Once your organization migrates to the the cloud, protecting your people and the data they create becomes more challenging and critical than ever. Cybercriminals are launching wide-scale brute force attacks on cloud services to compromise user accounts. 85% of Office 365 and G Suite tenants are targeted. After taking over your trusted accounts, threat actors use social engineering tactics to trick even the most savvy users to install malware, transfer money or hand over sensitive data. That's why a people-centric approach to your cloud security is one of the most effective ways to provide visibility and control over your cloud applications. So what does a people-centric strategy look like and how can you use it to better your overall cloud security? Join our experts for a deep dive into how to use a Cloud Access Security Broker (CASB) to protect your organization's IT-approved applications, such as Office 365 and G Suite that contain your most valuable assets: your people and data. In this session, we'll examine: - What the most prevalent cloud attacks are and how they target your VAPs, or Very Attacked People -Why a people-centric approach to cloud security is one of the most effective ways to protect your VAPs - The different CASB use cases, features, and architectures - What to look for in a CASB solution to mitigate the risks you're likely to face

Hora

18:00 - 19:00 hs GMT+1

Organizador

Cloud Security Alliance: CloudBytes
Compartir
Enviar a un amigo
Mi email *
Email destinatario *
Comentario *
Repite estos números *
Control de seguridad
Mayo / 2020 1144 webinars
Lunes
Martes
Miércoles
Jueves
Viernes
Sábado
Domingo
Lun 27 de Mayo de 2020
Mar 28 de Mayo de 2020
Mié 29 de Mayo de 2020
Jue 30 de Mayo de 2020
Vie 01 de Mayo de 2020
Sáb 02 de Mayo de 2020
Dom 03 de Mayo de 2020
Lun 04 de Mayo de 2020
Mar 05 de Mayo de 2020
Mié 06 de Mayo de 2020
Jue 07 de Mayo de 2020
Vie 08 de Mayo de 2020
Sáb 09 de Mayo de 2020
Dom 10 de Mayo de 2020
Lun 11 de Mayo de 2020
Mar 12 de Mayo de 2020
Mié 13 de Mayo de 2020