Detalles del evento
-
-
How AWS & Britive Eliminate End User Friction and Static Access Risk for Major Financial Institution
-
-
EN LÍNEA
Simon Panek | Solutions Architect, AWS, Shahzad Ali | Principal Solutions Architect, Britive
English
100: básico, 200: intermedio
-
-
As large enterprises, especially those in highly regulated industries like financial services, move more of their operations to the cloud, they face a growing challenge: how to give people and systems the access they need to move fast, without introducing long-term security risk.
Many organizations still rely on outdated methods like static credentials, legacy vaulting, and broad permissions, all of which are difficult to track, easy to misuse, and increasingly out of step with cloud scale. As AWS environments grow, so does the potential for access sprawl and operational risk.
In this session, AWS and Britive will walk through a real-world use case with a Fortune 500 global financial institution, showing how leading enterprises are extending AWS native access controls with Britive’s patented automation and real-time security policy engine to eliminate standing access and enable just-in-time, temporary permissions that disappear when no longer needed.
As large enterprises, especially those in highly regulated industries like financial services, move more of their operations to the cloud, they face a growing challenge: how to give people and systems the access they need to move fast, without introducing long-term security risk.
Many organizations still rely on outdated methods like static credentials, legacy vaulting, and broad permissions, all of which are difficult to track, easy to misuse, and increasingly out of step with cloud scale. As AWS environments grow, so does the potential for access sprawl and operational risk.
In this session, AWS and Britive will walk through a real-world use case with a Fortune 500 global financial institution, showing how leading enterprises are extending AWS native access controls with Britive’s patented automation and real-time security policy engine to eliminate standing access and enable just-in-time, temporary permissions that disappear when no longer needed.
You’ll learn how enterprise teams are:
Who should attend:
IAM leaders security architects, security engineers, DevSecOps teams, and platform engineering leaders looking to operationalize cloud AI securely.
Prerequisites:
Familiarity with cloud IAM concepts