Identity Security ProTalks
Cloud adoption is skyrocketing—but with it comes new complexity around securing access. Developers, platform engineers, and cloud admins all play different roles in building and running modern environments. But who really “owns” cloud identity security? And how can organizations enforce least privilege without slowing teams down?
In this webinar, IDC analyst Katie Norton and Josh Kirkwood from CyberArk will bring both research and real-world perspective to unpack how the cloud is actually consumed—by developers, data scientists, and engineers alike—and what that means for securing the development layer of the cloud. Together, they’ll explore how organizations can align responsibilities, protect rapidly expanding developer identities, and put Zero Standing Privileges into practice without blocking innovation.
What you’ll learn:
Whether you’re building, securing, or governing the pipeline, this session will help you understand who’s really in your cloud—and how to protect them.