistic cloud security advantage. We will also discuss how CIEM addresses some of the most critical security tenets of your organization's cloud adoption program and future planning.

As for the key takeaways of this session, you will be able to understand and articulate:

  1. When and where does CIEM fit in your overall cloud security and access governance strategy?
  2. What are the critical capabilities of CIEM to help evaluate the right CIEM product for your multi-cloud environment?
  3. What are industry best practices for implementing and operationalizing CIEM for your cloud security and achieving faster ROI?

Anmol Singh
Anmol Singh
Microsoft
Anmol Singh is a Principal Product Manager at Microsoft and brings more than 20 years of cybersecurity experience focused on IAM and related security technologies. Through his career, Singh has...

Panel: Multi-Cloud Agility Must-Haves

With a highly prioritized digital tranfsformation towards a composable enterprise, it will be inevitable to work with multi-cloud solutions to achieve the level of agility and flexibility required. If it was to avoid vendor lock-in or to consequently go for best-of-breed solutions - in this cloud expert panel we will discuss approaches to manage multi-clouds efficently and to avaid increased complexity.

Vittorio Bertocci
Vittorio Bertocci
Auth0
Vittorio Bertocci is a Principal Architect for Auth0. Before Auth0, he had a lengthy career with Microsoft, where Vittorio worked with Fortune 100 and Global 100 companies, including working on...
Paul Fisher
Paul Fisher
KuppingerCole
Paul Fisher is a Lead Analyst who researches primarily on cybersecurity and identity and access management (IAM). He also studies trends in AI, IoT and data governance for different industry...
Patrick McBride
Patrick McBride
Beyond Identity
Patrick has served as CMO of ZeroFOX and Claroty, as VP of Marketing at iSIGHT Partners and Xceedium, VP of Compliance at Scalable Software, Co-founder and CEO of META Security Group, and...
Anmol Singh
Anmol Singh
Microsoft
Anmol Singh is a Principal Product Manager at Microsoft and brings more than 20 years of cybersecurity experience focused on IAM and related security technologies. Through his career, Singh has...
Mike Small
Mike Small
KuppingerCole
Mike Small is the retired director of security management strategy of CA, where he was responsible for the technical strategy for CA's security management software product line within Europe,...

Security Improvement Through Visibility of Changes in Hybrid/Multi-Cloud Environments

Performing accidentally wrong or intentionally bad configuration changes by administrators, scripts or systems can lead to serious security vulnerabilities or unintentional visibility or leakage of data. This applies to on-premises systems, but especially to systems and applications in cloud environments.
With a comprehensive change auditing and reporting in hybrid environments, such critical changes and conditions can be quickly identified and remediated.
This session will deal with this topic in general and with a solution approach in particular.

Security Improvement Through Visibility of Changes in Hybrid/Multi-Cloud Environments
Event Recording
Security Improvement Through Visibility of Changes in Hybrid/Multi-Cloud Environments
Click here to watch the recording of this session. Please note that this video is only available to event participants and subscribers. You'll need to log in to watch it.
Security Improvement Through Visibility of Changes in Hybrid/Multi-Cloud Environments
Presentation deck
Security Improvement Through Visibility of Changes in Hybrid/Multi-Cloud Environments
Click here to download the slide deck. Please note that downloads are only available for event participants and subscribers. You'll need to log in to download it.
Michael Breier
Michael Breier
Cygna Labs Corp.
Michael has 25+ years of experience in different IT management areas such as System-, Network-, Least Privilege- and Privileged Access Management as well as Active Directory and Cloud Security...

Tickets

On-Demand Access
Re-live EIC 2022
€300
 
Watch 200 sessions on-demand
Download all available presentations
Subscribe for updates
Please provide your email address