Cloud adoption is exploding with nearly 1,300 cloud apps in use in an average enterprise. From suites like Office 365 to collaboration tools like Slack, the cloud has enabled new levels of productivity resulting in enterprises gaining strategic advantages. Enterprises are not the only
ones benefitting from cloud adoption. Bad actors are using the cloud to bypass legacy defense mechanisms and harvest credentials, deliver malicious payloads, and steal data. Join this informative session to learn about a couple of recent cloud data breaches and dissect how these breaches occurred and best practices to reduce the chance it will happen to your organization. You will learn:
• About new attack scenarios that involve using the cloud to bypass traditional security tools
• How the cloud-enabled kill chain forces a rethinking of how to defend against threats such as Clouphishing and data exfiltration
• 5 steps to protect against cloud threats