As we have seen from the recent Capital One data breach and other cloud security incidents, getting cloud access security right 100% of the time is not a simple task. However, the models available for cloud access security can also make certain authentication and authorization tasks much easier and more secure. In this webcast, we will discuss some of the perils associated with configuring your cloud access security incorrectly and also some of the perks of understanding and leveraging cloud identity and access management models and services.