Successfully reported this slideshow.
We use your LinkedIn profile and activity data to personalize ads and to show you more relevant ads. You can change your ad preferences anytime.

The Razor's Edge: Enabling Cloud While Mitigating the Risk of a Cloud Data Breach

1,694 views

Published on

Shadow IT. It's not a new term and certainly not a new challenge. But with only blunt-force solutions like saying "no" or blocking cloud services at the firewall, IT has not been able to do much to address the challenge. This is all changing. Business and IT leaders alike see real value in cloud services and want to take a lean-forward approach to enabling them. The reality, though, is that cloud services are not without their risks, and the risk of a data breach increases when the cloud is involved. Hear from Netskope about the risks, economic impact, and multiplier effect of a cloud data breach, and how forward-looking organizations are walking the razor’s edge to mitigate these risks while enabling the cloud.

Published in: Technology, Business
  • I'd advise you to use this service: ⇒ www.HelpWriting.net ⇐ The price of your order will depend on the deadline and type of paper (e.g. bachelor, undergraduate etc). The more time you have before the deadline - the less price of the order you will have. Thus, this service offers high-quality essays at the optimal price.
       Reply 
    Are you sure you want to  Yes  No
    Your message goes here
  • Hi there! I just wanted to share a list of sites that helped me a lot during my studies: .................................................................................................................................... www.EssayWrite.best - Write an essay .................................................................................................................................... www.LitReview.xyz - Summary of books .................................................................................................................................... www.Coursework.best - Online coursework .................................................................................................................................... www.Dissertations.me - proquest dissertations .................................................................................................................................... www.ReMovie.club - Movies reviews .................................................................................................................................... www.WebSlides.vip - Best powerpoint presentations .................................................................................................................................... www.WritePaper.info - Write a research paper .................................................................................................................................... www.EddyHelp.com - Homework help online .................................................................................................................................... www.MyResumeHelp.net - Professional resume writing service .................................................................................................................................. www.HelpWriting.net - Help with writing any papers ......................................................................................................................................... Save so as not to lose
       Reply 
    Are you sure you want to  Yes  No
    Your message goes here
  • Be the first to like this

The Razor's Edge: Enabling Cloud While Mitigating the Risk of a Cloud Data Breach

  1. 1. The Razor’s Edge: Enabling cloud while mitigating the risk of a cloud data breach
  2. 2. Cloud App Explosion 2 Driven by individual and line of business adoption of cloud and mobile. 2011 2016 $21.2B $92.8B SaaSRevenue Forrester
  3. 3. 3 There are 5,000 enterprise apps today (and growing).
  4. 4. People love their cloud apps, and for good reason Anywhere Access CollaborationProductivity 4
  5. 5. 5 But this means sleepless nights for IT But how bad is it?
  6. 6. 6
  7. 7. The following are contributors to the cloud multiplier effect 7 Cloud app adoption Mobile and consumerization Ease and speed of data sharing
  8. 8. 8 Increase use and increase probability If your organization had 100 cloud apps and added 25 more in a 12-month period, you would increase your probability (and expected economic impact) of a data breach by 75%
  9. 9. We looked at 2 data breach types 9 Loss or theft of 100,000 customer records Theft of high-value information
  10. 10. Baseline cost of a data breach 10 $20.1M $11.8M
  11. 11. Survey respondents said… 11.8% 25.4% probability of this happening in current environment
  12. 12. The probability adjusted estimated economic impact 11.8% of $20.1 = $2.37M 25.4% of $11.8 = $2.99M
  13. 13. Effects of cloud on the probability of theft or loss of 100,000 or more customer records 13 Use of cloud services (SaaS) Backup and storage of sensitive and/or confidential information Increase use of cloud by 50% in 12 months
  14. 14. 14 Use of cloud services (SaaS) Backup and storage of sensitive and/or confidential information Increase use of cloud by 50% in 12 months Effects of cloud on the probability of theft of high-value information
  15. 15. 15 124% increase in probability of a data breach Increase BYOD access of cloud services
  16. 16. Invisible to IT 16 36% of business-critical apps are in the cloud. IT isn’t aware of nearly half of them. 30% of business information resides in the cloud. IT doesn't have visibility into more than one third of it.
  17. 17. People love their cloud apps, and for good reason 17 Love doesn’t have to be blind
  18. 18. 18 MEASURE: Discover the cloud apps running in your enterprise
  19. 19. 19 MEASURE: Discover the cloud apps running in your enterprise • 3rd party tools like Netskope can analyze firewall logs (and others) for this information • Resist the urge to immediately blacklist unsanctioned apps
  20. 20. 20 User Location Device Time Activity App Content Risk w/Whom ANALYZE: Understand the context of usage at a deeper level
  21. 21. 21 User Location Device Time Activity App Content Risk w/Whom
  22. 22. 22 ACT: Plot a course of action based on risk, usage criticality
  23. 23. 23 ACT: Plot a course of action based on risk, usage criticality • Use an objective criteria for assessing app. The Cloud Controls Matrix from CSA is good start, and vendors have taken this to a whole new level. • After risk, look at usage, including the nature of the content. This will help triage policy enforcement next steps, especially when hundreds of apps are in play. • Risky usage can be more important than app risk.
  24. 24. ACT: Plot a course of action based on risk, usage criticality ANALYZE: Understand the context of app usage at a deeper level MEASURE: Discover the cloud apps running in your enterprise
  25. 25. 25 The real face of shadow IT is you and me. Ultimately, this is simply unmanaged risk.
  26. 26. Allow is the new block (allow is new block green light slide) 26 S M

×