SlideShare a Scribd company logo
webinar
august 30
2016
mitigating risk for
cloud
applications
STORYBOAR
core questions
■ What are the top cloud security threats facing enterprises?
■ How should cloud app vendors approach government
cooperation?
■ What capabilities are most valuable for protecting data?
■ Do IT leaders have adequate visibility into user activity?
■ How are organizations dealing with the shadow IT threat?
STORYBOAR
■ A few organizations now cloud-only
■ Most cloud-first or shifting to a
cloud-first mentality
■ Rate of adoption continues to grow
rapidly across all industries
cloud adoption continues to rise
most organizations have deployed at least one cloud app
poll:
what are your top
cloud security
concerns
STORYBOAR
biggest concern - external sharing
followed by unauthorized devices, data sync
■ Nearly 60% see external sharing
as a key concern
○ Cloud apps have made one
click sharing easier
■ Data sync concerns suggest orgs
need control over sync clients
STORYBOAR
■ Organizations need solutions that
leverage cloud APIs for control over
sharing
■ Real-time DLP limits risk at access
and download
■ UEBA trending up
sharing controls and DLP top cloud sec capabilities
access controls are increasingly valuable
STORYBOAR
■ One in three say yes, they expect
cloud providers to cooperate with
government
■ Small handful support government
mandated encryption algorithms
most opposed to government cooperation
over 30% say providers should turn over encrypted data
poll:
what security
capabilities are
most critical
in your org
STORYBOAR
■ Many are turning to third-party
solutions
○ Separation of systems for
data-at-rest provides
additional level of security
■ 17% take no security measures.
IT leaders use encryption to combat security concerns
most are taking steps to limit risk of data leakage
STORYBOAR
■ Basic visibility provided by some
cloud apps
■ Cross-app visibility is limited orgs
without CASBs
most enterprises lack adequate visibility
cross-app visibility remains a challenge
STORYBOAR
■ Written policies ineffective in
protecting data
■ Blocking apps encourages
employees to work around IT
■ Useful technical controls, like
proxies, used by 29%
most orgs lack technical controls to combat shadow IT
a growing problem needs an effective solution
STORYBOAR
the enterprise is responsible for secure saas usage
components
usage/consumption
data
application
services
servers & storage
network
layer
data
application
infrastructure
owner
enterprise
STORYBOAR
security must
evolve to protect
data outside the
firewall
ungoverned
access to
corporate data in
the cloud
hidden Shadow
IT threats
sensitive cloud
data on
unmanaged
devices
STORYBOAR
findings recap
■ Public cloud adoption continues to rise, only 16% have no SaaS apps
deployed.
■ Split on government cooperation. 55% are opposed.
■ Shadow IT a concern, but few organizations have technical controls in
place.
■ Security incidents still rampant. 59% due to unwanted external sharing.
■ Cloud visibility is lacking. Less than 30% can monitor user logins and
activity.
STORYBOAR
about
bitglass
total
data
protection est. jan
2013
200+
customer
s
tier 1
VCs
STORYBOAR
our
solutions
cloud mobile breach
16
resources:
more info about cloud security
■ report: mitigating cloud threats
■ whitepaper: definitive guide to casbs
■ report: cloud adoption by industry
STORYBOAR
bitglass.com
@bitglass

More Related Content

PPTX
Example presentation
PDF
Radical Innovation In Security (New Techniques Applied To Tomorrow’s Risk)
PDF
Why Your Business Can’t Ignore the Need for a Password Manager Any Longer
PDF
The Economics of IT Risk and Reputation
PPTX
Top 2016 Mobile Security Threats and your Employees
PDF
What has changed in Corporate Cybersecurity?
PPTX
CompTIA International Trends in Cybersecurity
PDF
Cybersecurity Skills in Industry 4.0
Example presentation
Radical Innovation In Security (New Techniques Applied To Tomorrow’s Risk)
Why Your Business Can’t Ignore the Need for a Password Manager Any Longer
The Economics of IT Risk and Reputation
Top 2016 Mobile Security Threats and your Employees
What has changed in Corporate Cybersecurity?
CompTIA International Trends in Cybersecurity
Cybersecurity Skills in Industry 4.0

What's hot (20)

PPTX
Internet of Things Security: IBM HorizonWatch 2016 Trend Brief
PDF
Securing the C-Suite: Cybersecurity Perspectives from the Boardroom
PDF
NetSecOps: Everything Network Managers Must Know About Collaborating with Sec...
PDF
CompTIA 10th Security Study
PPTX
Data erasure's role in limiting cyber attacks
PDF
The Borderless Enterprise: Adapting Network Management to Mobility, Cloud, & ...
PPTX
Information Security for Business Leaders - Eric Vanderburg - JurInnov
PDF
Big data contains valuable information - Protect It!
PPT
ITS Datamatix Gitex Conference 2009 New ICT Security V2
PPTX
Delete vs Erase: How Are Companies Wiping Active Files
PPTX
Global Threats| Cybersecurity|
PDF
2015 Mobile Security Trends: Are You Ready?
PPTX
Nonprofit Cybersecurity Risk Assessment Basics
PDF
Symantec Intelligence Report: May 2015
PDF
Digital Generation: Security Infographic
PPTX
APE Intrusion Prevention
PDF
Top 3 security concerns for enterprises
PDF
Iid infoshare exec_summary final
PDF
Security Trends in the Retail Industry
PDF
The State of Data Security
Internet of Things Security: IBM HorizonWatch 2016 Trend Brief
Securing the C-Suite: Cybersecurity Perspectives from the Boardroom
NetSecOps: Everything Network Managers Must Know About Collaborating with Sec...
CompTIA 10th Security Study
Data erasure's role in limiting cyber attacks
The Borderless Enterprise: Adapting Network Management to Mobility, Cloud, & ...
Information Security for Business Leaders - Eric Vanderburg - JurInnov
Big data contains valuable information - Protect It!
ITS Datamatix Gitex Conference 2009 New ICT Security V2
Delete vs Erase: How Are Companies Wiping Active Files
Global Threats| Cybersecurity|
2015 Mobile Security Trends: Are You Ready?
Nonprofit Cybersecurity Risk Assessment Basics
Symantec Intelligence Report: May 2015
Digital Generation: Security Infographic
APE Intrusion Prevention
Top 3 security concerns for enterprises
Iid infoshare exec_summary final
Security Trends in the Retail Industry
The State of Data Security
Ad

Viewers also liked (7)

PPT
Cloud Security Overview
PDF
Dimension data cloud_security_overview
PPTX
How to Secure Your IaaS and PaaS Environments
PDF
SAP Cloud security overview 2.0
PPTX
Is6120 data security presentation
PDF
The Security and Privacy Threats to Cloud Computing
PPTX
Cloud security ppt
Cloud Security Overview
Dimension data cloud_security_overview
How to Secure Your IaaS and PaaS Environments
SAP Cloud security overview 2.0
Is6120 data security presentation
The Security and Privacy Threats to Cloud Computing
Cloud security ppt
Ad

Similar to CSA Research: Mitigating Cloud Threats (20)

PPTX
Top 5 Cloud Security Threats in Healthcare
PPTX
CASBs: 8 Critical Capabilities in partnership with ISMG Media Group
PPTX
Cloud security, Cloud security Access broker, CSAB's 4 pillar, deployment mode
PPTX
Data Breach: The Cloud Multiplier Effect
DOCX
Schoology cloud assignment
PPTX
8 questions to ask when evaluating a Cloud Access Security Broker
PPTX
Webinar - Bitglass and CyberEdge - Hidden Security Threats
PPTX
Securing IaaS Applications
PPTX
Netskope — Shadow IT Is A Good Thing
PDF
Cloud Application Security Best Practices To follow.pdf
PPTX
The Razor's Edge: Enabling Cloud While Mitigating the Risk of a Cloud Data Br...
PPTX
Xylos Clients Day - Public cloud and security go hand in hand, if you approac...
PDF
Outsourcing control
PDF
Cloud Application Security Best Practices To follow.pdf
PPTX
Bitglass Webinar - 5 Cloud Security Best Practices for 2018
PPTX
Proteja sus datos en cualquier servicio Cloud y Web de forma unificada
PDF
6 major cyber security risks to cloud computing
PDF
Ciphercloud Solutions Overview hsa oct2011
PPTX
CASBs: Critical Capabilities - in partnership with ISC(2)
PDF
The 1% Who Can Take Down your Organization
Top 5 Cloud Security Threats in Healthcare
CASBs: 8 Critical Capabilities in partnership with ISMG Media Group
Cloud security, Cloud security Access broker, CSAB's 4 pillar, deployment mode
Data Breach: The Cloud Multiplier Effect
Schoology cloud assignment
8 questions to ask when evaluating a Cloud Access Security Broker
Webinar - Bitglass and CyberEdge - Hidden Security Threats
Securing IaaS Applications
Netskope — Shadow IT Is A Good Thing
Cloud Application Security Best Practices To follow.pdf
The Razor's Edge: Enabling Cloud While Mitigating the Risk of a Cloud Data Br...
Xylos Clients Day - Public cloud and security go hand in hand, if you approac...
Outsourcing control
Cloud Application Security Best Practices To follow.pdf
Bitglass Webinar - 5 Cloud Security Best Practices for 2018
Proteja sus datos en cualquier servicio Cloud y Web de forma unificada
6 major cyber security risks to cloud computing
Ciphercloud Solutions Overview hsa oct2011
CASBs: Critical Capabilities - in partnership with ISC(2)
The 1% Who Can Take Down your Organization

More from Bitglass (20)

PPTX
Bitglass Webinar - BlueCross BlueShield of Tennessee's CASB Journey to Secure...
PPTX
Bitglass Webinar - A Primer on CASBs and Cloud Security
PPTX
Bitglass Webinar - Top 6 CASB Use Cases
PPTX
Webinar - Mobile Security Trends
PPTX
Empowering the Cloud Through G Suite
PPTX
securing the cloud for financial services
PPTX
Webinar bitglass - complete deck-2
PPTX
Mitigating the Top 5 Cloud Security Threats
PPTX
Security O365 Using AI-based Advanced Threat Protection
PPTX
5 Security Questions To Ask When Deploying O365
PPTX
6 essentials for secure BYOD in healthcare
PPTX
The Future of CASBs - A Cloud Security Force Awakens
PPTX
CASBs - A New Hope
PPTX
CASBs and Office 365: The Security Menace
PPTX
Webinar: are casbs ready for primetime?
PPTX
Security and Accountability in the Cloud (in partnership with SANS)
PPTX
The Four Horsemen of the O365 Apocalypse
PPTX
Office 365 Security: How to Safeguard Your Data
PPTX
CASBs and Office 365 (with Argyle)
PPTX
Bridging the Office 365 Security Gap - Redmond Media
Bitglass Webinar - BlueCross BlueShield of Tennessee's CASB Journey to Secure...
Bitglass Webinar - A Primer on CASBs and Cloud Security
Bitglass Webinar - Top 6 CASB Use Cases
Webinar - Mobile Security Trends
Empowering the Cloud Through G Suite
securing the cloud for financial services
Webinar bitglass - complete deck-2
Mitigating the Top 5 Cloud Security Threats
Security O365 Using AI-based Advanced Threat Protection
5 Security Questions To Ask When Deploying O365
6 essentials for secure BYOD in healthcare
The Future of CASBs - A Cloud Security Force Awakens
CASBs - A New Hope
CASBs and Office 365: The Security Menace
Webinar: are casbs ready for primetime?
Security and Accountability in the Cloud (in partnership with SANS)
The Four Horsemen of the O365 Apocalypse
Office 365 Security: How to Safeguard Your Data
CASBs and Office 365 (with Argyle)
Bridging the Office 365 Security Gap - Redmond Media

Recently uploaded (20)

PDF
Chapter 3 Spatial Domain Image Processing.pdf
PDF
Unlocking AI with Model Context Protocol (MCP)
PDF
Dropbox Q2 2025 Financial Results & Investor Presentation
PDF
GamePlan Trading System Review: Professional Trader's Honest Take
PDF
7 ChatGPT Prompts to Help You Define Your Ideal Customer Profile.pdf
PDF
Modernizing your data center with Dell and AMD
PPTX
Understanding_Digital_Forensics_Presentation.pptx
PDF
GDG Cloud Iasi [PUBLIC] Florian Blaga - Unveiling the Evolution of Cybersecur...
PDF
Shreyas Phanse Resume: Experienced Backend Engineer | Java • Spring Boot • Ka...
PDF
Bridging biosciences and deep learning for revolutionary discoveries: a compr...
PDF
Mobile App Security Testing_ A Comprehensive Guide.pdf
PDF
Diabetes mellitus diagnosis method based random forest with bat algorithm
PDF
Optimiser vos workloads AI/ML sur Amazon EC2 et AWS Graviton
PDF
Blue Purple Modern Animated Computer Science Presentation.pdf.pdf
PDF
Advanced methodologies resolving dimensionality complications for autism neur...
PDF
Per capita expenditure prediction using model stacking based on satellite ima...
PPTX
PA Analog/Digital System: The Backbone of Modern Surveillance and Communication
PDF
How UI/UX Design Impacts User Retention in Mobile Apps.pdf
PDF
NewMind AI Weekly Chronicles - August'25 Week I
PDF
Review of recent advances in non-invasive hemoglobin estimation
Chapter 3 Spatial Domain Image Processing.pdf
Unlocking AI with Model Context Protocol (MCP)
Dropbox Q2 2025 Financial Results & Investor Presentation
GamePlan Trading System Review: Professional Trader's Honest Take
7 ChatGPT Prompts to Help You Define Your Ideal Customer Profile.pdf
Modernizing your data center with Dell and AMD
Understanding_Digital_Forensics_Presentation.pptx
GDG Cloud Iasi [PUBLIC] Florian Blaga - Unveiling the Evolution of Cybersecur...
Shreyas Phanse Resume: Experienced Backend Engineer | Java • Spring Boot • Ka...
Bridging biosciences and deep learning for revolutionary discoveries: a compr...
Mobile App Security Testing_ A Comprehensive Guide.pdf
Diabetes mellitus diagnosis method based random forest with bat algorithm
Optimiser vos workloads AI/ML sur Amazon EC2 et AWS Graviton
Blue Purple Modern Animated Computer Science Presentation.pdf.pdf
Advanced methodologies resolving dimensionality complications for autism neur...
Per capita expenditure prediction using model stacking based on satellite ima...
PA Analog/Digital System: The Backbone of Modern Surveillance and Communication
How UI/UX Design Impacts User Retention in Mobile Apps.pdf
NewMind AI Weekly Chronicles - August'25 Week I
Review of recent advances in non-invasive hemoglobin estimation

CSA Research: Mitigating Cloud Threats

  • 1. webinar august 30 2016 mitigating risk for cloud applications
  • 2. STORYBOAR core questions ■ What are the top cloud security threats facing enterprises? ■ How should cloud app vendors approach government cooperation? ■ What capabilities are most valuable for protecting data? ■ Do IT leaders have adequate visibility into user activity? ■ How are organizations dealing with the shadow IT threat?
  • 3. STORYBOAR ■ A few organizations now cloud-only ■ Most cloud-first or shifting to a cloud-first mentality ■ Rate of adoption continues to grow rapidly across all industries cloud adoption continues to rise most organizations have deployed at least one cloud app
  • 4. poll: what are your top cloud security concerns
  • 5. STORYBOAR biggest concern - external sharing followed by unauthorized devices, data sync ■ Nearly 60% see external sharing as a key concern ○ Cloud apps have made one click sharing easier ■ Data sync concerns suggest orgs need control over sync clients
  • 6. STORYBOAR ■ Organizations need solutions that leverage cloud APIs for control over sharing ■ Real-time DLP limits risk at access and download ■ UEBA trending up sharing controls and DLP top cloud sec capabilities access controls are increasingly valuable
  • 7. STORYBOAR ■ One in three say yes, they expect cloud providers to cooperate with government ■ Small handful support government mandated encryption algorithms most opposed to government cooperation over 30% say providers should turn over encrypted data
  • 9. STORYBOAR ■ Many are turning to third-party solutions ○ Separation of systems for data-at-rest provides additional level of security ■ 17% take no security measures. IT leaders use encryption to combat security concerns most are taking steps to limit risk of data leakage
  • 10. STORYBOAR ■ Basic visibility provided by some cloud apps ■ Cross-app visibility is limited orgs without CASBs most enterprises lack adequate visibility cross-app visibility remains a challenge
  • 11. STORYBOAR ■ Written policies ineffective in protecting data ■ Blocking apps encourages employees to work around IT ■ Useful technical controls, like proxies, used by 29% most orgs lack technical controls to combat shadow IT a growing problem needs an effective solution
  • 12. STORYBOAR the enterprise is responsible for secure saas usage components usage/consumption data application services servers & storage network layer data application infrastructure owner enterprise
  • 13. STORYBOAR security must evolve to protect data outside the firewall ungoverned access to corporate data in the cloud hidden Shadow IT threats sensitive cloud data on unmanaged devices
  • 14. STORYBOAR findings recap ■ Public cloud adoption continues to rise, only 16% have no SaaS apps deployed. ■ Split on government cooperation. 55% are opposed. ■ Shadow IT a concern, but few organizations have technical controls in place. ■ Security incidents still rampant. 59% due to unwanted external sharing. ■ Cloud visibility is lacking. Less than 30% can monitor user logins and activity.
  • 17. resources: more info about cloud security ■ report: mitigating cloud threats ■ whitepaper: definitive guide to casbs ■ report: cloud adoption by industry

Editor's Notes

  • #5: what are your top cloud security concerns
  • #9: Security capabilities most critical in your org Visibility into how corporate data is being used Control over access to data Encryption of sensitive data Potential for breaches Something else
  • #13: When talking to potential customers, sometimes this comes up. Aren’t cloud vendors already protecting their apps with native security features? Very simple framework for thinking about this. WSJ test.
  • #16: in: CA, NY, MA, IL, N