Hi [[ session.user.profile.firstName ]]

Malware Attack "Fan-out" Effect in the Cloud

The rapid rise in cloud adoption – of which corporate IT has underestimated the scope by as much as 10x - has created a new effect: a “cloud attack fan-out.” Between many connected devices, which increase the attack surface, and capabilities like sync and share, which increase data velocity in the cloud, both the propensity and the severity of a breach rise.

Join Krishna Narayanaswamy, Founder and Chief Scientist of cloud security company Netskope, as he takes an in-depth look at data breaches involving cloud services and how they come about. Krishna will take a fun, CSI-like presentation approach and draw upon unique, anonymized data seen in the cloud to illustrate:

- The multiplier effect that that the cloud can have on the probability of a data breach
- Three real-world examples in which the cloud can play a role in data breaches, including a step-by-step review of a recent exploit found in a cloud storage app
- How to identify data breaches in an enterprise cloud environment using advanced anomaly detection techniques
- A forensic walk-through in the reconstruction of a complex audit following a data breach
- Best practices for mitigating breaches as well as monitoring and protecting sensitive enterprise data in the cloud
Recorded Jun 21 2016 60 mins
Your place is confirmed,
we'll send you email reminders
Presented by
Krishna Narayanaswamy, Founder and Chief Scientist, Netskope
Presentation preview: Malware Attack "Fan-out" Effect in the Cloud

Network with like-minded attendees

  • [[ session.user.profile.displayName ]]
    Add a photo
    • [[ session.user.profile.displayName ]]
    • [[ session.user.profile.jobTitle ]]
    • [[ session.user.profile.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(session.user.profile) ]]
  • [[ card.displayName ]]
    • [[ card.displayName ]]
    • [[ card.jobTitle ]]
    • [[ card.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(card) ]]
  • Channel
  • Channel profile
  • The State of Cloud-Based Malware and Data Breaches Recorded: Nov 15 2016 51 mins
    Dr. Larry Ponemon, Chairman and Founder of the Ponemon Institute. Gautam Kanapathi, Product Manager at Netskope
    Netskope, the leading Cloud Access Security Broker, has partnered with the Ponemon Institute, the foremost expert on data breach research, to understand the state of cloud threats, including cloud malware and cloud-related data breaches. The webinar will include an in-depth look at trends and survey data, including:

    - Malware in cloud services – how much is there, how it got there, and how cloud propagates it
    - Data breaches and cloud – does cloud make data breaches more likely, and why?
    - Data breach costs and outcomes, and how those change when cloud is involved
  • Malware Attack "Fan-out" Effect in the Cloud Recorded: Jun 21 2016 60 mins
    Krishna Narayanaswamy, Founder and Chief Scientist, Netskope
    The rapid rise in cloud adoption – of which corporate IT has underestimated the scope by as much as 10x - has created a new effect: a “cloud attack fan-out.” Between many connected devices, which increase the attack surface, and capabilities like sync and share, which increase data velocity in the cloud, both the propensity and the severity of a breach rise.

    Join Krishna Narayanaswamy, Founder and Chief Scientist of cloud security company Netskope, as he takes an in-depth look at data breaches involving cloud services and how they come about. Krishna will take a fun, CSI-like presentation approach and draw upon unique, anonymized data seen in the cloud to illustrate:

    - The multiplier effect that that the cloud can have on the probability of a data breach
    - Three real-world examples in which the cloud can play a role in data breaches, including a step-by-step review of a recent exploit found in a cloud storage app
    - How to identify data breaches in an enterprise cloud environment using advanced anomaly detection techniques
    - A forensic walk-through in the reconstruction of a complex audit following a data breach
    - Best practices for mitigating breaches as well as monitoring and protecting sensitive enterprise data in the cloud
  • Cloud Security for Dummies, Enterprise Mobility Edition Recorded: Apr 26 2016 56 mins
    Christopher Campbell, Dir. Enterprise Mobility, VMware & authors of Cloud Security for Dummies, Lebin Cheng & Steve Malmskog
    VMware AirWatch and Netskope present:

    Cloud Security for Dummies, Enterprise Mobility Edition

    As more mission-critical business workflows move to the cloud, yesterday’s security protocols and measures have become inadequate. And as cybersecurity threats increase, protecting business resources from compromised mobile endpoints is no longer a “nice to have” but a “must have” for the digital enterprise. More than half of all enterprise cloud app activities now occur over mobile devices with enterprise mobility at the epicenter and crossroad of business productivity and cybersecurity challenges.

    Join VMware AirWatch Director of Enterprise Mobility, Christopher Campbell and Netskope authors of Cloud Security for Dummies, Steve Malmskog and Lebin Cheng, for a lively discussion and reveal of the 10 “must haves" for cloud-consuming mobile workforces. Attendees will learn how to:

    Use intelligence about identity, device, and cloud usage to inform policy decisions on the device, in the app, and in the cloud;

    Identify cloud app usage trends to anticipate users’ needs and create a better mobile and cloud user experience;

    Proactively protect sensitive user and corporate information through policy; and

    Halt threats in the cloud before they propagate to users’ devices.
  • Safely Enabling the Cloud in a World of Malware and Data Breaches Recorded: Apr 12 2016 61 mins
    Adrian Sanabria, Senior Analyst, Enterprise Security, 451 Research and Abhay Kulkarni, VP Engineering, Netskope
    Cloud adoption is quickly becoming a must-have for enterprises, as organizations clamor to exploit the cost savings and increase in collaboration and productivity that are now established benefits of many cloud apps But at the same time, this rise in adoption – of which corporate IT has underestimated the scope by as much as 10x - has created a new effect: a “cloud attack fan-out.” Between many connected devices, which increase the attack surface, and capabilities like sync and share, which increase data velocity in the cloud, both the propensity and the severity of a breach rise.

    Attend this webinar with Adrian Sanabria, Senior Analyst, Enterprise Security, 451 Research and Abhay Kulkarni, VP Engineering, Netskope for a spirited discussion that will explore the following:

    - Trends in the market related to cloud adoption and the steps being taken to address security concerns;
    - How to securely enable the use of cloud services for enterprise employees;
    - A “how to” for identifying data breaches in an enterprise cloud environment using advanced anomaly detection techniques;
    - Best practices for mitigating breaches as well as monitoring and protecting sensitive enterprise data in the cloud.
  • The Anatomy of a Cloud Data Breach Recorded: Mar 22 2016 27 mins
    Krishna Narayanaswamy, Chief Scientist, Netskope
    As cloud services proliferate in organizations, the nature of data breaches changes to fit the nature of those services. Between many connected devices, which increase the attack surface, and capabilities like sync and share, which increase data velocity in the cloud, both the propensity and the severity of a breach rise. Drawing on unique anonymized data seen in the Netskope cloud, Krishna will demonstrate how to detect a breach in the cloud using anomaly detection techniques, and how to use advanced forensic techniques to reconstruct a complex audit trail of events leading up to and following the breach.
  • Managing the challenges of the cloud under the EU GDPR Recorded: Feb 17 2016 46 mins
    Sue Goltyakova, Senior Marketing Manager, Netskope and Andy Aplin, Technical Director, Netskope
    The EU General Data Protection Regulation will soon become law and will come into force in 2018, so organisations need to start working on their compliance. With many hurdles to overcome, not least of which is managing your data in the cloud, will two years be enough time to get your house in order? We'll explain the key points of the GDPR and how Netskope can help you to control and protect your data in the cloud.
  • 6 Steps to Addressing Your Cloud Security Risks Recorded: Jan 20 2016 28 mins
    Scott Hogrefe, VP of Market Data for Netskope
    You can't have a discussion on the next generation of information security without talking about securing the cloud. The “move to the cloud” has long been considered a key initiative by organizations worldwide. With this move, there’s a level of increased risk that enterprises must address. What’s different is using cloud services requires abdicating some control over how systems and data are being protected. We begin this discussion on this footing.

    Join Scott Hogrefe, VP of Market Data for Netskope, who will lead this discussion about what security professionals need to know about:

    - Their cloud risk
    - How to quantify it for their corporate leadership and board of directors
    - How to convey it in the context of their overall cloud strategy
    - 6 steps to take right now to address cloud security risk
  • Office 365 In Focus: Security Strategies from the Experts Recorded: Nov 18 2015 61 mins
    Adrian Sanabria, 451 Research; Shamiana Soderberg, Microsoft; Jamie Barnett, Netskope
    One of today's biggest cloud trends is enterprise adoption of the Microsoft Office 365 suite. There is one wrinkle, though. Your business wants to move quickly to get immediate value, while your security team needs to proceed a little more cautiously to ensure they can govern usage and protect sensitive data. Can organizations move quickly and instrument the proper controls?

    Join Adrian Sanabria, Senior Security Analyst from 451 Research, Shamiana Soderberg, Senior Business Development Manager Cloud Productivity from Microsoft, and Jamie Barnett, CMO of Netskope for a look at safe enablement best practices for Office 365, and the role Cloud Access Security Brokers play in this effort.

    Attendees will come away with the ten real-world requirements that every organization should consider when adopting a sanctioned cloud productivity suite like Office 365. These requirements will address areas like:
    - Granular administrative and user controls across the Office 365 suite
    - DLP for content “at rest” within and “en route” to or from the suite
    - Usage and data governance within the suite and its ecosystem
Cloud Security Webcasts for IT Security Professionals
Netskope™ is the leading cloud access security broker (CASB). Netskope gives IT the ability to
find, understand, and secure cloud apps. Only Netskope empowers organizations to direct usage, protect sensitive data, and ensure compliance in real-time, on any device, for any cloud app so the business can move fast, with confidence.

Embed in website or blog

Successfully added emails: 0
Remove all
  • Title: Malware Attack "Fan-out" Effect in the Cloud
  • Live at: Jun 21 2016 5:00 pm
  • Presented by: Krishna Narayanaswamy, Founder and Chief Scientist, Netskope
  • From:
Your email has been sent.
or close