Securely Moving Workloads into the Cloud

Organizations are increasingly moving their workloads to the cloud to achieve greater agility, flexibility, and cost savings. According to Gartner, spending on cloud infrastructure services will grow from $39.5 billion in 2019 to $63 billion through 2021.

However, when transitioning to the cloud, it’s critical to understand that cloud security is a shared responsibility between the cloud service provider and the customer. The cloud service provider typically secures the core infrastructure and services while securing operating systems, platforms, and data remains the responsibility of the customer.

As your organization formulates a cloud security strategy, it is important to remember that the #1 cause of today’s breaches is privileged access abuse. And it takes just one single compromised privileged credential to impact millions of data records and result in millions of dollars in fines.

To limit their exposure to these attacks, organizations need to move to an identity-centric approach based on a Zero Trust model: “never trust, always verify, enforce least privilege”. This concept should be extended to the organization’s workforce, as well as partners, privileged IT admins, and outsourced IT.

Watch on-demand to learn:

  • The state of cloud computing
  • Key threats for cloud environments
  • Best practices for cloud security confidence in a world of Zero Trust
  • How to apply these best practices to critical privileged cloud access use cases
  • A customer success story
  • The benefits of Zero Trust Privilege


Dr. Torsten George

Dr. Torsten George
Cyber Security Evangelist

Dr. Torsten George is a cyber security evangelist at Centrify, which delivers Zero Trust Privilege to secure modern enterprises and stop the leading cause of breaches — privileged access abuse. He also serves as strategic advisory board member at vulnerability risk management software vendor, NopSec. He is an internationally recognized IT security expert, author, and speaker. Dr. George has been part of the global IT security community for more than 25 years and regularly provides commentary and publishes articles on data breaches, insider threats, cyber warfare, incident response and IT security best practices, as well as other cyber security topics in media outlets. He is also the co-author of the Zero Trust Privilege For Dummies book.