Latest Talk
Mastering Cloud Security Policies: Four Best Practices for Hybrid Environments
Hybrid cloud environments offer flexibility and scalability, but managing security policies across diverse infrastructures and teams is a growing challenge.
Join us for an engaging webinar, Mastering Cloud Security Policies: Four Best Practices for Hybrid Environments, where we’ll explore how organizations can …
Upcoming talks
Unlocking Application-Centric Security in the Cloud
Securing applications in today's dynamic cloud environments demands a new approach. This webinar explores the critical shift towards application-centric
security, moving beyond traditional network-centric models to address the unique challenges of cloud-native architectures. We'll delve into how a deep
understanding of application behavior and dependencies is essential for robust security posture. Attendees will learn how to leverage threat intelligence an…
Behind the Scenes: OWASP Top 10 NHI Risks
Join us for a behind-the-scenes journey into how industry experts curated the definitive guide to the most critical risks in NHI Security: the OWASP Top 10 NHI
Security Risks. In this talk, we'll break down the methodology behind the rankings—explaining why specific risks were chosen and how they map to
challenges engineers face in real-world production environments. We’ll also spotlight the growing role of AI agents—often hailed as the workforce of the fut…
How To Effectively Manage and Automate the Evolving Landscape of Patch Management
In today’s digitally interconnected world, patch management is no longer a routine IT task—it’s a critical business imperative. The complexity of modern IT
environments, including hybrid clouds, diverse operating systems, and a multitude of third-party apps, has made patch management increasingly
challenging. In this webinar, Automox and GigaOM will share insights from the “GigaOM Radar Report for Patch Management v3.0” and discuss how organiz…
How to Succeed at Agentic AI with Trusted & Resilient Data
Join Eoghan Casey and Mark Wigham from Salesforce for an in-depth webinar on maintaining trusted and resilient data to deploy AI at scale. We will explore
the essential steps to ensure that AI Agents have access to the data they need, don’t have access to data they shouldn’t, and perform optimally. Key topics
include: • Trusted Agentic AI: Understand how to implement robust data security measures to control and track what data Agents access, create, and modif…
On-demand talks
Mastering Cloud Security Policies: Four Best Practices for Hybrid Environments
Hybrid cloud environments offer flexibility and scalability, but managing security policies across diverse infrastructures and teams is a growing challenge.
Join us for an engaging webinar, Mastering Cloud Security Policies: Four Best Practices for Hybrid Environments, where we’ll explore how organizations can
achieve unified security policy management, improve operational efficiency, and maintain compliance across hybrid and multi-cloud environments. Our fe…
Data Security Strategies for a Gen AI World
Generative AI is here to stay, and it’s transforming the way we use and protect data. But as AI adoption skyrockets, organizations are asking: How do we
balance innovation with security? This can be a tough question for many organizations to answer, but it all comes down to one thing – embracing a
data-centric approach. In this webinar, we’ll cover: • Risk and challenges that come with deploying advanced AI systems • How to better understand the A…
Heads in the Cloud, Feet on the Ground: A No-Nonsense Discussion on Cloud Data Protection
Join us for an unfiltered conversation on cloud data protection with Corey Quinn, the “Chief Cloud Economist” at The Duckbill Group and a well-known AWS
commentator. In this candid discussion, Corey will provide clear and insightful perspectives on the important aspects of securing your data in the cloud.
Whether you are new to the cloud or an experienced practitioner, this webinar is designed to help you navigate the complexities of cloud security and stren…
Kubernetes: Development Challenges and Security Considerations in a Cloud-Native World
Kubernetes has revolutionized how we build, deploy, and manage applications, but it also introduces new complexities. This webinar explores Kubernetes not
only from a security perspective but from the lens of developers. We’ll dive into the challenges posed by containerized environments, from managing
dependencies to securing CI/CD pipelines. Additionally, we’ll discuss how Kubernetes operates as a cloud in itself and how deploying and scaling it in public c…
How an Industrial Company Optimized NHIs in their Azure Environment
In this session, we’ll delve into how an industrial company tackled the challenge of securing non-human identities (NHIs) in their Azure environment. As the
organization transitioned to cloud-first operations, it quickly faced the complexity of managing a growing number of NHIs. From APIs to service accounts and
automated systems, these NHIs were critical to the company's operations, but their proliferation led to serious security and compliance risks. Using advanc…
Securing Embedded AI: Accelerate SaaS AI Copilot Adoption Safely
AI Copilots such as M365 Copilot bring transformative potential, empowering your company employees to access and analyze vast amounts of enterprise
data within SaaS applications. While this significantly boosts employee productivity, it introduces new data security and governance risks. In the rush to adopt
Copilot adoption, many organizations have overlooked essential data controls, leading to unintended exposure of sensitive information. Employees may unk…
Logging and Monitoring
In this presentation we focus on the Logging and Monitoring domain, which includes thirteen control specifications that help both Cloud Service Providers
(CSPs) and Cloud Service Customers (CSCs) collect, store, analyze, and report on activities and events in their cloud environments. These controls are
essential for detecting and responding to security incidents, addressing operational issues, identifying system anomalies, complying with regulatory require…
Service Accounts vs. Managed Identities: Real Exploits & Best Practices
Service accounts are everywhere, but their overprivileged, multi-use, and often unmanaged nature makes them a security liability. Managed identities (and
other “passwordless” NHIs) are considered a safer alternative, yet they come with their own set of vulnerabilities attackers can exploit. Join this 30-minute
webinar to learn from NHI security researchers: • The types and common pitfalls of service accounts. • How to convert service accounts into managed iden…