SlideShare a Scribd company logo
Copyright © 2017 Forcepoint. All rights reserved.
Cloudy with a Chance of ...
Visibility, Accountability & Security
Doug Copley
Deputy CISO; Sr. Security & Privacy Strategist
March 16, 2016
Copyright © 2017 Forcepoint. All rights reserved.
CMO: Big board meeting in an hour
Need latest customer data from Rita
Her office is dark… Uh ohhh…
Where is Rita?
Copyright © 2017 Forcepoint. All rights reserved. | 3
WHY CLOUD?
1. Salesforce.com – “Why Move To The Cloud? 10 Benefits Of Cloud Computing” (11/15)
1. Time to Market
2. Scale, Cost Flexibility
3. Work From Anywhere
4. Automatic Updates/Patches
5. Focus on Mission
6. BC/DR
7. Competitiveness
8. Security
Copyright © 2017 Forcepoint. All rights reserved.
THE CLOUD IS CHANGING IT AND SECURITY MUST EVOLVE
Cloud adoption is
growing and it’s not
slowing down
▸ Cloud now 40% of IT budgets1
▸ 78% of organizations indicate that their budget for cloud services will
increase by 2017, with 29% expecting significant increases1
SaaS adoption
exploding
Organizations now
have a “Cloud First”
mentality
▸ SaaS (Software as a Service) spend is projected to grow to $75B by
2020 at a 19.2% compound annual growth rate2
▸ Of those Gartner surveyed who use or plan to use cloud services,
88% have a “Cloud First” strategy for technology initiatives1
1. Gartner – “Market Trends: Cloud Adoption Trends Favor Public Cloud With a Hybrid Twist (08/16)
2. Gartner – Forecast Analysis: Public Cloud Services Worldwide, 4Q16 Update (01/17)
There’s no turning back, but how do you keep your business secure?
Copyright © 2017 Forcepoint. All rights reserved.
BARRIERS TO
CLOUD ADOPTION
Copyright © 2017 Forcepoint. All rights reserved. | 6
Budget
Organization
Enablement
Project Delivery
Lifecycle
Security
Architecture
Governance, Risk
& Compliance
Legal & Human
Resources
Threat Prevention,
Detection & Response
Identity
Management
Risk Management
Copyright © 2017 Forcepoint. All rights reserved.
CONTROL QUESTIONS FOR CLOUD COMPUTING
“How do I know if departments are using
unsanctioned cloud applications?”
“How to we protect web usage without a
proxy on site?”
“How can we protect email when it’s in
Office365 or GMail? What about sandboxing?”
“Everyone can get to the cloud. How can I make sure only authorized
users access our data?” (Authentication/Authorization)
“How do I inspect cloud traffic (for data loss) when it
never traverses our network? What if it’s TLS traffic?”
Copyright © 2017 Forcepoint. All rights reserved. | 8
DATA-CENTRIC CONTEXT AWARE MODEL
What are my
critical assets?
Where are they? How much protection
is needed?
General
Email
Meeting
Notes
Source
Code
Product
Designs
HR
Data
Marketing
Materials
Telephone
Directory
Product
Manuals
Public
Presentations
Internal Repository
And ??? GitHub?
PCs?
Department
OneDrive
ADP Cloud
Application
Server
Inventory
In ServiceNow
Copyright © 2017 Forcepoint. All rights reserved.
ADDRESSING SECURITY
IN THE CLOUD
Copyright © 2017 Forcepoint. All rights reserved.
Corporate Environment
Cloud
Security
Vendor/AWS/Azure
Web Proxy
Email GW
Sandbox
DLP
CASB
Copyright © 2017 Forcepoint. All rights reserved.
Users from Anywhere
Cloud Access Security
Broker (CASB)
WHAT IS A CLOUD ACCESS SECURITY BROKER (CASB)?
Users From
the Office
Users from Home
Cloud
Provides a Layer
of Visibility
and Control
or
Copyright © 2017 Forcepoint. All rights reserved. | 12
IMPROVE VISIBILITY
Discover Shadow IT & Risk
Effective CASBs:
1. Eliminate blind spots
2. Discover what cloud apps are
being used by your workforce
3. Risk rank those cloud apps so IT
teams know what usage has the
highest risk
Copyright © 2017 Forcepoint. All rights reserved.
VISIBILITY – WHO, WHAT (DATA), WHEN, WHERE, WHAT (DEVICE)
Unusual Access
Detect access anomalies that may
indicate an external or insider
threat targeting your data
Audit Trails
ID, department, location, time, device,
actions and data accessed
Admin Activity
Track, monitor, and report all administrative and privileged user activity:
data accesses, configuration changes and permission modifications
Copyright © 2017 Forcepoint. All rights reserved.
ACCOUNTABILITY
Identification of Excess Privileges
• Users may have excess privileges. You
could be overlooking unauthorized
access to sensitive corporate or
customer information.
Secure Access From Managed and Unmanaged Devices
• Force multi-factor authentication based on user, device,
mobile app, location or risk profile
• Limit access or ability to download information for
unmanaged devices
• Restrict access or permissions from outside the country
Copyright © 2017 Forcepoint. All rights reserved. | 15
SECURITY AND COMPLIANCE
Detection of Compliance Gaps
Get notified when cloud app security settings
change and compare them to industry best
practices or standards (e.g., HIPAA, PCI DSS,
ISO, CSA) to highlight deficiencies that require
immediate attention.
Identify Exposed Sensitive Information
Scan corporate files and data stored in file-
sharing services such as OneDrive, Box, Dropbox
and Google Drive for sensitive information and
initiate a remediation workflow, if necessary.
Copyright © 2017 Forcepoint. All rights reserved. | 16
Security and compliance
Prevent Leaks of Sensitive Data
Inspect files and cloud content in real-time to
prevent the malicious or unintentional
leakage of confidential information.
Identify and analyze sensitive or regulated
data stored in cloud file-sync services to
understand sharing permissions exposure
and ensure compliance with regulations such
as PCI, SOX, and HIPAA.
Copyright © 2017 Forcepoint. All rights reserved. | 17
BEHAVIOR AND INTENT
Optimize Detection of Anomalies and
Threats
Forcepoint CASB is the only cloud access
security broker out there that protects
enterprise data from theft and loss due to
compromised, malicious, and careless
users and that correlates activity anomalies
with risky IP addresses.
Copyright © 2017 Forcepoint. All rights reserved.
NEED FOR
OPERATIONAL EFFICIENCY
Copyright © 2017 Forcepoint. All rights reserved. | 19
DRIVES OPERATIONAL EFFICIENCIES
Identifying Security Gaps
CASB APIs can analyze your cloud tenants,
helping IT review users and admins to
detect dormant accounts, external users,
and ex-employees that might still have
access to your cloud apps.
In addition, it inspects your tenant security
configurations to detect deficiencies and to
recommend best-practice settings for
effective cloud governance.
Copyright © 2017 Forcepoint. All rights reserved. | 20
ANALYZING BEHAVIOR TO UNDERSTAND INTENT
Detect & Block Cyber Attacks
CASB monitors all user activity and
analyzes usage patterns to rapidly detect
anomalies that can indicate an account
takeover (much more efficient)
The dashboard provides a wealth of cloud
analytics, highlighting suspicious activities
and attempts to compromise accounts
Copyright © 2017 Forcepoint. All rights reserved. | 21
CLOUD CONVERGENCE & GOVERNANCE
Common Tools Across Platforms
Mature vendors can offer integrated
tool sets that work on premise and in
the cloud (no separate tools
necessary)
Cloud App Metrics
Automate cloud app metrics - number of
users, activity level, traffic volume and
usage hours for each app.
Identification of Overspend
Review the entitlements of your users. You
could be overlooking potential areas of risk
or possibly cost savings opportunities.
Copyright © 2017 Forcepoint. All rights reserved.
CRITICAL CAPABILITIES FOR
CLOUD SECURITY PROVIDERS
Copyright © 2017 Forcepoint. All rights reserved. | 23
Copyright © 2017 Forcepoint. All rights reserved. | 24
THEY SHOULD HAVE BROAD GLOBAL PRESENCE
USA-NA
Toronto
San Jose
Dallas
Miami
Ashburn
Chicago
New York
Los Angeles
CALA
Sao Paulo
AFRICA
Johannesburg
EMEA
Amsterdam
Dusseldorf
Frankfurt
Geneva
Istanbul
London (3)
Paris
Stockholm
Warsaw
Milan
APAC
Tokyo
Hong Kong
Sydney
Singapore
Mumbai
Copyright © 2017 Forcepoint. All rights reserved. | 25
DON’T ACCEPT LATENCY
 Multiple Tier-1 ISPs
 Maintain our own ASNs
 Present at peering exchanges
 Content providers and Network providers
Copyright © 2017 Forcepoint. All rights reserved. | 26
THEY SHOULD BE CERTIFIED (THEIR ENTIRE CAPABILITY)
Forcepoint certifications cover
complete operations and staff
 Architecture
 Development
 Deployment
 Operations
 Data Center
 Services
 SOC
In Process:
 FedRAMP
 GDPR (ISO 27018 supports)
 ISO 27017 (Cloud Security)
 ISO 22301 (Bus Continuity)
Forcepoint Compliance Standards
Star Gold Award
Copyright © 2017 Forcepoint. All rights reserved.
THE CLOUD SECURITY FOGLIGHT
1. Can identify cloud services being used and
risk-rank them
2. Can provide detailed usage activity – even for
administrators
3. Can trigger adaptive authentication
4. Can help identify unauthorized access activity
5. Can identify user access anomalies and
correlate that with cloud apps
6. Can discover sensitive data in cloud apps
and assess risk
Copyright © 2017 Forcepoint. All rights reserved.
THE CLOUD SECURITY FOGLIGHT
7. Can identify when non-compliant
changes are made
8. Can identify users with excess
privileges
9. Can limit functionality for unmanaged
devices (and managed ones too!)
10. Can integrate with DLP and web
gateways for comprehensive security
11. Can analyze user behavior to
understand anomalies and user intent
12. Can ease information security workload
Copyright © 2017 Forcepoint. All rights reserved. | 29
Where information is most valuable
– and most vulnerable
PROTECTING
THE HUMAN POINT
Doug Copley
Deputy CISO; Sr. Security & Privacy Strategist
LinkedIn: linkedin.com/in/dcopley
Twitter: @hcare_security

More Related Content

PDF
GDPR is Here. Now What?
PPTX
Forcepoint Advanced Malware Detection
PPTX
CASB: Securing your cloud applications
PDF
CASB — Your new best friend for safe cloud adoption?
PPTX
Top 5 Information Security Lessons Learned from Transitioning to the Cloud
PDF
Cybersecurity frameworks globally and saudi arabia
PPTX
Driving the successful adoption of Microsoft Office 365
PDF
Symantec Webinar | Tips for Successful CASB Projects
GDPR is Here. Now What?
Forcepoint Advanced Malware Detection
CASB: Securing your cloud applications
CASB — Your new best friend for safe cloud adoption?
Top 5 Information Security Lessons Learned from Transitioning to the Cloud
Cybersecurity frameworks globally and saudi arabia
Driving the successful adoption of Microsoft Office 365
Symantec Webinar | Tips for Successful CASB Projects

What's hot (20)

PDF
Forcepoint Dynamic Data Protection
PDF
63 Requirements for CASB
PDF
Global Mandate to Secure Cloud Computing
PPTX
The Cloud & I, The CISO challenges with Cloud Computing
PPTX
FS-ISAC APAC Summit 2017 Singapore - Of Crown Jewels and Data Assets
PPTX
CASBs and Office 365: The Security Menace
PDF
Symantec - The Importance of Building Your Zero Trust Program on a Solid Plat...
PDF
Why Everyone Needs a Cloud-First Security Program - SASEfaction Guaranteed!
PDF
Cloud Security 101 by Madhav Chablani
PPTX
Webinar - Bitglass and CyberEdge - Hidden Security Threats
PDF
Brochure forcepoint dlp_en
PPTX
Cloud security for banks - the central bank of Israel regulations for cloud s...
PPTX
McAfee - MVISION Cloud (MVC) - Cloud Access Security Broker (CASB)
PPTX
Cloud security, Cloud security Access broker, CSAB's 4 pillar, deployment mode
PPTX
Forrester Research: Securing the Cloud When Users are Left to Their Own Devices
PDF
CSA Security Guidance Cloud Computing v3.0
PDF
Saas security stock company
PDF
PDF
SEB Forcepoint Corporate Overview
PPTX
Secure your cloud applications by building solid foundations with enterprise ...
Forcepoint Dynamic Data Protection
63 Requirements for CASB
Global Mandate to Secure Cloud Computing
The Cloud & I, The CISO challenges with Cloud Computing
FS-ISAC APAC Summit 2017 Singapore - Of Crown Jewels and Data Assets
CASBs and Office 365: The Security Menace
Symantec - The Importance of Building Your Zero Trust Program on a Solid Plat...
Why Everyone Needs a Cloud-First Security Program - SASEfaction Guaranteed!
Cloud Security 101 by Madhav Chablani
Webinar - Bitglass and CyberEdge - Hidden Security Threats
Brochure forcepoint dlp_en
Cloud security for banks - the central bank of Israel regulations for cloud s...
McAfee - MVISION Cloud (MVC) - Cloud Access Security Broker (CASB)
Cloud security, Cloud security Access broker, CSAB's 4 pillar, deployment mode
Forrester Research: Securing the Cloud When Users are Left to Their Own Devices
CSA Security Guidance Cloud Computing v3.0
Saas security stock company
SEB Forcepoint Corporate Overview
Secure your cloud applications by building solid foundations with enterprise ...
Ad

Similar to Improving Cloud Visibility, Accountability & Security (20)

PPTX
Cloudy with a Chance of...Visibility, Accountability & Security
PPTX
Proteja sus datos en cualquier servicio Cloud y Web de forma unificada
PPTX
Webinar bitglass - complete deck-2
PPTX
The Enablement of an Identity-Centric SOC in the Regulatory Rumba Era
PPTX
Cloud Seeding
PDF
Forcepoint: Technická opatření pro ochranu osobních údajů (a citlivých dat) z...
PPTX
Security and Compliance with SharePoint and Office 365
PPTX
Larry Whiteside - Optiv Cloud ready or steam rolled csa version
PPTX
Accelerated Saa S Exec Briefing V2
PPTX
Securing Beyond the Cloud Generation
PPTX
Atelier Technique - Symantec - #ACSS2019
PDF
The Role of Cloud Access Security Brokers in Securing SaaS Applications.pdf
PPTX
5 Highest-Impact CASB Use Cases - Office 365
PPTX
How to Recover from a Ransomware Disaster
PPTX
Forcepoint Corporate Presentation_Short.pptx
PPTX
5 Highest-Impact CASB Use Cases
PDF
SYN 220: XenApp and XenDesktop Security Best Practices
PDF
Cisco connect winnipeg 2018 unlocking business value with network programma...
PDF
Take It to the Cloud: The Evolution of Security Architecture
PPTX
Security in the Hybrid Cloud at Liberty Mutual
Cloudy with a Chance of...Visibility, Accountability & Security
Proteja sus datos en cualquier servicio Cloud y Web de forma unificada
Webinar bitglass - complete deck-2
The Enablement of an Identity-Centric SOC in the Regulatory Rumba Era
Cloud Seeding
Forcepoint: Technická opatření pro ochranu osobních údajů (a citlivých dat) z...
Security and Compliance with SharePoint and Office 365
Larry Whiteside - Optiv Cloud ready or steam rolled csa version
Accelerated Saa S Exec Briefing V2
Securing Beyond the Cloud Generation
Atelier Technique - Symantec - #ACSS2019
The Role of Cloud Access Security Brokers in Securing SaaS Applications.pdf
5 Highest-Impact CASB Use Cases - Office 365
How to Recover from a Ransomware Disaster
Forcepoint Corporate Presentation_Short.pptx
5 Highest-Impact CASB Use Cases
SYN 220: XenApp and XenDesktop Security Best Practices
Cisco connect winnipeg 2018 unlocking business value with network programma...
Take It to the Cloud: The Evolution of Security Architecture
Security in the Hybrid Cloud at Liberty Mutual
Ad

More from Doug Copley (7)

PDF
Security Program Guidance and Establishing a Culture of Security
PDF
Demonstrating Information Security Program Effectiveness
PDF
Improving Security Metrics
PDF
Cybersecurity Challenges in Healthcare
PDF
What it Takes to be a CISO in 2017
PDF
2015 Secureworld_effectively_managing_information_risk
PDF
Detroit ISSA Healthcare Cybersecurity
Security Program Guidance and Establishing a Culture of Security
Demonstrating Information Security Program Effectiveness
Improving Security Metrics
Cybersecurity Challenges in Healthcare
What it Takes to be a CISO in 2017
2015 Secureworld_effectively_managing_information_risk
Detroit ISSA Healthcare Cybersecurity

Recently uploaded (20)

PDF
“Google Algorithm Updates in 2025 Guide”
PPTX
innovation process that make everything different.pptx
PPTX
Introuction about ICD -10 and ICD-11 PPT.pptx
PPTX
international classification of diseases ICD-10 review PPT.pptx
PPTX
Job_Card_System_Styled_lorem_ipsum_.pptx
PPT
tcp ip networks nd ip layering assotred slides
PDF
Tenda Login Guide: Access Your Router in 5 Easy Steps
PPTX
SAP Ariba Sourcing PPT for learning material
PDF
LABUAN4D EXCLUSIVE SERVER STAR GAMING ASIA NO.1
PPTX
Internet___Basics___Styled_ presentation
PDF
Decoding a Decade: 10 Years of Applied CTI Discipline
PDF
Paper PDF World Game (s) Great Redesign.pdf
PDF
WebRTC in SignalWire - troubleshooting media negotiation
PDF
LABUAN4D EXCLUSIVE SERVER STAR GAMING ASIA NO.1
PDF
Sims 4 Historia para lo sims 4 para jugar
PDF
💰 𝐔𝐊𝐓𝐈 𝐊𝐄𝐌𝐄𝐍𝐀𝐍𝐆𝐀𝐍 𝐊𝐈𝐏𝐄𝐑𝟒𝐃 𝐇𝐀𝐑𝐈 𝐈𝐍𝐈 𝟐𝟎𝟐𝟓 💰
PDF
Triggering QUIC, presented by Geoff Huston at IETF 123
PDF
An introduction to the IFRS (ISSB) Stndards.pdf
PPTX
introduction about ICD -10 & ICD-11 ppt.pptx
PPTX
Digital Literacy And Online Safety on internet
“Google Algorithm Updates in 2025 Guide”
innovation process that make everything different.pptx
Introuction about ICD -10 and ICD-11 PPT.pptx
international classification of diseases ICD-10 review PPT.pptx
Job_Card_System_Styled_lorem_ipsum_.pptx
tcp ip networks nd ip layering assotred slides
Tenda Login Guide: Access Your Router in 5 Easy Steps
SAP Ariba Sourcing PPT for learning material
LABUAN4D EXCLUSIVE SERVER STAR GAMING ASIA NO.1
Internet___Basics___Styled_ presentation
Decoding a Decade: 10 Years of Applied CTI Discipline
Paper PDF World Game (s) Great Redesign.pdf
WebRTC in SignalWire - troubleshooting media negotiation
LABUAN4D EXCLUSIVE SERVER STAR GAMING ASIA NO.1
Sims 4 Historia para lo sims 4 para jugar
💰 𝐔𝐊𝐓𝐈 𝐊𝐄𝐌𝐄𝐍𝐀𝐍𝐆𝐀𝐍 𝐊𝐈𝐏𝐄𝐑𝟒𝐃 𝐇𝐀𝐑𝐈 𝐈𝐍𝐈 𝟐𝟎𝟐𝟓 💰
Triggering QUIC, presented by Geoff Huston at IETF 123
An introduction to the IFRS (ISSB) Stndards.pdf
introduction about ICD -10 & ICD-11 ppt.pptx
Digital Literacy And Online Safety on internet

Improving Cloud Visibility, Accountability & Security

  • 1. Copyright © 2017 Forcepoint. All rights reserved. Cloudy with a Chance of ... Visibility, Accountability & Security Doug Copley Deputy CISO; Sr. Security & Privacy Strategist March 16, 2016
  • 2. Copyright © 2017 Forcepoint. All rights reserved. CMO: Big board meeting in an hour Need latest customer data from Rita Her office is dark… Uh ohhh… Where is Rita?
  • 3. Copyright © 2017 Forcepoint. All rights reserved. | 3 WHY CLOUD? 1. Salesforce.com – “Why Move To The Cloud? 10 Benefits Of Cloud Computing” (11/15) 1. Time to Market 2. Scale, Cost Flexibility 3. Work From Anywhere 4. Automatic Updates/Patches 5. Focus on Mission 6. BC/DR 7. Competitiveness 8. Security
  • 4. Copyright © 2017 Forcepoint. All rights reserved. THE CLOUD IS CHANGING IT AND SECURITY MUST EVOLVE Cloud adoption is growing and it’s not slowing down ▸ Cloud now 40% of IT budgets1 ▸ 78% of organizations indicate that their budget for cloud services will increase by 2017, with 29% expecting significant increases1 SaaS adoption exploding Organizations now have a “Cloud First” mentality ▸ SaaS (Software as a Service) spend is projected to grow to $75B by 2020 at a 19.2% compound annual growth rate2 ▸ Of those Gartner surveyed who use or plan to use cloud services, 88% have a “Cloud First” strategy for technology initiatives1 1. Gartner – “Market Trends: Cloud Adoption Trends Favor Public Cloud With a Hybrid Twist (08/16) 2. Gartner – Forecast Analysis: Public Cloud Services Worldwide, 4Q16 Update (01/17) There’s no turning back, but how do you keep your business secure?
  • 5. Copyright © 2017 Forcepoint. All rights reserved. BARRIERS TO CLOUD ADOPTION
  • 6. Copyright © 2017 Forcepoint. All rights reserved. | 6 Budget Organization Enablement Project Delivery Lifecycle Security Architecture Governance, Risk & Compliance Legal & Human Resources Threat Prevention, Detection & Response Identity Management Risk Management
  • 7. Copyright © 2017 Forcepoint. All rights reserved. CONTROL QUESTIONS FOR CLOUD COMPUTING “How do I know if departments are using unsanctioned cloud applications?” “How to we protect web usage without a proxy on site?” “How can we protect email when it’s in Office365 or GMail? What about sandboxing?” “Everyone can get to the cloud. How can I make sure only authorized users access our data?” (Authentication/Authorization) “How do I inspect cloud traffic (for data loss) when it never traverses our network? What if it’s TLS traffic?”
  • 8. Copyright © 2017 Forcepoint. All rights reserved. | 8 DATA-CENTRIC CONTEXT AWARE MODEL What are my critical assets? Where are they? How much protection is needed? General Email Meeting Notes Source Code Product Designs HR Data Marketing Materials Telephone Directory Product Manuals Public Presentations Internal Repository And ??? GitHub? PCs? Department OneDrive ADP Cloud Application Server Inventory In ServiceNow
  • 9. Copyright © 2017 Forcepoint. All rights reserved. ADDRESSING SECURITY IN THE CLOUD
  • 10. Copyright © 2017 Forcepoint. All rights reserved. Corporate Environment Cloud Security Vendor/AWS/Azure Web Proxy Email GW Sandbox DLP CASB
  • 11. Copyright © 2017 Forcepoint. All rights reserved. Users from Anywhere Cloud Access Security Broker (CASB) WHAT IS A CLOUD ACCESS SECURITY BROKER (CASB)? Users From the Office Users from Home Cloud Provides a Layer of Visibility and Control or
  • 12. Copyright © 2017 Forcepoint. All rights reserved. | 12 IMPROVE VISIBILITY Discover Shadow IT & Risk Effective CASBs: 1. Eliminate blind spots 2. Discover what cloud apps are being used by your workforce 3. Risk rank those cloud apps so IT teams know what usage has the highest risk
  • 13. Copyright © 2017 Forcepoint. All rights reserved. VISIBILITY – WHO, WHAT (DATA), WHEN, WHERE, WHAT (DEVICE) Unusual Access Detect access anomalies that may indicate an external or insider threat targeting your data Audit Trails ID, department, location, time, device, actions and data accessed Admin Activity Track, monitor, and report all administrative and privileged user activity: data accesses, configuration changes and permission modifications
  • 14. Copyright © 2017 Forcepoint. All rights reserved. ACCOUNTABILITY Identification of Excess Privileges • Users may have excess privileges. You could be overlooking unauthorized access to sensitive corporate or customer information. Secure Access From Managed and Unmanaged Devices • Force multi-factor authentication based on user, device, mobile app, location or risk profile • Limit access or ability to download information for unmanaged devices • Restrict access or permissions from outside the country
  • 15. Copyright © 2017 Forcepoint. All rights reserved. | 15 SECURITY AND COMPLIANCE Detection of Compliance Gaps Get notified when cloud app security settings change and compare them to industry best practices or standards (e.g., HIPAA, PCI DSS, ISO, CSA) to highlight deficiencies that require immediate attention. Identify Exposed Sensitive Information Scan corporate files and data stored in file- sharing services such as OneDrive, Box, Dropbox and Google Drive for sensitive information and initiate a remediation workflow, if necessary.
  • 16. Copyright © 2017 Forcepoint. All rights reserved. | 16 Security and compliance Prevent Leaks of Sensitive Data Inspect files and cloud content in real-time to prevent the malicious or unintentional leakage of confidential information. Identify and analyze sensitive or regulated data stored in cloud file-sync services to understand sharing permissions exposure and ensure compliance with regulations such as PCI, SOX, and HIPAA.
  • 17. Copyright © 2017 Forcepoint. All rights reserved. | 17 BEHAVIOR AND INTENT Optimize Detection of Anomalies and Threats Forcepoint CASB is the only cloud access security broker out there that protects enterprise data from theft and loss due to compromised, malicious, and careless users and that correlates activity anomalies with risky IP addresses.
  • 18. Copyright © 2017 Forcepoint. All rights reserved. NEED FOR OPERATIONAL EFFICIENCY
  • 19. Copyright © 2017 Forcepoint. All rights reserved. | 19 DRIVES OPERATIONAL EFFICIENCIES Identifying Security Gaps CASB APIs can analyze your cloud tenants, helping IT review users and admins to detect dormant accounts, external users, and ex-employees that might still have access to your cloud apps. In addition, it inspects your tenant security configurations to detect deficiencies and to recommend best-practice settings for effective cloud governance.
  • 20. Copyright © 2017 Forcepoint. All rights reserved. | 20 ANALYZING BEHAVIOR TO UNDERSTAND INTENT Detect & Block Cyber Attacks CASB monitors all user activity and analyzes usage patterns to rapidly detect anomalies that can indicate an account takeover (much more efficient) The dashboard provides a wealth of cloud analytics, highlighting suspicious activities and attempts to compromise accounts
  • 21. Copyright © 2017 Forcepoint. All rights reserved. | 21 CLOUD CONVERGENCE & GOVERNANCE Common Tools Across Platforms Mature vendors can offer integrated tool sets that work on premise and in the cloud (no separate tools necessary) Cloud App Metrics Automate cloud app metrics - number of users, activity level, traffic volume and usage hours for each app. Identification of Overspend Review the entitlements of your users. You could be overlooking potential areas of risk or possibly cost savings opportunities.
  • 22. Copyright © 2017 Forcepoint. All rights reserved. CRITICAL CAPABILITIES FOR CLOUD SECURITY PROVIDERS
  • 23. Copyright © 2017 Forcepoint. All rights reserved. | 23
  • 24. Copyright © 2017 Forcepoint. All rights reserved. | 24 THEY SHOULD HAVE BROAD GLOBAL PRESENCE USA-NA Toronto San Jose Dallas Miami Ashburn Chicago New York Los Angeles CALA Sao Paulo AFRICA Johannesburg EMEA Amsterdam Dusseldorf Frankfurt Geneva Istanbul London (3) Paris Stockholm Warsaw Milan APAC Tokyo Hong Kong Sydney Singapore Mumbai
  • 25. Copyright © 2017 Forcepoint. All rights reserved. | 25 DON’T ACCEPT LATENCY  Multiple Tier-1 ISPs  Maintain our own ASNs  Present at peering exchanges  Content providers and Network providers
  • 26. Copyright © 2017 Forcepoint. All rights reserved. | 26 THEY SHOULD BE CERTIFIED (THEIR ENTIRE CAPABILITY) Forcepoint certifications cover complete operations and staff  Architecture  Development  Deployment  Operations  Data Center  Services  SOC In Process:  FedRAMP  GDPR (ISO 27018 supports)  ISO 27017 (Cloud Security)  ISO 22301 (Bus Continuity) Forcepoint Compliance Standards Star Gold Award
  • 27. Copyright © 2017 Forcepoint. All rights reserved. THE CLOUD SECURITY FOGLIGHT 1. Can identify cloud services being used and risk-rank them 2. Can provide detailed usage activity – even for administrators 3. Can trigger adaptive authentication 4. Can help identify unauthorized access activity 5. Can identify user access anomalies and correlate that with cloud apps 6. Can discover sensitive data in cloud apps and assess risk
  • 28. Copyright © 2017 Forcepoint. All rights reserved. THE CLOUD SECURITY FOGLIGHT 7. Can identify when non-compliant changes are made 8. Can identify users with excess privileges 9. Can limit functionality for unmanaged devices (and managed ones too!) 10. Can integrate with DLP and web gateways for comprehensive security 11. Can analyze user behavior to understand anomalies and user intent 12. Can ease information security workload
  • 29. Copyright © 2017 Forcepoint. All rights reserved. | 29 Where information is most valuable – and most vulnerable PROTECTING THE HUMAN POINT Doug Copley Deputy CISO; Sr. Security & Privacy Strategist LinkedIn: linkedin.com/in/dcopley Twitter: @hcare_security