Loading Events

Address the Hidden Risk in Cloud Infrastructure: Misconfigured Identities, Access & Privileges

Home » Events » Address the Hidden Risk in Cloud Infrastructure: Misconfigured Identities, Access & Privileges

  • This event has passed so registration is closed.

Sponsor

Details

Date and Time

October 14, 2020 @ 1:00 pm - 2:00 pm EDT

Event Category

Web Conference

Organizer

Candice Benson

Contact

Lisa O'Connell

Overview

In the public cloud, thousands of human and machine identities, roles, policies, entitlements and configurations determine what hackers can do if they gain a foothold in your environment. One excess permission or open port can make the difference between a failed breach attempt and devastating data loss. By 2023, Gartner predicts that 75% of cloud security failures will result from inadequate management of identities, access and privileges. First-generation cloud security solutions do not give you visibility into access entitlements and risks. And the complexity of cloud infrastructure and development velocity make it virtually impossible to analyze and remediate at scale.

In this session we’ll discuss:

  • The hidden threats to AWS, Azure and Google Cloud Platform
  • The difference between managing human and machine identities
  • How identity and network configuration affect data security
  • Automating public cloud security throughout the software lifecycle

Moderator

Joshua Marpet – Executive Director and Chairman, Risk Management ISAO

After a number of interesting (police, fireman, blacksmith) but unrelated professions, Josh began his security career with the Federal Reserve Bank of Philadelphia as an information security engineer.

He is a current faculty member for IANS, the Institute for Applied Network Security, a co-host of Security and Compliance Weekly, a CMMC author, a member of the SPDX standards committee, and too many other places to list.

Joshua is currently the Executive Director and Chairman of the Risk Management ISAO (RM-isao.org), the only membership organization developed to help small and medium federal contractors be compliant and secure. He’s also a founder and board member of MJM Growth, an equity based incubator and business brokerage.

Joshua is a graduate of MACH37™, the topcybersecuritystart-up accelerator designed to facilitate the creation of the next generation of cyber product companies.

See Joshua Marpet‘s full profile.

Speaker/s

Arick Goomanovsky – Co-founder and Chief Business Officer, Ermetic

Arick is a tenured business leader with two decades of experience in strategy, technology, research, and leadership in government and the private sector. Prior to founding Ermetic, Arick was a co-founder of Sygnia Consulting, a cyber consulting and incident response firm which was acquired by Temasek Holdings for $250M. Before Sygnia, Arick worked at McKinsey & Company in London, where he focused on strategy and operations. He served for 15 years in the IDF Intelligence Corps Unit 8200, where he held senior leadership positions from research to leading hundreds of cyber R&D experts. He received several awards for his unique contributions to national security. Arick earned a BSc in Mathematics and Physics (Talpiot program, cum laude) and an MSc in Mathematics from Hebrew University, and an MBA (cum laude) from INSEAD.

See Arick Goomanovsky‘s full profile.

Chris Hughes

Roughly 15 years of Cybersecurity expertise in the public and private sector with a strong focus on Cloud Architecture and Security. Passionate about technological innovation, modernization and improving outcomes for customers and mission owners. Adjunct Professor of Cybersecurity who enjoys teaching those looking to break into the career field or grow their existing careers. Hold an M.S. in Cybersecurity as well as an MBA and various industry certifications, including 8 AWS certifications and the ISC2 Certified Cloud Security Professional (CCSP). Lifelong learner and seeker of growth.

See Chris Hughes‘s full profile.

ISSA Webinars and Conference series cover all the continuing education credits to maintain your cyber security certifications. (CPEs, CEUs, ECE, etc). Each hour is equal to one continuing education credit. Certificates of completion are available upon request after completion. For instructions, click here.

Scroll to Top