At Orca Security, our mission is to help organizations thrive securely in the cloud. Just like mastering the game of chess, success in the cloud requires strategic planning, calculated execution, and the ability to anticipate your adversary’s next moves. 

That’s why we’re thrilled to launch Cloud Security Live 2025, an engaging virtual summit where today’s top cloud defenders share how they’re staying several moves ahead of attackers. Across five engaging sessions, industry leaders reveal their strategies, insights, and best practices for outmaneuvering risks and threats in the cloud. 

Sign up to this free virtual event (May 20, 2025: 8am-10:30am PST) and you’ll hear from a who’s-who list of leaders and experts. Read on to see what you can expect from the event and save your seat.

Keynote – Cloud Security Strategy: Mid-Year Review 2025 

Cloud security is a marathon, not a sprint. To stay ahead of the attackers as the threat landscape evolves, the former World Chess Champion, Max Euwe, says it best, “Strategy requires thought, tactics require observation.” 

There is no shortage of moves you could take as a security leader to keep your cloud environment and applications protected.

Join this keynote session to learn about the trends, challenges, and strategy for resilience against cloud threats.

Speakers: 

Key topics:

  • Major trends in the cloud
  • Current challenges for cloud security
  • Strategy for resilience against cloud threats

Session #1 – Growing a Cloud Security Program One Move at a Time

Whether an organization is cloud-native or currently migrating to the cloud, every resilient cloud program requires some basic tactics executing on a long term strategy. 

In this first session, get practical tips on how to approach building a resilient cloud security program—from executive alignment, to cross-functional buy-in and technology purchases to support corporate goals. 

Speakers:

Key topics

  • Challenges of launching a cloud security program
  • Practical tips for gaining stakeholder buy-in and ownership
  • Key considerations for choosing the right security strategy and technology

Session #2 – Playing to Win: Unifying CNAPP and AppSec for Cloud-Native Security

As organizations increasingly innovate in the cloud, the divide between application security and cloud security is putting their most critical assets at risk. Legacy approaches that silo these disciplines are no longer sustainable. To truly protect your crown jewels, security must evolve—unifying application security and cloud security across the full application lifecycle. 

In this second session, discover how to overcome the barriers to securing cloud-native applications.

Speakers:

Key topics

  • Challenges of balancing cloud and application security
  • Advantages of a unified model and what it entails
  • How to implement a unified approach in your organization

Session #3 – Controlling the Board: Leveraging the Advantages of Cloud Detection and Response (CDR)

As cloud environments grow in scale and complexity, cloud detection and response (CDR) is becoming an important defense against today’s sophisticated threats. Yet leveraging CDR effectively depends on choosing the right strategy and technology.

In the third session, hear from an experienced security practitioner about the right way to approach CDR. 

Speakers: 

Key topics:

  • The role of cloud detection and response (CDR) in cloud security 
  • Why CDR matters
  • Practical considerations for choosing a tool and strategy
  • The future of CDR security

Session #4 – Mastering Multi-Cloud: One Game, Many Boards

As organizations embrace the flexibility and innovation that multi-cloud strategies offer, they also inherit a new layer of complexity—especially when it comes to security. Each cloud provider introduces its own tools, knowledge requirements, and nuances, making it increasingly difficult to gain unified visibility and capabilities. 

In this final session, discover how to build a strategy that works across platforms and providers.

Speakers: 

Key topics:

  • Emerging challenges with multi-cloud security
  • Practical considerations for securing your multi-cloud estate
  • Choosing cloud-agnostic security solutions 

Save your spot to Orca’s Cloud Security Live 2025

Whether you’re a CISO, security practitioner, DevOps engineer, or developer, save your seat now to Orca Cloud Security Live 2025 on May 20, 2025 at 8-10:30am PST. Tune in to hear from leaders, experts, and practitioners on their strategies for securing their cloud. Sign up to the virtual summit.