SlideShare a Scribd company logo
1 of 12
Download to read offline
Confidential - All rights reserved - © Zygon 2023
zygon.tech
Zygon is the copilot of IT/Security admins to
scale the security configuration controls to all
their SaaS applications.
Scale SaaS Security Posture
Spring 2023
www.zygon.tech
Confidential - All rights reserved - © Zygon 2023
6 policies to ensure a safe
usage of modern tools:
● Login
● Ownership
● Privileges
● Third party
integrations
● Offboarding
● Data leak monitoring
What is your responsibility
Confidential - All rights reserved - © Zygon 2023
3 parties may be involved in getting unauthorized access to Salesforce
Confidential - All rights reserved - © Zygon 2023
4 weak points in Salesforce
Confidential - All rights reserved - © Zygon 2023
SaaS Sprawl creates massive security challenges
100
average number of identified SaaS softwares
used by enterprises across all industries.
Sources: CB Insights, G2
1,000
average number of shadow IT
cloud services used in a typical
enterprise 10x
“Clear” vs
“Shadow” IT
< 10
number of SaaS softwares secured by
security teams across all industries.
● "Many organisations do not fully understand the sprawl of their SaaS
portfolio and underestimate the prevalence of shadow SaaS.” Gartner
● Lack of regard for shadow SaaS has fewer consequences than the
implications they create - exposure to cyber threats, noncompliance and
other IT vulnerabilities.
Confidential - All rights reserved - © Zygon 2023
Security does not keep up with SaaS Sprawl
Business Users
Security
Teams
● 1 new SaaS secured every
year
● Not enough resources
● Alert fatigue
● Emptying the ocean with
a spoon
● 1 new sign up every day
● Business and efficiency
first
● Security is seen as a
constraint
● Security is not in their job
description
Confidential - All rights reserved - © Zygon 2023
You don’t want to be here
Confidential - All rights reserved - © Zygon 2023
Be aware
Versus
Be an actor
Everyone is in security
Confidential - All rights reserved - © Zygon 2023
What no MFA means
Confidential - All rights reserved - © Zygon 2023
SaaS security consequences: data leak
Why should I care?
It was not really a question….
Confidential - All rights reserved - © Zygon 2023
Detect data breaches
WHAT
Fake identities
Fake credentials
Fake files
Fake messages
Fake APIs We scan the dark web for
leaks containing the decoys
we have generated for you.
Dark Web
Monitoring
All our decoys come with
an adapted type of
honeypot that detects
their active usage.
(contact, click, open, login,
request,...)
Usage
Monitoring
HOW
Confidential - All rights reserved - © Zygon 2023
THANK YOU
Zygon Technologies, Inc.
thomas@zygon.tech
zygon.tech

More Related Content

Similar to Controle de configuration ou fuite de donnees, comment mieux securiser SFDC

Alfresco Virtual DevCon 2020 - Security First!
Alfresco Virtual DevCon 2020 - Security First!Alfresco Virtual DevCon 2020 - Security First!
Alfresco Virtual DevCon 2020 - Security First!Jason Jolley
 
Presentazione CHECKPOINT Evento CloudGarage 5-11 giugno 2013
Presentazione CHECKPOINT Evento CloudGarage 5-11 giugno 2013Presentazione CHECKPOINT Evento CloudGarage 5-11 giugno 2013
Presentazione CHECKPOINT Evento CloudGarage 5-11 giugno 2013Clouditalia Telecomunicazioni
 
Evolution security controls towards Cloud Services
Evolution security controls towards Cloud ServicesEvolution security controls towards Cloud Services
Evolution security controls towards Cloud ServicesHugo Rodrigues
 
Forcepoint Corporate Presentation_Short.pptx
Forcepoint Corporate Presentation_Short.pptxForcepoint Corporate Presentation_Short.pptx
Forcepoint Corporate Presentation_Short.pptxcaesar92
 
Sholove cyren web security - technical datasheet2
Sholove cyren web security  - technical datasheet2Sholove cyren web security  - technical datasheet2
Sholove cyren web security - technical datasheet2SHOLOVE INTERNATIONAL LLC
 
Scrapping for Pennies: How to implement security without a budget
Scrapping for Pennies: How to implement security without a budgetScrapping for Pennies: How to implement security without a budget
Scrapping for Pennies: How to implement security without a budgetRyan Wisniewski
 
Cisco Connect 2018 Malaysia - Cisco incident response services-strengthen you...
Cisco Connect 2018 Malaysia - Cisco incident response services-strengthen you...Cisco Connect 2018 Malaysia - Cisco incident response services-strengthen you...
Cisco Connect 2018 Malaysia - Cisco incident response services-strengthen you...NetworkCollaborators
 
BIZGrowth Strategies - Cybersecurity Special Edition
BIZGrowth Strategies - Cybersecurity Special EditionBIZGrowth Strategies - Cybersecurity Special Edition
BIZGrowth Strategies - Cybersecurity Special EditionCBIZ, Inc.
 
How BlueHat Cyber Uses SanerNow to Automate Patch Management and Beyond
How BlueHat Cyber Uses SanerNow to Automate Patch Management and BeyondHow BlueHat Cyber Uses SanerNow to Automate Patch Management and Beyond
How BlueHat Cyber Uses SanerNow to Automate Patch Management and BeyondSecPod Technologies
 
Enhancing Cybersecurity in Remote Work-3.pdf
Enhancing Cybersecurity in Remote Work-3.pdfEnhancing Cybersecurity in Remote Work-3.pdf
Enhancing Cybersecurity in Remote Work-3.pdfTuring.com
 
Latest Cybersecurity Trends
Latest Cybersecurity TrendsLatest Cybersecurity Trends
Latest Cybersecurity TrendsIRJET Journal
 
Top 5 predictions webinar
Top 5 predictions webinarTop 5 predictions webinar
Top 5 predictions webinarZscaler
 
Cs credit card processor
Cs  credit card processorCs  credit card processor
Cs credit card processorLiora R. Herman
 
Why Cyber Security Is important?
Why Cyber Security Is important?Why Cyber Security Is important?
Why Cyber Security Is important?ManojAgrawal74
 
Protect your confidential information while improving services
Protect your confidential information while improving servicesProtect your confidential information while improving services
Protect your confidential information while improving servicesCloudMask inc.
 

Similar to Controle de configuration ou fuite de donnees, comment mieux securiser SFDC (20)

Protecting the "Crown Jewels" by Henrik Bodskov, IBM
Protecting the "Crown Jewels" by Henrik Bodskov, IBMProtecting the "Crown Jewels" by Henrik Bodskov, IBM
Protecting the "Crown Jewels" by Henrik Bodskov, IBM
 
Azure Security.pdf
Azure Security.pdfAzure Security.pdf
Azure Security.pdf
 
Azure security
Azure securityAzure security
Azure security
 
Alfresco Virtual DevCon 2020 - Security First!
Alfresco Virtual DevCon 2020 - Security First!Alfresco Virtual DevCon 2020 - Security First!
Alfresco Virtual DevCon 2020 - Security First!
 
Presentazione CHECKPOINT Evento CloudGarage 5-11 giugno 2013
Presentazione CHECKPOINT Evento CloudGarage 5-11 giugno 2013Presentazione CHECKPOINT Evento CloudGarage 5-11 giugno 2013
Presentazione CHECKPOINT Evento CloudGarage 5-11 giugno 2013
 
Evolution security controls towards Cloud Services
Evolution security controls towards Cloud ServicesEvolution security controls towards Cloud Services
Evolution security controls towards Cloud Services
 
Forcepoint Corporate Presentation_Short.pptx
Forcepoint Corporate Presentation_Short.pptxForcepoint Corporate Presentation_Short.pptx
Forcepoint Corporate Presentation_Short.pptx
 
Sholove cyren web security - technical datasheet2
Sholove cyren web security  - technical datasheet2Sholove cyren web security  - technical datasheet2
Sholove cyren web security - technical datasheet2
 
Scrapping for Pennies: How to implement security without a budget
Scrapping for Pennies: How to implement security without a budgetScrapping for Pennies: How to implement security without a budget
Scrapping for Pennies: How to implement security without a budget
 
Cisco Connect 2018 Malaysia - Cisco incident response services-strengthen you...
Cisco Connect 2018 Malaysia - Cisco incident response services-strengthen you...Cisco Connect 2018 Malaysia - Cisco incident response services-strengthen you...
Cisco Connect 2018 Malaysia - Cisco incident response services-strengthen you...
 
BIZGrowth Strategies - Cybersecurity Special Edition
BIZGrowth Strategies - Cybersecurity Special EditionBIZGrowth Strategies - Cybersecurity Special Edition
BIZGrowth Strategies - Cybersecurity Special Edition
 
Security and Data Breach
Security and Data BreachSecurity and Data Breach
Security and Data Breach
 
How BlueHat Cyber Uses SanerNow to Automate Patch Management and Beyond
How BlueHat Cyber Uses SanerNow to Automate Patch Management and BeyondHow BlueHat Cyber Uses SanerNow to Automate Patch Management and Beyond
How BlueHat Cyber Uses SanerNow to Automate Patch Management and Beyond
 
Enhancing Cybersecurity in Remote Work-3.pdf
Enhancing Cybersecurity in Remote Work-3.pdfEnhancing Cybersecurity in Remote Work-3.pdf
Enhancing Cybersecurity in Remote Work-3.pdf
 
Latest Cybersecurity Trends
Latest Cybersecurity TrendsLatest Cybersecurity Trends
Latest Cybersecurity Trends
 
Fy17 sec shadow_it-e_book_final_032417
Fy17 sec shadow_it-e_book_final_032417Fy17 sec shadow_it-e_book_final_032417
Fy17 sec shadow_it-e_book_final_032417
 
Top 5 predictions webinar
Top 5 predictions webinarTop 5 predictions webinar
Top 5 predictions webinar
 
Cs credit card processor
Cs  credit card processorCs  credit card processor
Cs credit card processor
 
Why Cyber Security Is important?
Why Cyber Security Is important?Why Cyber Security Is important?
Why Cyber Security Is important?
 
Protect your confidential information while improving services
Protect your confidential information while improving servicesProtect your confidential information while improving services
Protect your confidential information while improving services
 

More from Thierry TROUIN ☁

AlbaniaDreamin24 - How to easily use an API with Flows
AlbaniaDreamin24 - How to easily use an API with FlowsAlbaniaDreamin24 - How to easily use an API with Flows
AlbaniaDreamin24 - How to easily use an API with FlowsThierry TROUIN ☁
 
Comment Challenger les ApexDebugLog et comment améliorer leur analyse
Comment Challenger les ApexDebugLog et comment améliorer leur analyseComment Challenger les ApexDebugLog et comment améliorer leur analyse
Comment Challenger les ApexDebugLog et comment améliorer leur analyseThierry TROUIN ☁
 
Comment exploiter facilement une API avec les Flows
Comment exploiter facilement une API avec les FlowsComment exploiter facilement une API avec les Flows
Comment exploiter facilement une API avec les FlowsThierry TROUIN ☁
 
TunisUserGroup - Ecosysteme salesforce.pptx
TunisUserGroup -  Ecosysteme salesforce.pptxTunisUserGroup -  Ecosysteme salesforce.pptx
TunisUserGroup - Ecosysteme salesforce.pptxThierry TROUIN ☁
 
Monia, l’IAssistante qui aide vos equipes a closer leurs Opportunites
Monia, l’IAssistante qui aide vos equipes a closer leurs OpportunitesMonia, l’IAssistante qui aide vos equipes a closer leurs Opportunites
Monia, l’IAssistante qui aide vos equipes a closer leurs OpportunitesThierry TROUIN ☁
 
Sales enablement, e-signature, closing & automations dans Salesforce
Sales enablement, e-signature, closing & automations dans SalesforceSales enablement, e-signature, closing & automations dans Salesforce
Sales enablement, e-signature, closing & automations dans SalesforceThierry TROUIN ☁
 
Les formulaires web dans salesforce
Les formulaires web dans salesforceLes formulaires web dans salesforce
Les formulaires web dans salesforceThierry TROUIN ☁
 
Découvrez les enquêtes de satisfaction dans Salesforce
Découvrez les enquêtes de satisfaction dans SalesforceDécouvrez les enquêtes de satisfaction dans Salesforce
Découvrez les enquêtes de satisfaction dans SalesforceThierry TROUIN ☁
 
Winter-23-French-Gathering+Dreamforce
Winter-23-French-Gathering+DreamforceWinter-23-French-Gathering+Dreamforce
Winter-23-French-Gathering+DreamforceThierry TROUIN ☁
 
Meetup Cameroun - Presentation SFDC
Meetup Cameroun - Presentation SFDCMeetup Cameroun - Presentation SFDC
Meetup Cameroun - Presentation SFDCThierry TROUIN ☁
 
Construire sa strategie de gestion des donnees Salesforce avec Odaseva
Construire sa strategie de gestion des donnees Salesforce avec OdasevaConstruire sa strategie de gestion des donnees Salesforce avec Odaseva
Construire sa strategie de gestion des donnees Salesforce avec OdasevaThierry TROUIN ☁
 
Data Quality : Presentation de ISV Ellisphere
Data Quality : Presentation de ISV EllisphereData Quality : Presentation de ISV Ellisphere
Data Quality : Presentation de ISV EllisphereThierry TROUIN ☁
 
Simplifiez vos journées avec sfdx-hardis et l’écosystème open-source
Simplifiez vos journées avec sfdx-hardis et l’écosystème open-sourceSimplifiez vos journées avec sfdx-hardis et l’écosystème open-source
Simplifiez vos journées avec sfdx-hardis et l’écosystème open-sourceThierry TROUIN ☁
 
Ameliorez vos parcours omnicanaux avec Marketing Cloud
Ameliorez vos parcours omnicanaux avec Marketing CloudAmeliorez vos parcours omnicanaux avec Marketing Cloud
Ameliorez vos parcours omnicanaux avec Marketing CloudThierry TROUIN ☁
 
Bien Démarrer avec Pardot: Comment délivrer un engagement client connecté
Bien Démarrer avec Pardot: Comment délivrer un engagement client connectéBien Démarrer avec Pardot: Comment délivrer un engagement client connecté
Bien Démarrer avec Pardot: Comment délivrer un engagement client connectéThierry TROUIN ☁
 
Ameliorez votre Marketing : Introduction aux solutions Marketing Cloud et Pardot
Ameliorez votre Marketing : Introduction aux solutions Marketing Cloud et PardotAmeliorez votre Marketing : Introduction aux solutions Marketing Cloud et Pardot
Ameliorez votre Marketing : Introduction aux solutions Marketing Cloud et PardotThierry TROUIN ☁
 
Debarrassez-vous de la dette technique dans votre organisation avec OrgCheck
Debarrassez-vous de la dette technique dans votre organisation avec OrgCheckDebarrassez-vous de la dette technique dans votre organisation avec OrgCheck
Debarrassez-vous de la dette technique dans votre organisation avec OrgCheckThierry TROUIN ☁
 
How to build a Salesforce DevOps process with Gearset
How to build a Salesforce DevOps process with GearsetHow to build a Salesforce DevOps process with Gearset
How to build a Salesforce DevOps process with GearsetThierry TROUIN ☁
 

More from Thierry TROUIN ☁ (20)

AlbaniaDreamin24 - How to easily use an API with Flows
AlbaniaDreamin24 - How to easily use an API with FlowsAlbaniaDreamin24 - How to easily use an API with Flows
AlbaniaDreamin24 - How to easily use an API with Flows
 
Comment Challenger les ApexDebugLog et comment améliorer leur analyse
Comment Challenger les ApexDebugLog et comment améliorer leur analyseComment Challenger les ApexDebugLog et comment améliorer leur analyse
Comment Challenger les ApexDebugLog et comment améliorer leur analyse
 
Comment exploiter facilement une API avec les Flows
Comment exploiter facilement une API avec les FlowsComment exploiter facilement une API avec les Flows
Comment exploiter facilement une API avec les Flows
 
TunisUserGroup - Ecosysteme salesforce.pptx
TunisUserGroup -  Ecosysteme salesforce.pptxTunisUserGroup -  Ecosysteme salesforce.pptx
TunisUserGroup - Ecosysteme salesforce.pptx
 
Monia, l’IAssistante qui aide vos equipes a closer leurs Opportunites
Monia, l’IAssistante qui aide vos equipes a closer leurs OpportunitesMonia, l’IAssistante qui aide vos equipes a closer leurs Opportunites
Monia, l’IAssistante qui aide vos equipes a closer leurs Opportunites
 
Sales enablement, e-signature, closing & automations dans Salesforce
Sales enablement, e-signature, closing & automations dans SalesforceSales enablement, e-signature, closing & automations dans Salesforce
Sales enablement, e-signature, closing & automations dans Salesforce
 
Les formulaires web dans salesforce
Les formulaires web dans salesforceLes formulaires web dans salesforce
Les formulaires web dans salesforce
 
Découvrez les enquêtes de satisfaction dans Salesforce
Découvrez les enquêtes de satisfaction dans SalesforceDécouvrez les enquêtes de satisfaction dans Salesforce
Découvrez les enquêtes de satisfaction dans Salesforce
 
Winter-23-French-Gathering+Dreamforce
Winter-23-French-Gathering+DreamforceWinter-23-French-Gathering+Dreamforce
Winter-23-French-Gathering+Dreamforce
 
Meetup Cameroun - Presentation SFDC
Meetup Cameroun - Presentation SFDCMeetup Cameroun - Presentation SFDC
Meetup Cameroun - Presentation SFDC
 
Construire sa strategie de gestion des donnees Salesforce avec Odaseva
Construire sa strategie de gestion des donnees Salesforce avec OdasevaConstruire sa strategie de gestion des donnees Salesforce avec Odaseva
Construire sa strategie de gestion des donnees Salesforce avec Odaseva
 
Summer-22-FG-Mai-2022
Summer-22-FG-Mai-2022Summer-22-FG-Mai-2022
Summer-22-FG-Mai-2022
 
Data Quality : Presentation de ISV Ellisphere
Data Quality : Presentation de ISV EllisphereData Quality : Presentation de ISV Ellisphere
Data Quality : Presentation de ISV Ellisphere
 
Simplifiez vos journées avec sfdx-hardis et l’écosystème open-source
Simplifiez vos journées avec sfdx-hardis et l’écosystème open-sourceSimplifiez vos journées avec sfdx-hardis et l’écosystème open-source
Simplifiez vos journées avec sfdx-hardis et l’écosystème open-source
 
Ameliorez vos parcours omnicanaux avec Marketing Cloud
Ameliorez vos parcours omnicanaux avec Marketing CloudAmeliorez vos parcours omnicanaux avec Marketing Cloud
Ameliorez vos parcours omnicanaux avec Marketing Cloud
 
Bien Démarrer avec Pardot: Comment délivrer un engagement client connecté
Bien Démarrer avec Pardot: Comment délivrer un engagement client connectéBien Démarrer avec Pardot: Comment délivrer un engagement client connecté
Bien Démarrer avec Pardot: Comment délivrer un engagement client connecté
 
Ameliorez votre Marketing : Introduction aux solutions Marketing Cloud et Pardot
Ameliorez votre Marketing : Introduction aux solutions Marketing Cloud et PardotAmeliorez votre Marketing : Introduction aux solutions Marketing Cloud et Pardot
Ameliorez votre Marketing : Introduction aux solutions Marketing Cloud et Pardot
 
Debarrassez-vous de la dette technique dans votre organisation avec OrgCheck
Debarrassez-vous de la dette technique dans votre organisation avec OrgCheckDebarrassez-vous de la dette technique dans votre organisation avec OrgCheck
Debarrassez-vous de la dette technique dans votre organisation avec OrgCheck
 
Release Winter 22 FR
Release Winter 22 FRRelease Winter 22 FR
Release Winter 22 FR
 
How to build a Salesforce DevOps process with Gearset
How to build a Salesforce DevOps process with GearsetHow to build a Salesforce DevOps process with Gearset
How to build a Salesforce DevOps process with Gearset
 

Recently uploaded

Packaging the Monolith - PHP Tek 2024 (Breaking it down one bite at a time)
Packaging the Monolith - PHP Tek 2024 (Breaking it down one bite at a time)Packaging the Monolith - PHP Tek 2024 (Breaking it down one bite at a time)
Packaging the Monolith - PHP Tek 2024 (Breaking it down one bite at a time)Dana Luther
 
VIP Call Girls Kolkata Ananya 🤌 8250192130 🚀 Vip Call Girls Kolkata
VIP Call Girls Kolkata Ananya 🤌  8250192130 🚀 Vip Call Girls KolkataVIP Call Girls Kolkata Ananya 🤌  8250192130 🚀 Vip Call Girls Kolkata
VIP Call Girls Kolkata Ananya 🤌 8250192130 🚀 Vip Call Girls Kolkataanamikaraghav4
 
FULL ENJOY Call Girls In Mayur Vihar Delhi Contact Us 8377087607
FULL ENJOY Call Girls In Mayur Vihar Delhi Contact Us 8377087607FULL ENJOY Call Girls In Mayur Vihar Delhi Contact Us 8377087607
FULL ENJOY Call Girls In Mayur Vihar Delhi Contact Us 8377087607dollysharma2066
 
定制(UAL学位证)英国伦敦艺术大学毕业证成绩单原版一比一
定制(UAL学位证)英国伦敦艺术大学毕业证成绩单原版一比一定制(UAL学位证)英国伦敦艺术大学毕业证成绩单原版一比一
定制(UAL学位证)英国伦敦艺术大学毕业证成绩单原版一比一Fs
 
A Good Girl's Guide to Murder (A Good Girl's Guide to Murder, #1)
A Good Girl's Guide to Murder (A Good Girl's Guide to Murder, #1)A Good Girl's Guide to Murder (A Good Girl's Guide to Murder, #1)
A Good Girl's Guide to Murder (A Good Girl's Guide to Murder, #1)Christopher H Felton
 
Git and Github workshop GDSC MLRITM
Git and Github  workshop GDSC MLRITMGit and Github  workshop GDSC MLRITM
Git and Github workshop GDSC MLRITMgdsc13
 
Russian Call Girls in Kolkata Samaira 🤌 8250192130 🚀 Vip Call Girls Kolkata
Russian Call Girls in Kolkata Samaira 🤌  8250192130 🚀 Vip Call Girls KolkataRussian Call Girls in Kolkata Samaira 🤌  8250192130 🚀 Vip Call Girls Kolkata
Russian Call Girls in Kolkata Samaira 🤌 8250192130 🚀 Vip Call Girls Kolkataanamikaraghav4
 
VIP 7001035870 Find & Meet Hyderabad Call Girls Dilsukhnagar high-profile Cal...
VIP 7001035870 Find & Meet Hyderabad Call Girls Dilsukhnagar high-profile Cal...VIP 7001035870 Find & Meet Hyderabad Call Girls Dilsukhnagar high-profile Cal...
VIP 7001035870 Find & Meet Hyderabad Call Girls Dilsukhnagar high-profile Cal...aditipandeya
 
Call Girls South Delhi Delhi reach out to us at ☎ 9711199012
Call Girls South Delhi Delhi reach out to us at ☎ 9711199012Call Girls South Delhi Delhi reach out to us at ☎ 9711199012
Call Girls South Delhi Delhi reach out to us at ☎ 9711199012rehmti665
 
VIP Kolkata Call Girl Dum Dum 👉 8250192130 Available With Room
VIP Kolkata Call Girl Dum Dum 👉 8250192130  Available With RoomVIP Kolkata Call Girl Dum Dum 👉 8250192130  Available With Room
VIP Kolkata Call Girl Dum Dum 👉 8250192130 Available With Roomdivyansh0kumar0
 
How is AI changing journalism? (v. April 2024)
How is AI changing journalism? (v. April 2024)How is AI changing journalism? (v. April 2024)
How is AI changing journalism? (v. April 2024)Damian Radcliffe
 
定制(Lincoln毕业证书)新西兰林肯大学毕业证成绩单原版一比一
定制(Lincoln毕业证书)新西兰林肯大学毕业证成绩单原版一比一定制(Lincoln毕业证书)新西兰林肯大学毕业证成绩单原版一比一
定制(Lincoln毕业证书)新西兰林肯大学毕业证成绩单原版一比一Fs
 
Russian Call Girls in Kolkata Ishita 🤌 8250192130 🚀 Vip Call Girls Kolkata
Russian Call Girls in Kolkata Ishita 🤌  8250192130 🚀 Vip Call Girls KolkataRussian Call Girls in Kolkata Ishita 🤌  8250192130 🚀 Vip Call Girls Kolkata
Russian Call Girls in Kolkata Ishita 🤌 8250192130 🚀 Vip Call Girls Kolkataanamikaraghav4
 
Gram Darshan PPT cyber rural in villages of india
Gram Darshan PPT cyber rural  in villages of indiaGram Darshan PPT cyber rural  in villages of india
Gram Darshan PPT cyber rural in villages of indiaimessage0108
 
Call Girls In Mumbai Central Mumbai ❤️ 9920874524 👈 Cash on Delivery
Call Girls In Mumbai Central Mumbai ❤️ 9920874524 👈 Cash on DeliveryCall Girls In Mumbai Central Mumbai ❤️ 9920874524 👈 Cash on Delivery
Call Girls In Mumbai Central Mumbai ❤️ 9920874524 👈 Cash on Deliverybabeytanya
 
Low Rate Call Girls Kolkata Avani 🤌 8250192130 🚀 Vip Call Girls Kolkata
Low Rate Call Girls Kolkata Avani 🤌  8250192130 🚀 Vip Call Girls KolkataLow Rate Call Girls Kolkata Avani 🤌  8250192130 🚀 Vip Call Girls Kolkata
Low Rate Call Girls Kolkata Avani 🤌 8250192130 🚀 Vip Call Girls Kolkataanamikaraghav4
 

Recently uploaded (20)

Packaging the Monolith - PHP Tek 2024 (Breaking it down one bite at a time)
Packaging the Monolith - PHP Tek 2024 (Breaking it down one bite at a time)Packaging the Monolith - PHP Tek 2024 (Breaking it down one bite at a time)
Packaging the Monolith - PHP Tek 2024 (Breaking it down one bite at a time)
 
VIP Call Girls Kolkata Ananya 🤌 8250192130 🚀 Vip Call Girls Kolkata
VIP Call Girls Kolkata Ananya 🤌  8250192130 🚀 Vip Call Girls KolkataVIP Call Girls Kolkata Ananya 🤌  8250192130 🚀 Vip Call Girls Kolkata
VIP Call Girls Kolkata Ananya 🤌 8250192130 🚀 Vip Call Girls Kolkata
 
FULL ENJOY Call Girls In Mayur Vihar Delhi Contact Us 8377087607
FULL ENJOY Call Girls In Mayur Vihar Delhi Contact Us 8377087607FULL ENJOY Call Girls In Mayur Vihar Delhi Contact Us 8377087607
FULL ENJOY Call Girls In Mayur Vihar Delhi Contact Us 8377087607
 
定制(UAL学位证)英国伦敦艺术大学毕业证成绩单原版一比一
定制(UAL学位证)英国伦敦艺术大学毕业证成绩单原版一比一定制(UAL学位证)英国伦敦艺术大学毕业证成绩单原版一比一
定制(UAL学位证)英国伦敦艺术大学毕业证成绩单原版一比一
 
A Good Girl's Guide to Murder (A Good Girl's Guide to Murder, #1)
A Good Girl's Guide to Murder (A Good Girl's Guide to Murder, #1)A Good Girl's Guide to Murder (A Good Girl's Guide to Murder, #1)
A Good Girl's Guide to Murder (A Good Girl's Guide to Murder, #1)
 
Call Girls In South Ex 📱 9999965857 🤩 Delhi 🫦 HOT AND SEXY VVIP 🍎 SERVICE
Call Girls In South Ex 📱  9999965857  🤩 Delhi 🫦 HOT AND SEXY VVIP 🍎 SERVICECall Girls In South Ex 📱  9999965857  🤩 Delhi 🫦 HOT AND SEXY VVIP 🍎 SERVICE
Call Girls In South Ex 📱 9999965857 🤩 Delhi 🫦 HOT AND SEXY VVIP 🍎 SERVICE
 
Git and Github workshop GDSC MLRITM
Git and Github  workshop GDSC MLRITMGit and Github  workshop GDSC MLRITM
Git and Github workshop GDSC MLRITM
 
Model Call Girl in Jamuna Vihar Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in  Jamuna Vihar Delhi reach out to us at 🔝9953056974🔝Model Call Girl in  Jamuna Vihar Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Jamuna Vihar Delhi reach out to us at 🔝9953056974🔝
 
Russian Call Girls in Kolkata Samaira 🤌 8250192130 🚀 Vip Call Girls Kolkata
Russian Call Girls in Kolkata Samaira 🤌  8250192130 🚀 Vip Call Girls KolkataRussian Call Girls in Kolkata Samaira 🤌  8250192130 🚀 Vip Call Girls Kolkata
Russian Call Girls in Kolkata Samaira 🤌 8250192130 🚀 Vip Call Girls Kolkata
 
sasti delhi Call Girls in munirka 🔝 9953056974 🔝 escort Service-
sasti delhi Call Girls in munirka 🔝 9953056974 🔝 escort Service-sasti delhi Call Girls in munirka 🔝 9953056974 🔝 escort Service-
sasti delhi Call Girls in munirka 🔝 9953056974 🔝 escort Service-
 
VIP 7001035870 Find & Meet Hyderabad Call Girls Dilsukhnagar high-profile Cal...
VIP 7001035870 Find & Meet Hyderabad Call Girls Dilsukhnagar high-profile Cal...VIP 7001035870 Find & Meet Hyderabad Call Girls Dilsukhnagar high-profile Cal...
VIP 7001035870 Find & Meet Hyderabad Call Girls Dilsukhnagar high-profile Cal...
 
Call Girls South Delhi Delhi reach out to us at ☎ 9711199012
Call Girls South Delhi Delhi reach out to us at ☎ 9711199012Call Girls South Delhi Delhi reach out to us at ☎ 9711199012
Call Girls South Delhi Delhi reach out to us at ☎ 9711199012
 
VIP Kolkata Call Girl Dum Dum 👉 8250192130 Available With Room
VIP Kolkata Call Girl Dum Dum 👉 8250192130  Available With RoomVIP Kolkata Call Girl Dum Dum 👉 8250192130  Available With Room
VIP Kolkata Call Girl Dum Dum 👉 8250192130 Available With Room
 
How is AI changing journalism? (v. April 2024)
How is AI changing journalism? (v. April 2024)How is AI changing journalism? (v. April 2024)
How is AI changing journalism? (v. April 2024)
 
定制(Lincoln毕业证书)新西兰林肯大学毕业证成绩单原版一比一
定制(Lincoln毕业证书)新西兰林肯大学毕业证成绩单原版一比一定制(Lincoln毕业证书)新西兰林肯大学毕业证成绩单原版一比一
定制(Lincoln毕业证书)新西兰林肯大学毕业证成绩单原版一比一
 
Russian Call Girls in Kolkata Ishita 🤌 8250192130 🚀 Vip Call Girls Kolkata
Russian Call Girls in Kolkata Ishita 🤌  8250192130 🚀 Vip Call Girls KolkataRussian Call Girls in Kolkata Ishita 🤌  8250192130 🚀 Vip Call Girls Kolkata
Russian Call Girls in Kolkata Ishita 🤌 8250192130 🚀 Vip Call Girls Kolkata
 
Gram Darshan PPT cyber rural in villages of india
Gram Darshan PPT cyber rural  in villages of indiaGram Darshan PPT cyber rural  in villages of india
Gram Darshan PPT cyber rural in villages of india
 
Call Girls In Mumbai Central Mumbai ❤️ 9920874524 👈 Cash on Delivery
Call Girls In Mumbai Central Mumbai ❤️ 9920874524 👈 Cash on DeliveryCall Girls In Mumbai Central Mumbai ❤️ 9920874524 👈 Cash on Delivery
Call Girls In Mumbai Central Mumbai ❤️ 9920874524 👈 Cash on Delivery
 
Low Rate Call Girls Kolkata Avani 🤌 8250192130 🚀 Vip Call Girls Kolkata
Low Rate Call Girls Kolkata Avani 🤌  8250192130 🚀 Vip Call Girls KolkataLow Rate Call Girls Kolkata Avani 🤌  8250192130 🚀 Vip Call Girls Kolkata
Low Rate Call Girls Kolkata Avani 🤌 8250192130 🚀 Vip Call Girls Kolkata
 
Hot Sexy call girls in Rk Puram 🔝 9953056974 🔝 Delhi escort Service
Hot Sexy call girls in  Rk Puram 🔝 9953056974 🔝 Delhi escort ServiceHot Sexy call girls in  Rk Puram 🔝 9953056974 🔝 Delhi escort Service
Hot Sexy call girls in Rk Puram 🔝 9953056974 🔝 Delhi escort Service
 

Controle de configuration ou fuite de donnees, comment mieux securiser SFDC

  • 1. Confidential - All rights reserved - © Zygon 2023 zygon.tech Zygon is the copilot of IT/Security admins to scale the security configuration controls to all their SaaS applications. Scale SaaS Security Posture Spring 2023 www.zygon.tech
  • 2. Confidential - All rights reserved - © Zygon 2023 6 policies to ensure a safe usage of modern tools: ● Login ● Ownership ● Privileges ● Third party integrations ● Offboarding ● Data leak monitoring What is your responsibility
  • 3. Confidential - All rights reserved - © Zygon 2023 3 parties may be involved in getting unauthorized access to Salesforce
  • 4. Confidential - All rights reserved - © Zygon 2023 4 weak points in Salesforce
  • 5. Confidential - All rights reserved - © Zygon 2023 SaaS Sprawl creates massive security challenges 100 average number of identified SaaS softwares used by enterprises across all industries. Sources: CB Insights, G2 1,000 average number of shadow IT cloud services used in a typical enterprise 10x “Clear” vs “Shadow” IT < 10 number of SaaS softwares secured by security teams across all industries. ● "Many organisations do not fully understand the sprawl of their SaaS portfolio and underestimate the prevalence of shadow SaaS.” Gartner ● Lack of regard for shadow SaaS has fewer consequences than the implications they create - exposure to cyber threats, noncompliance and other IT vulnerabilities.
  • 6. Confidential - All rights reserved - © Zygon 2023 Security does not keep up with SaaS Sprawl Business Users Security Teams ● 1 new SaaS secured every year ● Not enough resources ● Alert fatigue ● Emptying the ocean with a spoon ● 1 new sign up every day ● Business and efficiency first ● Security is seen as a constraint ● Security is not in their job description
  • 7. Confidential - All rights reserved - © Zygon 2023 You don’t want to be here
  • 8. Confidential - All rights reserved - © Zygon 2023 Be aware Versus Be an actor Everyone is in security
  • 9. Confidential - All rights reserved - © Zygon 2023 What no MFA means
  • 10. Confidential - All rights reserved - © Zygon 2023 SaaS security consequences: data leak Why should I care? It was not really a question….
  • 11. Confidential - All rights reserved - © Zygon 2023 Detect data breaches WHAT Fake identities Fake credentials Fake files Fake messages Fake APIs We scan the dark web for leaks containing the decoys we have generated for you. Dark Web Monitoring All our decoys come with an adapted type of honeypot that detects their active usage. (contact, click, open, login, request,...) Usage Monitoring HOW
  • 12. Confidential - All rights reserved - © Zygon 2023 THANK YOU Zygon Technologies, Inc. thomas@zygon.tech zygon.tech