<img src="https://certify.alexametrics.com/atrk.gif?account=8w5fq1Fx9f207i" style="display:none" height="1" width="1" alt="">


Think About Your Audience Before Choosing a Webinar Title

Sponsored by:

Stack Identity Logo


On Demand

Cloud, application data, AI, and third-party access are growing concerns that create identity and access management (IAM) blind spots. These cloud IAM blind spots represent an ever-expanding threat vector to cloud security, enabling unmonitored, unauthorized 'shadow access' and the potential for data exposure. Cloud security and cloud operations teams need to regain visibility and control of thousands of invisible identities, access permissions and policies in the cloud.

In this Techstrong Learning Experience, experts will share the cause and impacts of shadow access on operations, governance, compliance and zero-trust. You'll learn how to improve visibility, policy control and governance by transforming cloud IAM. The session will also feature a live demo that shows how to comprehensively detect shadow access, pinpoint related cloud security risks and compliance violations and understand how to enable cloud security teams with the knowledge necessary to effectively stop attackers from leveraging shadow access.

You'll learn:

  • Why and how shadow access happens and its impact on operations, governance, compliance and zero-trust.
  • How to find and fix the thousands of shadow access instances that cause security incidents, policy and compliance violations and cloud breaches
  • The 10 types of shadow access and how to pinpoint related cloud security risks and IAM exposures via a live demo
  • Real-world perspective on best practices to improve visibility, policy control,and governance of shadow access from Venkat Raghavan, founder and CEO, Stack Identity, CISO, Ken Foster VP of governance, risk & compliance, Stack Identity, and Al Ghous, CISO, Investor and Advisor at Snapdocs.
  • How to use the lens of shadow access to improve the efficiency of cloud IAM, user access reviews, cloud risk assessments, audit, compliance and governance programs
Venkat Raghavan
Founder and CEO - Stack Identity
Venkat Raghavan is the founder and CEO of Stack Identity, a Bay Area startup. He is an operator, builder, and entrepreneur with over 25 years of enterprise security software experience spanning big tech and start-ups. Venkat has held a variety of senior operational roles in products, research and development, general management, business, and corporate development. Venkat was a founding leader of IBM Security, senior vice president at Bluecoat, and a partner at venture capital firm BGV. His areas of expertise include Cyber Security, AI/ML, Cloud Native, and Data technologies. Venkat has spoken at many conferences including RSA and industry conferences. At his new startup, he is pioneering a new type of Data Security for the Cloud Native and the Data Native era.
Ken Foster
VP of IT Governance, Risk and Compliance - FleetCor
Ken is currently VP of IT Governance, Risk, and Compliance at Fleetcor with more than 20 years of experience in the field focusing on platform architecture and security. I previously held the positions of Head of Global Cyber Risk Governance and Government Security Services at Fiserv and CISO at MacStadium and Rollins. In the past 20+ years of his career, Ken has held essential positions at several companies in the Atlanta area as well as for the US government including be forward deployed in Afghanistan with the US intelligence community. Ken is a proud veteran of the United States Navy and has been an active member of his local security community. 
Al Ghous
CISO, Advisor, Investor - Snapdocs
Al Ghous is an experienced CISO, venture advisor, and co-founder of SVCI (Silicon Valley CISO Investments). Al has been in the cybersecurity industry for over 20 years contributing in different capacities from Product Security and Risk Management to Solution Consulting and Security Architecture. Al's experience spans serving as Chief Information Security Officer at Snapdocs and Envision Digital and Chief Security Officer at ServiceMax, as well as leading Cyber Security, Cloud Platform, and Products at GE Digital. Al has also served in leadership positions at Informatica, Robert Half, Kaiser Permanente, PeopleSoft/Oracle, and Ernst & Young. Al is active in the cybersecurity industry and is part of several industry organizations and consortiums. Al is closely tied to the Venture Capital community as well as a member of several advisory boards.

Register to Watch Now:

What You’ll Learn in This Webinar

You’ve probably written a hundred abstracts in your day, but have you come up with a template that really seems to resonate? Go back through your past webinar inventory and see what events produced the most registrants. Sure – this will vary by topic but what got their attention initially was the description you wrote.

Paint a mental image of the benefits of attending your webinar. Often times this can be summarized in the title of your event. Your prospects may not even make it to the body of the message, so get your point across immediately.  Capture their attention, pique their interest, and push them towards the desired action (i.e. signing up for your event). You have to make them focus and you have to do it fast. Using an active voice and bullet points is great way to do this.

Always add key takeaways. Something like this....In this session, you’ll learn about:

  • You know you’ve cringed at misspellings and improper grammar before, so don’t get caught making the same mistake.
  • Get a second or even third set of eyes to review your work.
  • It reflects on your professionalism even if it has nothing to do with your event.