Thursday, October 3rd, 2024

Best Practices for Securing Identities in the Cloud

10:00 AM - 11:30 AM BST | Virtual

Event Overview

Organizations continue to embrace more cloud-based applications, infrastructure and services. The potential payoff from these digital transformation programs includes faster deployment, easier to manage infrastructure and lower cost.

At the same time, moving to the cloud creates compounding identity security concerns, not least because of the challenge of managing identities across hybrid and multi-cloud environments. Many organizations also continue to apply on-premises thinking, when new technology and approaches can free them to embrace fresh and more optimized approaches.

Accordingly, what are best practices for managing identity security in the cloud? What Zero Trust principles – for example, via a Zero Standing Privilege Model – should organizations pursue? How can well-executed cloud identity security programs deliver demonstrable business value?

This invitation-only roundtable on Best Practices for Securing Identities in the Cloud will provide answers to these and other critical questions.

DISCUSSION POINTS

  • ·       What all does the cloud enable from a dynamic access management perspective that was not possible before?

    ·       What new technology, processes, workflows and thinking should organizations adopt?

    ·       What are best practices for linking identity security in the cloud to business value?

Request to Attend

By submitting this form you agree to our Privacy & GDPR Statement.

If you have any trouble submitting this form, please send an email to roundtables@ismg-events.com for assistance.

*Please note that this is an invitation-only event and space is limited. All requests to attend will be reviewed by our event staff and approved based on professional qualifications and event capacity. Additionally, these events will not be recorded and the Chatham House Rule will apply.


Mathew Schwartz 

Executive Editor

ISMG (Moderator)


David Higgins

Field CTO

CyberArk


Charles Chu

General Manager of PAM and Cloud Security

CyberArk

Speakers

Join your peers and thought-leaders David Higgins  & Charles Chu from CyberArk along with Mathew Schwartz to discuss Best Practices for Securing Identities in the Cloud.

This  session will be:

  • Chatham house rules
  • Peer driven
  • Pitch free

Moderator

Mathew Schwartz

Executive Editor

ISMG

Schwartz is an award-winning journalist with two decades of experience in magazines, newspapers and electronic media. He has covered the information security and privacy sector throughout his career. Before joining ISMG in 2014, where he now serves as the executive editor, DataBreachToday and for European news coverage, Schwartz was the information security beat reporter for InformationWeek and a frequent contributor to DarkReading, among other publications.

Subject matter expert

David Higgins

EMEA Technical Director

CyberArk

Since joining CyberArk in 2010, Higgins has worked to help the world’s leading – and most complex – organizations secure and protect their privileged access. He advises clients on threats associated with privileged escalation, lateral movement and credential theft as well as best practices and driving innovation around privileged access management processes.

Subject matter expert

Charles Chu

General Manager of PAM and Cloud Security

CyberArk

Wilson heads the privileged access management team at PwC UK. He has led a number of programs across FTSE and Fortune 100 clients over the past decade and helps customers design and implement their privileged account management controls. Wilson also advises organizations embracing cloud and automation on privileged access best practices.

Get an Exclusive Sneak Peek of This Roundtable!

Venue

The Savoy

Strand, London WC2R 0EZ, United Kingdom

Underwritten by

CyberArk is the global leader in Identity Security. Centered on privileged access management, CyberArk provides the most comprehensive security offering for any identity – human or machine – across business applications, distributed workforces, hybrid cloud workloads and throughout the DevOps lifecycle. The world’s leading organizations trust CyberArk to help secure their most critical assets.

Rules of Engagement

By taking part in this discussion you agree that:

  • These events follow Chatham House Rule. Nothing shared will be recorded or distributed anywhere online.
  • If for any reason you need to cancel your reservation, we ask you to let us know 48 hours prior to the event commencing so we can open your seat up to someone else.
  • These are interactive discussions, so we ask that all attendees participate in the discussion. If this is a virtual event, we ask all attendees to join via video.

Upcoming ISMG Events

September 17, 2024

Cybersecurity Summit: London

September 24, 2024

The Elastic and Google Cloud GenAI Roadshow San Francisco: Explore the Next Generation of AI-Driven Search and Insight

September 26, 2024

Cybersecurity Summit: Canada East

October 1, 2024

Proactive Cyber Third-Party Risk Management: Gaining Control

October 17, 2024

Government Cybersecurity Summit: DC Hosted by GovInfoSecurity

Upcoming ISMG Events

September 17, 2024

Cybersecurity Summit: London

September 24, 2024

The Elastic and Google Cloud GenAI Roadshow San Francisco: Explore the Next Generation of AI-Driven Search and Insight

September 26, 2024

Cybersecurity Summit: Canada East