The Realities of Cloud Security
Session
Wednesday, December 04, 2024 15:30—16:30
Location: Sirius
Log in to download presentations
Wednesday, December 04, 2024 15:30—16:30
Location: Sirius
Watch the video
Modern business architectures require more flexible approaches to meet expectation of good security and great user experience
In today's dynamic business environment, using external identities has become essential due to partnerships, mergers, acquisitions and the increasing use of social logins. This presentation will explore the need for and implementation of Single Sign-On (SSO) for end users through identity federation.
Key topics include the concept of bearer tokens for client and user authentication, a comprehensive overview of the architecture showing where identities are consumed, and the token exchange protocol that can be used to improve security. We will also discuss identity enforcement through preemptive identity verification at gateways and the integration of Web Application Firewall (WAF) and API gateway capabilities to support Zero Trust principles.
The session will conclude with a discussion of the proposed setup's benefits for application integration and identity information propagation. Attendees will better understand how to effectively manage identities and ensure secure, seamless access across disparate systems.
Watch the video
Rapidly evolving AI technologies allow hackers to craft sophisticated social engineering attacks with little effort and therefore, at scale, leaving human employees highly vulnerable. How can companies protect their employees and ultimately themselves from this increasing cyber risk? This session aims to showcase a practical, more holistic awareness approach and discusses new requirements for next-gen awareness solutions.
Watch the video
Cloud security remains a critical concern as organizations increasingly migrate to cloud environments. This panel will focus on the realities of cloud security, sharing experiences from cloud implementations and discussing the strategies used to secure these environments. Experts will address common challenges and offer best practices for maintaining security in the cloud. Attendees will learn how to navigate the complexities of cloud security and ensure their cloud-based assets are protected.