State of Office 365 Adoption & Risk A Dive into the Data. Jim Reavis, CEO, Cloud Security Alliance Brandon Cook, VP, Marketing, Skyhigh Networks

Similar documents
Jim Reavis CEO and Founder Cloud Security Alliance December 2017

CSA GUIDANCE VERSION 4 S TAT E O F T H E A R T CLOUD SECURITY AND GDPR NOTES. Hing-Yan Lee (Dr.) EVP, APAC, Cloud Security Alliance

Microsoft Security Management

McAfee Skyhigh Security Cloud for Citrix ShareFile

Security as a Service (Implementation Guides) Research Sponsorship

Cloud Security Alliance Quantum-safe Security Working Group

Securing Office 365 with SecureCloud

Microsoft 365. A complete, intelligent, secure solution to empower employees. Integrated for simplicity. Built for teamwork. Unlocks creativity

CloudSOC and Security.cloud for Microsoft Office 365

Next-Gen CASB. Patrick Koh Bitglass

McAfee MVISION Cloud. Data Security for the Cloud Era

IBM Cloud Security for the Cloud. Amr Ismail Security Solutions Sales Leader Middle East & Pakistan

McAfee Skyhigh Security Cloud for Amazon Web Services

IBM Future of Work Forum

The Etihad Journey to a Secure Cloud

Protecting Against Modern Attacks. Protection Against Modern Attack Vectors

Netwrix Virtual. Customer Summit 2016

CipherCloud CASB+ Connector for ServiceNow

Cloud is the 'Only' Way Forward in Information Security. Leveraging Scale to Make the Unknown Known, in Dev, Sec & Ops.

Go mobile. Stay in control.

Storage Made Easy. Enterprise File Fabric for Unified Data Indexing, Auditing, e-compliance, and secure file sharing.

Cloud Security, Mobility and Current Threats. Tristan Watkins, Head of Research and Innovation

Consumerization. Copyright 2014 Trend Micro Inc. IT Work Load

Building a More Secure Cloud Architecture

RHM Presentation. Maas 360 Mobile device management

CCSK Research Sponsorship

Make Cloud the Most Secure Environment for Business. Seth Hammerman, Systems Engineer Mvision Cloud (formerly Skyhigh Networks)

Benefits of Implementing a SaaS Cybersecurity Solution Andras Cser, VP Principal Analyst

CAN MICROSOFT HELP MEET THE GDPR

WORKPLACE Data Leak Prevention: Keeping your sensitive out of the public domain. Frans Oudendorp Ronny de Jong

Best Practices in Securing a Multicloud World

MAXIMIZE SOFTWARE INVESTMENTS

Windows 10 IoT Overview. Microsoft Corporation

Strategies for a Successful Security and Digital Transformation

M365 Powered Device Proof of Concept Overview

Managed Endpoint Defense

Microsoft Azure Security, Privacy, & Compliance

Martijn Loderus. Merritt Maxim. Principal Analyst Forrester. Director & Global Practice Partner for Advisory Consulting Janrain

Don t Be the Next Data Loss Story

Secure & Unified Identity

IT Security Training MS-500: Microsoft 365 Security Administration. Upcoming Dates. Course Description. Course Outline $2,

2018 Edition. Security and Compliance for Office 365

Corporate Membership

Effective Threat Modeling using TAM

Healthcare and the Cloud:

Security Models for Cloud

Mobile Security Overview Rob Greer, VP Endpoint Management and Mobility Product Management Dave Cole, Sr. Director Consumer Mobile Product Management

LBI Public Information. Please consider the impact to the environment before printing this.

Cloud Adop)on, Risks & Security & GDPR An Ac)on Guide

Securing Office 365 with MobileIron

THE IDENTITY DEFINED SECURITY ALLIANCE

Zero Trust with Okta: A Modern Approach to Secure Access from Anywhere. How Okta enables a Zero Trust solution for our customers

Oracle Buys Palerra Extends Oracle Identity Cloud Service with Innovative Cloud Access Security Broker

SECOPS: NAVIGATE THE NEW LANDSCAPE FOR PREVENTION, DETECTION AND RESPONSE

EU GDPR & NEW YORK CYBERSECURITY REQUIREMENTS 3 KEYS TO SUCCESS

MaaS360 Secure Productivity Suite

Cloud Security: Constant Innovation

Cybersecurity Auditing in an Unsecure World

Cisco Connected Factory Accelerator Bundles

Securing Your Most Sensitive Data

Managing Microsoft 365 Identity and Access

Everyday Security: Simple Solutions to Complex Security Problems

Next Generation Authentication

AKAMAI CLOUD SECURITY SOLUTIONS

Delivering Integrated Cyber Defense for the Cloud Generation Darren Thomson

BULLETPROOF365 SECURING YOUR IT. Bulletproof365.com

The Business of Security in the Cloud

What matters in Cyber Security

MAKING THE CLOUD A SECURE EXTENSION OF YOUR DATACENTER

CLOUD WORKLOAD SECURITY

Access Governance in a Cloudy Environment. Nabeel Nizar VP Worldwide Solutions

Office 365: Modern Workplace

Automating the Top 20 CIS Critical Security Controls

BULLETPROOF365 SECURING YOUR IT. Bulletproof365.com

Allot Corporate Presentation

Verasys Enterprise Security and IT Guide

Privileged Account Security: A Balanced Approach to Securing Unix Environments

Shadow IT in the Enterprise

Top. Reasons Legal Teams Select kiteworks by Accellion

the SWIFT Customer Security

Key Technologies for Security Operations. Copyright 2014 EMC Corporation. All rights reserved.

Disclaimer This presentation may contain product features that are currently under development. This overview of new technology represents no commitme

Ο ρόλος της τεχνολογίας στο ταξίδι της συμμόρφωσης με τον Γενικό Κανονισμό. Αντιγόνη Παπανικολάου & Νίκος Αναστόπουλος

Bringing cyber to the Board of Directors & C-level and keeping it there. Dirk Lybaert, Proximus September 9 th 2016

Look Who s Hiring! AWS Solution Architect AWS Cloud TAM

CIAM: Need for Identity Governance & Assurance. Yash Prakash VP of Products

Enterprise & Cloud Security

Why is Office 365 the right choice?

Comprehensive Database Security

EXPLORE MICROSOFT SHAREPOINT SERVER 2016 AND BEYOND #ILTAG70

THE IMPACT OF HYBRID AND MULTI CLOUDS TO CYBERSECURITY PRIORITIES

85% 89% 10/5/2018. Do You Have A Firewall Around Your Cloud? Conquering The Big Threats & Challenges

Cisco Self Defending Network

Sourcefire Solutions Overview Security for the Real World. SEE everything in your environment. LEARN by applying security intelligence to data

Lessons from the Human Immune System Gavin Hill, Director Threat Intelligence

Integrated Security Management Framework

Maximize your move to Microsoft in the cloud

Designing an Adaptive Defense Security Architecture. George Chiorescu FireEye

WHITEPAPER. Compliance with ITAR and Export Controls in Collaboration Systems

Transformation in Technology Barbara Duck Chief Information Officer. Investor Day 2018

Transcription:

State of Office 365 Adoption & Risk A Dive into the Data Jim Reavis, CEO, Cloud Security Alliance Brandon Cook, VP, Marketing, Skyhigh Networks

Q4 2016 Office 365 Usage and Risk Report Brandon Cook, Skyhigh Networks

Hard Data on O365 Usage Anonymized usage data 30+ million users 600+ companies across 28 industries 78 countries worldwide

Office 365 Adoption vs Usage It s Just Starting Penetration rate of Office 365 in the enterprises has increased from 87.3% to 91.4% in 9 months But, active usage has tripled in same time. Growth driven by pricing model and new features

Office 365 Utilization by App OneDrive is top app (bundled with Office and Exchange Online) Exchange Online utilization still relatively small

Office 365 Now World s Most Popular Enterprise Cloud Service

Office 365 Usage by Industry

Office 365 is Home to Sensitive Data

Collaboration within Office 365 (OneDrive, SharePoint) is Growing 37.2% of O365 files are shared today

Sensitive Data Shared Externally 9.2% of Externally Shared Docs Contain Sensitive Data

O365 Threat Funnel

Office 365 Data Under Siege

O365 Data Loss Scenarios

Leveraging CASBs to Address O365 Data Loss Scenarios Encryption

Leveraging CASBs to Address O365 Data Loss Scenarios Encryption API controls (OAuth)

Leveraging CASBs to Address O365 Data Loss Scenarios Encryption API controls (OAuth) Granular DLP on shadow cloud services

Leveraging CASBs to Address O365 Data Loss Scenarios Encryption API controls (OAuth) Granular DLP on shadow cloud services User behavior, privileged user, and geolocation analytics

Leveraging CASBs to Address O365 Data Loss Scenarios Encryption API controls (OAuth) Granular DLP on shadow cloud services Device-based access controls User behavior, privileged user, and geolocation analytics

Leveraging CASBs to Address O365 Data Loss Scenarios Encryption API controls (OAuth) Security Configuration audit Granular DLP on shadow cloud services Device-based access controls User behavior, privileged user, and geolocation analytics

Leveraging CASBs to Address O365 Data Loss Scenarios Collaboration controls Encryption API controls (OAuth) Security Configuration audit Granular DLP on shadow cloud services Device-based access controls User behavior, privileged user, and geolocation analytics

Top 7 O365 CASB Uses Cases Ranked 1. Prevent unauthorized data from being shared externally 70% 2. Prevent high-value data from being stored in the cloud 65% Adoption 3. Block download of O365 data to personal devices 55% 4. Detect compromised accounts, insider/privileged user threats 40% 5. Capture an audit trail of activity for forensic investigations 30% 6. Prevent access to personal O365 instances 20% 7. Prevent proliferation of malware 15%

Guidance from the Cloud Security Alliance (CSA Jim Reavis CEO, Cloud Security Alliance

Awareness, Opportunism, Strategy in securing your Cloud experience Visibility into cloud usage today and plans for tomorrow

Awareness, Opportunism, Strategy in securing your Cloud experience Visibility into cloud usage today and plans for tomorrow Data security: think about the entire data lifecycle and address security in all phases

Awareness, Opportunism, Strategy in securing your Cloud experience Visibility into cloud usage today and plans for tomorrow Data security: think about the entire data lifecycle and address security in all phases Strong Identity & Access Management strategy

Awareness, Opportunism, Strategy in securing your Cloud experience Visibility into cloud usage today and plans for tomorrow Data security: think about the entire data lifecycle and address security in all phases Strong Identity & Access Management strategy Due diligence with your providers

Awareness, Opportunism, Strategy in securing your Cloud experience Visibility into cloud usage today and plans for tomorrow Data security: think about the entire data lifecycle and address security in all phases Strong Identity & Access Management strategy Due diligence with your providers Understand how software development is different in cloud

Awareness, Opportunism, Strategy in securing your Cloud experience Visibility into cloud usage today and plans for tomorrow Data security: think about the entire data lifecycle and address security in all phases Strong Identity & Access Management strategy Due diligence with your providers Understand how software development is different in cloud Learn about new "cloud-driven" security practices like DevSecOps

Lots of free tools and research to make your transition easier CSA Guidance, Cloud Controls Matrix, CSA STAR and much more https://cloudsecurityalliance.org/ Get your CCSK & CCSP!

Questions?