Tackling Data Security in the Multi-Clo...
Join Dig Security’s CEO and Co-Founder Dan Benjamin for an insider chat with Carlos Carlos, Director of Data Security at Oportun as they flesh out key challenges and advise on practical solutions related to tackling data security in the multi-cloud era. The panelists will discuss topics including how to know when you need to protect your cloud data, requirements for an effective cloud data security program, specific cloud data security c...
Making Secrets Management Scalable and...
Explore how Confidential Computing revolutionizes secrets management for organizations undergoing cloud-based digital transformations. Hybrid architectures often strain legacy backend components like HSMs and key management systems, which must move to the cloud to scale. Learn how Confidential Computing solves these challenges, enabling effective secrets management practices. Join us as we explore: The challenges of leveraging the cloud for di...
The Role of CWPP in a CNAPP World
Cloud Workload Protection Platforms (CWPP) must provide real-time detection and response if they are to be effective in defending against machine-speed ransomware attacks in the cloud. When coupled with Cloud Native Application Protection Platforms (CNAPP), cloud-enabled businesses can experience comprehensive cloud security without throttling innovation. Join SentinelOne as we speak plainly about cloud defense in depth. From build time to run...
5 Ways Access Management Goes Awry in AWS
When following best practices for secure access in the cloud, things often seem to start off so simple. Least privilege makes sense. Enforcing credential rotation, strong passwords and the such all seem easy. But then you’re faced with fact that the vast majority of breaches today are access/identity-based, and that recent research shows that 85% of access grants were never used in a 90-day period. All of a sudden things aren’t so...
The State of Cloud-Native Security 2023
Learn what’s keeping 2,500 of your peers awake at night. Stay informed with empirical insights to inform your cloud-native security decisions.The State of Cloud-Native Security Report 2023 is the result of a months-long survey traversing seven countries and five sectors of industry to consult with 2,500 cloud security and DevOps professionals — from chief executives to developers to security technicians — with the goal of ide...
How to Fortify Your Salesforce Ecosyste...
Nearly every enterprise relies on Salesforce to manage customer relationships and build new applications designed to drive business outcomes and innovation. But a secure Salesforce environment requires more than configuration management to mitigate a SaaS breach. Overlooking the shared responsibility during implementation and in everyday operations can lead to potential risks. Salesforce admins, security practitioners, and IT teams need visibi...
Intersecting Cloud Security and Agility...
Agility and security do not have to be in conflict, and businesses of all sizes have the capacity to innovate swiftly and operate securely. Join SentinelOne and Wiz for a webinar as we discuss cloud security at scale, and what our new partnership means to both customers and the security community. We’ll cover how we plan to translate our “better-together” vision into reality through the integration of our platforms with: Enha...
Cloud Trust Summit
CSA’s Cloud Trust Summit will deliver detailed information about how to secure cloud adoption and maintain robust cyber resilience through use of CSA's Security, Trust, Assurance and Risk (STAR) program, the largest cloud assurance program in the world. Prominent leaders from industry, national and regional regulatory bodies will convene at the Cloud Trust Summit to discuss the top challenges for enterprises to achieve cloud assurance re...
Securing Human and Workload Identities...
As multicloud environments expand, there are more identities and permissions organizations need to effectively manage. In fact, our recent State of Cloud Permissions Risks Report finds that there are over 40,000 permissions across major clouds but human and workload identities across multicloud are using only 1% of their permissions granted; this delta is called the Permissions Gap. The bigger the gap, the more significant risk for accidental...
Cloud Threats & Vulnerabilities Summit
CSA’s Virtual Cloud Threats & Vulnerabilities Summit is a free, two-day online event that will address key systemic risks uncovered within the global cloud ecosystem and show how CSA's efforts to improve standards for cloud vulnerability and threat identification are growing. Attendees will gain a better understanding of the key responsibilities every cloud customer has in managing vulnerabilities and modeling threats, how malicious...
Please enter your email and password:
Please sign in with your email and password:
LinkedIn is experiencing technical difficulties. Please log in via email and password. If you do not remember your password, please click "Forgot Password" to reset.