On-Demand Webinar / Cloud

Cómo proteger las identidades a lo largo de su superficie de ataque

Bajo demanda

Real-world identity insights for security, cloud, and identity and access management (IAM) practitioners.

Your organization’s identity and access management efforts have far-reaching implications on overall security posture.

Understanding the similarities and differences between identities and entitlements across your cloud and on-prem attack surface is central to a preventive security program.

In this session, Tenable experts discuss the nuances of identity risk management across multi-cloud and on-prem environments. By watching you will gain insights into practices DevOps, IAM, and security teams can use to protect your environment and block bad actors from lateral movement.

Webinar highlights

  • Key considerations for assessing IAM-related risks across on-prem and cloud environments
  • How traditional Active Directory deployments contribute to overall risk and compliance in the cloud
  • Lessons from real-world attacks and prevention strategies

¿Quién debería verlos?
Security professionals responsible for administering and protecting identities and entitlements in the cloud and on-prem.


Oradores

Alvin Yeo
Alvin Yeo

CISSP & CCSP, Cloud Specialist, APJ

Wing Churn Leong
Wing Churn Leong

Senior Cloud Security Engineer, APJ, Tenable

Kendal Cole
Kendal Cole

Territory Manager, Cloud Security, Tenable

Nick Bourke
Nick Bourke

Senior Cloud Security Engineer, Tenable

Recursos

Analyst Research
可視化× 自動化×統合化によるクラウドセキュリティのアプローチ
Hoja de datos
Tenable Hexa AI: el motor agéntico de la plataforma de gestión de exposición Tenable One
Solución
Obtenga seguridad integral de aceleración de la detección (shift-left) con Tenable One Cloud Exposure