Cloud IAM: Enlightenment or #%$^?!?

Cloud IAM: Enlightenment or #%$^?!?

Strong identity and access management (IAM) is one key to preventing data breaches and limiting the blast radius should a security incident occur. But cloud IAM presents a new set of constructs for organizations to build and manage. Is cloud IAM the best identity and access control ever, or yet one more reason to tear your hair out in frustration? Join Jeremy Snyder, Senior Director of Solutions Engineering, and Alex Corstorphine, Senior Solutions Engineer, from DivvyCloud by Rapid7 for an active discussion and debate. Topics will include why managing cloud IAM is so complex, what challenges this creates for IT and cybersecurity professionals, and how leading organizations governing cloud IAM to reduce risk and the chance of a data breach.

See Also: The Operationalization of Threat Intelligence Programs

Key takeaways include understanding how to:

  • Gain visibility to assess, prioritize and remediate improper permission combinations that grant unintended or overly permissive access.
  • Reduce access down to least privilege
  • Work to minimize cloud security blast radius.

Webinar Registration

Premium Members Only

OnDemand access to this webinar is restricted to Premium Members.

Join Now to Access
Have an account? Sign in.

Around the Network

Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing, you agree to our use of cookies.