Cloud Security Test Drive: A Hands-On Experience
Date and time
Location
Regus - Massachusetts, Boston - Beacon Hill, 100 Cambridge Street
100 Cambridge Street
#14th Floor
Boston, MA 02108
Description
With the advent of Digital Transformation, businesses and customers are realizing never before seen advancements in experience and satisfaction. However, with cloud being the epicenter of Digital Transformation, you need heightened security and barriers to keep all parties safe from nefarious entities trying to exploit modern applications. Simply put, Cloud Security is essential for ongoing survival and success.
Therefore, moving to the cloud will inevitably present a multitude of information security gaps. And, because traditional security systems are not designed for the unique challenges of the cloud, you need to ask yourself:
- What are the cloud apps that my employees are using
- How many cloud apps are my employees using?
- Where is my data going?
- Is my organization compliant to regulatory mandates?
- How do I protect my cloud assets with strong authentication?
- How do I provision entitlements from my primary source of truth, such as an Active Directory, out to the cloud?
- How do I provide easy access to cloud applications for users who are entitled to use them?
During this hands-on Bootcamp event, Cedrus, Netskope, and Okta will provide attendees with workstations and access to test environments so they can actually configure and experience common use cases, such as securing access control and data protection for O365 and AWS.
Agenda
- Cloud Native Identity Management - How does Okta take traditional Identity and Access Management to the next level with a cloud focus.
- How does Okta provide provisioning, single sign-on and multi-factor authentication for your sanctioned cloud applications?
- CASB Overview– What does Netskope CASB do and why do you need it? Why is CASB different from traditional security technologies? How does it fit into your overall cloud security strategy?
- Discovery– What cloud applications are in use and who is using them?
- Policy for Managed and Unmanaged Devices– Which BYOD policies need to be in place?
- IaaS (AWS) Integration– How can I secure EC2 instances that my organization is unaware of? Which employees have the right privileges to create EC2 instances? Are my instances misconfigured?
- Office 365 Integration– provide step-up authentication for unmanaged device access to corporate data
- Collaboration Tool Integration (Slack will be used as an example)– Visibility into what data is being sent within slack and use policies to protect from misuse.
Breakfast & Lunch will be provided!