webinar - bitglass and cyberedge - hidden security threats

26
webinar: hidden threats and the 2017 cyber threat defense report

Upload: bitglass

Post on 12-Apr-2017

18 views

Category:

Technology


1 download

TRANSCRIPT

Page 1: Webinar - Bitglass and CyberEdge - Hidden Security Threats

webinar:hidden threatsand the 2017 cyber threat

defense report

Page 2: Webinar - Bitglass and CyberEdge - Hidden Security Threats

About The Cyberthreat Defense Report

❑ 27-question online survey conducted in Nov 2016▪IT security decision maker or practitioner▪Employed by organization with at least

500 employees❑ Survey designed to assess:▪Organization’s security posture▪Perceptions of cyberthreats and security

defenses▪Current and future IT security investments▪IT security practices and strategies

2

Page 3: Webinar - Bitglass and CyberEdge - Hidden Security Threats

Survey Demographics

3Respondents by employee countRespondents by country

1,100 respondents | 15 countries | 19 industries

Page 4: Webinar - Bitglass and CyberEdge - Hidden Security Threats

Steadily Rising Cyberattacks

4

79% were affected by a successful cyberattack in 2016…

Percentage compromised at least onceFrequency of successful attacks

Page 5: Webinar - Bitglass and CyberEdge - Hidden Security Threats

Cyberthreat Migraines

5

Malware and spear-phishing are always top of mind. Overall concern is rising!

Overall concern for cyberthreats is rising!

Page 6: Webinar - Bitglass and CyberEdge - Hidden Security Threats

Feeling Ransomware’s Pain

6

Data loss and productivity loss are of greatest concern. Losing revenue isn’t.

Page 7: Webinar - Bitglass and CyberEdge - Hidden Security Threats

Responding to Ransomware

Percentage affected by ransomware in 2016

61% of organizations affected by ransomware globally. Thankfully, most (54%) recovered their data without paying the ransom.

Page 8: Webinar - Bitglass and CyberEdge - Hidden Security Threats

Room for Improving Office 365 Security

8

Only 1 in 3 is truly confident with Microsoft’s available Office 365 protections, opening the door to third-party solutions.

Page 9: Webinar - Bitglass and CyberEdge - Hidden Security Threats

Biggest Obstacles to “Being Secure”

“Low security awareness among employees” is the biggest obstacle for the fourth consecutive year. When will the industry take notice?

Page 10: Webinar - Bitglass and CyberEdge - Hidden Security Threats

App and Data Security Deployment Plans

10

App security testing, app vulnerability scanning, and deception technology are most sought after in 2017.

Page 11: Webinar - Bitglass and CyberEdge - Hidden Security Threats

Threat Intelligence Practices

Blocking more threats remains the dominant use case for threat intelligence services.

Page 12: Webinar - Bitglass and CyberEdge - Hidden Security Threats

CASB Deployment Use Cases

12

Preventing unwanted data disclosures remains the number one use case for deploying CASB technology.

Page 13: Webinar - Bitglass and CyberEdge - Hidden Security Threats

Overcoming the IT Security Skills Shortage

13

Nine out of 10 organizations are affected by the skills shortage. Most (51%) are leveraging external vendors and contractors.

Percentage affected by the IT security skills shortage, by industry

Page 14: Webinar - Bitglass and CyberEdge - Hidden Security Threats

Key Take-Aways

❑ Successful cyber attacks are rising!▪79% affected in 2017 vs. 62% in 2014

❑ Malware is the biggest headache for IT security teams▪Followed by phishing and insider threats

❑ Ransomware is a significant issue▪61% of organizations affected▪One-third paid the ransom▪More than 13% lost their data

❑ CASBs are among the top investments planned for 2017▪Address a growing area of concern▪Rich feature set provides a lot of coverage/capabilities

14

Page 15: Webinar - Bitglass and CyberEdge - Hidden Security Threats

poll: what are your top

cloud security concerns?

Page 16: Webinar - Bitglass and CyberEdge - Hidden Security Threats

the traditional approach to

security is inadequate

Page 17: Webinar - Bitglass and CyberEdge - Hidden Security Threats

enterprise(CASB)

end-user devicesvisibility & analytics

data protectionidentity & access control

applicationstorageserversnetwork

how does the solution differ from security built into cloud apps?

app vendor

Page 18: Webinar - Bitglass and CyberEdge - Hidden Security Threats

does the solution protect cloud data end-to-end?

■ Cloud data doesn’t exist only “in the cloud”

■ A complete solution must provide visibility and control over data in the cloud

■ Solution must also protect data on end-user devices

■ Leverage contextual access controls

Page 19: Webinar - Bitglass and CyberEdge - Hidden Security Threats

can the solution control access from both managed & unmanaged devices?

reverse proxy■ unmanaged devices - any device, anywhere■ no software to install/configure

forward proxy■ managed devices - inline control for installed

apps■ agent and certificate based approaches

activesync proxy■ secure email, calendar, etc on any mobile

device■ no software to install/configure■ device level security - wipe, encryption, PIN

etc

Page 20: Webinar - Bitglass and CyberEdge - Hidden Security Threats

does the solution provide real-time visibility and control?

■ Apply granular DLP to data-at-rest and upon access

■ Context-awareness should distinguish between users, managed and unmanaged devices, and more

■ Flexible policy actions (DRM, quarantine, remove share, etc) required to mitigate overall risk

Page 21: Webinar - Bitglass and CyberEdge - Hidden Security Threats

does the solution protect against unauthorized access?

■ Cloud app identity management should maintain the best practices of on-prem identity

■ Cross-app visibility into suspicious access activity with actions like step-up multifactor authentication

Page 22: Webinar - Bitglass and CyberEdge - Hidden Security Threats

secure office 365 + byod

client:

■ 35,000 employees globally

challenge: ■ Inadequate native O365 security■ Controlled access from any device■ Limit external sharing■ Interoperable with existing

infrastructure, e.g. Bluecoat, ADFS

solution: ■ Real-time data visibility and control ■ DLP policy enforcement at upload

or download■ Quarantine externally-shared

sensitive files in cloud ■ Controlled unmanaged device

access■ Shadow IT & Breach discovery

fortune 50 healthcar

efirm

Page 23: Webinar - Bitglass and CyberEdge - Hidden Security Threats

client:

■ 15,000 employees in 190+ locations globally

challenge:

■ Mitigate risks of Google Apps adoption

■ Prevent sensitive data from being stored in the cloud

■ Limit data access based on device risk level

■ Govern external sharing

solution:

■ Inline data protection for unmanaged devices/BYOD

■ Bidirectional DLP

■ Real-time sharing control

secure google apps +

byod

business data

giant

Page 24: Webinar - Bitglass and CyberEdge - Hidden Security Threats

about bitglass

total data

protection est. jan

2013

100+ custome

rs

tier 1 VCs

Page 25: Webinar - Bitglass and CyberEdge - Hidden Security Threats

resources:more info about cloud security

■ whitepaper: the definitive guide to CASBs

■ report: cyberthreat defense

■ case study: fortune 100 healthcare firm secure O365

Page 26: Webinar - Bitglass and CyberEdge - Hidden Security Threats

bitglass.com@bitglass