Hi [[ session.user.profile.firstName ]]

Elastica Cloud Security Academy

  • Date
  • Rating
  • Views
  • How to Extend Security and Compliance Within Box How to Extend Security and Compliance Within Box Eric Andrews, VP Marketing, Elastica Recorded: Sep 29 2015 21 mins
    Choosing an enterprise-class file sharing service such as Box is a great first step in safely migrating to the cloud. However even with the most robust service, enterprise organizations are still responsible for how their users take advantage of the service, what sensitive content they upload and share, and potential damage due to compromised user credentials.

    In this on-demand webcast, Sergio Castro, Cloud Security Expert at Elastica, will discuss:

    •What base level security Box provides
    •Best practices in identifying sensitive, shared content that may violate compliance policies (PCI, PHI, PII, etc.)
    •Best practices in using data science to uncover risky or anomalous behavior
    •How to automate protection against data breaches, including a demo of the Elastica Securlet™ for Box
  • Cloud DLP: Revealing Shadow IT and Shadow Data Cloud DLP: Revealing Shadow IT and Shadow Data Jim Reavis, CEO, Cloud Security Alliance Recorded: Sep 29 2015 52 mins
    In this cloud DLP webcast, “Cloud Security Alliance and Elastica: Revealing Shadow Data”, Jim Reavis, CEO of CSA, and Elastica delve deeply into the Elastica Q2 2015 Shadow Data Report and share insights into how organizations can unlock the full business potential of cloud apps and the sensitive corporate data stored in them, while staying secure and compliant.

    In addition, Ben Munroe from Cisco shares his insights into how Cisco is addressing the cloud data loss prevention problem.

    Looking beyond Shadow IT, this webcast examines:

    • What types of sensitive data are typically found in cloud sharing apps (PHI, PCE, and PII)
    • Which vertical industries have the riskiest exposures (Hint: its healthcare) and what steps can be taken to mitigate the these risks.
    • Why managing Shadow Data is the next critical step in protecting cloud apps beyond just controlling Shadow IT.
    • How to build an effective cloud app security architecture that provides visibility, control, and remediation.
  • Case Study – A Government Agency’s Passwords Exposed Publicly via Google Drive Case Study – A Government Agency’s Passwords Exposed Publicly via Google Drive Aditya Sood, PhD, Elastica Cloud Threat Labs Recorded: Sep 23 2015 31 mins
    There is no doubt that Google Drive is a best-in-class solution for online file sharing and management. However, accidental or malicious exposure of sensitive files stored on Google Drive can be disastrous for enterprises. Case in point – a recent incident uncovered in a recent Elastica blog post occurred at a government agency where a document containing sensitive data including usernames and passwords stored in Google Drive was exposed publicly. In this webcast, Aditya K. Sood, Elastica Cloud Threat Labs Architect, will discuss:

    •A brief overview of the case study
    •The threat model and possible reasons for document exposure on Google Drive
    •The concept of “window of exposure” in the context of sharing documents and files
    •The different ways that targeted cyber-attacks can be launched using the exposed information
    •The importance of user behavior modeling techniques to detect risky behavior in SaaS applications
  • Protecting Your Data in Google Apps Protecting Your Data in Google Apps Nitin Kumar, Service Deployment Manager, Cisco & Sergio Castro, Elastica Cloud Security Expert Recorded: Sep 18 2015 35 mins
    Google Drive has enabled millions of users to easily share documents and collaborate more effectively. However, a lack of visibility and control by IT departments over these users and their activity in Google Drive has actually dramatically increased the risk of malicious or accidental leakage of business-critical data.

    In this webcast, cloud security experts Nitin Kumar of Cisco, and Sergio Castro of Elastica will discuss best practices for protecting your data in Google Drive. You will learn:

    •What base level security Google Drive provides (and what it doesn’t)
    •Best practices in identifying sensitive, shared content that may violate compliance policies (PCI, PHI, PII, etc.)
    •Best practices in using data science to uncover risky or anomalous behavior
    •How to automate protection against Google Drive data breaches
  • Enabling Dropbox for Business Enabling Dropbox for Business Elastica Cloud Security Expert Recorded: Sep 16 2015 22 mins
    Dropbox has revolutionized how employees can access, share and manage company data and collaborate more effectively. But while the distributive nature of cloud based file sharing makes it invaluable to business productivity, it also adds increased risk of malicious or accidental leakage of business-critical data.

    Today’s cloud sharing services like Dropbox require a complete rethinking of traditional security practices to ensure proper access control, security, and compliance as corporate assets migrate outside the enterprise boundary into 3rd party cloud apps. Implementing these security practices starts with gaining visibility into how cloud apps are being used by employees, identifying sensitive content and how it is being shared, uncovering risky or anomalous behavior, and proactively enforcing policies to protect against internal or external threats.

    In this webinar, you will learn how your organization can leverage Dropbox while protecting data from attacks and maintaining corporate compliance and governance requirements.
  • Protect Your Data in Office 365 Protect Your Data in Office 365 Kapil Raina, Cloud Security Expert Recorded: Sep 15 2015 34 mins
    Office 365 revolutionized how employees work and collaborate by embracing the power of the software-as-a-service (SaaS) model. While the easy deployment and broad access of Office 365 makes it invaluable to business productivity, a SaaS model adds increased risk of malicious or accidental leakage of business-critical data.

    In this on-demand webcast Protect Your Data in Office365 you will learn to:

    Understand how Office 365 is being used by your users
    Identify sensitive content (like payment information, healthcare records, source code, or other types of data) being shared
    Uncover risky or anomalous behavior by rogue insiders
    Automate protection against Office 365 data breaches, minimize false positives, and eliminate the constant retuning of data classification policies

Embed in website or blog