Monitoring and Administrating Privileged Access in the Cloud

Learn how to request, fulfill, certify, and govern privileged assets in the cloud with Saviynt’s Cloud privileged access management (PAM) solution.

Topic
Industry
Partner
Use Case
Showing results: 1-12
Total results: 19
  • Default
Sorry, no videos match your criteria.
  • Session

    Security, Identity, and Compliance

    Best Practices for Privileged Access & Secrets Management in the Cloud (DEM04)

    In this session, you learn from real-world scenarios related to privileged access security in cloud environments. Experts from TOTVS and CyberArk provide insights from lessons learned while securing commercial SaaS applications, cloud infrastructure, and internal applications deployed in the cloud. Topics covered include privilege and cloud scenarios (e.g., human access models, support for automation, proactive controls, and programmatic deployment), as well as best practices and augmentation of existing security controls for privilege and secrets management on the AWS Cloud. We also cover limited use of root accounts, considerations for human administrator access in the cloud, and success with hybrid cloud environments.
    27:06
  • Session

    Security, Identity, and Compliance

    Making Application Threat Intelligence Practical (DEM06)

    The daily volume of cyberattacks that target applications and the frequency of associated breaches is overwhelming to even the most experienced security professionals. We cover important lessons learned from F5 Labs’ analysis of global attack data and breach root causes that are attributed to application threats. This helps you understand attackers’ top targets and motives and the changing application security landscape of systems used to launch application attacks. Addressing these threats requires practical controls that organizations can be successful with. We offer tips and tricks that you can work on immediately to address common application threats and appropriately prioritize your application security controls.
    24:12
  • Session

    Security, Identity, and Compliance

    Build Anywhere; Secure Everywhere (DEM01-R)

    Developers want to build quickly and deliver powerful application experiences to every user. In this session, we show how you can enable agile development while securing your entire application footprint. Akamai’s intelligent edge security solutions surround and extend your entire architecture for a single policy that’s adaptive, integrated, and consistently secure. Combine that with the power of AWS, and you have a total edge ecosystem that’s unparalleled in its ability to deliver and protect amazing experiences everywhere. Don’t just build—build better with Akamai.
    27:47
  • Session

    Security, Identity, and Compliance

    It’s in My Backlog: The Truth behind DevSecOps (FND217)

    The term DevSecOps has often been confused with securing DevOps, with security operations, or with using a secure development lifecycle in agile development. When you build security into DevOps and even into agile development, when do practices such as threat modeling, static application security testing, and dynamic application security testing occur? This session explains how sound architecture and implementation is key to providing DevSecOps capability with AWS. A core concept is that cybersecurity requirements are foundational and cannot be placed on a backlog indefinitely while development and operations are actively worked on.
    59:24
  • Session

    Security, Identity, and Compliance

    Build Security in CI/CD Pipelines for Effective Security Automation (SDD351-S)

    Realizing DevSecOps and effectively implementing security into CI/CD pipelines on AWS remains a challenging proposition for most organizations today. In this session, we share the essential principles of achieving security automation in your CI/CD pipelines and across the build, deploy, and run phases of your applications. Finally, we conclude with a demonstration of security automation across all three phases of your applications that are deployed on AWS infrastructure, showing you how to bring security automation to your organization.
    46:32
  • Session

    Security, Identity, and Compliance

    Integrating Network and API Security into Your Application Lifecycle (DEM07)

    In this session, we discuss the contention between traditional network security practices and the agile development processes typically associated with cloud computing. We also introduce new approaches used by Fortinet customers that help cloud teams and security teams share a common language and secure their business more effectively—without introducing additional friction and operational overhead.
    24:51
  • Session

    Security, Identity, and Compliance

    Monitoring and Administrating Privileged Access in the Cloud (DEM09)

    A key security consideration for the enterprise is monitoring and administrating privileged access for business-critical applications that are running on the AWS Cloud. Join Saviynt in this session and learn how to request, fulfill, certify, and govern privileged assets in the cloud with Saviynt’s Cloud privileged access management (PAM) solution. Saviynt covers best practices and the benefits of securing privileged access in the cloud, ranging from the AWS Management Console to elastic workloads. This session helps you understand why privileged access is a cornerstone of best practices and compliance for cloud security.
    24:34
  • Session

    Security, Identity, and Compliance

    How to Leverage Traffic Analysis to Navigate through Cloudy Skies (DEM03-R)

    How do you establish and maintain consistent security and governance across your dynamic AWS environments, with visibility and control of your security posture? Zohar Alon, Head of Cloud Product Line at Check Point and former CEO of Dome9, discusses security best practices as you scale across VPCs, accounts and regions. He covers considerations and recommendations for network, control plane and identities when building your cloud security strategy. Understand how security orchestration and active protection tools secure your cloud journey. Discover new ways to leverage traffic analysis for security intelligence, threat detection and auto-remediation.
    24:10
  • Session

    Containers

    Pragmatic Container Security (DEM11-R)

    Containers accelerate development and address the challenges of application packaging and delivery. Thanks to containers, teams can quickly and reliably deploy their applications. But solutions always come with a cost. Containers simplify the developer experience by pushing complexity down into the infrastructure. This shift requires a change in the security approach in order to preserve the advantages that containers bring. In this talk, we use practical examples to understand the security strategy using the AWS shared responsibility model, and we cover tactics that you need to continue accelerating development while meeting your container deployment security goals on AWS.
    25:25
  • Session

    Security, Identity, and Compliance

    Achieving Security Goals with AWS CloudHSM (SDD333)

    This talk compares AWS CloudHSM to other AWS cryptography services for common use cases. We dive deep on how to build scalable, reliable workloads with CloudHSM, and we cover configuration of the service for performance, error resilience, and cross-region redundancy.
    49:20
  • Session

    Security, Identity, and Compliance

    Harnessing Diversity to Solve a People Problem (FND312)

    Gender diversity is a challenge facing many organizations as they try to offer solutions that work for everyone. Women currently make up less than 24 percent of the Information Security workforce and less than 7 percent of CEOs in Fortune 500 companies. Decades of research prove that inclusive, diverse teams lead to more innovation, better solutions, and improved outcomes for organizations and customers. In this session, Jenny Brinkley (AWS), Teri Radichel (2nd Sight Lab), Patricia Smith (Cox Automotive), Fiona Williams (Deloitte), and Avni Rambhia (AWS) discuss how they’ve used diversity to produce superior outcomes and offer steps that you can take to replicate their successes.
    1:00:32
  • Session

    Security, Identity, and Compliance

    Driven by Security: MGM’s High-Velocity Cloud Transformation (SDD352-S)

    As a leader in its industry, MGM Resorts is transforming into a digital business with an aggressive strategy for cloud adoption. Join Dan Meacham, Legendary Entertainment VP Global Security and Corporate Operations and McAfee VP of cloud engineering Slawomir Ligier to hear how MGM’s approach to securing its AWS environment accelerated that transformation. Topics covered in this session include MGM’s primary focus areas for securing AWS environments, how McAfee helped accelerate this transformation, and the process of building a cloud security platform that extended from on premises to the cloud. We also discuss how to gain visibility into all workloads, lateral threat movements, and protection against advanced attacks, as well as how to create a successful DevOps workflow that integrates security.
    58:49
1 2