Everyone knows Least Privilege is the Cloud IAM gold standard; so why are so many struggling to achieve this state successfully? Well, building individual policies for thousands of human and machine identities and controlling access to all 42,000 possible permissions is cumbersome, endless, and can feel impossible. Current processes ask a lot of your team and are simply too slow.

So what can you do about it? Join this session to learn a new strategy for executing least privilege at scale—one that reduces attack surface, is operationally efficient, and does not disrupt your developers.

You can expect actionable tips to:

•  Restrict excessive permissions from human and machine identities
•  Restrict specific regions and unused services
•  Quarantine unused identities

Attendees are eligible for 1 CPE credit.

Generously supported by:

supported by logo
Speakers
speaker photo
Jeff Moncrief
Field CTO & VP of Sales Engineering, Sonrai Security

A security veteran for over 20 years, Jeff Moncrief helps enterprises protect data on the Internet and in public cloud. His specializations include compliance, IaaS/Paas, Kubernetes, network traffic analytics, incident response, and security architecture. Most recently, He’s been leading teams at cloud security companies (Tripwire) and Fortune 100 firms (Cisco). Today, Jeff leads Sonrai Security’s solutions team, as Field CTO, helping enterprises secure their cloud with identity & data governance.

Moderator
speaker photo
Tom Bechtold
Digital Events Director, SecureWorld
Tom has been part of the SecureWorld team for over 14 years. He has launched several of the regional conferences we hold today. Tom is currently responsible for SecureWorld Digital, which provides educational content to the SecureWorld audience. He produces, executes, and moderates the majority of the Remote Sessions webcasts while also working closely with the SecureWorld event directors to build relevant agendas at the regional conferences.