SANS Cloud Security Exchange 2024

  • Tuesday, 27 Aug 2024 11:00AM EDT (27 Aug 2024 15:00 UTC)
  • Speaker: Frank Kim

Get ready to dive into the ultimate cloud security experience! Join us on Tuesday, August 27th, at 11:00 AM ET (15:00 UTC) for SANS Cloud Security Exchange 2024.

Learn from industry-leading experts at Amazon Web Services (AWS), Google Cloud, and Microsoft.

This global online event, completely free of charge, offers a rare chance to learn from the best in the business. Don’t miss out!

In an era where cloud security is evolving rapidly and artificial intelligence (AI) is becoming a game-changer, the SANS 2024 Cloud Security Exchange offers an unparalleled opportunity to stay ahead of the curve. Discover what’s working and what’s not working in cloud security design, identity modernization, and Generative AI security.

Even if your schedule doesn’t allow for live attendance, be sure to register anyway! This way, you’ll have first access to free recordings and a free Cloud Security eBook authored by our AWS, Google Cloud, and Microsoft expert speakers.

Join us for a cutting-edge virtual event that will redefine your approach to cloud security!--> To view the full agenda for this event, please scroll down.

STOP, there's more!
Get connected with our event chairs, guest speakers, and fellow attendees for our 2024 events --> GET CONNECTED
Cloud_Sec_Exchange_24_470_x_382.jpg

In Partnership With:

AWS_logo_RGB.pngGoogle_Cloud.pngMicrosoft_-_Transparent.png

Agenda | August 27, 2024 | 11:00 AM-4:00 PM EDT

Timeline
(EDT)

Session Description

11:00 AM

SANS Welcome & Opening Comments

Frank Kim, Event Chair, SANS Institute

11:15 AM

Evolving Cloud Security with a Modern Approach
Modernizing cloud security practices is a necessity and many organizations still struggle to implement effective cloud security measures, despite the availability of tried-and-true best practices. Discover ten key areas where organizations can focus their efforts to improve their cloud security posture (with an overview of the "new ways" in which cloud security best practices are evolving). It’s critical to adapt security strategies to the ever-changing landscape of cloud computing, and we fortunately have a good understanding of what this shift looks like today.

Dr. Anton Chuvakin, Security Advisor at Office of the CISO, Google Cloud

Brandon Evans, Certified Instructor, SANS

12:00PM

Identity Modernization

The imperative for Identity Modernization has never been more critical. As organizations navigate the evolving landscape of digital identity, the urgency to adapt has been significantly amplified by the recent advent of Generative AI technologies. This transformation journey is especially pivotal for enterprises looking to migrate applications from traditional Active Directory frameworks to more agile and secure platforms like Entra ID. These solutions not only modernize private app access through granular application segmentation but also enhance security postures by ensuring only the right individuals have access to the right resources under the right conditions. A clear path for organizations to achieve Identity Modernization emphasizes the integration of modernizing private app access with ZTNA, a pivotal step that redefines how access controls are managed and enforced, shifting away from the perimeter-based models to one that is dynamic and identity-aware. We will also discuss the benefits of expanding Conditional Access controls across a broader array of applications. This expansion is not just about enforcing policies; it's about creating a security model that adapts in real-time to changes in user roles, security incidents, location shifts, and device compliance status.

Angelica Faber, Security Architect, Microsoft

Simon Vernon, Certified Instructor, SANS Institute

12:45 PM

Break

1:00 PM

Building Security from the Ground up with Secure by Design
Discover the power of embracing security as a core business requirement with a Secure by Design mindset. Secure by Design means more than integrating security into your design and development processes from the start. It's a comprehensive approach that can help you balance agility and cost optimization with your security goals, and make it easier to maintain the security of your products and services over time. We'll guide you through key Secure by Design principles, and best practices for proactively incorporating security into your development lifecycle and workloads. You'll gain actionable insights into the mechanisms that can help you significantly reduce the impact of vulnerabilities with your target architecture, and how you can use cloud technology to achieve your objectives.

Paul Vixie, Ph.D, Deputy CISO, Vice President, and Distinguished Engineer, AWS

Eric Johnson, Senior Instructor, SANS Institute

1:45 PM

The Cloud Security Journey: Day One

It’s day one in a professional security practitioner’s position responsible for protecting their enterprise’s cloud infrastructure, and as always, figuring out where to start can be challenging. The cloud security journey begins with outlining the best practices and skill sets needed to build a well-architected cloud environment that enables effective identity and access management (IAM), data security and asset management, and ensures overall security compliance. The next step is establishing the detection and mitigation practices needed to ensure compliance, taking into account critical issues like the pros and cons of cloud detection services and the varying approaches to securing heterogeneous cloud services and applications. And this critical first day ends with an in-depth look at tools and methods for investigation and pursuit following a security event.

Shaun McCullough, SANS Certified Instructor

Ashish Rajan, Associate Instructor, SANS Institute,

Megan Roddie, Author, SANS Institute

2:20 PM

AI Security Challenges, Hype, and Opportunities

Nearly two decades ago, the public cloud introduced a powerful tool with countless opportunities and underestimated risks. Today, that tool is Generative AI. While AI enables organizations to solve new problems and reduce the resources necessary to do so, it also enables attackers to leverage new attack vectors. This is often because organizations do not understand the intricate details of how Generative AI works. At the same time, the security industry sees promise in AI improving their operations and tooling. However, while it is highly promising in many cases, it is useless or counterproductive in some others. Ahmed Abugharbia and Brandon Evans will discuss how customers have been using AI in insecure ways, both as regular users and application developers, how those issues are complicated when using the AI offerings from the Big 3 Cloud providers (AWS, Azure, GCP), and how AI can be used practically to improve security operations.

Brandon Evans, Certified Instructor, SANS Institute

Ahmed Abugharbia, Certified Instructor, SANS Institute

2:45 PM

Break

2:55 PM

Panel Discussion

Moderator:

Frank Kim, Event Chairperson, SANS Institute

Panelists:

Dr. Anton Chuvakin, Security Advisor at Office of the CISO, Google Cloud

Angelica Faber, Sr. Security Architect, Microsoft Azure Security

Paul Vixie, Ph.D, Deputy CISO, Vice President, and Distinguished Engineer, AWS

Shaun McCullough, Certified Instructor, SANS Institute

3:55 PM

Closing Remarks

Frank Kim, Event Chair, SANS Institute