SANS CloudSecNext Summit Solutions Track 2024: Charting the Course: Navigating the Evolving Landscape of Cloud Security

  • Tuesday, 01 Oct 2024 12:00PM EDT (01 Oct 2024 16:00 UTC)
  • Speaker: AJ Yawn

In the dynamic realm of cloud security, organizations are in constant pursuit of innovative solutions to shield their cloud environments from the ever-growing array of threats. The SANS CloudSecNext Solutions Summit stands as a pivotal platform that brings to the forefront the latest trends, challenges, and solutions pivotal to cloud security.

This solutions track is meticulously curated to provide a rich tapestry of insights, case studies, and thought leadership from seasoned experts in the field. These speakers will delve into the intricacies of cloud infrastructure, shedding light on effective security measures and tools that are instrumental in fortifying cloud environments. The presentations will be solution-focused, providing actionable strategies and practical advice that can be seamlessly integrated into existing cybersecurity frameworks.

Join us as we explore innovative solutions, gain insights from industry leaders, and chart a course towards a more secure digital future.

-> To view the full agenda for this event, please scroll down.
-> Join our dedicated Summit Slack workspace to connect with fellow attendees, SANS Instructors, and our invited speakers.

470x382_SolutionsTrack_CloudSecNext-2024.jpg

Thank You to Our Sponsors

Palo_Alto_Networks.pngSonrai logo_stacked_black.pngTenable_Logo_fullcolor_750x486.png

This webinar is offered free of charge through collaboration between SANS and its sponsor(s). If you prefer not to share your registration details with sponsor(s), a recorded webinar will be available approximately 30 days after its initial release through the SANS archive. To access the recording, you will need to create a SANS account, but your information will not be shared with the sponsor(s).

Full Agenda (MT)

Timeline (MT)Session Details
10:00am - 10:10amEvent Kickoff & Introduction

AJ Yawn, Event Chairperson & SANS Associate Instructor
10:10am - 10:45amSecuring Data in the Age of AI
Data remains one of the most frequent targets for cyber attacks and one of the hardest assets to protect. As organizations grapple with growing data volumes, increased regulation, and the shift towards AI, the challenge of understanding sensitive data, access permissions, and exposure points becomes increasingly complex.

In this 30-minute session, tailored for security professionals, we will delve into three critical areas to enhance your organization's data security posture in the age of AI:
- The security and compliance risks that stem from unprotected data and AI infrastructure in the cloud
- How agentless tools allow you to see a full picture of data risk in your environment within 24 hours, without impacting other business operations
- Monitoring data and responding to incidents in near-real time

Benny Rofman, Senior Product Manager at Palo Alto Networks
10:45am - 11:20amDefeating Cloud Zombies: Identifying and Eliminating Hidden Threats
Join this session to uncover the hidden dangers of zombie identities—dormant users or roles that persist in your cloud environment, posing significant security risks. We will begin by reviewing proprietary data on the prevalence of these threats in today's cloud environments. From there, we'll explore effective strategies for identifying and managing these vulnerabilities, including practical steps to quarantine and neutralize unused identities. You'll leave equipped with techniques to find these cloud zombies and actionable steps to improve your cloud identity posture.


Jeff Moncrief, Field CTO at Sonrai Security
11:20am - 11:55amCloud Security Without Identity Isn't Cloud Security At All
Exploited identities are the cause of many data breaches in the public cloud. Whether your organization is migrating workloads to the cloud or cloud-native from the start, managing identities and entitlements is key to the security posture of your cloud infrastructure. The dynamic nature of development and operations in the cloud leads to inadequate management of human and non-human identities and access privileges to applications and data. These privileges give security professionals a previously unimaginable level of control, creating a perfect risk storm for sensitive data.

We invite you to join this session and learn to secure cloud identities, remove excessive entitlements and permissions that humans and machines have to critical cloud resources and sensitive data, enforce just-in-time access for employees, and advance your zero trust initiatives with least-privilege access.


Nagraj Seshardi, VP Marketing at Tenable Cloud Security
11:55am - 12:10pmEvent Recap & Closing Remarks

AJ Yawn, Event Chairperson & SANS Associate Instructor