Cloud Security , Governance & Risk Management , Privileged Access Management

Cloud Security and Developers: Role of Zero Standing Privilege

CyberArk's Mike Bykat and Steven James on Defending New Attack Targets
Mike Bykat, global solution strategy architect for cloud security, CyberArk; Steven James, solutions engineer, CyberArk

When it comes to attack trends in the cloud, developers often are targeted as a weak cybersecurity link. Mike Bykat, global solution strategy architect for cloud security at CyberArk and Steven James, solutions engineer at CyberArk, discuss how to turn that security liability into an asset by implementing the emerging practice of Zero Standing Privilege.

In this video interview with Information Security Media Group, Bykat and James also discussed:

  • Why developers are the new attack focal point;
  • What developers bring to the table as assets and liabilities;
  • The role of Zero Standing Privilege in providing frictionless security.

With over 15 years of information technology and security experience, Bykat is a leader and a skilled technical engineer. He specializes in architecting and implementing enterprise cybersecurity solutions with a focus on cloud and privilege access management.

James is a seasoned IT professional with over 20 years of experience in the industry. He specializes in cybersecurity and identity management solutions.


About the Author

Tom Field

Tom Field

Senior Vice President, Editorial, ISMG

Field is responsible for all of ISMG's 28 global media properties and its team of journalists. He also helped to develop and lead ISMG's award-winning summit series that has brought together security practitioners and industry influencers from around the world, as well as ISMG's series of exclusive executive roundtables.




Around the Network

Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing healthcareinfosecurity.com, you agree to our use of cookies.