• Skip to main content
  • Skip to secondary menu
  • Skip to footer

Cybersecurity Market

Cybersecurity Technologies & Markets

  • Cybersecurity Events 2025-2026
  • Cybersecurity Jobs
  • Sponsored Post
    • Make a Contribution
  • Market Reports
  • About
    • GDPR
  • Contact

Identity Management & Access Control in Multiclouds Workshop and Conference, January 22 – 24, 2020, Gaithersburg, MD

January 21, 2020 By admin

This one-and-a-half day conference will focus on identity management and access control in multi-clouds to mitigate insider threats and return control back to owners of applications and data. Emphasis will be placed on emerging concepts such as zero-trust architecture where gaining entry through a firewall or having an IP address does not provide additional privileges. The workshop will address attacks by implementing mutual TLS, secure service discovery, traffic encryption between services, and access control at the client, service, and data level through what is referred to as a “service mesh architecture.” Service mesh architectures originated to benefit the operational infrastructure of sophisticated cloud providers but are now becoming mainstream through the availability of tool sets and open-source SDKs that streamline and eliminate much of the complexity of their deployment.

The conference program will feature experts on service mesh architectures, identity, and access control in the modern-day cloud architecture and address the following themes:

Mitigating insider threat
Service mesh use cases, tools, analysis, and deployment experience
Enforcing next-generation attribute-based access controls in the multi-cloud
Tutorials, demonstrations, and vendor displays will offer attendees the opportunity to gain insights into these emerging technologies and connect with tool and integration experts.

Entrepreneurs, students, and cybersecurity professionals in particular, are encouraged to attend!

REGISTER FOR THE JANUARY 22ND SESSION
Join a day early for hands-on sessions and lighting talks!

January 22, 2019 8:30 am – 12.30 pm | The Basics of Istio & Envoy | Tetrate

Click on the “Register” usa-button to opt in for the January 22nd Session

During this workshop you will gain hands-on experience to understand how Envoy & Istio have changed the landscape of cloud native applications. This 4-hour training will demonstrate how and why to use these tools to solve the challenges of security, observability, networking, and multi-cloud. Topics include:

Traffic Management and Resilient Communication between Services
Policy Enforcement and Rate Limiting
Telemetry, Monitoring and Reporting
Securing Communication between Microservices
Canary Deployment

Source: NIST

Filed Under: Cybersecurity Market Tagged With: Access Control, Identity Management, Multicloud, event

Footer

Recent Posts

  • AI Meets Cybersecurity at Black Hat USA 2025: A Strategic Convergence of Defense and Disruption
  • SentinelOne Earns Recognition as Strong Performer in Gartner Peer Insights ‘Voice of the Customer’ for CSPM
  • Rubrik Named Leader in Gartner Magic Quadrant, Fuels Cyber Resilience with Agentic AI
  • Cato Networks Raises $359M to Lead AI-Driven Enterprise Security
  • SquareX Reveals that Employees are No Longer the Weakest Link, Browser AI Agents Are
  • Leeds United and Reflectiz Partner to Share Insights on Proactive Web Security After Cyber Attack
  • Cloudflare Named a TIME100 Most Influential Company for Shielding U.S. Democracy Online
  • General Dan Caine Headlines Cybersecurity Gathering in Washington Amid Rising Threat Landscape
  • CrowdStrike Reinforces Leadership in Unified Cloud Security with IDC MarketScape Recognition
  • DefectDojo Elevates Cybersecurity Integration with Groundbreaking MCP Support

Media Partners

  • Technology Conferences
  • Technologies
  • Event Sharing Network
  • GameTech Market
  • OSINT
  • Event Calendar
  • Calendarial
  • Media Presser
  • 3V

Media Partners

  • App Coding
  • API Coding
  • Blockchaining
  • S3H
  • Press Club
  • VPNW
  • Opinion
  • Media Press Release
  • Defense Market

Copyright © 2022 CybersecurityMarket.com

Technologies, Market Analysis & Market Research