Training
Get a free hour of SANS training

Experience SANS training through course previews.

Learn More
Learning Paths
Can't find what you are looking for?

Let us help.

Contact us
Resources
Join the SANS Community

Become a member for instant access to our free resources.

Sign Up
For Organizations
Interested in developing a training plan to fit your organization’s needs?

We're here to help.

Contact Us
Talk with an expert

Fall Cyber Solutions Fest 2025: Cloud Identity and Access Management Track

  • Wed, Nov 5, 2025
  • 8:00AM - 3:00PM EST
  • English
  • Aaron Sparling, Rob Lee, Robert M. Lee + 2 more
  • Solutions Forum
Abstract image of a microphone

With Support from Our Premier Sponsors

This focused track explores the ever-evolving world of Cloud IAM, diving into modern strategies, common missteps, and emerging tools designed to help organizations reclaim control over sprawling identities and creeping permissions.

As organizations embrace cloud transformation, managing identity and access across multiple cloud platforms has become both a top security priority and a complex challenge. Cloud IAM visibility is crucial for understanding who has access to what resources—empowering teams to enforce least privilege and swiftly detect unauthorized permissions before they become risks.

 That’s where the Fall Cyber Fest Cloud Identity and Access Management (IAM) Track steps in. This focused track explores the ever-evolving world of Cloud IAM, diving into modern strategies, common missteps, and emerging tools designed to help organizations reclaim control over sprawling identities and creeping permissions.

 Attendees will gain a deep understanding of the challenges and nuances involved in managing access across AWS, Azure, GCP, and on-premise environments. We'll examine the pros and cons of federated versus consolidated identity models, the growing role of Cloud Infrastructure Entitlement Management (CIEM) tools, and how Policy-as-Code is redefining scalable identity governance.

 From automating IAM processes to countering identity-based threats through Identity Threat Detection and Response (ITDR), this track will also cover offensive techniques—highlighting how attackers exploit misconfigured policies and how defenders can respond.

 Whether you're looking to mature your cloud security program or gain tactical insights into the latest IAM solutions, this track is essential for anyone seeking to elevate their cloud defenses and harness the full potential of IAM in the modern cloud ecosystem.

 What steps should organizations take in 2025/2026 to proactively strengthen their Cloud IAM strategy, operationalize identity-focused threat intelligence, and bolster the governance of their cloud IAM capabilities?

 What to Expect

  • Strategies for IAM across AWS, Azure, GCP, and on-premise environments – including federation, consolidation, and common pitfalls.
  • Exploring CIEM and emerging IAM tools – to identify and remediate excessively permissioned access and other IAM challenges.
  • Policy-as-Code in practice – using OPA, Rego, and Terraform to automate IAM and avoid identity drift.
  • Real world tales around IAM misconfigurations – exploits, high-profile failures, and lessons learned.
  • Identity-First Security and ITDR – the role of IAM in enabling Zero Trust and detecting identity-centric attacks.

Part 2: Cloud stuff

As organizations embrace cloud transformation, managing identity and access across multiple cloud platforms has become both a top security priority and a complex challenge. Cloud IAM visibility is crucial for understanding who has access to what resources—empowering teams to enforce least privilege and swiftly detect unauthorized permissions before they become risks.

Alan Paller

Part 3: Cloud

As organizations embrace cloud transformation, managing identity and access across multiple cloud platforms has become both a top security priority and a complex challenge. Cloud IAM visibility is crucial for understanding who has access to what resources—empowering teams to enforce least privilege and swiftly detect unauthorized permissions before they become risks.

Solutions Fest

Part 3

As organizations embrace cloud transformation, managing identity and access across multiple cloud platforms has become both a top security priority and a complex challenge. Cloud IAM visibility is crucial for understanding who has access to what resources—empowering teams to enforce least privilege and swiftly detect unauthorized permissions before they become risks.

Virtual Events

Part 4

As organizations embrace cloud transformation, managing identity and access across multiple cloud platforms has become both a top security priority and a complex challenge. Cloud IAM visibility is crucial for understanding who has access to what resources—empowering teams to enforce least privilege and swiftly detect unauthorized permissions before they become risks.

Why Sponsor

Schedule

Showing 1 of 1
Filter by:

Keynote 8am

Event description...

Morning08:00AM - 09:00AM EDT

Virtual

Speakers

FAQs