Securing cloud solution providers

Last Modified 2022-02-09

This video provides strategic guidance and demonstrations of the steps that are required to secure a CSP environment, including implementing zero-trust architectural concepts, setting up conditional access, managing identities and privileged access, and auditing and monitoring for threats.