The Cost of Cloud Compromise and Shadow IT

Logo
Presented by

Larry Ponemon, Ponemon Institute and Itir Clarke, Proofpoint

About this talk

With the increased use of SaaS applications, cloud account takeover and Shadow IT present an increasing security risk to organizations. As the network perimeter is replaced by a user-defined security perimeter, it becomes critical to evaluate access controls, threat detection and data security in the cloud. So how can you better protect your company? Join us for this special webinar with experts from Proofpoint and Ponemon Institute. They will discuss the findings of the newly conducted research among IT and security professionals to determine the risk and cost of cloud account takeovers and Shadow IT. In this session, we’ll cover: • The state of cloud usage in organizations • Security risks and practices to secure the cloud • Cloud compromises and the end user risk • The cost of compromised cloud accounts
Related topics:

More from this channel

Upcoming talks (3)
On-demand talks (329)
Subscribers (33950)
ISSA is the community of choice for international cybersecurity professionals dedicated to advancing individual growth, managing technology risk and protecting critical information and infrastructure.