How to Stop Cloud Threats by Leveraging CASB With a People-Centric Cybersecurity

Logo
Presented by

Itir Clarke of Proofpoint & Rich Mogull of CSA

About this talk

Once your organization migrates to the cloud, protecting your people and the data they create becomes more challenging and critical than ever. Cybercriminals are launching wide-scale brute force attacks on cloud services to compromise user accounts. 85% of Office 365 and G Suite tenants are targeted. After taking over your trusted accounts, threat actors use social engineering tactics to trick even the most savvy users to install malware, transfer money or hand over sensitive data. That's why a people-centric approach to your cloud security is one of the most effective ways to provide visibility and control over your cloud applications. So what does a people-centric strategy look like and how can you use it to better your overall cloud security? Join our experts for a deep dive into how to use a Cloud Access Security Broker (CASB) to protect your organization's IT-approved applications, such as Office 365 and G Suite that contain your most valuable assets: your people and data. In this session, we'll examine: - What the most prevalent cloud attacks are and how they target your VAPs, or Very Attacked People -Why a people-centric approach to cloud security is one of the most effective ways to protect your VAPs - The different CASB use cases, features, and architectures - What to look for in a CASB solution to mitigate the risks you're likely to face
Related topics:

More from this channel

Upcoming talks (2)
On-demand talks (901)
Subscribers (65594)
CSA CloudBytes was launched as a webinar series to help us educate the industry on all matters related to the cloud. Our channel is designed to inform our audience about trending topics, new technologies, and latest research. Learn more at cloudsecurityalliance.org. Join the Cloud Security Alliance on LinkedIn and follow us on twitter: @cloudsa