Webinars & Podcasts
[On-Demand] Understanding Attack Tactics to Better Secure Your AWS Environment
Watch us simulate an attack pathway using an open source framework (CloudGoat) that provisions vulnerable infrastructure.
[On-Demand] CyberUnfiltered – The Journey of the Modern CISO with Anand Singh
Anand Singh discusses challenges and discoveries of the modern CISO including emerging threats, key pillars of a good cloud security strategy, and more.
[On-Demand] Cloud Incident Response with Mitiga
Find out what you need to be conscious of when developing incident response strategies in the cloud
[Podcast] The Founder Formula: Reasons To Launch A Startup
The Trace3 Founder Formula podcast co-hosts discuss the inner workings of launching Ermetic with Arick Goomanovsky.
[On-Demand] Survey Findings – Cloud Security Maturity
Gain insight into the key findings of an Ermetic-commissioned study on cloud security maturity
[On-Demand] CyberUnfiltered – Deconstructing the Attacker Mindset
Listen in as Igal Gofman and Lior Zatlavi discuss the attacker mindset -- with an unfiltered view from the trenches.
[On-Demand] Maturing Your Way to Effective Identity Governance
Listen in on this joint IBM-Ermetic webinar exploring the Ermetic cloud Security Maturity Model in detail.
[On-Demand] 5 Ways to Reduce Risk from AWS IAM User Access Keys
Cutting down IAM user access keys risk in AWS can be your quickest security win in 2022.
[Podcast+Video] A Grin Without a Cat: Your Cloud Blast Radius
In this episode of Down the Security Rabbithole Podcast, Arick Goomanovsky joins Rafal Los to talk about the biggest risk in cloud infrastructure.
[On-Demand] The Ultimate IAM Comparison of the Top 3 Cloud Providers
This session offers a comparison of the IAM mechanisms available in AWS, Azure and GCP.
[On-Demand] Eliminate GCP IAM Risks
This on-demand webinar provides an introduction to the IAM mechanisms available in GCP.
[On-Demand] Security Through Maturity
Applying the cloud security maturity model framework.
On-Demand: AWS Pen Testing Workshop
How might attackers act at each stage of an AWS environment attack? What can you do to uncover it?
[On-Demand] Start-up your Cloud Security: Cybersecurity from Founding to Exit
Learn the steps required to ensure your startup is prepared to incorporate cloud security from day one and throughout its lifecycle.
[On-Demand] Take Action: How to Kick the S3 Bucket Ransomware Threat Caused by Misconfigurations
This workshop outlines the specifics of how ransomware can wreak havoc on misconfigured S3 buckets and offers strategies to reduce your ransomware exposure.
[On-Demand] Cloud Compliance Achievement Unlocked. Now What?
This webinar looks at standards compliance and custom policies as strategic to your cloud security.
[On-Demand] Forrester Webinar: Securing Your Cloud – What’s Identity Governance Got to Do with It?
Get Andras Cser's take on why cloud entitlements are the linchpin to reducing the attack surface.
[On-Demand] SANS Webcast: Are Cloud Service Provider Tools Enough to Secure Your Identities?
Watch this SANS - Ermetic workshop for an overview of CSP tools.
[On-Demand] Webinar: Cloud Native Security, Explained
Explore new tactics for securing cloud computing in Azure with Tanya Janca of We Hack Purple.
[On-Demand] Eliminate Azure IAM Risks: How to Leverage Native Azure Tools and Automation to Pursue Least Privilege
Using access permissions analysis, RBAC and native tools in Azure toward least privilege.
[On-Demand] TAG Cyber Virtual Panel: Developing a Cloud Infrastructure Security Plan
Watch this panel of industry experts share advice on prioritizing cloud infrastructure security projects.
[On-Demand] ISSA Webcast: Going Multicloud
Secure your multicloud! Explore managing identities and privileges risk in both AWS and Azure.
[On-Demand] Workshop: How to Eliminate AWS IAM Risk
Join Ermetic architect Lior Zatlavi to unpack analyzing access permissions and pursuing least privilege in AWS.
[On-Demand] ISACA Webinar: Tame that Overprivileged Cloud
Learn from Ermetic’s CBO about best practices for mitigating access risks in AWS and Azure.
[On-Demand] Of Birds, Bees — and Cloud Native Controls to Protect your Hive
Hear Google’s former CISO explain why automation is essential to closing cloud security gaps at scale.
[On-Demand] Essentials Workshop: How to manage identities and access risk in AWS and Azure
Understand where AWS and Azure align and differ in handling access management.
[On-Demand] 451 Webinar: Getting a Grip on Privileged Access in Public Cloud Infrastructure
451 and Ermetic explore how entitlements management can simplify your cloud infrastructure security.
[On-Demand] Webinar: Cloud Infrastructure Entitlement Management and the Gartner Hype
Dive into why Gartner featured CIEM in this year’s Cloud Security and IAM hype cycles.
[On-Demand] DevOps.com Webinar: How to Govern Identities and Access in Cloud Infrastructure: AppsFlyer Case Study
How organizations govern access and achieve least privilege by analyzing permissions in the cloud.
[Podcast] Cloud Identity Governance – Understanding Challenges
Find out about cloud identity and access challenges -- and the impact of neglecting entitlements.
[On-Demand] Webinar: Ask Me Anything! Fireside Chat with Atlassian CISO, Adrian Ludwig
Prepare to delight in this chat with Atlassian CISO Adrian Ludwig and Ermetic CEO/Co-Founder, Shai Morag.