Cloud adoption is skyrocketing—but with it comes new complexity around securing access. Developers, platform engineers, and cloud admins all play different roles in building and running modern environments. But who really “owns” cloud identity security? And how can organizations enforce least privilege without slowing teams down?
In this webinar, IDC analyst Katie Norton and Josh Kirkwood from CyberArk will bring both research and real-world perspective to unpack how the cloud is actually consumed—by developers, data scientists, and engineers alike—and what that means for securing the development layer of the cloud. Together, they’ll explore how organizations can align responsibilities, protect rapidly expanding developer identities, and put Zero Standing Privileges into practice without blocking innovation.
What you’ll learn:
- The evolving responsibilities of platform engineers, developers, and cloud security teams
- Why developer and data scientist identities are becoming a prime attack surface
- Practical ways to reduce standing access while enabling speed
- How to define, and work effectively within, secure cloud guardrails
Whether you’re building, securing, or governing the pipeline, this session will help you understand who’s really in your cloud—and how to protect them.




















