Cloud Access Security Brokers (CASB) , Cloud Security , Next-Generation Technologies & Secure Development

The Cost of Cloud Compromise and Shadow IT

With the increased use of SaaS applications, cloud account takeover and Shadow IT present an increasing security risk to organizations. As the network perimeter is replaced by a user-defined security perimeter, it becomes critical to evaluate access controls, threat detection and data security in the cloud. So how can you better protect your company?

Join us for this special webinar with experts from Proofpoint and Ponemon Institute. They will discuss the findings of the newly conducted research among IT and security professionals to determine the risk and cost of cloud account takeovers and Shadow IT. In this session, we’ll cover:

  • The state of cloud usage in organizations
  • Security risks and practices to secure the cloud
  • Cloud compromises and the end user risk
  • The cost of compromised cloud accounts

Speakers: Larry Ponemon, Ponemon Institute and Itir Clarke, Proofpoint

About the Author

Around the Network

Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing, you agree to our use of cookies.