5 Recommendations to Secure Identities in the Cloud
In this session, Dwayne will discuss five recommendations that can be used to provide secure and protected identities when moving to cloud technologies. As companies move to the cloud, identity becomes the primary perimeter where attackers can exploit vulnerabilities. These recommendations can provide a foundation for securing the cloud and avoiding identities from being compromised.
Global Principal Cloud Security Lead for Eviden | MVP - Security | (ISC)2 CCSP, CISSP, CGRC, CC | MCT Regional Lead | AWS Security & Identity Community Builder | Cloud Training Architect for Opsgility
Detroit, Michigan, United States