Anatomy of a Cloud Data Breach

  • Aired Thursday, 19 Mar 2020 1:00PM EDT (19 Mar 2020 17:00 UTC)
  • Speakers: Nathan Smolenski, Ray Canzanese, Ph.D.

Digital transformation continues to drive cloud adoption across the enterprise. On average, enterprises are using more that 1,300 cloud apps across their organization for everything from marketing, to collaboration, to file storage. Productivity tools like Office 365 and Slack make it incredibly easy for users to deploy by themselves. However, the benefits of cloud adoption also bring about new types of risk. Malicious actors are leveraging the cloud to deliver new payloads faster, while circumventing traditional security tools.

In this session we will look back at several recent data breaches and analyze both how they occurred, and the best practices security teams can apply to mitigate the risks surrounding them.

Key Takeaways:

  • Common techniques attackers are using to thwart or bypass traditional security tools
  • Five key controls that you can review to ensure they stop endpoint and cloud-based threats
  • The most common enterprise cloud apps and the risk exposure posed to the organization from using them