We've all heard about the massive breaches that take place, Target, Home Depot, Sony, Anthem, Premera, but what actually happens to the data after it is stolen? Where does it travel? How many people see it, and how much damage can it cause?
In an effort to find the answers to these questions Bitglass launched the world's first data tracking experiment located in the Dark Web. The company created 1,568 fake employee credentials, then placed the information on anonymous file sharing sites within the "Dark web." They tracked the data as it travelled to various locations around the world, and as it was shared amongst cyber-crime syndicates overseas. Here's what they found.
RecordedApr 10 20153 mins
Your place is confirmed, we'll send you email reminders
Mark Bouchard, COO at CyberEdge Group & Salim Hafid, Product Marketing Manager at Bitglass
Enterprises are migrating to the cloud in droves, taking advantage of lower costs, easy deployment, and improved infrastructure security. Protecting data in the cloud, however, remains a challenge as employees push to access cloud apps from any device, anywhere. In the last year alone, 1 in 3 organizations were hacked more than 5 times. Double the rate from 2014.
In this webinar, Mark Bouchard, COO at CyberEdge Group and Salim Hafid, Product Marketing Manager at Bitglass, will discuss major trends impacting cyber security – from the rising frequency of attacks and types of threats that concern organizations the most to the growth in cloud access security brokers (CASBs) – as revealed by a survey of over 1,000 IT professionals. Mark and Salim will also discuss the risks, priorities, and capabilities that are top of mind for enterprises as they migrate to the cloud.
Enterprises are quickly moving their corporate data and custom internal apps to IaaS platforms like AWS, but many lack the visibility and control they need over business-critical workloads. Services like S3 and RDS, for example, store massive volumes of sensitive data that your organization must protect.
In this webinar, we explore how Cloud Access Security Brokers (CASBs) are evolving to protect IaaS with granular access controls, real-time DLP, tokenization, and more. Learn how a CASB can help you achieve compliance and protect data across your IaaS apps.
At Bitglass, innovation and growth are our foundation. As a part of that, we want to keep you in the loop on the new things that are happening with our technology and business. This webinar will cover new features and integration partnerships that we have introduced in Q1 2017.
Some of the features we will cover is legacy client app support for Office 365, a custom app template (add any existing cloud app for access control and download DLP), further IaaS support (AWS as well as custom apps created in IaaS systems), greater malware protection via partnership with Cylance, and DLP Exact Match capabilities.
For healthcare organizations struggling to secure BYOD, Mobile Device Management (MDM) was widely heralded as a solution, one that could completely control unmanaged assets. However, physicians with multiple hospital affiliations coupled with privacy concerns has resulted in stagnant adoption.
In this webinar, we explore alternatives to MDM that protect mobile data and devices without impeding on employee privacy. We'll also explore 6 critical capabilities for securing BYOD to help your firm achieve compliance.
Maxim Integrated - Matt Hollcraft, CISO & Dave Ruedger, Chief Security Architect; Bitglass - Rich Campagna, SVP Products
We are now three plus years into widespread adoption across industries of public SaaS apps like Office 365. Despite this momentum, security and compliance remain top challenges. This webinar, featuring Matt Hollcraft, CISO for Maxim Integrated, Dave Ruedger, Chief Security Architect for Maxim Integrated, and Rich Campagna, SVP of Products for Bitglass, will help you build a 2017 action plan to embrace public cloud without sacrificing security and compliance.
While offering practical, actionable advice for major apps like Office 365, Matt, Dave and Rich will address your top concerns, such as unmanaged device access, external sharing, and mitigating controls. They also will provide real world examples of how other organizations have securely navigated the public cloud.
Michael Ball, CISO at AGF Investments & Rich Campagna, VP of Products at Bitglass
Enterprises are migrating to the cloud in droves, taking advantage of lower costs, easy deployment, and improved infrastructure security. Protecting data in the cloud, however, remains a challenge as employees push to access cloud apps from any device, anywhere.
In this webinar, Michael Ball, CISO at AGF Investments and Rich Campagna, VP of Products at Bitglass, will discuss the evolution of Cloud Access Security Brokers (CASBs), from app discovery tools to mature solutions that now provide deep visibility and control over data across all cloud apps. Michael and Rich will also highlight real-world CASB deployments and how major organizations are leveraging these solutions to protect data end to end, from cloud to device.
Ben Kepes, Technology Evangelist and Subject Matter Expert & Rich Campagna, VP of Products for Bitglass
We're now a couple of solid years into the apocalypse that is ushering in the collapse of premises-based email and productivity suites - mass adoption of Office 365 across every major industry. Despite this momentum, security and compliance remain top challenges. This webinar, featuring Ben Kepes, prolific journalist and security subject matter expert, and Rich Campagna, VP of Products at Bitglass, will introduce the 4 security horsemen of the Office 365 apocalypse - cloud, mobile, identity and access.
With emphasis on practical and immediately useful advice, Ben and Rich will cover the top concerns like unmanaged device access and external sharing, mitigating controls, and will give examples of how other organizations have adopted Office 365 and lived to tell the tale.
As employee-owned devices become the norm in the workplace, organizations without the appropriate security infrastructure lose control and visibility over corporate data accessed from these devices. Enabling secure BYOD has thus become one of the greatest challenges facing IT leaders.
Mobile device management (MDM), seen by many as cumbersome and invasive, have struggled to see meaningful adoption among employees. Instead, enterprises are turning to data-centric security, capable of contextual access controls and real-time DLP. In this webinar, we discuss the trends driving growth in demand for BYOD, the drawbacks of MDM, and some of alternative solutions used to secure employee-owned devices without agents.
Greg Schaffer, CISO for FirstBank & Rich Campagna, VP of Products for Bitglass
Public cloud apps like Office 365 are being widely adopted in every major industry, with security & compliance at the top of the list of concerns. In this webinar, Greg Schaffer, CISO at FirstBank and Rich Campagna, VP of Products at Bitglass, will provide practical cloud security advice that you can apply immediately in your organization. Focusing on O365 but offering a broad view, Greg and Rich will cover top concerns, mitigating controls and will give examples of how your peers have responded to the cloud security challenge.
Join us for our monthly Bitglass Webinar Express - 30 minutes start to finish.
As more organizations look to deploy new or additional cloud apps to enable employee productivity, securing corporate data becomes a challenge. Cloud Access Security Brokers (CASBs) have emerged as the go-to solution for organizations that need end-to-end data security, from cloud to device. In fact, Gartner has identified CASBs as the top technology for information security in 2016 because such solutions mitigate the risks posed by enabling corporate data access from any device, anywhere.
In this webinar, we'll explore:
-The gaps in cloud app security that result in data leakage and how CASBs fill these gaps.
-What makes CASBs different from security solutions built natively into cloud apps like Office 365.
-How CASBs integrate with existing identity and DLP solutions you may have in place.
-What CASBs can do to protect data on unmanaged devices.
Join us to learn how a CASB can help you meet your security and compliance requirements.
Mike Schuricht, Director of Product Management & Salim Hafid, Product Marketing Manager
For financial services firms eager to migrate to the cloud, security and compliance requirements can pose a challenge. Personally identifiable information (PII) and non-public information (NPI) is often entrusted to financial services orgs with the expectation that access be limited, that the data be encrypted, and that activity involving that sensitive information be monitored. In fact, mandates including GLBA and PCI DSS require that firms maintain control over both data residency and privacy, capabilities that are not the focus for most cloud app vendors.
In this webinar, we'll discuss the essential components of a complete cloud security strategy and the tools that can help protect financial data in any cloud app. Learn how Cloud Access Security Brokers (CASBs) implement full-strength encryption for data-at-rest in Salesforce, provide contextual access controls, apply content-aware DLP to sensitive customer data, and more.
By all accounts, support for BYOD is growing rapidly across all industries as IT leaders respond to end-user demands. Adoption, however, has stagnated due to privacy concerns, cumbersome third-party apps required to secure mobile devices, and issues supporting the latest operating systems.
In this webinar, we will discuss the major trends that are reshaping the mobile landscape, from changing end-user needs to the shift toward data-centric security. Learn how IT leaders across all major sectors are rethinking their approach to mobile security to keep pace with evolving employee behaviors.
With adoption of Office 365, Google Apps, and others up massively in the last year, IT leaders are curious to know which features are most commonly used by your peers to protect corporate data in a cloud-first world.
In this webinar, we’ll discuss the questions every IT leader should ask when evaluating a cloud security solution. As many know, not all cloud security products are created equal. Some provide real-time protection while others can only offer next-day alerts after sensitive files have already been compromised. Join us to learn how best to evaluate Cloud Access Security Brokers.
Andras Cser, VP and Principal Security & Risk Analyst at Forrester, and Rich Campagna, VP Products at Bitglass
Organizations in every major vertical are looking to Cloud Access Security Brokers (CASBs) to protect corporate cloud apps like Office 365 end-to-end, from the cloud to the device.
In this webinar, guest speaker Andras Cser, VP and Principal Security & Risk Analyst at Forrester, and Rich Campagna, VP Products at Bitglass will discuss the functionality of these solutions and the importance of a hybrid architecture. The webinar will also highlight case studies of enterprises that have deployed CASB solutions to secure public cloud apps.
As cloud app usage grows, hundreds of organizations in every major vertical are looking to Cloud Access Security Brokers (CASBs) to help secure corporate data in the cloud and enable secure BYOD. In healthcare, for example, CASBs are an easy-to-deploy means of achieving mobile HIPAA compliance. For other organizations, the ability to encrypt data-at-rest is critical.
In this webinar, we will discuss several cases where Cloud Access Security Brokers are used to secure data in the cloud, at access, on the network, and across all devices.
In Project Cumulus, Bitglass researchers created a fictitious bank and leaked a bank employee's "phished" credentials onto the Dark Web. Hundreds of hackers across the Dark Web quickly found the employee's account information and successfully accessed both personal and sensitive corporate data along the way.
Join our webinar to learn how the experiment unfolded, how hackers on the Dark Web reacted to the leaked credentials, and why Tor makes tracking illicit activity more difficult than ever. We will also discuss how, with a Cloud Access Security Broker, you can be sure to quickly identify potential breaches, limit access from suspicious locations, and apply DLP to sensitive files all to prevent the situation we observed with Project Cumulus.
You've read the report. Now, hear all the details in this live webcast
In Project Cumulus, Bitglass researchers leaked account credentials belonging to a fictitious bank's employee. Hackers on the Dark Web quickly found these credentials and were able to access the victim's Google Drive, bank information, and more.
Check out the full report at www.bitglass.com/cumulus_report and the webinar at https://www.brighttalk.com/webcast/11129/192681
One in three Americans' healthcare records were leaked as a result of hacking and IT-related breaches in 2015, a massive year-over-year increase. Why are hackers now targeting healthcare data? How did they go about conducting the large-scale Anthem and Premera attacks that affected millions?
Learn the answer to those questions and detail how healthcare organizations can use a Cloud Access Security Broker to protect data in the cloud, enable secure BYOD and remain HIPAA compliant.