The many stages of cyber kill chains are leveraging cloud services in new ways to evade legacy web and email defenses. These trusted domains with valid certificates are a quick path using implicit trust for success. Inline defenses need to understand cloud service account instances, activity, and data to prevent these cloud-enabled threats while enabling business unit and user freedom to adopt cloud services for digital transformation. In Part 2 of this series from Netskope, we’ll examine the average use of cloud services per company, why so few cloud services are managed by IT, what the key indicators are signaling this change, examples of cloud-enabled threats and kill chain stages and what defense updates you should consider to prevent and detect.