This webinar is offered free of charge through collaboration between SANS and its sponsor(s). If you prefer not to share your registration details with sponsor(s), a recorded webinar will be available approximately 30 days after its initial release through the SANS archive. To access the recording, you will need to create a SANS account, but your information will not be shared with the sponsor(s).
Full Agenda (MT)
Timeline (MT) | Session Details |
---|---|
10:00am - 10:10am | Event Kickoff & Introduction AJ Yawn, Event Chairperson & SANS Associate Instructor |
10:10am - 10:45am | Securing Data in the Age of AI Data remains one of the most frequent targets for cyber attacks and one of the hardest assets to protect. As organizations grapple with growing data volumes, increased regulation, and the shift towards AI, the challenge of understanding sensitive data, access permissions, and exposure points becomes increasingly complex. In this 30-minute session, tailored for security professionals, we will delve into three critical areas to enhance your organization's data security posture in the age of AI: - The security and compliance risks that stem from unprotected data and AI infrastructure in the cloud - How agentless tools allow you to see a full picture of data risk in your environment within 24 hours, without impacting other business operations - Monitoring data and responding to incidents in near-real time Benny Rofman, Senior Product Manager at Palo Alto Networks |
10:45am - 11:20am | Defeating Cloud Zombies: Identifying and Eliminating Hidden Threats Join this session to uncover the hidden dangers of zombie identities—dormant users or roles that persist in your cloud environment, posing significant security risks. We will begin by reviewing proprietary data on the prevalence of these threats in today's cloud environments. From there, we'll explore effective strategies for identifying and managing these vulnerabilities, including practical steps to quarantine and neutralize unused identities. You'll leave equipped with techniques to find these cloud zombies and actionable steps to improve your cloud identity posture. Jeff Moncrief, Field CTO at Sonrai Security |
11:20am - 11:55am | Cloud Security Without Identity Isn't Cloud Security At All Exploited identities are the cause of many data breaches in the public cloud. Whether your organization is migrating workloads to the cloud or cloud-native from the start, managing identities and entitlements is key to the security posture of your cloud infrastructure. The dynamic nature of development and operations in the cloud leads to inadequate management of human and non-human identities and access privileges to applications and data. These privileges give security professionals a previously unimaginable level of control, creating a perfect risk storm for sensitive data. We invite you to join this session and learn to secure cloud identities, remove excessive entitlements and permissions that humans and machines have to critical cloud resources and sensitive data, enforce just-in-time access for employees, and advance your zero trust initiatives with least-privilege access. Nagraj Seshardi, VP Marketing at Tenable Cloud Security |
11:55am - 12:10pm | Event Recap & Closing Remarks AJ Yawn, Event Chairperson & SANS Associate Instructor |