Your Data Is Everywhere: Why Your Security Should Be Too
Presenter: Steve Riley – Field CTO, Netskope
Room: Ballroom, EMU 244, Level 2
Time: 10:30a – 11:00a
The number of cloud apps that an organization uses continues to increase steadily, up 35% in the first five months of 2022, according to Netskope’s 2022 Cloud and Threat Report: Cloud Data Sprawl. Depending on the size of the organization, 138 to 326 different apps are used to create, upload, share, or store data. The apps include managed app instances, unmanaged apps and app instances freely adopted by business units, and personal apps and app instances. While most users create, upload, and store data in managed app instances, 22% of users regularly do so with personal apps and instances. Furthermore, 20% of users upload an unusually high amount of data to personal apps and instances immediately before they leave an organization. Using personal apps and instances enables users to retain access to data even after they leave.
In this session, participants will learn about the latest shifts and trends in technology and the resultant impact on security. The increased use of cloud and SaaS apps—whether sanctioned 2022 © Netskope Confidential. All rights reserved. – August 27, 2022 by an organization or not—has resulted in an increased attack surface that organization’s are left to protect, in many cases, with legacy tools and processes. Security controls built for earlier eras of networking and perimeter protection are blind to today’s traffic; proving ineffective with today’s architectures. It’s time to integrate the perspective and interdependencies between network and security teams to address the cloud-dependent WFH and modern architectures required to provide organizations and users with appropriate access to secure and high performance services and data.
In this session we will unpack the need for the “modern security stack”. Where it exists (in the cloud of course), and where your network and security teams can/should have the visibility and control into what is happening in real-time, but also enable access to rich historic context to better predict and have the means to reduce risk.
Lastly, this session will include specific recommendations on how to control data sprawl and protect sensitive data, encompassing solutions and approaches such as security service edge (SSE), secure access service edge (SASE), zero trust, and other methods that can ultimately enable more granular control as well as richer context for decision making, data protection, and risk reduction.