What’s Identity Governance Got to Do with It?
Forrester Principal Analyst, Andras Cser explains how to find out why cloud entitlements are the linchpin to reducing your cloud’s attack surface.
In the effort to keep your cloud secure, are you looking at all your cloud identities -- human and non-human -- and their entitlements? Likely not, as cloud visibility is notoriously poor. And yet, that lack of visibility and control over access and entitlements to your compute, storage and network assets is almost surely jeopardizing your sensitive resources and security posture.
Forrester Research sees the ability to govern identities and mitigate access risk as essential for any organization whose cloud infrastructure footprint is large enough to secure.
In this on-demand webinar, cloud security expert Andras Cser, vice president and principal analyst serving security & risk professionals at Forrester explains what a cloud identity governance solution requires to be effective, and why. The session will cover:
- Mapping and analyzing identity access in context as a strategy for reducing your cloud attack surface and protecting against insider threats
- Automating your cloud through automatic access policy reviews and recertification, and IAM permissions reduction, reducing the need for manual attestation
- Cloud identity governance as a pathway for addressing privacy requirements
Check out this on-demand webinar to find out how governing cloud identities can help you reduce cloud security threats while improving administrative efficiencies and addressing compliance needs.
Andras Cser, Vice President, Principal Analyst Serving Security & Risk Professionals, Forrester Research
Andras serves Security & Risk Professionals. He is a leading expert on identity management, access management, user account provisioning, entitlement management, federation, privileged identity management, and role design and management. Andras covers cloud security and enterprise fraud management, which have many synergies with identity and access management when an organization needs to protect against risk and wants to manage fraud appropriately. He helps clients develop enterprise strategies for creating business value through identity management, cloud security, and fraud management.
His research focuses on strategy, cost-benefit analysis, architecture, performance and scalability of identity and access management and provisioning solutions, enterprise fraud management solutions, and role-based access control (RBAC), as well as maintenance and distributed intranet and Internet identity systems. He maintains an interest in evaluating the skill sets and core competencies of professional service providers in these spaces.