Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Teleport

Policy as Code: The Future of Authorization & Access Control - Sasha Klizhentas at Teleport Connect

Join Sasha Klizhentas, CTO of Teleport, as he discusses the critical challenges in authorization and access control, and introduces an innovative approach using policy as code. Learn how this new methodology can help prevent misconfigurations that lead to data breaches, and see a live demo of Teleport's new policy as code features with Dave Sudia. In this talk, you'll discover.

Enhancing Your Teleport Experience with Kenneth Roraback

Join a dynamic workshop session from Teleport Connect where users and team members collaborate to shape the future of Teleport. This interactive session captures real user feedback about current frustrations and desired features for 2025 and beyond, using a structured brainstorming approach with color-coded post-its and group discussions. In this session, you'll see: Key themes that emerged: Chapters.

Hardening Infrastructure Security Against SSO Identity Provider Compromise w/ Francesco Lacerenza

Francesco Arena, Senior Security Engineer at doyensec, as he dives deep into protecting your infrastructure against SSO identity provider compromises. Learn how to implement robust security measures in Teleport clusters, understand attack scenarios, and discover practical hardening strategies. This talk covers essential topics like MFA implementation, device trust features, and effective detection & response mechanisms. Perfect for security professionals and infrastructure engineers looking to strengthen their security posture against identity-based attacks.

Securing Infrastructure in the Age of Identity Attacks with Ev Kontsevoy

Learn why identity-based attacks are now more common than malware attacks and discover practical strategies to secure your computing infrastructure. The talk covers the economics of cybersecurity, the impact of complexity on human error, and proven approaches to reduce your attack surface. With real data from industry surveys, learn how leading organizations are successfully preventing identity attacks through passwordless authentication, cryptographic identities, and infrastructure simplification.

Key Teleport Connect 2024 Takeaways & Closing Remarks with Ev Kontsevoy

Join Teleport's closing keynote for powerful insights on the evolving landscape of cybersecurity. Learn why identity attacks have become the predominant threat, how increasing technological complexity impacts human capabilities, and why unification of identity management is crucial for modern security. This talk explores the human element of security, the importance of breaking down silos, and the critical role security professionals play in driving organizational change. Perfect for security leaders, IT professionals, and anyone interested in understanding the future of infrastructure security.

Nailing a Security Compliance Audit with Teleport with George Chamales & Jason Shropshire

Join Jason Shire (COO of Infusion Points) and George Tal (Secure Systems Architect) as they share valuable insights on implementing security compliance with Teleport. Learn why traditional DIY approaches to compliance often fall short and how Teleport can streamline your compliance journey, from FedRAMP to SOC 2. This talk covers practical solutions for common compliance challenges, including access controls, audit logging, session management, and FIPS requirements. Perfect for security professionals, compliance officers, and engineering teams looking to simplify their compliance implementations.

Teleport Identity & Policy: Deep Technical Dive with Xin Ding

As digital environments expand, the challenges of protecting critical infrastructure continue to grow. Join us in this insightful discussion as we dive into the complex landscape of cybersecurity. This video explores key industry trends, major threats to infrastructure, and actionable strategies for improving security.

Breaches & Compromises in 2024: How to Build a Defense with Eddie Glenn

Did you know that 3 out of 4 companies agree that securing infrastructure is becoming more challenging each year? As environments grow in complexity and cyber threats like identity-based attacks evolve, security teams face mounting pressure to keep systems safe without sacrificing productivity. In this video, we explore the parallels between dystopian themes in anime and the real-world challenges of cybersecurity.

"Q&A: Digital Threats Landscape" with Joseph Menn

Join us for an insightful conversation with Joseph Menn, veteran cybersecurity reporter for the Washington Post and author of "Cult of the Dead Cow: How the Original Hacking Supergroup Might Just Save the World." In this closing keynote discussion, Menn shares his perspectives on the evolution of cybersecurity, exploring the complex relationship between technology advancement and security.