play_circle_filled Identity Security ProTalks

Understanding the Privilege of Your Cloud Users

Hero Image
  • Calendar icon October 28 Calendar icon Americas: 2PM ET | EMEA: 3PM CET | APAC: 11AM SGT

Cloud adoption is skyrocketing—but with it comes new complexity around securing access. Developers, platform engineers, and cloud admins all play different roles in building and running modern environments. But who really “owns” cloud identity security? And how can organizations enforce least privilege without slowing teams down?

In this webinar, IDC analyst Katie Norton and Josh Kirkwood from CyberArk will bring both research and real-world perspective to unpack how the cloud is actually consumed—by developers, data scientists, and engineers alike—and what that means for securing the development layer of the cloud. Together, they’ll explore how organizations can align responsibilities, protect rapidly expanding developer identities, and put Zero Standing Privileges into practice without blocking innovation.

What you’ll learn:

  • The evolving responsibilities of platform engineers, developers, and cloud security teams
  • Why developer and data scientist identities are becoming a prime attack surface
  • Practical ways to reduce standing access while enabling speed
  • How to define, and work effectively within, secure cloud guardrails

Whether you’re building, securing, or governing the pipeline, this session will help you understand who’s really in your cloud—and how to protect them.

Presenters:

Katie Norton

Research Manager, DevSecOps & Software Supply Chain Security, IDC

Josh Kirkwood

Field Technology Office, Sr Manager, CyberArk

REGISTER NOW

About CyberArk
CyberArk (NASDAQ: CYBR) is the global leader in identity security, trusted by organizations around the world to secure human and machine identities in the modern enterprise. CyberArk’s AI-powered Identity Security Platform applies intelligent privilege controls to every identity with continuous threat prevention, detection and response across the identity lifecycle. With CyberArk, organizations can reduce operational and security risks by enabling zero trust and least privilege with complete visibility, empowering all users and identities, including workforce, IT, developers and machines, to securely access any resource, located anywhere, from everywhere. Learn more at cyberark.com.