Hi [[ session.user.profile.firstName ]]

6 Steps to Addressing Your Cloud Security Risks

You can't have a discussion on the next generation of information security without talking about securing the cloud. The “move to the cloud” has long been considered a key initiative by organizations worldwide. With this move, there’s a level of increased risk that enterprises must address. What’s different is using cloud services requires abdicating some control over how systems and data are being protected. We begin this discussion on this footing.

Join Scott Hogrefe, VP of Market Data for Netskope, who will lead this discussion about what security professionals need to know about:

- Their cloud risk
- How to quantify it for their corporate leadership and board of directors
- How to convey it in the context of their overall cloud strategy
- 6 steps to take right now to address cloud security risk
Recorded Jan 20 2016 28 mins
Your place is confirmed,
we'll send you email reminders
Presented by
Scott Hogrefe, VP of Market Data for Netskope
Presentation preview: 6 Steps to Addressing Your Cloud Security Risks

Network with like-minded attendees

  • [[ session.user.profile.displayName ]]
    Add a photo
    • [[ session.user.profile.displayName ]]
    • [[ session.user.profile.jobTitle ]]
    • [[ session.user.profile.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(session.user.profile) ]]
  • [[ card.displayName ]]
    • [[ card.displayName ]]
    • [[ card.jobTitle ]]
    • [[ card.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(card) ]]
  • Channel
  • Channel profile
  • Introduction to Smart Cloud Security (Spanish) Recorded: Jun 13 2018 45 mins
    Daniel Junqueira, Netskope Senior Engineer, and Alain Karioty, Netskope Sales Director LATAM
    Las empresas preocupadas por el uso de las aplicaciones cloud están empezando a utilizar soluciones CASB (Cloud Access Security Broker) y pasarelas de seguridad Web (SWG) para proteger a sus usuarios a la vez que les permiten tener flexibilidad e incrementar su productividad.

    Únase a nosotros en este webinar introductorio a la seguridad en la Nube y Web para saber más sobre:


    Los desafíos y amenazas en el mundo actual de la nube y la movilidad, donde los empleados de las organizaciones están cada vez más distribuidos.
    Casos de uso de seguridad en la nube y en la Web como el gobierno de Microsoft Office 365, Salesforce y Facebook
    Cómo las organizaciones están adoptando SaaS, IaaS, y control Web con una estrategia que hace posible entornos de trabajo seguros.
  • Introduction to Smart Cloud Security (Portugués) Recorded: Jun 13 2018 42 mins
    Daniel Junqueira, Netskope Senior Engineer, and Alain Karioty, Netskope Sales Director LATAM
    Descubra como administrar y proteger qualquer serviço Cloud assim como Web.

    Com funcionários cada vez mais habituados a dispositivos móveis e à nuvem, sua empresa pode se beneficiar do aumento de flexibilidade e produtividade. Infelizmente, também há um lado negativo. O uso de SaaS, IaaS e serviços da web pode trazer novos riscos aos dados e representar mais vulnerabilidade a ameaças, como malware.

    As plataformas de segurança na nuvem estão começando a usar tecnologias de CASBs – Cloud Access Security Brokers e de gateway seguro da web (SWG, Secure Web Gateway) para ajudar a proteger suas empresas, garantindo flexibilidade e produtividade.

    Junte-se a nós neste webinar de introdução à segurança na nuvem e na web para saber mais sobre:

    - Desafios e ameaças no cenário atual da nuvem, dos dispositivos móveis e da força de trabalho cada vez mais distribuída;
    - Casos de uso de segurança na nuvem e na web, como governança de Microsoft Office 365, Salesforce e Facebook;
    - Como as empresas estão adotando SaaS, IaaS e web com abordagem de sistema para permitir o uso seguro da nuvem e da web.
  • Cloud Security & CASB – eine Einführung (German) Recorded: Jun 13 2018 47 mins
    Jürgen Seitz, Netskope Principal Engineer, and Kristina Vervoort, Netskope Sales Director CEUR
    Webinar teil und erfahren Sie mehr über:

    - Cloud Security Use Cases rund um die Nutzung beliebter Public Cloud Apps wie Microsoft Office 365, Salesforce, Slack oder Workplace.

    - Wie kann CASB dabei helfen, riskante Aktivitäten in der Cloud zu verstehen, sensible Daten zu schützen, Online-Bedrohungen zu stoppen und auf Vorfälle zu reagieren? Und dies in einer Art und Weise, die den Arbeitsgewohnheiten und -weisen von heute entspricht.
  • Introduction à la Sécurité Cloud Intelligente (French) Recorded: Jun 13 2018 40 mins
    Matthieu Bouthors, Netskope SE, France, and Laurence Cozlin, Netskope Sales Manager, France
    Conseils venant d’experts concernant la sécurité Cloud et Proxy Web.

    L’engouement croissant de vos collaborateurs pour le cloud et les solutions mobiles peut permettre à votre entreprise de gagner en flexibilité et en productivité. Malheureusement, il peut y avoir un inconvénient à cette évolution.

    En effet, le recours aux services Web, Saas et IaaS peut faire courir de nouveaux risques, notamment aux données utilisées, et générer des menaces comme les malwares.

    Les plateformes de sécurité en mode cloud commencent à avoir recours à des technologies CASB (cloud access security broker) et de sécurisation du Web (SWG) pour protéger les entreprises sans entraver leur flexibilité et leur productivité.

    Assistez à ce webinaire sur la sécurité sur Internet et sur le cloud pour en savoir plus sur :

    - Les menaces et défis auxquels le monde, mobile et cloud, doit faire face et la dispersion croissante de la main-d’œuvre

    - Les études de cas relatifs à la sécurité du Web et du cloud, tels que la gouvernance de Microsoft Office 365, Salesforce et Facebook

    - Comment les entreprises adoptent les environnements SaaS, IaaS et le Web en suivant une approche cadre de l’accès Web et cloud
  • Introduction to Smart Cloud Security Recorded: Jun 13 2018 46 mins
    Andy Apiln, Netskope SE Director and Jonathon Mepsted, Netskope Sales Director UK
    Cloud security platforms are starting to use cloud access security broker (CASB) and web security (SWG) technologies to help secure their organisations while still enabling flexibility and productivity.

    View this webinar for an introduction to cloud and web security to learn about:

    - Challenges and threats in today’s cloud and mobile world and increasingly distributed workforce
    - Cloud and web security use cases like governance of Microsoft Office 365, Salesforce and Facebook
    - How organisations are adopting SaaS, IaaS, and web with a framework-approach to safe cloud and web enablement
  • Demo - Adaptive access control for Azure Recorded: Mar 14 2018 4 mins
    Netskope
    Netskope supports adaptive access control for Azure, extending real-time visibility and control to both users on personal devices accessing the sanctioned Azure instance and users on managed devices accessing both sanctioned and unsanctioned instances of Azure.
  • Uncover a Place More Scary Than the Dark Web - the Bright Web! Recorded: Mar 7 2018 45 mins
    Bob Gilbert, Chief Evangelist, Netskope
    The Dark Web is a well-known part of the internet where many sites are not indexed by search engines and can only be accessed if you know the site address, making them effectively hidden. Accessing the dark web requires special software, like browsers configured with Tor. Once inside the dark web, “dark net” markets exist that sell sensitive data stolen in breaches (in addition to illegal products like drugs and firearms). The currency of choice is the cryptocurrency Bitcoin.

    But there is one area arguably more dangerous and much larger in scale, and that is the Bright Web. We use the bright web every day, and it consists of tens of thousands of places where sensitive data can be easily uploaded and shared publicly either with malicious intent or on accident by unsuspecting perpetrators.

    Watch this webinar to uncover the current state of the bright web, how it affects you and your company, and how recent technology advances provide the visibility and control you need to safely maneuver the Bright Web.

    Topics discussed:
    • New research that provides insight into how big and widespread the Bright Web is
    • A look at dozens of cloud services that make it easy to share sensitive data publicly
    • How the Bright Web wreaked havoc on three companies
    • 7 steps for mitigating risk and safely enabling cloud services in the Bright Web
  • GDPR Countdown - Rationalize Stage Recorded: Feb 1 2018 11 mins
    Robert Bond, legal expert in data protection, and Andy Aplin, Netskope's EMEA Engineering Manager
    Robert Bond, legal expert in data protection and information security, and Andy Aplin, Netskope's EMEA Engineering Manager, walk you through a short summary of the GDPR Countdown Rationalize Stage.
  • Cloud Compliance with New Financial Services Cybersecurity Regulations Recorded: Dec 13 2017 37 mins
    Nathan Narayan, Director Product Mgt, Livius Feinbaum, Principal Sales Engineer, and Neelum Khan, Netskope Product Evangelist
    The coming into effect of New York's cybersecurity compliance requirements for financial institutions and their third party service providers marked a major development in the cyber risk regulatory environment. In this social webcast you’ll meet Netskope’s product experts as they discuss some practical steps to help you achieve cloud compliance with the regulations.

    In this webinar, they will review:

    - Common cloud compliance concerns from leading financial institutions and strategies to overcome these hurdles
    - Tips for implementing the key requirements outlined in the regulation within your cloud environment
    - The answers to your most common questions about cloud compliance

    PRESENTERS

    Nathan Narayan, Director of Product Management, Netskope

    Livius Feinbaum, Principal Sales Engineer, Netskope

    Neelum Khan, Product Evangelist, Netskope
  • GDPR Countdown - Audit Stage Recorded: Dec 12 2017 16 mins
    Robert Bond, legal expert in data protection, and Andy Aplin, Netskope's EMEA Engineering Manager
    Robert Bond, legal expert in data protection and information security, and Andy Aplin, Netskope's EMEA Engineering Manager, walk you through a short summary of the GDPR Countdown Audit Stage.
  • How Berkshire Bank Safely Enables the Cloud with a CASB Recorded: Nov 1 2017 25 mins
    Ryan Melle, VP Information Security Officer at Berkshire Bank
    Berkshire is growing. Learn how Netskope helps enable their growth with safe cloud enablement.

    Ryan Melle, Berkshire Bank VP Information Security Officer, shares three use cases where Netskope helps Berkshire Bank enable the cloud: Cloud DLP, Granular Access Control Policies, and Netskope for Salesforce and Office 365.
  • Evolving Your Cloud Security Stack With a CASB Recorded: Jul 28 2017 30 mins
    Gartner's Cloud Security Research Director Steve Riley and Netskope CEO Sanjay Beri
    Hear from Gartner’s cloud security research director Steve Riley.

    New API-driven cloud and web services, along with mobile devices, have unlocked new and unsurpassed levels of productivity.

    The reality, however, is that while the way people work has evolved, legacy security tools were designed for a different time — and new tools such as cloud access security brokers (CASBs) are quickly gaining the attention of security architects and CISOs worldwide.

    Netskope is proud to sponsor this webcast where attendees will hear from Gartner’s cloud security research director Steve Riley.

    Attendees will learn:

    - how organizations are rethinking visibility, governance, data security, and threat protection

    - how to build a new security stack as resilient and nimble as the new workforce they protect.

    Featured presenters

    Steve Riley
    Cloud Security Research Director
    Gartner

    Sanjay Beri
    Chief Executive Officer
    Netskope
  • CASB Redefined: the Emergence of Cloud Security Platforms Recorded: Apr 18 2017 62 mins
    Join Doug Cahill, Senior Analyst, ESG and Bob Gilbert, Chief Evangelist, Netskope
    The development of the cloud access security broker (CASB) category has mirrored the adoption of cloud services - rapid. But this accelerated market development has also led to misconceptions about both what a CASB is and what a CASB should be moving forward. As CASBs evolve and expand their scope to cover more dimensions of cloud security, the notion of a 'cloud security platform' has emerged.

    Join Doug Cahill, Senior Analyst, ESG and Bob Gilbert, Chief Evangelist, Netskope for this webinar where attendees will learn the following:

    - How CASBs enable enteprises to fully harness cloud services safely and efficiently;
    - The visibility and control requirements of cloud security platforms;
    - Desired outcomes of what a CASB should accomplish and use cases that support those outcomes
    - The latest trends around the shift to cloud security platforms
  • “Cloud-First” Ransomware: A Technical Analysis Recorded: Apr 3 2017 44 mins
    Netskope chief scientist Krishna Narayanaswamy and Director of Netskope Threat Research Labs Ravi Balupari
    Get a technical analyses of recent malware campaigns discovered or documented by Netskope Threat Research Labs and learn how to defend against them.

    Cloud services have emerged as the preferred attack vector of some of the most dangerous and innovative cloud malware exploits of the past six months. Why? Because many organizations don't inspect their cloud SSL traffic for a malware and the same functionalities of the cloud dramatically increase productivity (sync, share, collaborate, etc) also provide ransomware developers with a perfect medium for faster delivery of malware payloads to more targets.

    Join Netskope chief scientist Krishna Narayanaswamy and Director of Netskope Threat Research Labs Ravi Balupari for a fascinating look at how malicious actors now design ransomware to make best use of popular cloud services to hide in plain sight, and do more damage in less time.

    Krishna and Ravi will provide technical analyses of recent malware campaigns discovered or documented by Netskope Threat Research Labs.

    These include:

    - Virlock, which encrypts files and also infects them, making it a polymorphic file infector
    - CloudFanta, which uses the SugarSync cloud storage app to deliver malware capable of stealing user credentials and monitoring online banking activities
    - CloudSquirrel, which takes advantage of multiple cloud apps throughout the ransomware kill chain with the intent to steal and exfiltrate user data
    - The Zepto variant of Locky ransomware, now distributed both by popular cloud storage apps and via DLL
  • 5 Highest-Impact CASB Use Cases Recorded: Jan 19 2017 61 mins
    Bob Gilbert, Chief Evangelist at Netskope​
    Cloud app security is a top priority for many enterprises. Whether securing data in the Office 365 suite, ensuring compliance in ServiceNow, or getting control over shadow IT, information security leaders are exploring how Cloud Access Security Brokers (CASB) can make an impact in their organizations.

    Join Bob Gilbert, chief evangelist of Netskope, for a session on the top five CASB use cases that have the highest impact on cloud-consuming enterprises.

    Attendees will learn:

    •Industry-specific data that’s foundational to any cloud security business case;

    •The five highest-impact CASB use cases from our customers, demonstrated from the perspective of users and security professionals; and

    •How those use cases translate to “must have” requirements for any CASB evaluation.
  • The State of Cloud-Based Malware and Data Breaches Recorded: Nov 15 2016 51 mins
    Dr. Larry Ponemon, Chairman and Founder of the Ponemon Institute. Gautam Kanapathi, Product Manager at Netskope
    Netskope, the leading Cloud Access Security Broker, has partnered with the Ponemon Institute, the foremost expert on data breach research, to understand the state of cloud threats, including cloud malware and cloud-related data breaches. The webinar will include an in-depth look at trends and survey data, including:

    - Malware in cloud services – how much is there, how it got there, and how cloud propagates it
    - Data breaches and cloud – does cloud make data breaches more likely, and why?
    - Data breach costs and outcomes, and how those change when cloud is involved
  • Malware Attack "Fan-out" Effect in the Cloud Recorded: Jun 21 2016 60 mins
    Krishna Narayanaswamy, Founder and Chief Scientist, Netskope
    The rapid rise in cloud adoption – of which corporate IT has underestimated the scope by as much as 10x - has created a new effect: a “cloud attack fan-out.” Between many connected devices, which increase the attack surface, and capabilities like sync and share, which increase data velocity in the cloud, both the propensity and the severity of a breach rise.

    Join Krishna Narayanaswamy, Founder and Chief Scientist of cloud security company Netskope, as he takes an in-depth look at data breaches involving cloud services and how they come about. Krishna will take a fun, CSI-like presentation approach and draw upon unique, anonymized data seen in the cloud to illustrate:

    - The multiplier effect that that the cloud can have on the probability of a data breach
    - Three real-world examples in which the cloud can play a role in data breaches, including a step-by-step review of a recent exploit found in a cloud storage app
    - How to identify data breaches in an enterprise cloud environment using advanced anomaly detection techniques
    - A forensic walk-through in the reconstruction of a complex audit following a data breach
    - Best practices for mitigating breaches as well as monitoring and protecting sensitive enterprise data in the cloud
  • Cloud Security for Dummies, Enterprise Mobility Edition Recorded: Apr 26 2016 56 mins
    Christopher Campbell, Dir. Enterprise Mobility, VMware & authors of Cloud Security for Dummies, Lebin Cheng & Steve Malmskog
    VMware AirWatch and Netskope present:

    Cloud Security for Dummies, Enterprise Mobility Edition

    As more mission-critical business workflows move to the cloud, yesterday’s security protocols and measures have become inadequate. And as cybersecurity threats increase, protecting business resources from compromised mobile endpoints is no longer a “nice to have” but a “must have” for the digital enterprise. More than half of all enterprise cloud app activities now occur over mobile devices with enterprise mobility at the epicenter and crossroad of business productivity and cybersecurity challenges.

    Join VMware AirWatch Director of Enterprise Mobility, Christopher Campbell and Netskope authors of Cloud Security for Dummies, Steve Malmskog and Lebin Cheng, for a lively discussion and reveal of the 10 “must haves" for cloud-consuming mobile workforces. Attendees will learn how to:

    Use intelligence about identity, device, and cloud usage to inform policy decisions on the device, in the app, and in the cloud;

    Identify cloud app usage trends to anticipate users’ needs and create a better mobile and cloud user experience;

    Proactively protect sensitive user and corporate information through policy; and

    Halt threats in the cloud before they propagate to users’ devices.
  • Safely Enabling the Cloud in a World of Malware and Data Breaches Recorded: Apr 12 2016 61 mins
    Adrian Sanabria, Senior Analyst, Enterprise Security, 451 Research and Abhay Kulkarni, VP Engineering, Netskope
    Cloud adoption is quickly becoming a must-have for enterprises, as organizations clamor to exploit the cost savings and increase in collaboration and productivity that are now established benefits of many cloud apps But at the same time, this rise in adoption – of which corporate IT has underestimated the scope by as much as 10x - has created a new effect: a “cloud attack fan-out.” Between many connected devices, which increase the attack surface, and capabilities like sync and share, which increase data velocity in the cloud, both the propensity and the severity of a breach rise.

    Attend this webinar with Adrian Sanabria, Senior Analyst, Enterprise Security, 451 Research and Abhay Kulkarni, VP Engineering, Netskope for a spirited discussion that will explore the following:

    - Trends in the market related to cloud adoption and the steps being taken to address security concerns;
    - How to securely enable the use of cloud services for enterprise employees;
    - A “how to” for identifying data breaches in an enterprise cloud environment using advanced anomaly detection techniques;
    - Best practices for mitigating breaches as well as monitoring and protecting sensitive enterprise data in the cloud.
  • The Anatomy of a Cloud Data Breach Recorded: Mar 22 2016 27 mins
    Krishna Narayanaswamy, Chief Scientist, Netskope
    As cloud services proliferate in organizations, the nature of data breaches changes to fit the nature of those services. Between many connected devices, which increase the attack surface, and capabilities like sync and share, which increase data velocity in the cloud, both the propensity and the severity of a breach rise. Drawing on unique anonymized data seen in the Netskope cloud, Krishna will demonstrate how to detect a breach in the cloud using anomaly detection techniques, and how to use advanced forensic techniques to reconstruct a complex audit trail of events leading up to and following the breach.
Cloud Security Webcasts for IT Security Professionals
Netskope™ is the leading cloud access security broker (CASB). Netskope gives IT the ability to
find, understand, and secure cloud apps. Only Netskope empowers organizations to direct usage, protect sensitive data, and ensure compliance in real-time, on any device, for any cloud app so the business can move fast, with confidence.

Embed in website or blog

Successfully added emails: 0
Remove all
  • Title: 6 Steps to Addressing Your Cloud Security Risks
  • Live at: Jan 20 2016 5:00 pm
  • Presented by: Scott Hogrefe, VP of Market Data for Netskope
  • From:
Your email has been sent.
or close