This webinar is offered free of charge through collaboration between SANS and its sponsor(s). If you prefer not to share your registration details with sponsor(s), a recorded webinar will be available approximately 30 days after its initial release through the SANS archive. To access the recording, you will need to create a SANS account, but your information will not be shared with the sponsor(s).
Cloud Security Exchange 2025 – Agenda Highlights
Timeline (EDT) | Session Description |
---|---|
10:30AM | Welcome Remarks Speaker: Kick off the day with a high-level overview of today’s cloud security landscape and what’s at stake for defenders. |
10:45AM | AWS Keynote Speaker: Title: Securing Cloud at Scale: DNS, Identity, and Resilience Hear from one of the internet’s foundational architects as he explores the modern role of DNS and identity in defending enterprise cloud environments. |
11:30AM | Microsoft Keynote Speakers: Title: Defending Against Modern Threats: Applying Zero Trust in Real Enterprise Environments Discover how Zero Trust has evolved from theory to enterprise-critical strategy. Learn how Microsoft is helping organizations build dynamic, real-world Zero Trust frameworks that counter modern attacker tactics. This session will: • Establish a foundational understanding of the Zero Trust security model and its core principles; • Explore how emerging technologies impact an organization’s ability to adopt, implement, and maintain a Zero Trust posture; and • Analyze current attacker tactics, techniques, and procedures (TTPs), along with the corresponding defensive capabilities enabled by Zero Trust architectures. To bring these concepts to life, the chapter integrates real-world scenarios that demonstrate how modern Zero Trust strategies are being applied across enterprise environments to enhance security, reduce risk, and support digital transformation. |
12:35PM | Google Cloud Keynote Speakers: Title: Cloud Security Groundhog Day: Avoiding Recurring Mistakes in a Dynamic Landscape Why do so many teams repeat the same cloud security mistakes? This session dissects persistent pitfalls—from clinging to outdated IAM models to neglecting cloud-native tooling—and offers practical steps to break the cycle. You’ll walk away with: • Insight into the most common recurring mistakes in cloud security • A framework for reviewing and evolving outdated practices • Actionable guidance to build a more future-proof cloud security strategy |
1:20PM | Expert Panel Discussion Moderator: Panelists: Join our headline speakers for an in-depth conversation on cloud security trends, lessons learned, and what’s coming next in detection, resilience, and architecture strategy |
2:20PM | Closing Remarks Final thoughts and key takeaways from the day. Bonus: All registrants receive access to the session recordings + the 2025 Cloud Security Insights eBook, featuring insights and guidance from AWS, Google Cloud, Microsoft, and SANS. |