Fall Cyber Solutions Fest 2025: Cloud Identity and Access Management Track

  • Wednesday, 05 Nov 2025 8:00AM EST (05 Nov 2025 13:00 UTC)
  • Speaker: Chris Edmundson

As organizations embrace cloud transformation, managing identity and access across multiple cloud platforms has become both a top security priority and a complex challenge. Cloud IAM visibility is crucial for understanding who has access to what resources—empowering teams to enforce least privilege and swiftly detect unauthorized permissions before they become risks.

 That’s where the Fall Cyber Fest Cloud Identity and Access Management (IAM) Track steps in. This focused track explores the ever-evolving world of Cloud IAM, diving into modern strategies, common missteps, and emerging tools designed to help organizations reclaim control over sprawling identities and creeping permissions.

 Attendees will gain a deep understanding of the challenges and nuances involved in managing access across AWS, Azure, GCP, and on-premise environments. We'll examine the pros and cons of federated versus consolidated identity models, the growing role of Cloud Infrastructure Entitlement Management (CIEM) tools, and how Policy-as-Code is redefining scalable identity governance.

 From automating IAM processes to countering identity-based threats through Identity Threat Detection and Response (ITDR), this track will also cover offensive techniques—highlighting how attackers exploit misconfigured policies and how defenders can respond.

 Whether you're looking to mature your cloud security program or gain tactical insights into the latest IAM solutions, this track is essential for anyone seeking to elevate their cloud defenses and harness the full potential of IAM in the modern cloud ecosystem.

 What steps should organizations take in 2025/2026 to proactively strengthen their Cloud IAM strategy, operationalize identity-focused threat intelligence, and bolster the governance of their cloud IAM capabilities?

 What to Expect:

  • Strategies for IAM across AWS, Azure, GCP, and on-premise environments – including federation, consolidation, and common pitfalls.
  • Exploring CIEM and emerging IAM tools – to identify and remediate excessively permissioned access and other IAM challenges.
  • Policy-as-Code in practice – using OPA, Rego, and Terraform to automate IAM and avoid identity drift.
  • Real world tales around IAM misconfigurations – exploits, high-profile failures, and lessons learned.
  • Identity-First Security and ITDR – the role of IAM in enabling Zero Trust and detecting identity-centric attacks.

Thank You To Our Sponsors!

Screenshot 2025-04-23 at 2.57.15 PM.png

Platinum Sponsors

logo_1000 (1).png

Gold Sponsors

Astrix_Logo-01.png

Silver Sponsors

New_Logo_Blue.png