SlideShare a Scribd company logo
1 of 29
Download to read offline
Copyright © 2017 Forcepoint. All rights reserved.
Cloudy with a Chance of ...
Visibility, Accountability & Security
Doug Copley
Deputy CISO; Sr. Security & Privacy Strategist
March 16, 2016
Copyright © 2017 Forcepoint. All rights reserved.
CMO: Big board meeting in an hour
Need latest customer data from Rita
Her office is dark… Uh ohhh…
Where is Rita?
Copyright © 2017 Forcepoint. All rights reserved. | 3
WHY CLOUD?
1. Salesforce.com – “Why Move To The Cloud? 10 Benefits Of Cloud Computing” (11/15)
1. Time to Market
2. Scale, Cost Flexibility
3. Work From Anywhere
4. Automatic Updates/Patches
5. Focus on Mission
6. BC/DR
7. Competitiveness
8. Security
Copyright © 2017 Forcepoint. All rights reserved.
THE CLOUD IS CHANGING IT AND SECURITY MUST EVOLVE
Cloud adoption is
growing and it’s not
slowing down
▸ Cloud now 40% of IT budgets1
▸ 78% of organizations indicate that their budget for cloud services will
increase by 2017, with 29% expecting significant increases1
SaaS adoption
exploding
Organizations now
have a “Cloud First”
mentality
▸ SaaS (Software as a Service) spend is projected to grow to $75B by
2020 at a 19.2% compound annual growth rate2
▸ Of those Gartner surveyed who use or plan to use cloud services,
88% have a “Cloud First” strategy for technology initiatives1
1. Gartner – “Market Trends: Cloud Adoption Trends Favor Public Cloud With a Hybrid Twist (08/16)
2. Gartner – Forecast Analysis: Public Cloud Services Worldwide, 4Q16 Update (01/17)
There’s no turning back, but how do you keep your business secure?
Copyright © 2017 Forcepoint. All rights reserved.
BARRIERS TO
CLOUD ADOPTION
Copyright © 2017 Forcepoint. All rights reserved. | 6
Budget
Organization
Enablement
Project Delivery
Lifecycle
Security
Architecture
Governance, Risk
& Compliance
Legal & Human
Resources
Threat Prevention,
Detection & Response
Identity
Management
Risk Management
Copyright © 2017 Forcepoint. All rights reserved.
CONTROL QUESTIONS FOR CLOUD COMPUTING
“How do I know if departments are using
unsanctioned cloud applications?”
“How to we protect web usage without a
proxy on site?”
“How can we protect email when it’s in
Office365 or GMail? What about sandboxing?”
“Everyone can get to the cloud. How can I make sure only authorized
users access our data?” (Authentication/Authorization)
“How do I inspect cloud traffic (for data loss) when it
never traverses our network? What if it’s TLS traffic?”
Copyright © 2017 Forcepoint. All rights reserved. | 8
DATA-CENTRIC CONTEXT AWARE MODEL
What are my
critical assets?
Where are they? How much protection
is needed?
General
Email
Meeting
Notes
Source
Code
Product
Designs
HR
Data
Marketing
Materials
Telephone
Directory
Product
Manuals
Public
Presentations
Internal Repository
And ??? GitHub?
PCs?
Department
OneDrive
ADP Cloud
Application
Server
Inventory
In ServiceNow
Copyright © 2017 Forcepoint. All rights reserved.
ADDRESSING SECURITY
IN THE CLOUD
Copyright © 2017 Forcepoint. All rights reserved.
Corporate Environment
Cloud
Security
Vendor/AWS/Azure
Web Proxy
Email GW
Sandbox
DLP
CASB
Copyright © 2017 Forcepoint. All rights reserved.
Users from Anywhere
Cloud Access Security
Broker (CASB)
WHAT IS A CLOUD ACCESS SECURITY BROKER (CASB)?
Users From
the Office
Users from Home
Cloud
Provides a Layer
of Visibility
and Control
or
Copyright © 2017 Forcepoint. All rights reserved. | 12
IMPROVE VISIBILITY
Discover Shadow IT & Risk
Effective CASBs:
1. Eliminate blind spots
2. Discover what cloud apps are
being used by your workforce
3. Risk rank those cloud apps so IT
teams know what usage has the
highest risk
Copyright © 2017 Forcepoint. All rights reserved.
VISIBILITY – WHO, WHAT (DATA), WHEN, WHERE, WHAT (DEVICE)
Unusual Access
Detect access anomalies that may
indicate an external or insider
threat targeting your data
Audit Trails
ID, department, location, time, device,
actions and data accessed
Admin Activity
Track, monitor, and report all administrative and privileged user activity:
data accesses, configuration changes and permission modifications
Copyright © 2017 Forcepoint. All rights reserved.
ACCOUNTABILITY
Identification of Excess Privileges
• Users may have excess privileges. You
could be overlooking unauthorized
access to sensitive corporate or
customer information.
Secure Access From Managed and Unmanaged Devices
• Force multi-factor authentication based on user, device,
mobile app, location or risk profile
• Limit access or ability to download information for
unmanaged devices
• Restrict access or permissions from outside the country
Copyright © 2017 Forcepoint. All rights reserved. | 15
SECURITY AND COMPLIANCE
Detection of Compliance Gaps
Get notified when cloud app security settings
change and compare them to industry best
practices or standards (e.g., HIPAA, PCI DSS,
ISO, CSA) to highlight deficiencies that require
immediate attention.
Identify Exposed Sensitive Information
Scan corporate files and data stored in file-
sharing services such as OneDrive, Box, Dropbox
and Google Drive for sensitive information and
initiate a remediation workflow, if necessary.
Copyright © 2017 Forcepoint. All rights reserved. | 16
Security and compliance
Prevent Leaks of Sensitive Data
Inspect files and cloud content in real-time to
prevent the malicious or unintentional
leakage of confidential information.
Identify and analyze sensitive or regulated
data stored in cloud file-sync services to
understand sharing permissions exposure
and ensure compliance with regulations such
as PCI, SOX, and HIPAA.
Copyright © 2017 Forcepoint. All rights reserved. | 17
BEHAVIOR AND INTENT
Optimize Detection of Anomalies and
Threats
Forcepoint CASB is the only cloud access
security broker out there that protects
enterprise data from theft and loss due to
compromised, malicious, and careless
users and that correlates activity anomalies
with risky IP addresses.
Copyright © 2017 Forcepoint. All rights reserved.
NEED FOR
OPERATIONAL EFFICIENCY
Copyright © 2017 Forcepoint. All rights reserved. | 19
DRIVES OPERATIONAL EFFICIENCIES
Identifying Security Gaps
CASB APIs can analyze your cloud tenants,
helping IT review users and admins to
detect dormant accounts, external users,
and ex-employees that might still have
access to your cloud apps.
In addition, it inspects your tenant security
configurations to detect deficiencies and to
recommend best-practice settings for
effective cloud governance.
Copyright © 2017 Forcepoint. All rights reserved. | 20
ANALYZING BEHAVIOR TO UNDERSTAND INTENT
Detect & Block Cyber Attacks
CASB monitors all user activity and
analyzes usage patterns to rapidly detect
anomalies that can indicate an account
takeover (much more efficient)
The dashboard provides a wealth of cloud
analytics, highlighting suspicious activities
and attempts to compromise accounts
Copyright © 2017 Forcepoint. All rights reserved. | 21
CLOUD CONVERGENCE & GOVERNANCE
Common Tools Across Platforms
Mature vendors can offer integrated
tool sets that work on premise and in
the cloud (no separate tools
necessary)
Cloud App Metrics
Automate cloud app metrics - number of
users, activity level, traffic volume and
usage hours for each app.
Identification of Overspend
Review the entitlements of your users. You
could be overlooking potential areas of risk
or possibly cost savings opportunities.
Copyright © 2017 Forcepoint. All rights reserved.
CRITICAL CAPABILITIES FOR
CLOUD SECURITY PROVIDERS
Copyright © 2017 Forcepoint. All rights reserved. | 23
Copyright © 2017 Forcepoint. All rights reserved. | 24
THEY SHOULD HAVE BROAD GLOBAL PRESENCE
USA-NA
Toronto
San Jose
Dallas
Miami
Ashburn
Chicago
New York
Los Angeles
CALA
Sao Paulo
AFRICA
Johannesburg
EMEA
Amsterdam
Dusseldorf
Frankfurt
Geneva
Istanbul
London (3)
Paris
Stockholm
Warsaw
Milan
APAC
Tokyo
Hong Kong
Sydney
Singapore
Mumbai
Copyright © 2017 Forcepoint. All rights reserved. | 25
DON’T ACCEPT LATENCY
 Multiple Tier-1 ISPs
 Maintain our own ASNs
 Present at peering exchanges
 Content providers and Network providers
Copyright © 2017 Forcepoint. All rights reserved. | 26
THEY SHOULD BE CERTIFIED (THEIR ENTIRE CAPABILITY)
Forcepoint certifications cover
complete operations and staff
 Architecture
 Development
 Deployment
 Operations
 Data Center
 Services
 SOC
In Process:
 FedRAMP
 GDPR (ISO 27018 supports)
 ISO 27017 (Cloud Security)
 ISO 22301 (Bus Continuity)
Forcepoint Compliance Standards
Star Gold Award
Copyright © 2017 Forcepoint. All rights reserved.
THE CLOUD SECURITY FOGLIGHT
1. Can identify cloud services being used and
risk-rank them
2. Can provide detailed usage activity – even for
administrators
3. Can trigger adaptive authentication
4. Can help identify unauthorized access activity
5. Can identify user access anomalies and
correlate that with cloud apps
6. Can discover sensitive data in cloud apps
and assess risk
Copyright © 2017 Forcepoint. All rights reserved.
THE CLOUD SECURITY FOGLIGHT
7. Can identify when non-compliant
changes are made
8. Can identify users with excess
privileges
9. Can limit functionality for unmanaged
devices (and managed ones too!)
10. Can integrate with DLP and web
gateways for comprehensive security
11. Can analyze user behavior to
understand anomalies and user intent
12. Can ease information security workload
Copyright © 2017 Forcepoint. All rights reserved. | 29
Where information is most valuable
– and most vulnerable
PROTECTING
THE HUMAN POINT
Doug Copley
Deputy CISO; Sr. Security & Privacy Strategist
LinkedIn: linkedin.com/in/dcopley
Twitter: @hcare_security

More Related Content

What's hot

Forcepoint Dynamic Data Protection
Forcepoint Dynamic Data ProtectionForcepoint Dynamic Data Protection
Forcepoint Dynamic Data ProtectionMarketingArrowECS_CZ
 
63 Requirements for CASB
63 Requirements for CASB63 Requirements for CASB
63 Requirements for CASBKyle Watson
 
The Cloud & I, The CISO challenges with Cloud Computing
The Cloud & I, The CISO challenges with Cloud Computing The Cloud & I, The CISO challenges with Cloud Computing
The Cloud & I, The CISO challenges with Cloud Computing Moshe Ferber
 
FS-ISAC APAC Summit 2017 Singapore - Of Crown Jewels and Data Assets
FS-ISAC APAC Summit 2017 Singapore - Of Crown Jewels and Data AssetsFS-ISAC APAC Summit 2017 Singapore - Of Crown Jewels and Data Assets
FS-ISAC APAC Summit 2017 Singapore - Of Crown Jewels and Data AssetsPuneet Kukreja
 
CASBs and Office 365: The Security Menace
CASBs and Office 365: The Security MenaceCASBs and Office 365: The Security Menace
CASBs and Office 365: The Security MenaceBitglass
 
Symantec - The Importance of Building Your Zero Trust Program on a Solid Plat...
Symantec - The Importance of Building Your Zero Trust Program on a Solid Plat...Symantec - The Importance of Building Your Zero Trust Program on a Solid Plat...
Symantec - The Importance of Building Your Zero Trust Program on a Solid Plat...Symantec
 
Why Everyone Needs a Cloud-First Security Program - SASEfaction Guaranteed!
Why Everyone Needs a Cloud-First  Security Program - SASEfaction Guaranteed!Why Everyone Needs a Cloud-First  Security Program - SASEfaction Guaranteed!
Why Everyone Needs a Cloud-First Security Program - SASEfaction Guaranteed!Netskope
 
Cloud Security 101 by Madhav Chablani
Cloud Security 101 by Madhav ChablaniCloud Security 101 by Madhav Chablani
Cloud Security 101 by Madhav ChablaniOWASP Delhi
 
How Inovalon Uses Sophos to Control Security Costs on AWS
How Inovalon Uses Sophos to Control Security Costs on AWSHow Inovalon Uses Sophos to Control Security Costs on AWS
How Inovalon Uses Sophos to Control Security Costs on AWSAmazon Web Services
 
Webinar - Bitglass and CyberEdge - Hidden Security Threats
Webinar - Bitglass and CyberEdge - Hidden Security ThreatsWebinar - Bitglass and CyberEdge - Hidden Security Threats
Webinar - Bitglass and CyberEdge - Hidden Security ThreatsBitglass
 
Cloud security for banks - the central bank of Israel regulations for cloud s...
Cloud security for banks - the central bank of Israel regulations for cloud s...Cloud security for banks - the central bank of Israel regulations for cloud s...
Cloud security for banks - the central bank of Israel regulations for cloud s...Moshe Ferber
 
McAfee - MVISION Cloud (MVC) - Cloud Access Security Broker (CASB)
McAfee - MVISION Cloud (MVC) - Cloud Access Security Broker (CASB)McAfee - MVISION Cloud (MVC) - Cloud Access Security Broker (CASB)
McAfee - MVISION Cloud (MVC) - Cloud Access Security Broker (CASB)Iftikhar Ali Iqbal
 
Cloud security, Cloud security Access broker, CSAB's 4 pillar, deployment mode
Cloud security, Cloud security Access broker, CSAB's 4 pillar, deployment modeCloud security, Cloud security Access broker, CSAB's 4 pillar, deployment mode
Cloud security, Cloud security Access broker, CSAB's 4 pillar, deployment modeHimani Singh
 
Forrester Research: Securing the Cloud When Users are Left to Their Own Devices
Forrester Research: Securing the Cloud When Users are Left to Their Own DevicesForrester Research: Securing the Cloud When Users are Left to Their Own Devices
Forrester Research: Securing the Cloud When Users are Left to Their Own DevicesNetskope
 
SEB Forcepoint Corporate Overview
SEB Forcepoint Corporate OverviewSEB Forcepoint Corporate Overview
SEB Forcepoint Corporate OverviewStephen Bates
 

What's hot (20)

Forcepoint Dynamic Data Protection
Forcepoint Dynamic Data ProtectionForcepoint Dynamic Data Protection
Forcepoint Dynamic Data Protection
 
63 Requirements for CASB
63 Requirements for CASB63 Requirements for CASB
63 Requirements for CASB
 
Global Mandate to Secure Cloud Computing
Global Mandate to Secure Cloud ComputingGlobal Mandate to Secure Cloud Computing
Global Mandate to Secure Cloud Computing
 
The Cloud & I, The CISO challenges with Cloud Computing
The Cloud & I, The CISO challenges with Cloud Computing The Cloud & I, The CISO challenges with Cloud Computing
The Cloud & I, The CISO challenges with Cloud Computing
 
FS-ISAC APAC Summit 2017 Singapore - Of Crown Jewels and Data Assets
FS-ISAC APAC Summit 2017 Singapore - Of Crown Jewels and Data AssetsFS-ISAC APAC Summit 2017 Singapore - Of Crown Jewels and Data Assets
FS-ISAC APAC Summit 2017 Singapore - Of Crown Jewels and Data Assets
 
CASBs and Office 365: The Security Menace
CASBs and Office 365: The Security MenaceCASBs and Office 365: The Security Menace
CASBs and Office 365: The Security Menace
 
Symantec - The Importance of Building Your Zero Trust Program on a Solid Plat...
Symantec - The Importance of Building Your Zero Trust Program on a Solid Plat...Symantec - The Importance of Building Your Zero Trust Program on a Solid Plat...
Symantec - The Importance of Building Your Zero Trust Program on a Solid Plat...
 
Why Everyone Needs a Cloud-First Security Program - SASEfaction Guaranteed!
Why Everyone Needs a Cloud-First  Security Program - SASEfaction Guaranteed!Why Everyone Needs a Cloud-First  Security Program - SASEfaction Guaranteed!
Why Everyone Needs a Cloud-First Security Program - SASEfaction Guaranteed!
 
Cloud Security 101 by Madhav Chablani
Cloud Security 101 by Madhav ChablaniCloud Security 101 by Madhav Chablani
Cloud Security 101 by Madhav Chablani
 
How Inovalon Uses Sophos to Control Security Costs on AWS
How Inovalon Uses Sophos to Control Security Costs on AWSHow Inovalon Uses Sophos to Control Security Costs on AWS
How Inovalon Uses Sophos to Control Security Costs on AWS
 
Webinar - Bitglass and CyberEdge - Hidden Security Threats
Webinar - Bitglass and CyberEdge - Hidden Security ThreatsWebinar - Bitglass and CyberEdge - Hidden Security Threats
Webinar - Bitglass and CyberEdge - Hidden Security Threats
 
Brochure forcepoint dlp_en
Brochure forcepoint dlp_enBrochure forcepoint dlp_en
Brochure forcepoint dlp_en
 
Cloud security for banks - the central bank of Israel regulations for cloud s...
Cloud security for banks - the central bank of Israel regulations for cloud s...Cloud security for banks - the central bank of Israel regulations for cloud s...
Cloud security for banks - the central bank of Israel regulations for cloud s...
 
McAfee - MVISION Cloud (MVC) - Cloud Access Security Broker (CASB)
McAfee - MVISION Cloud (MVC) - Cloud Access Security Broker (CASB)McAfee - MVISION Cloud (MVC) - Cloud Access Security Broker (CASB)
McAfee - MVISION Cloud (MVC) - Cloud Access Security Broker (CASB)
 
Cloud security, Cloud security Access broker, CSAB's 4 pillar, deployment mode
Cloud security, Cloud security Access broker, CSAB's 4 pillar, deployment modeCloud security, Cloud security Access broker, CSAB's 4 pillar, deployment mode
Cloud security, Cloud security Access broker, CSAB's 4 pillar, deployment mode
 
Forrester Research: Securing the Cloud When Users are Left to Their Own Devices
Forrester Research: Securing the Cloud When Users are Left to Their Own DevicesForrester Research: Securing the Cloud When Users are Left to Their Own Devices
Forrester Research: Securing the Cloud When Users are Left to Their Own Devices
 
CSA Security Guidance Cloud Computing v3.0
CSA Security Guidance Cloud Computing v3.0CSA Security Guidance Cloud Computing v3.0
CSA Security Guidance Cloud Computing v3.0
 
Saas security stock company
Saas security stock companySaas security stock company
Saas security stock company
 
Why CSA Australia
Why CSA AustraliaWhy CSA Australia
Why CSA Australia
 
SEB Forcepoint Corporate Overview
SEB Forcepoint Corporate OverviewSEB Forcepoint Corporate Overview
SEB Forcepoint Corporate Overview
 

Similar to Improving Cloud Visibility, Accountability & Security

Cloudy with a Chance of...Visibility, Accountability & Security
Cloudy with a Chance of...Visibility, Accountability & SecurityCloudy with a Chance of...Visibility, Accountability & Security
Cloudy with a Chance of...Visibility, Accountability & SecurityForcepoint LLC
 
Proteja sus datos en cualquier servicio Cloud y Web de forma unificada
Proteja sus datos en cualquier servicio Cloud y Web de forma unificadaProteja sus datos en cualquier servicio Cloud y Web de forma unificada
Proteja sus datos en cualquier servicio Cloud y Web de forma unificadaCristian Garcia G.
 
Webinar bitglass - complete deck-2
Webinar   bitglass - complete deck-2Webinar   bitglass - complete deck-2
Webinar bitglass - complete deck-2Bitglass
 
The Enablement of an Identity-Centric SOC in the Regulatory Rumba Era
The Enablement of an Identity-Centric SOC in the Regulatory Rumba EraThe Enablement of an Identity-Centric SOC in the Regulatory Rumba Era
The Enablement of an Identity-Centric SOC in the Regulatory Rumba EraLuca Martelli
 
Forcepoint: Technická opatření pro ochranu osobních údajů (a citlivých dat) z...
Forcepoint: Technická opatření pro ochranu osobních údajů (a citlivých dat) z...Forcepoint: Technická opatření pro ochranu osobních údajů (a citlivých dat) z...
Forcepoint: Technická opatření pro ochranu osobních údajů (a citlivých dat) z...MarketingArrowECS_CZ
 
Security and Compliance with SharePoint and Office 365
Security and Compliance with SharePoint and Office 365Security and Compliance with SharePoint and Office 365
Security and Compliance with SharePoint and Office 365Richard Harbridge
 
Larry Whiteside - Optiv Cloud ready or steam rolled csa version
Larry Whiteside - Optiv Cloud ready or steam rolled csa versionLarry Whiteside - Optiv Cloud ready or steam rolled csa version
Larry Whiteside - Optiv Cloud ready or steam rolled csa versionTrish McGinity, CCSK
 
Accelerated Saa S Exec Briefing V2
Accelerated Saa S Exec Briefing V2Accelerated Saa S Exec Briefing V2
Accelerated Saa S Exec Briefing V2jeffirby
 
Securing Beyond the Cloud Generation
Securing Beyond the Cloud GenerationSecuring Beyond the Cloud Generation
Securing Beyond the Cloud GenerationForcepoint LLC
 
5 Highest-Impact CASB Use Cases - Office 365
5 Highest-Impact CASB Use Cases - Office 3655 Highest-Impact CASB Use Cases - Office 365
5 Highest-Impact CASB Use Cases - Office 365Netskope
 
Is Your SaaS Covered? Best Practices for Preventing Data Loss in Microsoft Of...
Is Your SaaS Covered? Best Practices for Preventing Data Loss in Microsoft Of...Is Your SaaS Covered? Best Practices for Preventing Data Loss in Microsoft Of...
Is Your SaaS Covered? Best Practices for Preventing Data Loss in Microsoft Of...Amazon Web Services
 
Achieving Visibility, Security and Real-Time Actionable Alerts Using VPC Flow...
Achieving Visibility, Security and Real-Time Actionable Alerts Using VPC Flow...Achieving Visibility, Security and Real-Time Actionable Alerts Using VPC Flow...
Achieving Visibility, Security and Real-Time Actionable Alerts Using VPC Flow...Amazon Web Services
 
The System Administrator Role in the Cloud Era: Better Than Ever (ENT212) | A...
The System Administrator Role in the Cloud Era: Better Than Ever (ENT212) | A...The System Administrator Role in the Cloud Era: Better Than Ever (ENT212) | A...
The System Administrator Role in the Cloud Era: Better Than Ever (ENT212) | A...Amazon Web Services
 
AWS FSI Symposium 2017 NYC - 9 Cloud Enabled Security Designs
AWS FSI Symposium 2017 NYC - 9 Cloud Enabled Security DesignsAWS FSI Symposium 2017 NYC - 9 Cloud Enabled Security Designs
AWS FSI Symposium 2017 NYC - 9 Cloud Enabled Security DesignsAmazon Web Services
 
How to Recover from a Ransomware Disaster
How to Recover from a Ransomware DisasterHow to Recover from a Ransomware Disaster
How to Recover from a Ransomware DisasterSpanning Cloud Apps
 
Forcepoint Corporate Presentation_Short.pptx
Forcepoint Corporate Presentation_Short.pptxForcepoint Corporate Presentation_Short.pptx
Forcepoint Corporate Presentation_Short.pptxcaesar92
 
5 Highest-Impact CASB Use Cases
5 Highest-Impact CASB Use Cases5 Highest-Impact CASB Use Cases
5 Highest-Impact CASB Use CasesNetskope
 
SYN 220: XenApp and XenDesktop Security Best Practices
SYN 220: XenApp and XenDesktop Security Best Practices SYN 220: XenApp and XenDesktop Security Best Practices
SYN 220: XenApp and XenDesktop Security Best Practices Citrix
 

Similar to Improving Cloud Visibility, Accountability & Security (20)

Cloudy with a Chance of...Visibility, Accountability & Security
Cloudy with a Chance of...Visibility, Accountability & SecurityCloudy with a Chance of...Visibility, Accountability & Security
Cloudy with a Chance of...Visibility, Accountability & Security
 
Proteja sus datos en cualquier servicio Cloud y Web de forma unificada
Proteja sus datos en cualquier servicio Cloud y Web de forma unificadaProteja sus datos en cualquier servicio Cloud y Web de forma unificada
Proteja sus datos en cualquier servicio Cloud y Web de forma unificada
 
Webinar bitglass - complete deck-2
Webinar   bitglass - complete deck-2Webinar   bitglass - complete deck-2
Webinar bitglass - complete deck-2
 
The Enablement of an Identity-Centric SOC in the Regulatory Rumba Era
The Enablement of an Identity-Centric SOC in the Regulatory Rumba EraThe Enablement of an Identity-Centric SOC in the Regulatory Rumba Era
The Enablement of an Identity-Centric SOC in the Regulatory Rumba Era
 
Cloud Seeding
Cloud SeedingCloud Seeding
Cloud Seeding
 
Forcepoint: Technická opatření pro ochranu osobních údajů (a citlivých dat) z...
Forcepoint: Technická opatření pro ochranu osobních údajů (a citlivých dat) z...Forcepoint: Technická opatření pro ochranu osobních údajů (a citlivých dat) z...
Forcepoint: Technická opatření pro ochranu osobních údajů (a citlivých dat) z...
 
Security and Compliance with SharePoint and Office 365
Security and Compliance with SharePoint and Office 365Security and Compliance with SharePoint and Office 365
Security and Compliance with SharePoint and Office 365
 
Larry Whiteside - Optiv Cloud ready or steam rolled csa version
Larry Whiteside - Optiv Cloud ready or steam rolled csa versionLarry Whiteside - Optiv Cloud ready or steam rolled csa version
Larry Whiteside - Optiv Cloud ready or steam rolled csa version
 
Accelerated Saa S Exec Briefing V2
Accelerated Saa S Exec Briefing V2Accelerated Saa S Exec Briefing V2
Accelerated Saa S Exec Briefing V2
 
Securing Beyond the Cloud Generation
Securing Beyond the Cloud GenerationSecuring Beyond the Cloud Generation
Securing Beyond the Cloud Generation
 
Atelier Technique - Symantec - #ACSS2019
Atelier Technique - Symantec - #ACSS2019Atelier Technique - Symantec - #ACSS2019
Atelier Technique - Symantec - #ACSS2019
 
5 Highest-Impact CASB Use Cases - Office 365
5 Highest-Impact CASB Use Cases - Office 3655 Highest-Impact CASB Use Cases - Office 365
5 Highest-Impact CASB Use Cases - Office 365
 
Is Your SaaS Covered? Best Practices for Preventing Data Loss in Microsoft Of...
Is Your SaaS Covered? Best Practices for Preventing Data Loss in Microsoft Of...Is Your SaaS Covered? Best Practices for Preventing Data Loss in Microsoft Of...
Is Your SaaS Covered? Best Practices for Preventing Data Loss in Microsoft Of...
 
Achieving Visibility, Security and Real-Time Actionable Alerts Using VPC Flow...
Achieving Visibility, Security and Real-Time Actionable Alerts Using VPC Flow...Achieving Visibility, Security and Real-Time Actionable Alerts Using VPC Flow...
Achieving Visibility, Security and Real-Time Actionable Alerts Using VPC Flow...
 
The System Administrator Role in the Cloud Era: Better Than Ever (ENT212) | A...
The System Administrator Role in the Cloud Era: Better Than Ever (ENT212) | A...The System Administrator Role in the Cloud Era: Better Than Ever (ENT212) | A...
The System Administrator Role in the Cloud Era: Better Than Ever (ENT212) | A...
 
AWS FSI Symposium 2017 NYC - 9 Cloud Enabled Security Designs
AWS FSI Symposium 2017 NYC - 9 Cloud Enabled Security DesignsAWS FSI Symposium 2017 NYC - 9 Cloud Enabled Security Designs
AWS FSI Symposium 2017 NYC - 9 Cloud Enabled Security Designs
 
How to Recover from a Ransomware Disaster
How to Recover from a Ransomware DisasterHow to Recover from a Ransomware Disaster
How to Recover from a Ransomware Disaster
 
Forcepoint Corporate Presentation_Short.pptx
Forcepoint Corporate Presentation_Short.pptxForcepoint Corporate Presentation_Short.pptx
Forcepoint Corporate Presentation_Short.pptx
 
5 Highest-Impact CASB Use Cases
5 Highest-Impact CASB Use Cases5 Highest-Impact CASB Use Cases
5 Highest-Impact CASB Use Cases
 
SYN 220: XenApp and XenDesktop Security Best Practices
SYN 220: XenApp and XenDesktop Security Best Practices SYN 220: XenApp and XenDesktop Security Best Practices
SYN 220: XenApp and XenDesktop Security Best Practices
 

More from Doug Copley

Security Program Guidance and Establishing a Culture of Security
Security Program Guidance and Establishing a Culture of SecuritySecurity Program Guidance and Establishing a Culture of Security
Security Program Guidance and Establishing a Culture of SecurityDoug Copley
 
Demonstrating Information Security Program Effectiveness
Demonstrating Information Security Program EffectivenessDemonstrating Information Security Program Effectiveness
Demonstrating Information Security Program EffectivenessDoug Copley
 
Improving Security Metrics
Improving Security MetricsImproving Security Metrics
Improving Security MetricsDoug Copley
 
Cybersecurity Challenges in Healthcare
Cybersecurity Challenges in HealthcareCybersecurity Challenges in Healthcare
Cybersecurity Challenges in HealthcareDoug Copley
 
What it Takes to be a CISO in 2017
What it Takes to be a CISO in 2017What it Takes to be a CISO in 2017
What it Takes to be a CISO in 2017Doug Copley
 
2015 Secureworld_effectively_managing_information_risk
2015 Secureworld_effectively_managing_information_risk2015 Secureworld_effectively_managing_information_risk
2015 Secureworld_effectively_managing_information_riskDoug Copley
 
Detroit ISSA Healthcare Cybersecurity
Detroit ISSA Healthcare CybersecurityDetroit ISSA Healthcare Cybersecurity
Detroit ISSA Healthcare CybersecurityDoug Copley
 

More from Doug Copley (7)

Security Program Guidance and Establishing a Culture of Security
Security Program Guidance and Establishing a Culture of SecuritySecurity Program Guidance and Establishing a Culture of Security
Security Program Guidance and Establishing a Culture of Security
 
Demonstrating Information Security Program Effectiveness
Demonstrating Information Security Program EffectivenessDemonstrating Information Security Program Effectiveness
Demonstrating Information Security Program Effectiveness
 
Improving Security Metrics
Improving Security MetricsImproving Security Metrics
Improving Security Metrics
 
Cybersecurity Challenges in Healthcare
Cybersecurity Challenges in HealthcareCybersecurity Challenges in Healthcare
Cybersecurity Challenges in Healthcare
 
What it Takes to be a CISO in 2017
What it Takes to be a CISO in 2017What it Takes to be a CISO in 2017
What it Takes to be a CISO in 2017
 
2015 Secureworld_effectively_managing_information_risk
2015 Secureworld_effectively_managing_information_risk2015 Secureworld_effectively_managing_information_risk
2015 Secureworld_effectively_managing_information_risk
 
Detroit ISSA Healthcare Cybersecurity
Detroit ISSA Healthcare CybersecurityDetroit ISSA Healthcare Cybersecurity
Detroit ISSA Healthcare Cybersecurity
 

Recently uploaded

Russian Call Girls in Kolkata Ishita 🤌 8250192130 🚀 Vip Call Girls Kolkata
Russian Call Girls in Kolkata Ishita 🤌  8250192130 🚀 Vip Call Girls KolkataRussian Call Girls in Kolkata Ishita 🤌  8250192130 🚀 Vip Call Girls Kolkata
Russian Call Girls in Kolkata Ishita 🤌 8250192130 🚀 Vip Call Girls Kolkataanamikaraghav4
 
Russian Call Girls in Kolkata Samaira 🤌 8250192130 🚀 Vip Call Girls Kolkata
Russian Call Girls in Kolkata Samaira 🤌  8250192130 🚀 Vip Call Girls KolkataRussian Call Girls in Kolkata Samaira 🤌  8250192130 🚀 Vip Call Girls Kolkata
Russian Call Girls in Kolkata Samaira 🤌 8250192130 🚀 Vip Call Girls Kolkataanamikaraghav4
 
Call Girls In Mumbai Central Mumbai ❤️ 9920874524 👈 Cash on Delivery
Call Girls In Mumbai Central Mumbai ❤️ 9920874524 👈 Cash on DeliveryCall Girls In Mumbai Central Mumbai ❤️ 9920874524 👈 Cash on Delivery
Call Girls In Mumbai Central Mumbai ❤️ 9920874524 👈 Cash on Deliverybabeytanya
 
VIP Kolkata Call Girl Salt Lake 👉 8250192130 Available With Room
VIP Kolkata Call Girl Salt Lake 👉 8250192130  Available With RoomVIP Kolkata Call Girl Salt Lake 👉 8250192130  Available With Room
VIP Kolkata Call Girl Salt Lake 👉 8250192130 Available With Roomishabajaj13
 
VIP Call Girls Kolkata Ananya 🤌 8250192130 🚀 Vip Call Girls Kolkata
VIP Call Girls Kolkata Ananya 🤌  8250192130 🚀 Vip Call Girls KolkataVIP Call Girls Kolkata Ananya 🤌  8250192130 🚀 Vip Call Girls Kolkata
VIP Call Girls Kolkata Ananya 🤌 8250192130 🚀 Vip Call Girls Kolkataanamikaraghav4
 
FULL ENJOY Call Girls In Mayur Vihar Delhi Contact Us 8377087607
FULL ENJOY Call Girls In Mayur Vihar Delhi Contact Us 8377087607FULL ENJOY Call Girls In Mayur Vihar Delhi Contact Us 8377087607
FULL ENJOY Call Girls In Mayur Vihar Delhi Contact Us 8377087607dollysharma2066
 
Packaging the Monolith - PHP Tek 2024 (Breaking it down one bite at a time)
Packaging the Monolith - PHP Tek 2024 (Breaking it down one bite at a time)Packaging the Monolith - PHP Tek 2024 (Breaking it down one bite at a time)
Packaging the Monolith - PHP Tek 2024 (Breaking it down one bite at a time)Dana Luther
 
定制(UAL学位证)英国伦敦艺术大学毕业证成绩单原版一比一
定制(UAL学位证)英国伦敦艺术大学毕业证成绩单原版一比一定制(UAL学位证)英国伦敦艺术大学毕业证成绩单原版一比一
定制(UAL学位证)英国伦敦艺术大学毕业证成绩单原版一比一Fs
 
How is AI changing journalism? (v. April 2024)
How is AI changing journalism? (v. April 2024)How is AI changing journalism? (v. April 2024)
How is AI changing journalism? (v. April 2024)Damian Radcliffe
 
AlbaniaDreamin24 - How to easily use an API with Flows
AlbaniaDreamin24 - How to easily use an API with FlowsAlbaniaDreamin24 - How to easily use an API with Flows
AlbaniaDreamin24 - How to easily use an API with FlowsThierry TROUIN ☁
 
VIP Kolkata Call Girl Alambazar 👉 8250192130 Available With Room
VIP Kolkata Call Girl Alambazar 👉 8250192130  Available With RoomVIP Kolkata Call Girl Alambazar 👉 8250192130  Available With Room
VIP Kolkata Call Girl Alambazar 👉 8250192130 Available With Roomdivyansh0kumar0
 
定制(Lincoln毕业证书)新西兰林肯大学毕业证成绩单原版一比一
定制(Lincoln毕业证书)新西兰林肯大学毕业证成绩单原版一比一定制(Lincoln毕业证书)新西兰林肯大学毕业证成绩单原版一比一
定制(Lincoln毕业证书)新西兰林肯大学毕业证成绩单原版一比一Fs
 
Denver Web Design brochure for public viewing
Denver Web Design brochure for public viewingDenver Web Design brochure for public viewing
Denver Web Design brochure for public viewingbigorange77
 
Chennai Call Girls Alwarpet Phone 🍆 8250192130 👅 celebrity escorts service
Chennai Call Girls Alwarpet Phone 🍆 8250192130 👅 celebrity escorts serviceChennai Call Girls Alwarpet Phone 🍆 8250192130 👅 celebrity escorts service
Chennai Call Girls Alwarpet Phone 🍆 8250192130 👅 celebrity escorts servicevipmodelshub1
 
Low Rate Call Girls Kolkata Avani 🤌 8250192130 🚀 Vip Call Girls Kolkata
Low Rate Call Girls Kolkata Avani 🤌  8250192130 🚀 Vip Call Girls KolkataLow Rate Call Girls Kolkata Avani 🤌  8250192130 🚀 Vip Call Girls Kolkata
Low Rate Call Girls Kolkata Avani 🤌 8250192130 🚀 Vip Call Girls Kolkataanamikaraghav4
 
Call Girls Service Adil Nagar 7001305949 Need escorts Service Pooja Vip
Call Girls Service Adil Nagar 7001305949 Need escorts Service Pooja VipCall Girls Service Adil Nagar 7001305949 Need escorts Service Pooja Vip
Call Girls Service Adil Nagar 7001305949 Need escorts Service Pooja VipCall Girls Lucknow
 

Recently uploaded (20)

Russian Call Girls in Kolkata Ishita 🤌 8250192130 🚀 Vip Call Girls Kolkata
Russian Call Girls in Kolkata Ishita 🤌  8250192130 🚀 Vip Call Girls KolkataRussian Call Girls in Kolkata Ishita 🤌  8250192130 🚀 Vip Call Girls Kolkata
Russian Call Girls in Kolkata Ishita 🤌 8250192130 🚀 Vip Call Girls Kolkata
 
Russian Call Girls in Kolkata Samaira 🤌 8250192130 🚀 Vip Call Girls Kolkata
Russian Call Girls in Kolkata Samaira 🤌  8250192130 🚀 Vip Call Girls KolkataRussian Call Girls in Kolkata Samaira 🤌  8250192130 🚀 Vip Call Girls Kolkata
Russian Call Girls in Kolkata Samaira 🤌 8250192130 🚀 Vip Call Girls Kolkata
 
Call Girls In Mumbai Central Mumbai ❤️ 9920874524 👈 Cash on Delivery
Call Girls In Mumbai Central Mumbai ❤️ 9920874524 👈 Cash on DeliveryCall Girls In Mumbai Central Mumbai ❤️ 9920874524 👈 Cash on Delivery
Call Girls In Mumbai Central Mumbai ❤️ 9920874524 👈 Cash on Delivery
 
VIP Kolkata Call Girl Salt Lake 👉 8250192130 Available With Room
VIP Kolkata Call Girl Salt Lake 👉 8250192130  Available With RoomVIP Kolkata Call Girl Salt Lake 👉 8250192130  Available With Room
VIP Kolkata Call Girl Salt Lake 👉 8250192130 Available With Room
 
VIP Call Girls Kolkata Ananya 🤌 8250192130 🚀 Vip Call Girls Kolkata
VIP Call Girls Kolkata Ananya 🤌  8250192130 🚀 Vip Call Girls KolkataVIP Call Girls Kolkata Ananya 🤌  8250192130 🚀 Vip Call Girls Kolkata
VIP Call Girls Kolkata Ananya 🤌 8250192130 🚀 Vip Call Girls Kolkata
 
FULL ENJOY Call Girls In Mayur Vihar Delhi Contact Us 8377087607
FULL ENJOY Call Girls In Mayur Vihar Delhi Contact Us 8377087607FULL ENJOY Call Girls In Mayur Vihar Delhi Contact Us 8377087607
FULL ENJOY Call Girls In Mayur Vihar Delhi Contact Us 8377087607
 
Packaging the Monolith - PHP Tek 2024 (Breaking it down one bite at a time)
Packaging the Monolith - PHP Tek 2024 (Breaking it down one bite at a time)Packaging the Monolith - PHP Tek 2024 (Breaking it down one bite at a time)
Packaging the Monolith - PHP Tek 2024 (Breaking it down one bite at a time)
 
定制(UAL学位证)英国伦敦艺术大学毕业证成绩单原版一比一
定制(UAL学位证)英国伦敦艺术大学毕业证成绩单原版一比一定制(UAL学位证)英国伦敦艺术大学毕业证成绩单原版一比一
定制(UAL学位证)英国伦敦艺术大学毕业证成绩单原版一比一
 
How is AI changing journalism? (v. April 2024)
How is AI changing journalism? (v. April 2024)How is AI changing journalism? (v. April 2024)
How is AI changing journalism? (v. April 2024)
 
AlbaniaDreamin24 - How to easily use an API with Flows
AlbaniaDreamin24 - How to easily use an API with FlowsAlbaniaDreamin24 - How to easily use an API with Flows
AlbaniaDreamin24 - How to easily use an API with Flows
 
VIP Kolkata Call Girl Alambazar 👉 8250192130 Available With Room
VIP Kolkata Call Girl Alambazar 👉 8250192130  Available With RoomVIP Kolkata Call Girl Alambazar 👉 8250192130  Available With Room
VIP Kolkata Call Girl Alambazar 👉 8250192130 Available With Room
 
定制(Lincoln毕业证书)新西兰林肯大学毕业证成绩单原版一比一
定制(Lincoln毕业证书)新西兰林肯大学毕业证成绩单原版一比一定制(Lincoln毕业证书)新西兰林肯大学毕业证成绩单原版一比一
定制(Lincoln毕业证书)新西兰林肯大学毕业证成绩单原版一比一
 
Hot Sexy call girls in Rk Puram 🔝 9953056974 🔝 Delhi escort Service
Hot Sexy call girls in  Rk Puram 🔝 9953056974 🔝 Delhi escort ServiceHot Sexy call girls in  Rk Puram 🔝 9953056974 🔝 Delhi escort Service
Hot Sexy call girls in Rk Puram 🔝 9953056974 🔝 Delhi escort Service
 
sasti delhi Call Girls in munirka 🔝 9953056974 🔝 escort Service-
sasti delhi Call Girls in munirka 🔝 9953056974 🔝 escort Service-sasti delhi Call Girls in munirka 🔝 9953056974 🔝 escort Service-
sasti delhi Call Girls in munirka 🔝 9953056974 🔝 escort Service-
 
Denver Web Design brochure for public viewing
Denver Web Design brochure for public viewingDenver Web Design brochure for public viewing
Denver Web Design brochure for public viewing
 
Chennai Call Girls Alwarpet Phone 🍆 8250192130 👅 celebrity escorts service
Chennai Call Girls Alwarpet Phone 🍆 8250192130 👅 celebrity escorts serviceChennai Call Girls Alwarpet Phone 🍆 8250192130 👅 celebrity escorts service
Chennai Call Girls Alwarpet Phone 🍆 8250192130 👅 celebrity escorts service
 
Model Call Girl in Jamuna Vihar Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in  Jamuna Vihar Delhi reach out to us at 🔝9953056974🔝Model Call Girl in  Jamuna Vihar Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Jamuna Vihar Delhi reach out to us at 🔝9953056974🔝
 
Rohini Sector 26 Call Girls Delhi 9999965857 @Sabina Saikh No Advance
Rohini Sector 26 Call Girls Delhi 9999965857 @Sabina Saikh No AdvanceRohini Sector 26 Call Girls Delhi 9999965857 @Sabina Saikh No Advance
Rohini Sector 26 Call Girls Delhi 9999965857 @Sabina Saikh No Advance
 
Low Rate Call Girls Kolkata Avani 🤌 8250192130 🚀 Vip Call Girls Kolkata
Low Rate Call Girls Kolkata Avani 🤌  8250192130 🚀 Vip Call Girls KolkataLow Rate Call Girls Kolkata Avani 🤌  8250192130 🚀 Vip Call Girls Kolkata
Low Rate Call Girls Kolkata Avani 🤌 8250192130 🚀 Vip Call Girls Kolkata
 
Call Girls Service Adil Nagar 7001305949 Need escorts Service Pooja Vip
Call Girls Service Adil Nagar 7001305949 Need escorts Service Pooja VipCall Girls Service Adil Nagar 7001305949 Need escorts Service Pooja Vip
Call Girls Service Adil Nagar 7001305949 Need escorts Service Pooja Vip
 

Improving Cloud Visibility, Accountability & Security

  • 1. Copyright © 2017 Forcepoint. All rights reserved. Cloudy with a Chance of ... Visibility, Accountability & Security Doug Copley Deputy CISO; Sr. Security & Privacy Strategist March 16, 2016
  • 2. Copyright © 2017 Forcepoint. All rights reserved. CMO: Big board meeting in an hour Need latest customer data from Rita Her office is dark… Uh ohhh… Where is Rita?
  • 3. Copyright © 2017 Forcepoint. All rights reserved. | 3 WHY CLOUD? 1. Salesforce.com – “Why Move To The Cloud? 10 Benefits Of Cloud Computing” (11/15) 1. Time to Market 2. Scale, Cost Flexibility 3. Work From Anywhere 4. Automatic Updates/Patches 5. Focus on Mission 6. BC/DR 7. Competitiveness 8. Security
  • 4. Copyright © 2017 Forcepoint. All rights reserved. THE CLOUD IS CHANGING IT AND SECURITY MUST EVOLVE Cloud adoption is growing and it’s not slowing down ▸ Cloud now 40% of IT budgets1 ▸ 78% of organizations indicate that their budget for cloud services will increase by 2017, with 29% expecting significant increases1 SaaS adoption exploding Organizations now have a “Cloud First” mentality ▸ SaaS (Software as a Service) spend is projected to grow to $75B by 2020 at a 19.2% compound annual growth rate2 ▸ Of those Gartner surveyed who use or plan to use cloud services, 88% have a “Cloud First” strategy for technology initiatives1 1. Gartner – “Market Trends: Cloud Adoption Trends Favor Public Cloud With a Hybrid Twist (08/16) 2. Gartner – Forecast Analysis: Public Cloud Services Worldwide, 4Q16 Update (01/17) There’s no turning back, but how do you keep your business secure?
  • 5. Copyright © 2017 Forcepoint. All rights reserved. BARRIERS TO CLOUD ADOPTION
  • 6. Copyright © 2017 Forcepoint. All rights reserved. | 6 Budget Organization Enablement Project Delivery Lifecycle Security Architecture Governance, Risk & Compliance Legal & Human Resources Threat Prevention, Detection & Response Identity Management Risk Management
  • 7. Copyright © 2017 Forcepoint. All rights reserved. CONTROL QUESTIONS FOR CLOUD COMPUTING “How do I know if departments are using unsanctioned cloud applications?” “How to we protect web usage without a proxy on site?” “How can we protect email when it’s in Office365 or GMail? What about sandboxing?” “Everyone can get to the cloud. How can I make sure only authorized users access our data?” (Authentication/Authorization) “How do I inspect cloud traffic (for data loss) when it never traverses our network? What if it’s TLS traffic?”
  • 8. Copyright © 2017 Forcepoint. All rights reserved. | 8 DATA-CENTRIC CONTEXT AWARE MODEL What are my critical assets? Where are they? How much protection is needed? General Email Meeting Notes Source Code Product Designs HR Data Marketing Materials Telephone Directory Product Manuals Public Presentations Internal Repository And ??? GitHub? PCs? Department OneDrive ADP Cloud Application Server Inventory In ServiceNow
  • 9. Copyright © 2017 Forcepoint. All rights reserved. ADDRESSING SECURITY IN THE CLOUD
  • 10. Copyright © 2017 Forcepoint. All rights reserved. Corporate Environment Cloud Security Vendor/AWS/Azure Web Proxy Email GW Sandbox DLP CASB
  • 11. Copyright © 2017 Forcepoint. All rights reserved. Users from Anywhere Cloud Access Security Broker (CASB) WHAT IS A CLOUD ACCESS SECURITY BROKER (CASB)? Users From the Office Users from Home Cloud Provides a Layer of Visibility and Control or
  • 12. Copyright © 2017 Forcepoint. All rights reserved. | 12 IMPROVE VISIBILITY Discover Shadow IT & Risk Effective CASBs: 1. Eliminate blind spots 2. Discover what cloud apps are being used by your workforce 3. Risk rank those cloud apps so IT teams know what usage has the highest risk
  • 13. Copyright © 2017 Forcepoint. All rights reserved. VISIBILITY – WHO, WHAT (DATA), WHEN, WHERE, WHAT (DEVICE) Unusual Access Detect access anomalies that may indicate an external or insider threat targeting your data Audit Trails ID, department, location, time, device, actions and data accessed Admin Activity Track, monitor, and report all administrative and privileged user activity: data accesses, configuration changes and permission modifications
  • 14. Copyright © 2017 Forcepoint. All rights reserved. ACCOUNTABILITY Identification of Excess Privileges • Users may have excess privileges. You could be overlooking unauthorized access to sensitive corporate or customer information. Secure Access From Managed and Unmanaged Devices • Force multi-factor authentication based on user, device, mobile app, location or risk profile • Limit access or ability to download information for unmanaged devices • Restrict access or permissions from outside the country
  • 15. Copyright © 2017 Forcepoint. All rights reserved. | 15 SECURITY AND COMPLIANCE Detection of Compliance Gaps Get notified when cloud app security settings change and compare them to industry best practices or standards (e.g., HIPAA, PCI DSS, ISO, CSA) to highlight deficiencies that require immediate attention. Identify Exposed Sensitive Information Scan corporate files and data stored in file- sharing services such as OneDrive, Box, Dropbox and Google Drive for sensitive information and initiate a remediation workflow, if necessary.
  • 16. Copyright © 2017 Forcepoint. All rights reserved. | 16 Security and compliance Prevent Leaks of Sensitive Data Inspect files and cloud content in real-time to prevent the malicious or unintentional leakage of confidential information. Identify and analyze sensitive or regulated data stored in cloud file-sync services to understand sharing permissions exposure and ensure compliance with regulations such as PCI, SOX, and HIPAA.
  • 17. Copyright © 2017 Forcepoint. All rights reserved. | 17 BEHAVIOR AND INTENT Optimize Detection of Anomalies and Threats Forcepoint CASB is the only cloud access security broker out there that protects enterprise data from theft and loss due to compromised, malicious, and careless users and that correlates activity anomalies with risky IP addresses.
  • 18. Copyright © 2017 Forcepoint. All rights reserved. NEED FOR OPERATIONAL EFFICIENCY
  • 19. Copyright © 2017 Forcepoint. All rights reserved. | 19 DRIVES OPERATIONAL EFFICIENCIES Identifying Security Gaps CASB APIs can analyze your cloud tenants, helping IT review users and admins to detect dormant accounts, external users, and ex-employees that might still have access to your cloud apps. In addition, it inspects your tenant security configurations to detect deficiencies and to recommend best-practice settings for effective cloud governance.
  • 20. Copyright © 2017 Forcepoint. All rights reserved. | 20 ANALYZING BEHAVIOR TO UNDERSTAND INTENT Detect & Block Cyber Attacks CASB monitors all user activity and analyzes usage patterns to rapidly detect anomalies that can indicate an account takeover (much more efficient) The dashboard provides a wealth of cloud analytics, highlighting suspicious activities and attempts to compromise accounts
  • 21. Copyright © 2017 Forcepoint. All rights reserved. | 21 CLOUD CONVERGENCE & GOVERNANCE Common Tools Across Platforms Mature vendors can offer integrated tool sets that work on premise and in the cloud (no separate tools necessary) Cloud App Metrics Automate cloud app metrics - number of users, activity level, traffic volume and usage hours for each app. Identification of Overspend Review the entitlements of your users. You could be overlooking potential areas of risk or possibly cost savings opportunities.
  • 22. Copyright © 2017 Forcepoint. All rights reserved. CRITICAL CAPABILITIES FOR CLOUD SECURITY PROVIDERS
  • 23. Copyright © 2017 Forcepoint. All rights reserved. | 23
  • 24. Copyright © 2017 Forcepoint. All rights reserved. | 24 THEY SHOULD HAVE BROAD GLOBAL PRESENCE USA-NA Toronto San Jose Dallas Miami Ashburn Chicago New York Los Angeles CALA Sao Paulo AFRICA Johannesburg EMEA Amsterdam Dusseldorf Frankfurt Geneva Istanbul London (3) Paris Stockholm Warsaw Milan APAC Tokyo Hong Kong Sydney Singapore Mumbai
  • 25. Copyright © 2017 Forcepoint. All rights reserved. | 25 DON’T ACCEPT LATENCY  Multiple Tier-1 ISPs  Maintain our own ASNs  Present at peering exchanges  Content providers and Network providers
  • 26. Copyright © 2017 Forcepoint. All rights reserved. | 26 THEY SHOULD BE CERTIFIED (THEIR ENTIRE CAPABILITY) Forcepoint certifications cover complete operations and staff  Architecture  Development  Deployment  Operations  Data Center  Services  SOC In Process:  FedRAMP  GDPR (ISO 27018 supports)  ISO 27017 (Cloud Security)  ISO 22301 (Bus Continuity) Forcepoint Compliance Standards Star Gold Award
  • 27. Copyright © 2017 Forcepoint. All rights reserved. THE CLOUD SECURITY FOGLIGHT 1. Can identify cloud services being used and risk-rank them 2. Can provide detailed usage activity – even for administrators 3. Can trigger adaptive authentication 4. Can help identify unauthorized access activity 5. Can identify user access anomalies and correlate that with cloud apps 6. Can discover sensitive data in cloud apps and assess risk
  • 28. Copyright © 2017 Forcepoint. All rights reserved. THE CLOUD SECURITY FOGLIGHT 7. Can identify when non-compliant changes are made 8. Can identify users with excess privileges 9. Can limit functionality for unmanaged devices (and managed ones too!) 10. Can integrate with DLP and web gateways for comprehensive security 11. Can analyze user behavior to understand anomalies and user intent 12. Can ease information security workload
  • 29. Copyright © 2017 Forcepoint. All rights reserved. | 29 Where information is most valuable – and most vulnerable PROTECTING THE HUMAN POINT Doug Copley Deputy CISO; Sr. Security & Privacy Strategist LinkedIn: linkedin.com/in/dcopley Twitter: @hcare_security