Cloud Security Exchange 2024
Discover the best in cloud security alongside the world's biggest cloud leaders on August 27th at 11:00 AM ET (15:00 UTC) for our annual live-online SANS Cloud Security Exchange 2024!
Where else can you access top-tier expertise from industry giants like Amazon Web Services (AWS), Google Cloud, Microsoft Azure, and the SANS Institute, all on one virtual stage?
This event, completely free of charge, offers a rare chance to learn rom the best in the business. Don’t miss out! Register for FREE.
Why Attend?
- Exclusive Expert Sessions: Benefit from expert insights directly from our world-leading partners shaping the future of cloud security: Amazon, Google, and Microsoft.
- AI Integration: Discover how Artificial Intelligence is transforming cloud security.
- Global Networking Opportunities: Connect with peers and professionals from around the globe in a dynamic, virtual environment. Exchange ideas, discuss strategies, and build valuable relationships from the comfort of your home or office.
- Certification and Career Advancement: Boost your cloud knowledge and career with GIAC certifications, earn 5 CPE credits. Validate your expertise and commitment to excellence in cloud security.
Don’t miss this chance to learn from the best in the industry. Secure your spot and be part of this transformative experience!
Even if you can’t attend, register anyway for first access to free recordings, free presentations and a free SANS e-book co-authored with our partners at Amazon, Google and Microsoft.
Who's Speaking During This Event?
Event Agenda
Timeline | Session Description |
---|---|
11:00 AM | SANS Welcome & Opening CommentsFrank Kim, Event Chair, SANS Institute |
11:15 AM | Evolving Cloud Security with a Modern ApproachModernizing cloud security practices is a necessity and many organizations still struggle to implement effective cloud security measures, despite the availability of tried-and-true best practices. Discover ten key areas where organizations can focus their efforts to improve their cloud security posture (with an overview of the "new ways" in which cloud security best practices are evolving). It’s critical to adapt security strategies to the ever-changing landscape of cloud computing, and we fortunately have a good understanding of what this shift looks like today.Dr. Anton Chuvakin, Security Advisor at Office of the CISO, Google Cloud Brandon Evans, Certified Instructor, SANS |
12:00PM | Identity ModernizationThe imperative for Identity Modernization has never been more critical. As organizations navigate the evolving landscape of digital identity, the urgency to adapt has been significantly amplified by the recent advent of Generative AI technologies. This transformation journey is especially pivotal for enterprises looking to migrate applications from traditional Active Directory frameworks to more agile and secure platforms like Entra ID. These solutions not only modernize private app access through granular application segmentation but also enhance security postures by ensuring only the right individuals have access to the right resources under the right conditions. A clear path for organizations to achieve Identity Modernization emphasizes the integration of modernizing private app access with ZTNA, a pivotal step that redefines how access controls are managed and enforced, shifting away from the perimeter-based models to one that is dynamic and identity-aware. We will also discuss the benefits of expanding Conditional Access controls across a broader array of applications. This expansion is not just about enforcing policies; it's about creating a security model that adapts in real-time to changes in user roles, security incidents, location shifts, and device compliance status. Angelica Faber, Security Architect, Microsoft Simon Vernon, Certified Instructor, SANS Institute |
12:45 PM | Break |
1:00 PM | Building Security from the Ground up with Secure by DesignDiscover the power of embracing security as a core business requirement with a Secure by Design mindset. Secure by Design means more than integrating security into your design and development processes from the start. It's a comprehensive approach that can help you balance agility and cost optimization with your security goals, and make it easier to maintain the security of your products and services over time. We'll guide you through key Secure by Design principles, and best practices for proactively incorporating security into your development lifecycle and workloads. You'll gain actionable insights into the mechanisms that can help you significantly reduce the impact of vulnerabilities with your target architecture, and how you can use cloud technology to achieve your objectives.Paul Vixie, Ph.D, Deputy CISO, Vice President, and Distinguished Engineer, AWS Eric Johnson, Senior Instructor, SANS Institute |
1:45 PM | The Cloud Security Journey: Day OneIt’s day one in a professional security practitioner’s position responsible for protecting their enterprise’s cloud infrastructure, and as always, figuring out where to start can be challenging. The cloud security journey begins with outlining the best practices and skill sets needed to build a well-architected cloud environment that enables effective identity and access management (IAM), data security and asset management, and ensures overall security compliance. The next step is establishing the detection and mitigation practices needed to ensure compliance, taking into account critical issues like the pros and cons of cloud detection services and the varying approaches to securing heterogeneous cloud services and applications. And this critical first day ends with an in-depth look at tools and methods for investigation and pursuit following a security event. Ashish Rajan, Associate Instructor, SANS Institute, Megan Roddie, Author, SANS Institute |
2:20 PM | AI Security Challenges, Hype, and OpportunitiesNearly two decades ago, the public cloud introduced a powerful tool with countless opportunities and underestimated risks. Today, that tool is Generative AI. While AI enables organizations to solve new problems and reduce the resources necessary to do so, it also enables attackers to leverage new attack vectors. This is often because organizations do not understand the intricate details of how Generative AI works. At the same time, the security industry sees promise in AI improving their operations and tooling. However, while it is highly promising in many cases, it is useless or counterproductive in some others. Ahmed Abugharbia and Brandon Evans will discuss how customers have been using AI in insecure ways, both as regular users and application developers, how those issues are complicated when using the AI offerings from the Big 3 Cloud providers (AWS, Azure, GCP), and how AI can be used practically to improve security operations.Brandon Evans, Certified Instructor, SANS Institute Ahmed Abugharbia, Certified Instructor, SANS Institute |
2:45 PM | Break |
2:55 PM | Panel DiscussionModerator: Frank Kim, Event Chairperson, SANS Institute Panelists: Dr. Anton Chuvakin, Security Advisor at Office of the CISO, Google Cloud Angelica Faber, Sr. Security Architect, Microsoft Azure Security Paul Vixie, Ph.D, Deputy CISO, Vice President, and Distinguished Engineer, AWS Shaun McCullough, Certified Instructor, SANS Institute |
3:55 PM | Closing RemarksFrank Kim, Event Chair, SANS Institute |