Best Practices for Extending Identity & Access Management to the Cloud

Managing and securing user credentials was never easy, and now that they are scattered across cloud platforms, software-as-a-service tools, mobile devices, and on-premises systems, the task has become even more complex. With adversaries increasingly targeting their attention to credential theft, enterprise defenders need to know what accounts they have and where they are located. In this webinar, experts discuss the best practices for identity and access management in the cloud, and how to gain visibility into misconfigured or improperly secured cloud-based accounts.

On Demand
1h 00min

Attend this webinar and you'll:

  • Get tips and advice on methods to streamline identity and access management processes with your cloud service providers.
  • Be better able to discern where your organization's IAM vulnerabilities are -- and how to remedy them.
  • Get a clearer picture of how fraudsters find the cracks in the wall and exploit them.
  • Reduce and even eliminate the potential for credential theft and safeguard cloud assets.

Featured Speakers

  • Jason Clark
    Jason Clark
    Insider Threat Researcher

    Dr. Jason Clark is a subject matter expert in cyber security with nearly 20 years of real-world experience within the intelligence community, academia, and industry. He has extensive knowledge and experience on a variety of technology related topics. Currently, his main area of interest is researching and analyzing better methods to detect, deter, and mitigate insider threats. Dr. Clark holds a CISSP and is a member of IEEE and ACM. He has served on a number of program committees, delivered numerous virtual webinars, and has presented his published work at a variety of conferences around the world.

  • Joseph Carson
    Joseph Carson
    Chief Security Scientist & Advisory CISO

    Joseph Carson has more than 25 years' experience in enterprise security; He has authored Privileged Account Management for Dummies and Cybersecurity for Dummies, is a cyber security professional and an ethical hacker. Carson is a cyber security advisor to several governments as well as critical infrastructure, financial and transportation companies. Carson is a seasoned speaker and has presented at conferences globally.

  • Terry Sweeney
    Terry Sweeney
    Dark Reading

    Terry Sweeney is a Los Angeles-based writer and editor who's covered business technology for three decades. He's written about cyber security for more than 15 years and was one of the founding editors of Dark Reading. Sweeney has covered enterprise networking extensively, as well as its supporting technologies like storage, wireless, cloud-based apps and the emerging Internet of Things. He's been a contributing editor to The Washington Post, Crain’s New York Business, Red Herring, Information Week, Network World,, and Stadium Tech Report.

Sponsored By