Assessing Cloud Apps Risk

"Mirror mirror on the wall who's the riskiest of them all?

It's no secret that companies are adopting cloud applications like Office 365, Google Apps, Dropbox and Salesforce to help improve their business. With the cost savings and increased scale and efficiency of the cloud, who could blame them? But what some companies tend to overlook is that there is a level of risk when it comes to each of these apps, and that it can differ based on each company's use case.

Do you know what cloud applications are running in your infrastructure today? How about the ones putting your sensitive data at the most amount of risk? Do you have a way of finding out?

In this webinar Chris Hines, Product Manager at Bitglass will teach you what's necessary when it comes to determining your company's riskiest cloud applications."
Watch Now

Spotlight

OTHER ON-DEMAND WEBINARS

Ransomware & Powershell: The Power Couple

Carbon Black

With more than 4,000 new ransomware samples appearing every day, it is impossible for signature-based defenses to keep up. Every indication shows that the rise in ransomware is accelerating, making it mission critical for you to put the right tools and processes in place to defend against these relentless emerging threats. This webinar will help organizations understand the typical behavior that powershell exhibits in environments normally so that ransomware attacks that leverage powershell can be detected quickly.
Watch Now

Mitigating DDoS Attacks and Malware Spread

Modern malware, ransomware, and DDoS attacks have become a big issue for organizations of any size. Zero Trust strategies, in addition to application and DDoS protection, are a way to help deal with these issues. Most internet traffic is encrypted today, threat actors are using encryption to hide their attacks. Organizations must rely on TLS/SSL decryption and inspection to protect their users and networks. This is key to employing a strong Zero Trust strategy. We will explore these concepts in this research backed webinar.
Watch Now

Securing CI/CD Pipelines Through Security Gates

CI/CD pipeline security has become a pressing issue for DevOps and DevSecOps teams. With today's frameworks and best practices, various security gates can be applied through the CICD process from writing the very first line of YAML in the CI, and later to the CD process.
Watch Now

Overcoming Unstructured Data Security and Privacy Choke Points

HealthcareInfoSecurity

Why do so many data loss prevention projects either stall or de-scope? Why with significant industry expenditures in the space do we continue to experience record-breaking instances of data breaches and exfiltration? What are the latest methodologies and technologies security and privacy executives should consider to protect their sensitive data and comply with ever-increasing and pervasive privacy regulations such as GDPR and CCPA. Join Deborah Kish, former Gartner data security analyst, as she shares insights gleaned from hundreds of sessions with CISO, CIO, CDO, CPO and CCOs to offer an insider's playbook to implementing an unstructured data security and privacy program.
Watch Now