Thursday, October 3rd, 2024

Best Practices for Securing Identities in the Cloud

11:00 AM -12:30 PM CEST | Virtual

Event Overview

Organizations continue to embrace more cloud-based applications, infrastructure and services. The potential payoff from these digital transformation programs includes faster deployment, easier to manage infrastructure and lower cost.

At the same time, moving to the cloud creates compounding identity security concerns, not least because of the challenge of managing identities across hybrid and multi-cloud environments. Many organizations also continue to apply on-premises thinking, when new technology and approaches can free them to embrace fresh and more optimized approaches.

Accordingly, what are best practices for managing identity security in the cloud? What Zero Trust principles – for example, via a Zero Standing Privilege Model – should organizations pursue? How can well-executed cloud identity security programs deliver demonstrable business value?

This invitation-only roundtable on Best Practices for Securing Identities in the Cloud will provide answers to these and other critical questions.

DISCUSSION POINTS

  • ·       What all does the cloud enable from a dynamic access management perspective that was not possible before?

    ·       What new technology, processes, workflows and thinking should organizations adopt?

    ·       What are best practices for linking identity security in the cloud to business value?

Join our Events Community ISMG Connect

Continue the conversation with your industry peers

Share your Feedback

Complete a brief 5-minute survey here


Mathew Schwartz 

Executive Editor

ISMG (Moderator)


David Higgins

Field CTO

CyberArk


Charles Chu

General Manager of PAM and Cloud Security

CyberArk

Speakers

Join your peers and thought-leaders David Higgins  & Charles Chu from CyberArk along with Mathew Schwartz to discuss Best Practices for Securing Identities in the Cloud.

This  session will be:

  • Chatham house rules
  • Peer driven
  • Pitch free

Moderator

Mathew Schwartz

Executive Editor

ISMG

Schwartz is an award-winning journalist with two decades of experience in magazines, newspapers and electronic media. He has covered the information security and privacy sector throughout his career. Before joining ISMG in 2014, where he now serves as the executive editor, DataBreachToday and for European news coverage, Schwartz was the information security beat reporter for InformationWeek and a frequent contributor to DarkReading, among other publications.

Subject matter expert

David Higgins

EMEA Technical Director

CyberArk

Since joining CyberArk in 2010, Higgins has worked to help the world’s leading – and most complex – organizations secure and protect their privileged access. He advises clients on threats associated with privileged escalation, lateral movement and credential theft as well as best practices and driving innovation around privileged access management processes.

Subject matter expert

Charles Chu

General Manager of PAM and Cloud Security

CyberArk

Wilson heads the privileged access management team at PwC UK. He has led a number of programs across FTSE and Fortune 100 clients over the past decade and helps customers design and implement their privileged account management controls. Wilson also advises organizations embracing cloud and automation on privileged access best practices.

Get an Exclusive Sneak Peek of This Roundtable!

Venue

The Savoy

Strand, London WC2R 0EZ, United Kingdom

Underwritten by

CyberArk is the global leader in Identity Security. Centered on privileged access management, CyberArk provides the most comprehensive security offering for any identity – human or machine – across business applications, distributed workforces, hybrid cloud workloads and throughout the DevOps lifecycle. The world’s leading organizations trust CyberArk to help secure their most critical assets.

Rules of Engagement

By taking part in this discussion you agree that:

  • These events follow Chatham House Rule. Nothing shared will be recorded or distributed anywhere online.
  • If for any reason you need to cancel your reservation, we ask you to let us know 48 hours prior to the event commencing so we can open your seat up to someone else.
  • These are interactive discussions, so we ask that all attendees participate in the discussion. If this is a virtual event, we ask all attendees to join via video.

Upcoming ISMG Events

January 16, 2025

AI-Driven Insights for Asset Visibility and Streamlined Patch Management

January 22, 2025

Mitigate Risks Through Asset Discovery and Compliance Monitoring

January 28, 2025

Are You Ready for DORA? Strengthening Resilience and Achieving Compliance by 2025

January 30, 2025

The Anatomy of Cyber Resilience: What It Is, What It Isn't, Why It Matters, and How to Achieve It

February 11-12, 2025

Virtual Summit: Cybersecurity Implications of AI

Upcoming ISMG Events

January 16, 2025

AI-Driven Insights for Asset Visibility and Streamlined Patch Management

January 22, 2025

Mitigate Risks Through Asset Discovery and Compliance Monitoring

January 28, 2025

Are You Ready for DORA? Strengthening Resilience and Achieving Compliance by 2025