Agenda | April 18, 2024 | 10:00AM-1:45 PM EDT
Timeline | Session Description |
---|---|
10:00 AM | Kickoff & WelcomeChris Dale, Event Chair, SANS Instructor |
10:20 AM | Session One | The (IAM) Call is Coming From Inside the HouseMost have a dark and malicious image in their head when they hear ‘insider threat’, but there can easily be a different kind of insider threat in your cloud. Some cloud permissions are more sensitive by nature than others. They can create opportunities for access into your environment, gaining credentials, evading detection, or impacting your data. What happens when you lose control over who has these sensitive permissions? Join us as we walk through several accidental or mistaken insider threat scenarios that may not seem dangerous, but could be. We’ll end with guidance on what you can do to better control access and cloud permissions. Example powerful permissions: - Microsoft.Automanage/configurationProfileAssignments/Delete - Securitycenter.muteconfigs.create - CreateFunctionUrlConfig + UpdateFunctionUrlConfig - CreatePresignedNotebookUrl Jeff Moncrief, Field CTO & VP of Sales Engineering, Sonrai Security |
10:50 AM | Session Two | Innovate or Integrate: The IGA DilemmaIn this course "Innovate or Integrate: The IGA Dilemma," we delve into the common predicament faced by organizations when deciding between building internal identity governance processes or seeking external assistance to manage their identity landscape. Through insightful discussions and practical examples, we explore the key aspects of establishing a successful identity governance program, factors such as organizational size, and specific considerations that arise during the decision-making process. Whether you're new to IGA, seasoned pro, or CISO, this course equips you with the knowledge and insights necessary to navigate the complexities of the IGA dilemma and make informed choices for your organization's identity management strategy Alexis Moyse, Co-founder and CEO, Clarity Security |
11:20 AM | Session Three | Elevate your security with a unified approach to Identity and Privileged AccessTraditionally, organizations have maintained least privilege by using Identity Governance and Access (IGA) and PAM solutions separately to complement their Identity solution. However, this fragmented approach using siloed tools has struggled to keep pace with the scale of the cloud, often requires custom integrations, and results in a poor user experience. This session will dive into why more and more organizations are intent on choosing a unified identity solution, where all users can get access to all applications, resources, and infrastructure in one place, with the controls necessary for admins to maintain least privilege. Come learn why Okta Privileged Access is unlike traditional PAM solutions and can help you achieve better visibility, compliance, and security. Elizabeth Baier, Sr Product Marketing Manager, Okta |
11:50 AM | Break |
12:00 PM | Keynote Session | Navigating Your Cybersecurity Career PanelAs the digital landscape evolves at an unprecedented pace, challenges and opportunities lie ahead for cybersecurity professionals. How will emerging technologies and artificial intelligence shape our industry? Will Artificial Intelligence take over cybersecurity jobs in the future? Join us for an engaging keynote panel featuring distinguished guests Candace Williams and Marie Galloway, as we navigate through the dynamic landscape of cybersecurity careers in the age of innovation. Gain valuable insight and advice on navigating your cybersecurity career as we delve into these compelling questions and more, offering a roadmap for success in this ever-evolving field. Naomi Buckwalter, Executive Director, Cybersecurity Gatebreakers Foundation Candace Williams, Founder, Cyb(her) Ally Mari Galloway, CEO, Cyberjutsu |
1:00 PM | Session Four | Why It's Easy Being a Hacker: Tales From Chris DaleChris Dale, Event Chair, SANS Instructor |
1:30 PM | Closing RemarksChris Dale, Event Chair, SANS Instructor |