Early-bird Discount
expires in
Register Now

Agenda

Cloud Security & Resilience

Cloud Security & Resilience

Combined Session
Thursday, May 08, 2025 12:05—13:05
Location: B09

4 Pillars of Cloud Security
12:05—12:25
 

As organizations embrace cloud adoption at an unprecedented pace, security challenges in complex, multi-cloud environments have grown exponentially. In 2025, the Chief Information Security Officer's (CISO) role is undergoing a transformation—evolving from reactive defence strategies to proactive leadership in cloud security.
Despite the inherent resilience of cloud services, the shared responsibility model remains a critical factor. Alarmingly, most cloud security incidents arise not from provider vulnerabilities but from customer misconfigurations and errors.
This session will demystify the four foundational pillars of cloud security that are essential for navigating today’s hybrid, multi-cloud landscape. Attendees will gain insights into cutting-edge approaches and technologies that are reshaping the field, ensuring compliance, and mitigating the risks posed by emerging threats. Using real-world case studies, this presentation will explore practical challenges and provide actionable guidance to elevate your cloud security posture and future-proof your organization.

After this presentation you will be able to:

  • Understand the rapidly evolving cloud security landscape and articulate the four pillars essential for robust cloud security.
  • Leverage innovative technologies, including automation, to streamline and strengthen your cloud security strategies.
  • Implement actionable strategies to secure multi-cloud environments, reduce risks, and achieve compliance in an increasingly dynamic threat landscape.
Mike Small
Senior Analyst
KuppingerCole
Mike Small is the retired director of security management strategy of CA, where he was responsible for the technical strategy for CA's security management software product line within Europe,...
Clear Skies: What If Suddenly There Is No Cloud?
12:25—12:45
 

Cloud-based IAM solutions provide clear benefits for both the customers and the vendors. There is, however, the question of what happens if the cloud-based IAM solution becomes unavailable. This could be due to a number of reasons: IAM vendor has an outage or the connection between the customer to the cloud IAM is interrupted somehow (I'm looking at you, dragging ship anchor...). Any good disaster recovery plan must take complete or partial outages of not only internal but also 3rd party resources into account. Regulations like DORA or NIS2 not only mandate technical controls such as MFA but also require that the organisation is resilient against outages. Therefore e.g. the question "What happens if our Cloud MFA vendor becomes unavailable and how do we recover from that?" becomes VERY relevant. So.... what is your plan in case of an outage? You do have one besides "Wait and hope it'll be back soon"... right?

Ingo Schubert
Field CTO International
RSA
Ingo Schubert joined RSA almost two decades ago and dealt with cryptographic toolkits and PKI until he discovered the identity and access management parts of RSA’s portfolio. His main...
PANEL: How to Secure Data in the Cloud - Is Encryption Enough?
12:45—13:05
 

As cloud adoption accelerates across industries, securing sensitive data in this dynamic environment has become a critical priority. While encryption is often viewed as the gold standard for protecting data, is it truly sufficient in the face of increasingly sophisticated threats? This panel brings together leading experts from cybersecurity, cloud architecture, and compliance to explore the evolving landscape of cloud data security.

Join us as we dive into the challenges of securing data at rest, in transit, and in use, and assess the role of encryption alongside other technologies like zero-trust architecture, AI-driven threat detection, and confidential computing. Panelists will discuss real-world scenarios, regulatory considerations, and practical strategies for organizations to safeguard their cloud ecosystems. Whether you’re a seasoned IT professional or a business leader navigating the cloud journey, this discussion will provide critical insights to help you build a robust and resilient data security framework.

Ingo Schubert
Field CTO International
RSA
Ingo Schubert joined RSA almost two decades ago and dealt with cryptographic toolkits and PKI until he discovered the identity and access management parts of RSA’s portfolio. His main...
Almost Ready to Join the EIC 2025?
Reach out to our team with any remaining questions
Get in touch