Hi [[ session.user.profile.firstName ]]

Netskope

  • Date
  • Rating
  • Views
  • Malware Attack "Fan-out" Effect in the Cloud Malware Attack "Fan-out" Effect in the Cloud Krishna Narayanaswamy, Founder and Chief Scientist, Netskope Recorded: Jun 21 2016 60 mins
    The rapid rise in cloud adoption – of which corporate IT has underestimated the scope by as much as 10x - has created a new effect: a “cloud attack fan-out.” Between many connected devices, which increase the attack surface, and capabilities like sync and share, which increase data velocity in the cloud, both the propensity and the severity of a breach rise.

    Join Krishna Narayanaswamy, Founder and Chief Scientist of cloud security company Netskope, as he takes an in-depth look at data breaches involving cloud services and how they come about. Krishna will take a fun, CSI-like presentation approach and draw upon unique, anonymized data seen in the cloud to illustrate:

    - The multiplier effect that that the cloud can have on the probability of a data breach
    - Three real-world examples in which the cloud can play a role in data breaches, including a step-by-step review of a recent exploit found in a cloud storage app
    - How to identify data breaches in an enterprise cloud environment using advanced anomaly detection techniques
    - A forensic walk-through in the reconstruction of a complex audit following a data breach
    - Best practices for mitigating breaches as well as monitoring and protecting sensitive enterprise data in the cloud
  • Cloud Security for Dummies, Enterprise Mobility Edition Cloud Security for Dummies, Enterprise Mobility Edition Christopher Campbell, Dir. Enterprise Mobility, VMware & authors of Cloud Security for Dummies, Lebin Cheng & Steve Malmskog Recorded: Apr 26 2016 56 mins
    VMware AirWatch and Netskope present:

    Cloud Security for Dummies, Enterprise Mobility Edition

    As more mission-critical business workflows move to the cloud, yesterday’s security protocols and measures have become inadequate. And as cybersecurity threats increase, protecting business resources from compromised mobile endpoints is no longer a “nice to have” but a “must have” for the digital enterprise. More than half of all enterprise cloud app activities now occur over mobile devices with enterprise mobility at the epicenter and crossroad of business productivity and cybersecurity challenges.

    Join VMware AirWatch Director of Enterprise Mobility, Christopher Campbell and Netskope authors of Cloud Security for Dummies, Steve Malmskog and Lebin Cheng, for a lively discussion and reveal of the 10 “must haves" for cloud-consuming mobile workforces. Attendees will learn how to:

    Use intelligence about identity, device, and cloud usage to inform policy decisions on the device, in the app, and in the cloud;

    Identify cloud app usage trends to anticipate users’ needs and create a better mobile and cloud user experience;

    Proactively protect sensitive user and corporate information through policy; and

    Halt threats in the cloud before they propagate to users’ devices.
  • Safely Enabling the Cloud in a World of Malware and Data Breaches Safely Enabling the Cloud in a World of Malware and Data Breaches Adrian Sanabria, Senior Analyst, Enterprise Security, 451 Research and Abhay Kulkarni, VP Engineering, Netskope Recorded: Apr 12 2016 61 mins
    Cloud adoption is quickly becoming a must-have for enterprises, as organizations clamor to exploit the cost savings and increase in collaboration and productivity that are now established benefits of many cloud apps But at the same time, this rise in adoption – of which corporate IT has underestimated the scope by as much as 10x - has created a new effect: a “cloud attack fan-out.” Between many connected devices, which increase the attack surface, and capabilities like sync and share, which increase data velocity in the cloud, both the propensity and the severity of a breach rise.

    Attend this webinar with Adrian Sanabria, Senior Analyst, Enterprise Security, 451 Research and Abhay Kulkarni, VP Engineering, Netskope for a spirited discussion that will explore the following:

    - Trends in the market related to cloud adoption and the steps being taken to address security concerns;
    - How to securely enable the use of cloud services for enterprise employees;
    - A “how to” for identifying data breaches in an enterprise cloud environment using advanced anomaly detection techniques;
    - Best practices for mitigating breaches as well as monitoring and protecting sensitive enterprise data in the cloud.
  • The Anatomy of a Cloud Data Breach The Anatomy of a Cloud Data Breach Krishna Narayanaswamy, Chief Scientist, Netskope Recorded: Mar 22 2016 27 mins
    As cloud services proliferate in organizations, the nature of data breaches changes to fit the nature of those services. Between many connected devices, which increase the attack surface, and capabilities like sync and share, which increase data velocity in the cloud, both the propensity and the severity of a breach rise. Drawing on unique anonymized data seen in the Netskope cloud, Krishna will demonstrate how to detect a breach in the cloud using anomaly detection techniques, and how to use advanced forensic techniques to reconstruct a complex audit trail of events leading up to and following the breach.
  • Managing the challenges of the cloud under the EU GDPR Managing the challenges of the cloud under the EU GDPR Sue Goltyakova, Senior Marketing Manager, Netskope and Andy Aplin, Technical Director, Netskope Recorded: Feb 17 2016 46 mins
    The EU General Data Protection Regulation will soon become law and will come into force in 2018, so organisations need to start working on their compliance. With many hurdles to overcome, not least of which is managing your data in the cloud, will two years be enough time to get your house in order? We'll explain the key points of the GDPR and how Netskope can help you to control and protect your data in the cloud.
  • 6 Steps to Addressing Your Cloud Security Risks 6 Steps to Addressing Your Cloud Security Risks Scott Hogrefe, VP of Market Data for Netskope Recorded: Jan 20 2016 28 mins
    You can't have a discussion on the next generation of information security without talking about securing the cloud. The “move to the cloud” has long been considered a key initiative by organizations worldwide. With this move, there’s a level of increased risk that enterprises must address. What’s different is using cloud services requires abdicating some control over how systems and data are being protected. We begin this discussion on this footing.

    Join Scott Hogrefe, VP of Market Data for Netskope, who will lead this discussion about what security professionals need to know about:

    - Their cloud risk
    - How to quantify it for their corporate leadership and board of directors
    - How to convey it in the context of their overall cloud strategy
    - 6 steps to take right now to address cloud security risk
  • Office 365 In Focus: Security Strategies from the Experts Office 365 In Focus: Security Strategies from the Experts Adrian Sanabria, 451 Research; Shamiana Soderberg, Microsoft; Jamie Barnett, Netskope Recorded: Nov 18 2015 61 mins
    One of today's biggest cloud trends is enterprise adoption of the Microsoft Office 365 suite. There is one wrinkle, though. Your business wants to move quickly to get immediate value, while your security team needs to proceed a little more cautiously to ensure they can govern usage and protect sensitive data. Can organizations move quickly and instrument the proper controls?

    Join Adrian Sanabria, Senior Security Analyst from 451 Research, Shamiana Soderberg, Senior Business Development Manager Cloud Productivity from Microsoft, and Jamie Barnett, CMO of Netskope for a look at safe enablement best practices for Office 365, and the role Cloud Access Security Brokers play in this effort.

    Attendees will come away with the ten real-world requirements that every organization should consider when adopting a sanctioned cloud productivity suite like Office 365. These requirements will address areas like:
    - Granular administrative and user controls across the Office 365 suite
    - DLP for content “at rest” within and “en route” to or from the suite
    - Usage and data governance within the suite and its ecosystem

Embed in website or blog