SlideShare a Scribd company logo
2016 © Netskope. All rights reserved. 2016 © Netskope. All rights reserved.
The Definitive CASB Business Case Kit
Jamie Barnett, CISSP, SVP Cloud Intelligence
2016 © Netskope. All rights reserved.
Gartner’s Top 10 Information Security Technologies
2
#1
2016 © Netskope. All rights reserved. 3
But When Your Day Job Looks Like This, Who Has
Time for “New Initiatives?”
2016 © Netskope. All rights reserved. 4
The Dreaded
Business Case
(cue dramatic music)
2016 © Netskope. All rights reserved. 5
First, Quantify Usage and Risk
2016 © Netskope. All rights reserved. 6
Actual:
977
IT estimate:
40-50
Source: Netskope Cloud Report
Cloud procurement happens
outside of IT
It’s every line of business, every
function, workgroup, and person.
No visibility or control
2016 © Netskope. All rights reserved.
33 Percent Business Data in Cloud
7
one-third
of it
“unknown”
2016 © Netskope. All rights reserved. 8
25 “ecosystem” apps
on average per “anchor
tenant” app or suite
2016 © Netskope. All rights reserved. 9
Nearly Half
of all cloud app
activities originate
from a mobile device
One Third
of all DLP policy
violations occur on a
mobile device
2016 © Netskope. All rights reserved. 10
Risk = Assets x Vulnerabilities x Threats
ASSET
THREAT
VULNERABILITY
Data (cost of losing or leaking sensitive data)
Systems (cost of downtime of a business-critical system)
External (malware, data breach)
Technical (vulnerabilities, e.g., OpenSSL)
Non-technical (people, misconfigurations, share button)
(how this definition might look when it’s in the cloud)
Internal (data loss or exposure, system downtime)
2016 © Netskope. All rights reserved. 11
data
leak
IP worth $50M Shared with
design
collaborator
Who leaves
company with
your data
2016 © Netskope. All rights reserved. 12
Then, Benchmark Against Others
2016 © Netskope. All rights reserved.
Next, Determine Your CASB Use Cases
13
VISIBILITY
DATA
SECURITY
COMPLIANCE
THREAT
PROTECTION
The Four Pillars of CASB
“CASB is a required security platform for
organizations using cloud services.”
2016 © Netskope. All rights reserved.
Use Case 1: Visibility Use Case
14
• Discover apps
• Assess enterprise-readiness
• Calculate risk
• Find compromised credentials,
malicious sites, TORs, anonymizers
2016 © Netskope. All rights reserved.
Use Case 2: Compliance Use Case
15
• GDPR – residency, privacy
• PII – downloads from HR
• SOX – data mods in finance
• PCI – shares of PCI
• NERC/FERC – data upload
2016 © Netskope. All rights reserved.
Use Case 3: Data Security Use Case
16
• Protect confidential data in sanctioned
apps, e.g., O365
• Prevent IP upload to unsanctioned
apps
• Encrypt sensitive data at rest and en
route
2016 © Netskope. All rights reserved.
• Block or remediate malware in
sanctioned/unsanctioned
• Detect and remediate ransomware
• Share threat intelligence with
EDR/sandbox
Use Case 4: Threat Protection Use Case
17
2016 © Netskope. All rights reserved.
Quantify ROI Based on Those Use Cases
(Customer Sample. Values Vary by Enterprise.)
18
VISIBILITY
DATA
SECURITY
COMPLIANCE
THREAT
PROTECTION
Avoidance of
failed audits
Avoidance of
non-compliance
Assessment of
existing apps
Assessment
of new apps
Automation of log
collection and review
Consolidation of
redundant apps
$605,000 $10,495,000 $357,500 $390,000
$312,000 $536,250 $16,419,476
Total Cost
Avoidance +
Savings
+ + +
+ +
Avoidance of data
breaches
involving cloud
$3,723,726
=
2016 © Netskope. All rights reserved.
Finally, Plan and Share Your Roadmap and Value Timeline
19
Mobile Device
Management
Sandboxed
Mail and WebCloud Spend
Control
Data Loss
Prevention
Real-time
Policy
Enforcement
Govern all
cloud apps,
including
ecosystems
Allow, Don’t
Block
Netskope Value-on-Investment
Any app, any device, anywhere
Malware
Protection
Discover all cloud apps
and assess risk
Vendor
Assurance
Risk
Assessment
Netskope Advanced Discovery
Safely enable sanctioned
cloud apps
Govern all apps and data
Netskope for:
Box, Dropbox, Egnyte, Google
Suite/GCP, Office 365, Salesforce,
ServiceNow, Slack
Netskope Active Platform
Granular
Access
Control
DLP, anti-malware,
real-time policy
enforcement, and
access control
across all apps
2016 © Netskope. All rights reserved.
This Is All Well and Good, But We Need Tools!
(We Put Examples Into a Handy Packet for You: netskope.com/casb-starter-kit)
20
Cloud Risk Assessment Benchmarks ROI Calculator
2016 © Netskope. All rights reserved.
Thank you!
21
Jamie Barnett, CISSP
jamie@netskope.com
@jamiecbarnett
/jamiecbarnett

More Related Content

PDF
Overview of Data Loss Prevention (DLP) Technology
PPTX
Security operation center (SOC)
PPTX
Multi Tenancy In The Cloud
PPTX
Collecting AWS Logs & Introducing Splunk New S3 Compatible Storage (SmartStore)
PDF
Endpoint Detection & Response - FireEye
PPTX
Radware - WAF (Web Application Firewall)
PPTX
5 Highest-Impact CASB Use Cases - Office 365
PPTX
Security Information and Event Management (SIEM)
Overview of Data Loss Prevention (DLP) Technology
Security operation center (SOC)
Multi Tenancy In The Cloud
Collecting AWS Logs & Introducing Splunk New S3 Compatible Storage (SmartStore)
Endpoint Detection & Response - FireEye
Radware - WAF (Web Application Firewall)
5 Highest-Impact CASB Use Cases - Office 365
Security Information and Event Management (SIEM)

What's hot (20)

PPTX
Zero Trust Model
PPTX
Technology Overview - Symantec Data Loss Prevention (DLP)
PDF
Cloud Security: A New Perspective
PDF
Palo alto networks product overview
PDF
Présentation ELK/SIEM et démo Wazuh
PPTX
Understanding Zero Trust Security for IBM i
PPTX
CyberSecurity Portfolio Management
PDF
Netskope Overview
PPTX
Cloud security, Cloud security Access broker, CSAB's 4 pillar, deployment mode
PPTX
Multifactor Authentication
PDF
01- intro to firewall concepts
PPT
Message Authentication
PPTX
Wireshark Packet Analyzer.pptx
PPTX
WannaCry ransomware attack
PPTX
CASB: Securing your cloud applications
PPTX
Data Loss Prevention
PDF
DLP Systems: Models, Architecture and Algorithms
PPTX
Cryptography - Block cipher & stream cipher
Zero Trust Model
Technology Overview - Symantec Data Loss Prevention (DLP)
Cloud Security: A New Perspective
Palo alto networks product overview
Présentation ELK/SIEM et démo Wazuh
Understanding Zero Trust Security for IBM i
CyberSecurity Portfolio Management
Netskope Overview
Cloud security, Cloud security Access broker, CSAB's 4 pillar, deployment mode
Multifactor Authentication
01- intro to firewall concepts
Message Authentication
Wireshark Packet Analyzer.pptx
WannaCry ransomware attack
CASB: Securing your cloud applications
Data Loss Prevention
DLP Systems: Models, Architecture and Algorithms
Cryptography - Block cipher & stream cipher
Ad

Viewers also liked (20)

PPTX
5 Highest-Impact CASB Use Cases
DOCX
Cloud Access Security Broker (CASB)
PPTX
Reference Architecture for Data Loss Prevention in the Cloud
PPTX
WeSecure Data Security Congres: 5 must haves to safe cloud enablement
PDF
Cloud Access Security Brokers - What's all the Hype
PDF
What's casb for cloud first age ?
PPTX
Quantifying Cloud Risk for Your Corporate Leadership
PPTX
Netskope — Shadow IT Is A Good Thing
PPTX
CASB Presentation: The ROC - A Roadmap for Optimizing Communities
PPTX
CloudCodes CASB for Google Apps
PPTX
CASBs: 8 Critical Capabilities in partnership with ISMG Media Group
PDF
2011 strategy conference strategy to execution - final 2
PPTX
SplunkLive! Austin Customer Presentation - Baylor
PDF
June 2016 Worldwide Netskope Cloud Report
PPTX
Lions, Tigers, and PHI, Oh My! The latest in data loss prevention in the cloud.
PDF
Projecting Enterprise Security Requirements on the Cloud
PPT
SplunkLive! Paris 2015 - Euler Hermes
PPTX
Data Breach: The Cloud Multiplier Effect
PDF
Application-aware Network Performance Management with OpManager
PPTX
Webinar Express: What is a CASB?
5 Highest-Impact CASB Use Cases
Cloud Access Security Broker (CASB)
Reference Architecture for Data Loss Prevention in the Cloud
WeSecure Data Security Congres: 5 must haves to safe cloud enablement
Cloud Access Security Brokers - What's all the Hype
What's casb for cloud first age ?
Quantifying Cloud Risk for Your Corporate Leadership
Netskope — Shadow IT Is A Good Thing
CASB Presentation: The ROC - A Roadmap for Optimizing Communities
CloudCodes CASB for Google Apps
CASBs: 8 Critical Capabilities in partnership with ISMG Media Group
2011 strategy conference strategy to execution - final 2
SplunkLive! Austin Customer Presentation - Baylor
June 2016 Worldwide Netskope Cloud Report
Lions, Tigers, and PHI, Oh My! The latest in data loss prevention in the cloud.
Projecting Enterprise Security Requirements on the Cloud
SplunkLive! Paris 2015 - Euler Hermes
Data Breach: The Cloud Multiplier Effect
Application-aware Network Performance Management with OpManager
Webinar Express: What is a CASB?
Ad

Similar to The Definitive CASB Business Case Kit - Presentation (20)

PPTX
Proteja sus datos en cualquier servicio Cloud y Web de forma unificada
PDF
CASB — Your new best friend for safe cloud adoption?
PPTX
Security crawl walk run presentation mckay v1 2017
PDF
5 Mobile App Security MUST-DOs in 2018
PPTX
The Enablement of an Identity-Centric SOC in the Regulatory Rumba Era
PPTX
Making the Case for Stronger Endpoint Data Visibility
PPTX
Combating Insider Threats – Protecting Your Agency from the Inside Out
PPTX
Cloudy with a Chance of...Visibility, Accountability & Security
PPTX
Delivering User Behavior Analytics at Apache Hadoop Scale : A new perspective...
PDF
Securing Your Digital Transformation: Cybersecurity and You
PPTX
Splunk Discovery Day Dubai 2017 - Security Keynote
PPTX
How a Leading Saudi Bank Matured Security to Better Partner the Business
PDF
Data Science for Cyber Risk
PDF
CASE STUDY - Ironclad Messaging & Secure App Dev for Regulated Industries
PPTX
Grid Analytics Europe 2016: "Defend the Grid", April 2016
PPTX
Larry Whiteside - Optiv Cloud ready or steam rolled csa version
PPTX
01-Chapter 01-Introduction to CASB and Netskope.pptx
PDF
Scot Cloud 2016
PDF
Mobile Penetration Testing: Episode 1 - The Forensic Menace
PPTX
Bitglass Webinar - A Primer on CASBs and Cloud Security
Proteja sus datos en cualquier servicio Cloud y Web de forma unificada
CASB — Your new best friend for safe cloud adoption?
Security crawl walk run presentation mckay v1 2017
5 Mobile App Security MUST-DOs in 2018
The Enablement of an Identity-Centric SOC in the Regulatory Rumba Era
Making the Case for Stronger Endpoint Data Visibility
Combating Insider Threats – Protecting Your Agency from the Inside Out
Cloudy with a Chance of...Visibility, Accountability & Security
Delivering User Behavior Analytics at Apache Hadoop Scale : A new perspective...
Securing Your Digital Transformation: Cybersecurity and You
Splunk Discovery Day Dubai 2017 - Security Keynote
How a Leading Saudi Bank Matured Security to Better Partner the Business
Data Science for Cyber Risk
CASE STUDY - Ironclad Messaging & Secure App Dev for Regulated Industries
Grid Analytics Europe 2016: "Defend the Grid", April 2016
Larry Whiteside - Optiv Cloud ready or steam rolled csa version
01-Chapter 01-Introduction to CASB and Netskope.pptx
Scot Cloud 2016
Mobile Penetration Testing: Episode 1 - The Forensic Menace
Bitglass Webinar - A Primer on CASBs and Cloud Security

More from Netskope (20)

PPTX
Netskope Threat Labs: Cloud As an Attack Vector
PDF
Why Everyone Needs a Cloud-First Security Program - SASEfaction Guaranteed!
PDF
MalCon Future of Security
PDF
Phishing in the Cloud Era (BSides)
PPTX
DEF CON 27 - Exploiting AWS Loopholes
PPTX
Defcon 27 - The Future of Command and Control
PPTX
Defcon 27 - Phishing in the Cloud Era
PPTX
Defcon 27 - Exploiting IAM in GCP
PDF
June 2016 EMEA Netskope Cloud Report
PPTX
Cure for the Common Cloud: How Healthcare can Safely Enable the Cloud
PDF
Autumn 2015 EMEA Netskope Cloud Report
PDF
Fall 2015 Worldwide Netskope Cloud Report
PPTX
Cloud Security for Dummies Webinar — The Identity Edition
PPTX
Office 365 in Focus. Security and Governance Strategies from the Experts - We...
PDF
Summer 2015 EMEA Netskope Cloud Report
PDF
Summer 2015 Worldwide Netskope Cloud Report
PPTX
Making Cloud Security Part of Your DNA Webinar Slides
PPTX
Forrester Research: Securing the Cloud When Users are Left to Their Own Devices
PPTX
Data Privacy, Security, and Sovereignty in a Cloudy World
PPTX
The Razor's Edge: Enabling Cloud While Mitigating the Risk of a Cloud Data Br...
Netskope Threat Labs: Cloud As an Attack Vector
Why Everyone Needs a Cloud-First Security Program - SASEfaction Guaranteed!
MalCon Future of Security
Phishing in the Cloud Era (BSides)
DEF CON 27 - Exploiting AWS Loopholes
Defcon 27 - The Future of Command and Control
Defcon 27 - Phishing in the Cloud Era
Defcon 27 - Exploiting IAM in GCP
June 2016 EMEA Netskope Cloud Report
Cure for the Common Cloud: How Healthcare can Safely Enable the Cloud
Autumn 2015 EMEA Netskope Cloud Report
Fall 2015 Worldwide Netskope Cloud Report
Cloud Security for Dummies Webinar — The Identity Edition
Office 365 in Focus. Security and Governance Strategies from the Experts - We...
Summer 2015 EMEA Netskope Cloud Report
Summer 2015 Worldwide Netskope Cloud Report
Making Cloud Security Part of Your DNA Webinar Slides
Forrester Research: Securing the Cloud When Users are Left to Their Own Devices
Data Privacy, Security, and Sovereignty in a Cloudy World
The Razor's Edge: Enabling Cloud While Mitigating the Risk of a Cloud Data Br...

Recently uploaded (20)

PPT
“AI and Expert System Decision Support & Business Intelligence Systems”
PDF
Agricultural_Statistics_at_a_Glance_2022_0.pdf
PDF
Blue Purple Modern Animated Computer Science Presentation.pdf.pdf
PDF
NewMind AI Monthly Chronicles - July 2025
PDF
CIFDAQ's Market Insight: SEC Turns Pro Crypto
PDF
Modernizing your data center with Dell and AMD
PDF
Diabetes mellitus diagnosis method based random forest with bat algorithm
PDF
Peak of Data & AI Encore- AI for Metadata and Smarter Workflows
PDF
The Rise and Fall of 3GPP – Time for a Sabbatical?
PDF
Empathic Computing: Creating Shared Understanding
PDF
Per capita expenditure prediction using model stacking based on satellite ima...
PPTX
Digital-Transformation-Roadmap-for-Companies.pptx
PDF
Build a system with the filesystem maintained by OSTree @ COSCUP 2025
PDF
Spectral efficient network and resource selection model in 5G networks
PPTX
Cloud computing and distributed systems.
PPTX
A Presentation on Artificial Intelligence
PDF
Machine learning based COVID-19 study performance prediction
PDF
Encapsulation theory and applications.pdf
PPTX
Understanding_Digital_Forensics_Presentation.pptx
PDF
Building Integrated photovoltaic BIPV_UPV.pdf
“AI and Expert System Decision Support & Business Intelligence Systems”
Agricultural_Statistics_at_a_Glance_2022_0.pdf
Blue Purple Modern Animated Computer Science Presentation.pdf.pdf
NewMind AI Monthly Chronicles - July 2025
CIFDAQ's Market Insight: SEC Turns Pro Crypto
Modernizing your data center with Dell and AMD
Diabetes mellitus diagnosis method based random forest with bat algorithm
Peak of Data & AI Encore- AI for Metadata and Smarter Workflows
The Rise and Fall of 3GPP – Time for a Sabbatical?
Empathic Computing: Creating Shared Understanding
Per capita expenditure prediction using model stacking based on satellite ima...
Digital-Transformation-Roadmap-for-Companies.pptx
Build a system with the filesystem maintained by OSTree @ COSCUP 2025
Spectral efficient network and resource selection model in 5G networks
Cloud computing and distributed systems.
A Presentation on Artificial Intelligence
Machine learning based COVID-19 study performance prediction
Encapsulation theory and applications.pdf
Understanding_Digital_Forensics_Presentation.pptx
Building Integrated photovoltaic BIPV_UPV.pdf

The Definitive CASB Business Case Kit - Presentation

  • 1. 2016 © Netskope. All rights reserved. 2016 © Netskope. All rights reserved. The Definitive CASB Business Case Kit Jamie Barnett, CISSP, SVP Cloud Intelligence
  • 2. 2016 © Netskope. All rights reserved. Gartner’s Top 10 Information Security Technologies 2 #1
  • 3. 2016 © Netskope. All rights reserved. 3 But When Your Day Job Looks Like This, Who Has Time for “New Initiatives?”
  • 4. 2016 © Netskope. All rights reserved. 4 The Dreaded Business Case (cue dramatic music)
  • 5. 2016 © Netskope. All rights reserved. 5 First, Quantify Usage and Risk
  • 6. 2016 © Netskope. All rights reserved. 6 Actual: 977 IT estimate: 40-50 Source: Netskope Cloud Report Cloud procurement happens outside of IT It’s every line of business, every function, workgroup, and person. No visibility or control
  • 7. 2016 © Netskope. All rights reserved. 33 Percent Business Data in Cloud 7 one-third of it “unknown”
  • 8. 2016 © Netskope. All rights reserved. 8 25 “ecosystem” apps on average per “anchor tenant” app or suite
  • 9. 2016 © Netskope. All rights reserved. 9 Nearly Half of all cloud app activities originate from a mobile device One Third of all DLP policy violations occur on a mobile device
  • 10. 2016 © Netskope. All rights reserved. 10 Risk = Assets x Vulnerabilities x Threats ASSET THREAT VULNERABILITY Data (cost of losing or leaking sensitive data) Systems (cost of downtime of a business-critical system) External (malware, data breach) Technical (vulnerabilities, e.g., OpenSSL) Non-technical (people, misconfigurations, share button) (how this definition might look when it’s in the cloud) Internal (data loss or exposure, system downtime)
  • 11. 2016 © Netskope. All rights reserved. 11 data leak IP worth $50M Shared with design collaborator Who leaves company with your data
  • 12. 2016 © Netskope. All rights reserved. 12 Then, Benchmark Against Others
  • 13. 2016 © Netskope. All rights reserved. Next, Determine Your CASB Use Cases 13 VISIBILITY DATA SECURITY COMPLIANCE THREAT PROTECTION The Four Pillars of CASB “CASB is a required security platform for organizations using cloud services.”
  • 14. 2016 © Netskope. All rights reserved. Use Case 1: Visibility Use Case 14 • Discover apps • Assess enterprise-readiness • Calculate risk • Find compromised credentials, malicious sites, TORs, anonymizers
  • 15. 2016 © Netskope. All rights reserved. Use Case 2: Compliance Use Case 15 • GDPR – residency, privacy • PII – downloads from HR • SOX – data mods in finance • PCI – shares of PCI • NERC/FERC – data upload
  • 16. 2016 © Netskope. All rights reserved. Use Case 3: Data Security Use Case 16 • Protect confidential data in sanctioned apps, e.g., O365 • Prevent IP upload to unsanctioned apps • Encrypt sensitive data at rest and en route
  • 17. 2016 © Netskope. All rights reserved. • Block or remediate malware in sanctioned/unsanctioned • Detect and remediate ransomware • Share threat intelligence with EDR/sandbox Use Case 4: Threat Protection Use Case 17
  • 18. 2016 © Netskope. All rights reserved. Quantify ROI Based on Those Use Cases (Customer Sample. Values Vary by Enterprise.) 18 VISIBILITY DATA SECURITY COMPLIANCE THREAT PROTECTION Avoidance of failed audits Avoidance of non-compliance Assessment of existing apps Assessment of new apps Automation of log collection and review Consolidation of redundant apps $605,000 $10,495,000 $357,500 $390,000 $312,000 $536,250 $16,419,476 Total Cost Avoidance + Savings + + + + + Avoidance of data breaches involving cloud $3,723,726 =
  • 19. 2016 © Netskope. All rights reserved. Finally, Plan and Share Your Roadmap and Value Timeline 19 Mobile Device Management Sandboxed Mail and WebCloud Spend Control Data Loss Prevention Real-time Policy Enforcement Govern all cloud apps, including ecosystems Allow, Don’t Block Netskope Value-on-Investment Any app, any device, anywhere Malware Protection Discover all cloud apps and assess risk Vendor Assurance Risk Assessment Netskope Advanced Discovery Safely enable sanctioned cloud apps Govern all apps and data Netskope for: Box, Dropbox, Egnyte, Google Suite/GCP, Office 365, Salesforce, ServiceNow, Slack Netskope Active Platform Granular Access Control DLP, anti-malware, real-time policy enforcement, and access control across all apps
  • 20. 2016 © Netskope. All rights reserved. This Is All Well and Good, But We Need Tools! (We Put Examples Into a Handy Packet for You: netskope.com/casb-starter-kit) 20 Cloud Risk Assessment Benchmarks ROI Calculator
  • 21. 2016 © Netskope. All rights reserved. Thank you! 21 Jamie Barnett, CISSP jamie@netskope.com @jamiecbarnett /jamiecbarnett