Anatomy of a Cloud Data Breach

Logo
Presented by

Bob Gilbert; Chief Evangelist, Netskope

About this talk

Cloud adoption is exploding with nearly 1,300 cloud apps in use in an average enterprise. From suites like Office 365 to collaboration tools like Slack, the cloud has enabled new levels of productivity resulting in enterprises gaining strategic advantages. Enterprises are not the only ones benefitting from cloud adoption. Bad actors are using the cloud to bypass legacy defense mechanisms and harvest credentials, deliver malicious payloads, and steal data. Join this informative session to learn about a couple of recent cloud data breaches and dissect how these breaches occurred and best practices to reduce the chance it will happen to your organization. You will learn: • About new attack scenarios that involve using the cloud to bypass traditional security tools • How the cloud-enabled kill chain forces a rethinking of how to defend against threats such as Clouphishing and data exfiltration • 5 steps to protect against cloud threats
Related topics:

More from this channel

Upcoming talks (1)
On-demand talks (904)
Subscribers (65204)
CSA CloudBytes was launched as a webinar series to help us educate the industry on all matters related to the cloud. Our channel is designed to inform our audience about trending topics, new technologies, and latest research. Learn more at cloudsecurityalliance.org. Join the Cloud Security Alliance on LinkedIn and follow us on twitter: @cloudsa