Exploring Cloud Identities, API’s and Automation
Event submitted on Monday, March 1st 2021, approved by Charles Villanueva ✓
This event has been tagged as follows:
[edit this info]
This is an online webinar planned for March 19th. Israeli tech continues to grow and ever-expanding rates. If you work with any aspect of the cloud and are based in Israel then you will likely find this event to be first-class. It seems that one of their sponsors is the Cloud Security Association, an organization that we’ve attributed dozens of events to.
Conference Event Summary
The following description was either submitted by the Conference Organizer on Monday, March 1st 2021, or created by us.
*The event will be in English at CET Time
17:00 – 17:30 Identities and entitlement in a multi-cloud environment – coping with a top attack vector
Abstract: Managing entitlements in a multi-cloud domain is extremely challenging – it is a common attack vector. In this session, Daniel and Yonatan present survey results of what cloud security architects think of recent trends. We will discuss the cloud IAM framework, and review potential breach examples and how they could be avoided with a secure process for managing your cloud entitlements. Real-life examples of a good policy vs. a poor one and best practices to manage permissions through continuous improvement cycle.
Speakers: Daniel Schwartzer, R&D CTO and Yonatan Klein, Director product for cloud security
17:30 – 17:45 A look at Cloud Adoption in Turkey – 2020
Abstract: Detailed analysis of the CSA Cloud Adoption survey that had great participation in Turkey from Enterprises, SMBs and startups. Results will show the current cloud adoption trends in Turkey while looking into adoption in different industries, usage of different technologies as well as challenges that companies face. On top of that, there will be a comparison of cloud usage in Europe Union vs. Turkey.
Speaker: Mehmet Uner, Services Solutions Strategy Manager – MEA Consulting Services
17:45 – 18:05 – Simplify cloud compliance with automation but without writing a single line of code
Compliance rules change fast and keeping up with cloud regulations and guidelines are grinding.
In our session, we’ll talk about
1) How to easily scan your cloud for vulnerabilities.
2) Simple way to be compliant with automatic rules, continuously running and updated but without having to write a single line of code.
Speaker: Chen Goldberg, CTO & Co-Founder at CloudWize.IO
18:-05 – 18:30 Securely connecting 3rd parties to internal applications
Abstract: Connecting a 3rd party provider to services and applications became a very common practice with modern workloads. In this session, Oz Avenstein will provide first time review of the latest research coming from CSA’s Israel regarding how to securely connect 3rd parties using best practices from the security architecture world. The talk will describe risk management process and the security architecture approach of connecting external entities and the security controls checklist that should be followed.
Speaker: Oz Avenstein, Freelance consultant in the field of Application & Cloud Security.