Skip to content
Try it Free Request Your Demo

    Uptycs Live: Monthly Webinar Series

    Explore emerging security and compliance challenges and how to address them faster with The Uptycs 30 mins or less!

    Uptycs Live - CDR Effective Permissions - Register Now

    Defending the Cloud Perimeter: Effective Access and Cloud Identities

    Live Date: Tuesday, September 27th 2022 | 10 AM PST / 1PM EST

    Cloud identities are persistently a first line of attack for threat actors, and effective access to cloud resources is the new age of the cloud security perimeter. Cloud identity related exploits are rising at massive scale, with attackers specifically targeting overly permissive identities as organizations lack the understanding of effective access for their roles and identities. 

    Join us this month to lock down the effective access to our cloud resources, break down cloud identities, and ultimately respond to these threats. Security teams need a true understanding of what their resources and identities (human and cloud) are permissioned with and Uptycs has developed tools to quickly and easily provide security teams with real-time effective access posture, and build on that foundation to reduce gaps across your cloud infrastructure.

    What you will learn:

    • Learn the different types of IAM policies and why each matters in your security posture.
    • Know what effective access is and understand the important complexities when locking down identities in cloud environments.
    • Build and automate an effective authorization layer at scale, for machine and human identities in the cloud.
    Watch Now

    Watch Past Sessions On-Demand

    ON-DEMAND WEBINAR Vulnerability Management w/ Uptycs Learn how Uptycs maps the identities of your cloud resources and arms security teams at the effective authorization layer. Watch Now
    On-Demand Webinar APT Threat Hunting & Toolkit Malware Analysis This webinar focuses on the toolkits, tactics, and techniques of Advanced Persistent Threats (APT) Groups. APT groups are well-resourced attackers that operate with sophisticated attack patterns and ... Watch Now
    On-Demand Webinar Thinking Strategically About CNAPP: A Platform Approach to Cloud-Security Watch this webinar to think strategically about how a strong platform approach to CNAPP security contrasts to a portfolio approach, and how platforms will best equip your organization to defend ... Watch Now
    On-Demand Webinar Lock Down Access to your Cloud Infrastructure In this webinar, we break down the real risks of cloud identity policy with Andre Rall, former Head of ATO, AWS Fraud Prevention (now Director of Cloud Security here at Uptycs) and Sudarsan Kannan, ... Watch Now
    On-Demand Webinar MITRE ATT&CK vs Ransomware Learn all about the latest round of MITRE ATT&CK® Evaluations Enterprise Round 4, focused on detecting Wizard Spider ransomware and Sandworm wiper malware attacks. In this session, we break down the ... Watch Now
    On-demand Webinar Container and Kubernetes Security Solutions In this demo, we break down securing your containers in the CI/CD pipeline in the Uptycs Platform. You'll learn how to best support and secure the DevOps cycle dynamic container-based workloads ... Watch Now
    On-Demand Webinar How eBPF changes the game for Linux security observability If you are curious about optimizing your Linux security observability, join us in this webinar as we break down everything you need to know about eBPF and showcase how Uptycs leverages eBPF to keep ... Watch Now
    On-demand Webinar Threat Detection and Malware Hunting with Uptycs In this demo, we will take you through the Uptycs detections process and highlight how these behavioral detections and threat intelligence matches help you to stay ahead of threat actors. Watch Now
    On-Demand Webinar Building Trust and Privacy with SOC 2 Compliance Join us in this demo as we demonstrate how Uptycs continuous compliance can bring stability and visibility to your SOC 2 compliance posture across endpoints and cloud workloads. Watch Now
    On-Demand Webinar Log4j Lessons Learned:What actually helped and how to improve cybersecurity readiness In the wake of the Log4J/Log4Shell vulnerability disclosure, we want to share lessons learned from our own internal remediation efforts here at Uptycs. Watch Now

    Our Customers

    See Uptycs in Action

    Schedule your demo of the Uptycs Cloud-Native Security Analytics Platform and see how Uptycs can help you protect and defend across modern attack surfaces.

    Schedule Your Demo