Adjust the vertical spacer by editing the class "spacer-X" where X = 0 (none) thru 5 (most)
Adjust the vertical spacer by editing the class "spacer-X" where X = 0 (none) thru 5 (most)
Adjust the vertical spacer by editing the class "spacer-X" where X = 0 (none) thru 5 (most)
Adjust the vertical spacer by editing the class "spacer-X" where X = 0 (none) thru 5 (most)
Adjust the vertical spacer by editing the class "spacer-X" where X = 0 (none) thru 5 (most)

Register Now

Registration includes access to all 3 on-demand sessions

Adjust the vertical spacer by editing the class "spacer-X" where X = 0 (none) thru 5 (most)
Adjust the vertical spacer by editing the class "spacer-X" where X = 0 (none) thru 5 (most)

Three 20-minute on-demand sessions for those interested in solving security challenges in the cloud

Security at scale requires consistent controls. But accelerating cloud adoption can lead to permissions sprawl and excessive access that can be manipulated by attackers.

Removing excessive permissions across your cloud footprint should be a key component of any cyber security program. But where to start?

Join us for our Cloud Boot Camp where, in just three 20-minute sessions, you will learn how to secure identity in the cloud & implement consistent controls to manage identity and access management (IAM) permissions and entitlements.

Adjust the vertical spacer by editing the class "spacer-X" where X = 0 (none) thru 5 (most)
Adjust the vertical spacer by editing the class "spacer-X" where X = 0 (none) thru 5 (most)

ON-DEMAND SESSIONS

Adjust the vertical spacer by editing the class "spacer-X" where X = 0 (none) thru 5 (most)
Session 1

In public cloud environments, human and machine identities are under fire – particularly those with sensitive cloud infrastructure entitlements. In this session, you’ll learn about different classifications of entitlements and the growing landscape of cloud permissions – alongside key principles for securely managing those that pose risk.

Session 2

Recent breaches show even leading world-class cloud security teams can struggle to manage excessive permissions. This session will explore established threats like Shadow Admin – identities with hidden, powerful permissions to escalate privileges – to help you defend key data and resources in new and existing cloud environments.

Session 3

The landscape of who can access what in modern cloud environments is intricate and complex. Mapping and managing cloud entitlements can be such a major challenge that it’s difficult to know where to start. Our boot camp will close with best practices for identifying workloads that pose as security or compliance risks, and with managing permissions to implement least privilege access to defend against attacks.

Adjust the vertical spacer by editing the class "spacer-X" where X = 0 (none) thru 5 (most)
Adjust the vertical spacer by editing the class "spacer-X" where X = 0 (none) thru 5 (most)

Our special thank you for participating! Boot Camp graduates are eligible for:

  • 1 CPE credit*
  • A personal subscription to A Cloud Guru!**
    • The leader in learning about cloud. Master your skills to drive your career on A Cloud Guru’s platform with courses and real hands-on labs in AWS, Azure, Google Cloud, and beyond
    • Learn more here. Offer available until December 31, 2021, while supplies last

*Attendees must view all 3 sessions on-demand
**Offer is valid for IT security professionals located in the US or Canada only, through December 31, 2021, while supplies last.

Adjust the vertical spacer by editing the class "spacer-X" where X = 0 (none) thru 5 (most)