You can't have a discussion on the next generation of information security without talking about securing the cloud. The “move to the cloud” has long been considered a key initiative by organizations worldwide. With this move, there’s a level of increased risk that enterprises must address. What’s different is using cloud services requires abdicating some control over how systems and data are being protected. We begin this discussion on this footing.
Join Scott Hogrefe, VP of Market Data for Netskope, who will lead this discussion about what security professionals need to know about:
- Their cloud risk
- How to quantify it for their corporate leadership and board of directors
- How to convey it in the context of their overall cloud strategy
- 6 steps to take right now to address cloud security risk
RecordedJan 20 201628 mins
Your place is confirmed, we'll send you email reminders
Daniel Junqueira, Netskope Senior Engineer, and Alain Karioty, Netskope Sales Director LATAM
Las empresas preocupadas por el uso de las aplicaciones cloud están empezando a utilizar soluciones CASB (Cloud Access Security Broker) y pasarelas de seguridad Web (SWG) para proteger a sus usuarios a la vez que les permiten tener flexibilidad e incrementar su productividad.
Únase a nosotros en este webinar introductorio a la seguridad en la Nube y Web para saber más sobre:
Los desafíos y amenazas en el mundo actual de la nube y la movilidad, donde los empleados de las organizaciones están cada vez más distribuidos.
Casos de uso de seguridad en la nube y en la Web como el gobierno de Microsoft Office 365, Salesforce y Facebook
Cómo las organizaciones están adoptando SaaS, IaaS, y control Web con una estrategia que hace posible entornos de trabajo seguros.
Daniel Junqueira, Netskope Senior Engineer, and Alain Karioty, Netskope Sales Director LATAM
Descubra como administrar y proteger qualquer serviço Cloud assim como Web.
Com funcionários cada vez mais habituados a dispositivos móveis e à nuvem, sua empresa pode se beneficiar do aumento de flexibilidade e produtividade. Infelizmente, também há um lado negativo. O uso de SaaS, IaaS e serviços da web pode trazer novos riscos aos dados e representar mais vulnerabilidade a ameaças, como malware.
As plataformas de segurança na nuvem estão começando a usar tecnologias de CASBs – Cloud Access Security Brokers e de gateway seguro da web (SWG, Secure Web Gateway) para ajudar a proteger suas empresas, garantindo flexibilidade e produtividade.
Junte-se a nós neste webinar de introdução à segurança na nuvem e na web para saber mais sobre:
- Desafios e ameaças no cenário atual da nuvem, dos dispositivos móveis e da força de trabalho cada vez mais distribuída;
- Casos de uso de segurança na nuvem e na web, como governança de Microsoft Office 365, Salesforce e Facebook;
- Como as empresas estão adotando SaaS, IaaS e web com abordagem de sistema para permitir o uso seguro da nuvem e da web.
Jürgen Seitz, Netskope Principal Engineer, and Kristina Vervoort, Netskope Sales Director CEUR
Webinar teil und erfahren Sie mehr über:
- Cloud Security Use Cases rund um die Nutzung beliebter Public Cloud Apps wie Microsoft Office 365, Salesforce, Slack oder Workplace.
- Wie kann CASB dabei helfen, riskante Aktivitäten in der Cloud zu verstehen, sensible Daten zu schützen, Online-Bedrohungen zu stoppen und auf Vorfälle zu reagieren? Und dies in einer Art und Weise, die den Arbeitsgewohnheiten und -weisen von heute entspricht.
Matthieu Bouthors, Netskope SE, France, and Laurence Cozlin, Netskope Sales Manager, France
Conseils venant d’experts concernant la sécurité Cloud et Proxy Web.
L’engouement croissant de vos collaborateurs pour le cloud et les solutions mobiles peut permettre à votre entreprise de gagner en flexibilité et en productivité. Malheureusement, il peut y avoir un inconvénient à cette évolution.
En effet, le recours aux services Web, Saas et IaaS peut faire courir de nouveaux risques, notamment aux données utilisées, et générer des menaces comme les malwares.
Les plateformes de sécurité en mode cloud commencent à avoir recours à des technologies CASB (cloud access security broker) et de sécurisation du Web (SWG) pour protéger les entreprises sans entraver leur flexibilité et leur productivité.
Assistez à ce webinaire sur la sécurité sur Internet et sur le cloud pour en savoir plus sur :
- Les menaces et défis auxquels le monde, mobile et cloud, doit faire face et la dispersion croissante de la main-d’œuvre
- Les études de cas relatifs à la sécurité du Web et du cloud, tels que la gouvernance de Microsoft Office 365, Salesforce et Facebook
- Comment les entreprises adoptent les environnements SaaS, IaaS et le Web en suivant une approche cadre de l’accès Web et cloud
Andy Apiln, Netskope SE Director and Jonathon Mepsted, Netskope Sales Director UK
Cloud security platforms are starting to use cloud access security broker (CASB) and web security (SWG) technologies to help secure their organisations while still enabling flexibility and productivity.
View this webinar for an introduction to cloud and web security to learn about:
- Challenges and threats in today’s cloud and mobile world and increasingly distributed workforce
- Cloud and web security use cases like governance of Microsoft Office 365, Salesforce and Facebook
- How organisations are adopting SaaS, IaaS, and web with a framework-approach to safe cloud and web enablement
Netskope supports adaptive access control for Azure, extending real-time visibility and control to both users on personal devices accessing the sanctioned Azure instance and users on managed devices accessing both sanctioned and unsanctioned instances of Azure.
The Dark Web is a well-known part of the internet where many sites are not indexed by search engines and can only be accessed if you know the site address, making them effectively hidden. Accessing the dark web requires special software, like browsers configured with Tor. Once inside the dark web, “dark net” markets exist that sell sensitive data stolen in breaches (in addition to illegal products like drugs and firearms). The currency of choice is the cryptocurrency Bitcoin.
But there is one area arguably more dangerous and much larger in scale, and that is the Bright Web. We use the bright web every day, and it consists of tens of thousands of places where sensitive data can be easily uploaded and shared publicly either with malicious intent or on accident by unsuspecting perpetrators.
Watch this webinar to uncover the current state of the bright web, how it affects you and your company, and how recent technology advances provide the visibility and control you need to safely maneuver the Bright Web.
• New research that provides insight into how big and widespread the Bright Web is
• A look at dozens of cloud services that make it easy to share sensitive data publicly
• How the Bright Web wreaked havoc on three companies
• 7 steps for mitigating risk and safely enabling cloud services in the Bright Web
Nathan Narayan, Director Product Mgt, Livius Feinbaum, Principal Sales Engineer, and Neelum Khan, Netskope Product Evangelist
The coming into effect of New York's cybersecurity compliance requirements for financial institutions and their third party service providers marked a major development in the cyber risk regulatory environment. In this social webcast you’ll meet Netskope’s product experts as they discuss some practical steps to help you achieve cloud compliance with the regulations.
In this webinar, they will review:
- Common cloud compliance concerns from leading financial institutions and strategies to overcome these hurdles
- Tips for implementing the key requirements outlined in the regulation within your cloud environment
- The answers to your most common questions about cloud compliance
Nathan Narayan, Director of Product Management, Netskope
Livius Feinbaum, Principal Sales Engineer, Netskope
Ryan Melle, VP Information Security Officer at Berkshire Bank
Berkshire is growing. Learn how Netskope helps enable their growth with safe cloud enablement.
Ryan Melle, Berkshire Bank VP Information Security Officer, shares three use cases where Netskope helps Berkshire Bank enable the cloud: Cloud DLP, Granular Access Control Policies, and Netskope for Salesforce and Office 365.
Gartner's Cloud Security Research Director Steve Riley and Netskope CEO Sanjay Beri
Hear from Gartner’s cloud security research director Steve Riley.
New API-driven cloud and web services, along with mobile devices, have unlocked new and unsurpassed levels of productivity.
The reality, however, is that while the way people work has evolved, legacy security tools were designed for a different time — and new tools such as cloud access security brokers (CASBs) are quickly gaining the attention of security architects and CISOs worldwide.
Netskope is proud to sponsor this webcast where attendees will hear from Gartner’s cloud security research director Steve Riley.
Attendees will learn:
- how organizations are rethinking visibility, governance, data security, and threat protection
- how to build a new security stack as resilient and nimble as the new workforce they protect.
Cloud Security Research Director
Join Doug Cahill, Senior Analyst, ESG and Bob Gilbert, Chief Evangelist, Netskope
The development of the cloud access security broker (CASB) category has mirrored the adoption of cloud services - rapid. But this accelerated market development has also led to misconceptions about both what a CASB is and what a CASB should be moving forward. As CASBs evolve and expand their scope to cover more dimensions of cloud security, the notion of a 'cloud security platform' has emerged.
Join Doug Cahill, Senior Analyst, ESG and Bob Gilbert, Chief Evangelist, Netskope for this webinar where attendees will learn the following:
- How CASBs enable enteprises to fully harness cloud services safely and efficiently;
- The visibility and control requirements of cloud security platforms;
- Desired outcomes of what a CASB should accomplish and use cases that support those outcomes
- The latest trends around the shift to cloud security platforms
Netskope chief scientist Krishna Narayanaswamy and Director of Netskope Threat Research Labs Ravi Balupari
Get a technical analyses of recent malware campaigns discovered or documented by Netskope Threat Research Labs and learn how to defend against them.
Cloud services have emerged as the preferred attack vector of some of the most dangerous and innovative cloud malware exploits of the past six months. Why? Because many organizations don't inspect their cloud SSL traffic for a malware and the same functionalities of the cloud dramatically increase productivity (sync, share, collaborate, etc) also provide ransomware developers with a perfect medium for faster delivery of malware payloads to more targets.
Join Netskope chief scientist Krishna Narayanaswamy and Director of Netskope Threat Research Labs Ravi Balupari for a fascinating look at how malicious actors now design ransomware to make best use of popular cloud services to hide in plain sight, and do more damage in less time.
Krishna and Ravi will provide technical analyses of recent malware campaigns discovered or documented by Netskope Threat Research Labs.
- Virlock, which encrypts files and also infects them, making it a polymorphic file infector
- CloudFanta, which uses the SugarSync cloud storage app to deliver malware capable of stealing user credentials and monitoring online banking activities
- CloudSquirrel, which takes advantage of multiple cloud apps throughout the ransomware kill chain with the intent to steal and exfiltrate user data
- The Zepto variant of Locky ransomware, now distributed both by popular cloud storage apps and via DLL
Cloud app security is a top priority for many enterprises. Whether securing data in the Office 365 suite, ensuring compliance in ServiceNow, or getting control over shadow IT, information security leaders are exploring how Cloud Access Security Brokers (CASB) can make an impact in their organizations.
Join Bob Gilbert, chief evangelist of Netskope, for a session on the top five CASB use cases that have the highest impact on cloud-consuming enterprises.
Attendees will learn:
•Industry-specific data that’s foundational to any cloud security business case;
•The five highest-impact CASB use cases from our customers, demonstrated from the perspective of users and security professionals; and
•How those use cases translate to “must have” requirements for any CASB evaluation.
Dr. Larry Ponemon, Chairman and Founder of the Ponemon Institute. Gautam Kanapathi, Product Manager at Netskope
Netskope, the leading Cloud Access Security Broker, has partnered with the Ponemon Institute, the foremost expert on data breach research, to understand the state of cloud threats, including cloud malware and cloud-related data breaches. The webinar will include an in-depth look at trends and survey data, including:
- Malware in cloud services – how much is there, how it got there, and how cloud propagates it
- Data breaches and cloud – does cloud make data breaches more likely, and why?
- Data breach costs and outcomes, and how those change when cloud is involved
Krishna Narayanaswamy, Founder and Chief Scientist, Netskope
The rapid rise in cloud adoption – of which corporate IT has underestimated the scope by as much as 10x - has created a new effect: a “cloud attack fan-out.” Between many connected devices, which increase the attack surface, and capabilities like sync and share, which increase data velocity in the cloud, both the propensity and the severity of a breach rise.
Join Krishna Narayanaswamy, Founder and Chief Scientist of cloud security company Netskope, as he takes an in-depth look at data breaches involving cloud services and how they come about. Krishna will take a fun, CSI-like presentation approach and draw upon unique, anonymized data seen in the cloud to illustrate:
- The multiplier effect that that the cloud can have on the probability of a data breach
- Three real-world examples in which the cloud can play a role in data breaches, including a step-by-step review of a recent exploit found in a cloud storage app
- How to identify data breaches in an enterprise cloud environment using advanced anomaly detection techniques
- A forensic walk-through in the reconstruction of a complex audit following a data breach
- Best practices for mitigating breaches as well as monitoring and protecting sensitive enterprise data in the cloud
Christopher Campbell, Dir. Enterprise Mobility, VMware & authors of Cloud Security for Dummies, Lebin Cheng & Steve Malmskog
VMware AirWatch and Netskope present:
Cloud Security for Dummies, Enterprise Mobility Edition
As more mission-critical business workflows move to the cloud, yesterday’s security protocols and measures have become inadequate. And as cybersecurity threats increase, protecting business resources from compromised mobile endpoints is no longer a “nice to have” but a “must have” for the digital enterprise. More than half of all enterprise cloud app activities now occur over mobile devices with enterprise mobility at the epicenter and crossroad of business productivity and cybersecurity challenges.
Join VMware AirWatch Director of Enterprise Mobility, Christopher Campbell and Netskope authors of Cloud Security for Dummies, Steve Malmskog and Lebin Cheng, for a lively discussion and reveal of the 10 “must haves" for cloud-consuming mobile workforces. Attendees will learn how to:
Use intelligence about identity, device, and cloud usage to inform policy decisions on the device, in the app, and in the cloud;
Identify cloud app usage trends to anticipate users’ needs and create a better mobile and cloud user experience;
Proactively protect sensitive user and corporate information through policy; and
Halt threats in the cloud before they propagate to users’ devices.
Adrian Sanabria, Senior Analyst, Enterprise Security, 451 Research and Abhay Kulkarni, VP Engineering, Netskope
Cloud adoption is quickly becoming a must-have for enterprises, as organizations clamor to exploit the cost savings and increase in collaboration and productivity that are now established benefits of many cloud apps But at the same time, this rise in adoption – of which corporate IT has underestimated the scope by as much as 10x - has created a new effect: a “cloud attack fan-out.” Between many connected devices, which increase the attack surface, and capabilities like sync and share, which increase data velocity in the cloud, both the propensity and the severity of a breach rise.
Attend this webinar with Adrian Sanabria, Senior Analyst, Enterprise Security, 451 Research and Abhay Kulkarni, VP Engineering, Netskope for a spirited discussion that will explore the following:
- Trends in the market related to cloud adoption and the steps being taken to address security concerns;
- How to securely enable the use of cloud services for enterprise employees;
- A “how to” for identifying data breaches in an enterprise cloud environment using advanced anomaly detection techniques;
- Best practices for mitigating breaches as well as monitoring and protecting sensitive enterprise data in the cloud.
As cloud services proliferate in organizations, the nature of data breaches changes to fit the nature of those services. Between many connected devices, which increase the attack surface, and capabilities like sync and share, which increase data velocity in the cloud, both the propensity and the severity of a breach rise. Drawing on unique anonymized data seen in the Netskope cloud, Krishna will demonstrate how to detect a breach in the cloud using anomaly detection techniques, and how to use advanced forensic techniques to reconstruct a complex audit trail of events leading up to and following the breach.
Cloud Security Webcasts for IT Security Professionals
Netskope™ is the leading cloud access security broker (CASB). Netskope gives IT the ability to
find, understand, and secure cloud apps. Only Netskope empowers organizations to direct usage, protect sensitive data, and ensure compliance in real-time, on any device, for any cloud app so the business can move fast, with confidence.