際際滷shows by User: Netskope / http://www.slideshare.net/images/logo.gif 際際滷shows by User: Netskope / Mon, 06 Apr 2020 20:50:22 GMT 際際滷Share feed for 際際滷shows by User: Netskope Netskope Threat Labs: Cloud As an Attack Vector /slideshow/netskope-threat-labs-cloud-as-an-attack-vector/231514644 nullcon-2020cloudasanattackvector-200406205023
Netskope Threat Labs analyzes how threat actors use the Cloud]]>

Netskope Threat Labs analyzes how threat actors use the Cloud]]>
Mon, 06 Apr 2020 20:50:22 GMT /slideshow/netskope-threat-labs-cloud-as-an-attack-vector/231514644 Netskope@slideshare.net(Netskope) Netskope Threat Labs: Cloud As an Attack Vector Netskope Netskope Threat Labs analyzes how threat actors use the Cloud <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/nullcon-2020cloudasanattackvector-200406205023-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> Netskope Threat Labs analyzes how threat actors use the Cloud
Netskope Threat Labs: Cloud As an Attack Vector from Netskope
]]>
2215 0 https://cdn.slidesharecdn.com/ss_thumbnails/nullcon-2020cloudasanattackvector-200406205023-thumbnail.jpg?width=120&height=120&fit=bounds presentation Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 1
Why Everyone Needs a Cloud-First Security Program - SASEfaction Guaranteed! /slideshow/why-everyone-needs-a-cloudfirst-security-program-sasefaction-guaranteed/230094723 rsa2020-briefing-cloud-firstsecurityprogram-netskope-email-200311200427
Security teams are constantly keeping up with complex attacks leveraging the cloud, but traditional security stacks just cant keep pace with malicious actors or insiders. In the session, well explore Gartners new SASE framework and how organizations can utilize Zero Trust, visibility into cloud-based traffic and cloud threat protection to build a modernized cloud-first stack.]]>

Security teams are constantly keeping up with complex attacks leveraging the cloud, but traditional security stacks just cant keep pace with malicious actors or insiders. In the session, well explore Gartners new SASE framework and how organizations can utilize Zero Trust, visibility into cloud-based traffic and cloud threat protection to build a modernized cloud-first stack.]]>
Wed, 11 Mar 2020 20:04:27 GMT /slideshow/why-everyone-needs-a-cloudfirst-security-program-sasefaction-guaranteed/230094723 Netskope@slideshare.net(Netskope) Why Everyone Needs a Cloud-First Security Program - SASEfaction Guaranteed! Netskope Security teams are constantly keeping up with complex attacks leveraging the cloud, but traditional security stacks just cant keep pace with malicious actors or insiders. In the session, well explore Gartners new SASE framework and how organizations can utilize Zero Trust, visibility into cloud-based traffic and cloud threat protection to build a modernized cloud-first stack. <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/rsa2020-briefing-cloud-firstsecurityprogram-netskope-email-200311200427-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> Security teams are constantly keeping up with complex attacks leveraging the cloud, but traditional security stacks just cant keep pace with malicious actors or insiders. In the session, well explore Gartners new SASE framework and how organizations can utilize Zero Trust, visibility into cloud-based traffic and cloud threat protection to build a modernized cloud-first stack.
Why Everyone Needs a Cloud-First Security Program - SASEfaction Guaranteed! from Netskope
]]>
1253 1 https://cdn.slidesharecdn.com/ss_thumbnails/rsa2020-briefing-cloud-firstsecurityprogram-netskope-email-200311200427-thumbnail.jpg?width=120&height=120&fit=bounds presentation Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 1
MalCon Future of Security /slideshow/malcon-future-of-security/194009775 galinkinfutureofcyber-191115175331
The Future of Cyber Attacks and Defense in the Cloud]]>

The Future of Cyber Attacks and Defense in the Cloud]]>
Fri, 15 Nov 2019 17:53:31 GMT /slideshow/malcon-future-of-security/194009775 Netskope@slideshare.net(Netskope) MalCon Future of Security Netskope The Future of Cyber Attacks and Defense in the Cloud <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/galinkinfutureofcyber-191115175331-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> The Future of Cyber Attacks and Defense in the Cloud
MalCon Future of Security from Netskope
]]>
376 2 https://cdn.slidesharecdn.com/ss_thumbnails/galinkinfutureofcyber-191115175331-thumbnail.jpg?width=120&height=120&fit=bounds presentation Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 1
Phishing in the Cloud Era (BSides) /slideshow/phishing-in-the-cloud-era-bsides/187814123 phishingintheclouderabsidesdelhifinal-191028165929
]]>

]]>
Mon, 28 Oct 2019 16:59:28 GMT /slideshow/phishing-in-the-cloud-era-bsides/187814123 Netskope@slideshare.net(Netskope) Phishing in the Cloud Era (BSides) Netskope <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/phishingintheclouderabsidesdelhifinal-191028165929-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br>
Phishing in the Cloud Era (BSides) from Netskope
]]>
347 2 https://cdn.slidesharecdn.com/ss_thumbnails/phishingintheclouderabsidesdelhifinal-191028165929-thumbnail.jpg?width=120&height=120&fit=bounds presentation Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 1
DEF CON 27 - Exploiting AWS Loopholes /slideshow/defson-27-exploiting-aws-loopholes/163286346 defson-2020-exploitingawsloopholes-190813000140
DEF CON 27 talk]]>

DEF CON 27 talk]]>
Tue, 13 Aug 2019 00:01:40 GMT /slideshow/defson-27-exploiting-aws-loopholes/163286346 Netskope@slideshare.net(Netskope) DEF CON 27 - Exploiting AWS Loopholes Netskope DEF CON 27 talk <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/defson-2020-exploitingawsloopholes-190813000140-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> DEF CON 27 talk
DEF CON 27 - Exploiting AWS Loopholes from Netskope
]]>
561 4 https://cdn.slidesharecdn.com/ss_thumbnails/defson-2020-exploitingawsloopholes-190813000140-thumbnail.jpg?width=120&height=120&fit=bounds presentation Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 1
Defcon 27 - The Future of Command and Control /slideshow/defcon-27-the-future-of-command-and-control/163286326 defcon-2020-thefutureofcnc-190813000128
Defcon 27 talk]]>

Defcon 27 talk]]>
Tue, 13 Aug 2019 00:01:28 GMT /slideshow/defcon-27-the-future-of-command-and-control/163286326 Netskope@slideshare.net(Netskope) Defcon 27 - The Future of Command and Control Netskope Defcon 27 talk <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/defcon-2020-thefutureofcnc-190813000128-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> Defcon 27 talk
Defcon 27 - The Future of Command and Control from Netskope
]]>
377 3 https://cdn.slidesharecdn.com/ss_thumbnails/defcon-2020-thefutureofcnc-190813000128-thumbnail.jpg?width=120&height=120&fit=bounds presentation Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 1
Defcon 27 - Phishing in the Cloud Era /slideshow/defcon-27-phishing-in-the-cloud-era/163286068 defcon-2020-phishinginthecloudera-190812235827
Defcon 27 talk]]>

Defcon 27 talk]]>
Mon, 12 Aug 2019 23:58:27 GMT /slideshow/defcon-27-phishing-in-the-cloud-era/163286068 Netskope@slideshare.net(Netskope) Defcon 27 - Phishing in the Cloud Era Netskope Defcon 27 talk <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/defcon-2020-phishinginthecloudera-190812235827-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> Defcon 27 talk
Defcon 27 - Phishing in the Cloud Era from Netskope
]]>
423 4 https://cdn.slidesharecdn.com/ss_thumbnails/defcon-2020-phishinginthecloudera-190812235827-thumbnail.jpg?width=120&height=120&fit=bounds presentation Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 1
Defcon 27 - Exploiting IAM in GCP /slideshow/defcon-27-exploiting-iam-in-gcp/163286064 defcon-2020-exploitingiamingcp-190812235824
Defcon 27 talk]]>

Defcon 27 talk]]>
Mon, 12 Aug 2019 23:58:24 GMT /slideshow/defcon-27-exploiting-iam-in-gcp/163286064 Netskope@slideshare.net(Netskope) Defcon 27 - Exploiting IAM in GCP Netskope Defcon 27 talk <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/defcon-2020-exploitingiamingcp-190812235824-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> Defcon 27 talk
Defcon 27 - Exploiting IAM in GCP from Netskope
]]>
655 1 https://cdn.slidesharecdn.com/ss_thumbnails/defcon-2020-exploitingiamingcp-190812235824-thumbnail.jpg?width=120&height=120&fit=bounds presentation Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 1
The Definitive CASB Business Case Kit - Presentation /slideshow/the-definitive-casb-business-case-kit/67515882 casbbusinesscase-161021210738
As #1 on Gartners information security agenda, CASB is a must-have. But is your business case lined up? Get started now with the definitive CASB business case starter kit. The kit includes: - The Gartner Market Guide to Cloud Access Security Brokers - A CASB justification letter that you can tailor and deliver to your decision-maker - A CASB ROI calculator into which you can enter your assumptions, plus a 3-slide companion executive presentation - A sample Cloud Risk Assessment so you know what to expect when you request this analysis from your CASB - The Netskope Cloud Report, which contains the latest cloud security benchmarks - The 15 Most Critical CASB Use Cases eBook, which will help you understand and prioritize your CASB use cases]]>

As #1 on Gartners information security agenda, CASB is a must-have. But is your business case lined up? Get started now with the definitive CASB business case starter kit. The kit includes: - The Gartner Market Guide to Cloud Access Security Brokers - A CASB justification letter that you can tailor and deliver to your decision-maker - A CASB ROI calculator into which you can enter your assumptions, plus a 3-slide companion executive presentation - A sample Cloud Risk Assessment so you know what to expect when you request this analysis from your CASB - The Netskope Cloud Report, which contains the latest cloud security benchmarks - The 15 Most Critical CASB Use Cases eBook, which will help you understand and prioritize your CASB use cases]]>
Fri, 21 Oct 2016 21:07:38 GMT /slideshow/the-definitive-casb-business-case-kit/67515882 Netskope@slideshare.net(Netskope) The Definitive CASB Business Case Kit - Presentation Netskope As #1 on Gartners information security agenda, CASB is a must-have. But is your business case lined up? Get started now with the definitive CASB business case starter kit. The kit includes: - The Gartner Market Guide to Cloud Access Security Brokers - A CASB justification letter that you can tailor and deliver to your decision-maker - A CASB ROI calculator into which you can enter your assumptions, plus a 3-slide companion executive presentation - A sample Cloud Risk Assessment so you know what to expect when you request this analysis from your CASB - The Netskope Cloud Report, which contains the latest cloud security benchmarks - The 15 Most Critical CASB Use Cases eBook, which will help you understand and prioritize your CASB use cases <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/casbbusinesscase-161021210738-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> As #1 on Gartners information security agenda, CASB is a must-have. But is your business case lined up? Get started now with the definitive CASB business case starter kit. The kit includes: - The Gartner Market Guide to Cloud Access Security Brokers - A CASB justification letter that you can tailor and deliver to your decision-maker - A CASB ROI calculator into which you can enter your assumptions, plus a 3-slide companion executive presentation - A sample Cloud Risk Assessment so you know what to expect when you request this analysis from your CASB - The Netskope Cloud Report, which contains the latest cloud security benchmarks - The 15 Most Critical CASB Use Cases eBook, which will help you understand and prioritize your CASB use cases
The Definitive CASB Business Case Kit - Presentation from Netskope
]]>
4410 9 https://cdn.slidesharecdn.com/ss_thumbnails/casbbusinesscase-161021210738-thumbnail.jpg?width=120&height=120&fit=bounds presentation Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 1
June 2016 EMEA Netskope Cloud Report /slideshow/june-2016-emea-netskope-cloud-report/62900177 ns-cloud-report-june16-emea-ig-00-160609153211
In this Netskope Cloud Report, weve compiled the most interesting trends on cloud app adoption and usage based on aggregated, anonymized data from the Netskope Active Platform. Report findings are based on usage seen across millions of users in hundreds of accounts globally, and represent usage trends from January 1 through March 31, 2016. Report highlights: - Three-quarters of cloud apps in use lack key capabilities to comply with the upcoming European Union General Data Protection Regulation. - Malware continues its rise in enterprise clouds, with an average of 11.0 percent of enterprises detecting malware in their sanctioned apps. - 26.2 percent of malware files discovered in sanctioned apps are shared with internal or external users or publicly. - Enterprises have an average of 777 cloud apps in use, a slight rise from 769 last quarter. The Microsoft Office 365 suite continues to lead the pack in top-used business productivity apps, with Office 365 Outlook.com, OneDrive for Business, SharePoint, Yammer, and Lync in the number 2, 3, 12, 19, and 20 spots, respectively. - Cloud Storage apps dominate cloud DLP violations, with 73.6 percent of the total.]]>

In this Netskope Cloud Report, weve compiled the most interesting trends on cloud app adoption and usage based on aggregated, anonymized data from the Netskope Active Platform. Report findings are based on usage seen across millions of users in hundreds of accounts globally, and represent usage trends from January 1 through March 31, 2016. Report highlights: - Three-quarters of cloud apps in use lack key capabilities to comply with the upcoming European Union General Data Protection Regulation. - Malware continues its rise in enterprise clouds, with an average of 11.0 percent of enterprises detecting malware in their sanctioned apps. - 26.2 percent of malware files discovered in sanctioned apps are shared with internal or external users or publicly. - Enterprises have an average of 777 cloud apps in use, a slight rise from 769 last quarter. The Microsoft Office 365 suite continues to lead the pack in top-used business productivity apps, with Office 365 Outlook.com, OneDrive for Business, SharePoint, Yammer, and Lync in the number 2, 3, 12, 19, and 20 spots, respectively. - Cloud Storage apps dominate cloud DLP violations, with 73.6 percent of the total.]]>
Thu, 09 Jun 2016 15:32:11 GMT /slideshow/june-2016-emea-netskope-cloud-report/62900177 Netskope@slideshare.net(Netskope) June 2016 EMEA Netskope Cloud Report Netskope In this Netskope Cloud Report, weve compiled the most interesting trends on cloud app adoption and usage based on aggregated, anonymized data from the Netskope Active Platform. Report findings are based on usage seen across millions of users in hundreds of accounts globally, and represent usage trends from January 1 through March 31, 2016. Report highlights: - Three-quarters of cloud apps in use lack key capabilities to comply with the upcoming European Union General Data Protection Regulation. - Malware continues its rise in enterprise clouds, with an average of 11.0 percent of enterprises detecting malware in their sanctioned apps. - 26.2 percent of malware files discovered in sanctioned apps are shared with internal or external users or publicly. - Enterprises have an average of 777 cloud apps in use, a slight rise from 769 last quarter. The Microsoft Office 365 suite continues to lead the pack in top-used business productivity apps, with Office 365 Outlook.com, OneDrive for Business, SharePoint, Yammer, and Lync in the number 2, 3, 12, 19, and 20 spots, respectively. - Cloud Storage apps dominate cloud DLP violations, with 73.6 percent of the total. <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/ns-cloud-report-june16-emea-ig-00-160609153211-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> In this Netskope Cloud Report, weve compiled the most interesting trends on cloud app adoption and usage based on aggregated, anonymized data from the Netskope Active Platform. Report findings are based on usage seen across millions of users in hundreds of accounts globally, and represent usage trends from January 1 through March 31, 2016. Report highlights: - Three-quarters of cloud apps in use lack key capabilities to comply with the upcoming European Union General Data Protection Regulation. - Malware continues its rise in enterprise clouds, with an average of 11.0 percent of enterprises detecting malware in their sanctioned apps. - 26.2 percent of malware files discovered in sanctioned apps are shared with internal or external users or publicly. - Enterprises have an average of 777 cloud apps in use, a slight rise from 769 last quarter. The Microsoft Office 365 suite continues to lead the pack in top-used business productivity apps, with Office 365 Outlook.com, OneDrive for Business, SharePoint, Yammer, and Lync in the number 2, 3, 12, 19, and 20 spots, respectively. - Cloud Storage apps dominate cloud DLP violations, with 73.6 percent of the total.
June 2016 EMEA Netskope Cloud Report from Netskope
]]>
229 7 https://cdn.slidesharecdn.com/ss_thumbnails/ns-cloud-report-june16-emea-ig-00-160609153211-thumbnail.jpg?width=120&height=120&fit=bounds infographic Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 1
June 2016 Worldwide Netskope Cloud Report /slideshow/june-2016-worldwide-netskope-cloud-report/62899951 ns-cloud-report-june16-ww-ig-00-160609152600
In this Netskope Cloud Report, weve compiled the most interesting trends on cloud app adoption and usage based on aggregated, anonymized data from the Netskope Active Platform. Report findings are based on usage seen across millions of users in hundreds of accounts globally, and represent usage trends from January 1 through March 31, 2016. Report highlights: - Three-quarters of cloud apps in use lack key capabilities to comply with the upcoming European Union General Data Protection Regulation. - Malware continues its rise in enterprise clouds, with an average of 11.0 percent of enterprises detecting malware in their sanctioned apps. - 26.2 percent of malware files discovered in sanctioned apps are shared with internal or external users or publicly. - Enterprises have an average of 935 cloud apps in use, a slight rise from 917 last quarter. The Microsoft Office 365 suite continues to lead the pack in top-used business productivity apps, with Office 365 Outlook.com, OneDrive for Business, SharePoint, Yammer, and Lync in the number 2, 3, 12, 19, and 20 spots, respectively. - Cloud Storage apps dominate cloud DLP violations, with 73.6 percent of the total.]]>

In this Netskope Cloud Report, weve compiled the most interesting trends on cloud app adoption and usage based on aggregated, anonymized data from the Netskope Active Platform. Report findings are based on usage seen across millions of users in hundreds of accounts globally, and represent usage trends from January 1 through March 31, 2016. Report highlights: - Three-quarters of cloud apps in use lack key capabilities to comply with the upcoming European Union General Data Protection Regulation. - Malware continues its rise in enterprise clouds, with an average of 11.0 percent of enterprises detecting malware in their sanctioned apps. - 26.2 percent of malware files discovered in sanctioned apps are shared with internal or external users or publicly. - Enterprises have an average of 935 cloud apps in use, a slight rise from 917 last quarter. The Microsoft Office 365 suite continues to lead the pack in top-used business productivity apps, with Office 365 Outlook.com, OneDrive for Business, SharePoint, Yammer, and Lync in the number 2, 3, 12, 19, and 20 spots, respectively. - Cloud Storage apps dominate cloud DLP violations, with 73.6 percent of the total.]]>
Thu, 09 Jun 2016 15:25:59 GMT /slideshow/june-2016-worldwide-netskope-cloud-report/62899951 Netskope@slideshare.net(Netskope) June 2016 Worldwide Netskope Cloud Report Netskope In this Netskope Cloud Report, weve compiled the most interesting trends on cloud app adoption and usage based on aggregated, anonymized data from the Netskope Active Platform. Report findings are based on usage seen across millions of users in hundreds of accounts globally, and represent usage trends from January 1 through March 31, 2016. Report highlights: - Three-quarters of cloud apps in use lack key capabilities to comply with the upcoming European Union General Data Protection Regulation. - Malware continues its rise in enterprise clouds, with an average of 11.0 percent of enterprises detecting malware in their sanctioned apps. - 26.2 percent of malware files discovered in sanctioned apps are shared with internal or external users or publicly. - Enterprises have an average of 935 cloud apps in use, a slight rise from 917 last quarter. The Microsoft Office 365 suite continues to lead the pack in top-used business productivity apps, with Office 365 Outlook.com, OneDrive for Business, SharePoint, Yammer, and Lync in the number 2, 3, 12, 19, and 20 spots, respectively. - Cloud Storage apps dominate cloud DLP violations, with 73.6 percent of the total. <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/ns-cloud-report-june16-ww-ig-00-160609152600-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> In this Netskope Cloud Report, weve compiled the most interesting trends on cloud app adoption and usage based on aggregated, anonymized data from the Netskope Active Platform. Report findings are based on usage seen across millions of users in hundreds of accounts globally, and represent usage trends from January 1 through March 31, 2016. Report highlights: - Three-quarters of cloud apps in use lack key capabilities to comply with the upcoming European Union General Data Protection Regulation. - Malware continues its rise in enterprise clouds, with an average of 11.0 percent of enterprises detecting malware in their sanctioned apps. - 26.2 percent of malware files discovered in sanctioned apps are shared with internal or external users or publicly. - Enterprises have an average of 935 cloud apps in use, a slight rise from 917 last quarter. The Microsoft Office 365 suite continues to lead the pack in top-used business productivity apps, with Office 365 Outlook.com, OneDrive for Business, SharePoint, Yammer, and Lync in the number 2, 3, 12, 19, and 20 spots, respectively. - Cloud Storage apps dominate cloud DLP violations, with 73.6 percent of the total.
June 2016 Worldwide Netskope Cloud Report from Netskope
]]>
285 5 https://cdn.slidesharecdn.com/ss_thumbnails/ns-cloud-report-june16-ww-ig-00-160609152600-thumbnail.jpg?width=120&height=120&fit=bounds infographic Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 1
5 Highest-Impact CASB Use Cases - Office 365 /slideshow/5-highestimpact-casb-use-cases-office-365/62126680 5highestimpactcasbusecases-office365-160518044540
Cloud app security is a top priority for many enterprises. Whether securing data in the Office 365 suite, ensuring compliance in Salesforce, or getting control over shadow IT, information security leaders are exploring how Cloud Access Security Brokers can make an impact in their organizations. This presentation covers the top Office 365-specific five CASB use cases that have the highest impact on cloud-consuming enterprises.]]>

Cloud app security is a top priority for many enterprises. Whether securing data in the Office 365 suite, ensuring compliance in Salesforce, or getting control over shadow IT, information security leaders are exploring how Cloud Access Security Brokers can make an impact in their organizations. This presentation covers the top Office 365-specific five CASB use cases that have the highest impact on cloud-consuming enterprises.]]>
Wed, 18 May 2016 04:45:40 GMT /slideshow/5-highestimpact-casb-use-cases-office-365/62126680 Netskope@slideshare.net(Netskope) 5 Highest-Impact CASB Use Cases - Office 365 Netskope Cloud app security is a top priority for many enterprises. Whether securing data in the Office 365 suite, ensuring compliance in Salesforce, or getting control over shadow IT, information security leaders are exploring how Cloud Access Security Brokers can make an impact in their organizations. This presentation covers the top Office 365-specific five CASB use cases that have the highest impact on cloud-consuming enterprises. <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/5highestimpactcasbusecases-office365-160518044540-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> Cloud app security is a top priority for many enterprises. Whether securing data in the Office 365 suite, ensuring compliance in Salesforce, or getting control over shadow IT, information security leaders are exploring how Cloud Access Security Brokers can make an impact in their organizations. This presentation covers the top Office 365-specific five CASB use cases that have the highest impact on cloud-consuming enterprises.
5 Highest-Impact CASB Use Cases - Office 365 from Netskope
]]>
3535 12 https://cdn.slidesharecdn.com/ss_thumbnails/5highestimpactcasbusecases-office365-160518044540-thumbnail.jpg?width=120&height=120&fit=bounds presentation Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 1
5 Highest-Impact CASB Use Cases /slideshow/5-highestimpact-casb-use-cases/62126627 5highestimpactcasbusecases-160518044223
Cloud app security is a top priority for many enterprises. Whether securing data in the Office 365 suite, ensuring compliance in Salesforce, or getting control over shadow IT, information security leaders are exploring how Cloud Access Security Brokers can make an impact in their organizations. This presentation covers the top five CASB use cases that have the highest impact on cloud-consuming enterprises.]]>

Cloud app security is a top priority for many enterprises. Whether securing data in the Office 365 suite, ensuring compliance in Salesforce, or getting control over shadow IT, information security leaders are exploring how Cloud Access Security Brokers can make an impact in their organizations. This presentation covers the top five CASB use cases that have the highest impact on cloud-consuming enterprises.]]>
Wed, 18 May 2016 04:42:23 GMT /slideshow/5-highestimpact-casb-use-cases/62126627 Netskope@slideshare.net(Netskope) 5 Highest-Impact CASB Use Cases Netskope Cloud app security is a top priority for many enterprises. Whether securing data in the Office 365 suite, ensuring compliance in Salesforce, or getting control over shadow IT, information security leaders are exploring how Cloud Access Security Brokers can make an impact in their organizations. This presentation covers the top five CASB use cases that have the highest impact on cloud-consuming enterprises. <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/5highestimpactcasbusecases-160518044223-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> Cloud app security is a top priority for many enterprises. Whether securing data in the Office 365 suite, ensuring compliance in Salesforce, or getting control over shadow IT, information security leaders are exploring how Cloud Access Security Brokers can make an impact in their organizations. This presentation covers the top five CASB use cases that have the highest impact on cloud-consuming enterprises.
5 Highest-Impact CASB Use Cases from Netskope
]]>
4320 10 https://cdn.slidesharecdn.com/ss_thumbnails/5highestimpactcasbusecases-160518044223-thumbnail.jpg?width=120&height=120&fit=bounds presentation Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 1
Cure for the Common Cloud: How Healthcare can Safely Enable the Cloud /slideshow/cure-for-the-common-cloud-how-healthcare-can-safely-enable-the-cloud/60626917 slideshare-cybersec-hc-exchange-160407200905
The explosion of useful cloud applications has enabled new levels of productivity, resulting in strategic advantages for some healthcare providers. But cloud app usage is not without risk. Craig Guinasso, CSO of Genomic Health, is leveraging the power of the cloud, while solving some of todays most complex security challenges. Craig, along with Krishna Narayanaswamy, co-founder and chief scientist of Netskope, discuss the top five strategies that healthcare technology and security leaders are adopting to get the most out of the cloud, while protecting patient health data and maintaining their organizations compliance. Attendees will learn how to: - Think about cloud services in relation to business objectives - Triage Shadow IT and consolidate on the most enterprise-ready cloud services - Create checks and policies to identify and prevent PHI leaks - Turn their business stakeholders into security champions ]]>

The explosion of useful cloud applications has enabled new levels of productivity, resulting in strategic advantages for some healthcare providers. But cloud app usage is not without risk. Craig Guinasso, CSO of Genomic Health, is leveraging the power of the cloud, while solving some of todays most complex security challenges. Craig, along with Krishna Narayanaswamy, co-founder and chief scientist of Netskope, discuss the top five strategies that healthcare technology and security leaders are adopting to get the most out of the cloud, while protecting patient health data and maintaining their organizations compliance. Attendees will learn how to: - Think about cloud services in relation to business objectives - Triage Shadow IT and consolidate on the most enterprise-ready cloud services - Create checks and policies to identify and prevent PHI leaks - Turn their business stakeholders into security champions ]]>
Thu, 07 Apr 2016 20:09:05 GMT /slideshow/cure-for-the-common-cloud-how-healthcare-can-safely-enable-the-cloud/60626917 Netskope@slideshare.net(Netskope) Cure for the Common Cloud: How Healthcare can Safely Enable the Cloud Netskope The explosion of useful cloud applications has enabled new levels of productivity, resulting in strategic advantages for some healthcare providers. But cloud app usage is not without risk. Craig Guinasso, CSO of Genomic Health, is leveraging the power of the cloud, while solving some of todays most complex security challenges. Craig, along with Krishna Narayanaswamy, co-founder and chief scientist of Netskope, discuss the top five strategies that healthcare technology and security leaders are adopting to get the most out of the cloud, while protecting patient health data and maintaining their organizations compliance. Attendees will learn how to: - Think about cloud services in relation to business objectives - Triage Shadow IT and consolidate on the most enterprise-ready cloud services - Create checks and policies to identify and prevent PHI leaks - Turn their business stakeholders into security champions <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/slideshare-cybersec-hc-exchange-160407200905-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> The explosion of useful cloud applications has enabled new levels of productivity, resulting in strategic advantages for some healthcare providers. But cloud app usage is not without risk. Craig Guinasso, CSO of Genomic Health, is leveraging the power of the cloud, while solving some of todays most complex security challenges. Craig, along with Krishna Narayanaswamy, co-founder and chief scientist of Netskope, discuss the top five strategies that healthcare technology and security leaders are adopting to get the most out of the cloud, while protecting patient health data and maintaining their organizations compliance. Attendees will learn how to: - Think about cloud services in relation to business objectives - Triage Shadow IT and consolidate on the most enterprise-ready cloud services - Create checks and policies to identify and prevent PHI leaks - Turn their business stakeholders into security champions
Cure for the Common Cloud: How Healthcare can Safely Enable the Cloud from Netskope
]]>
645 5 https://cdn.slidesharecdn.com/ss_thumbnails/slideshare-cybersec-hc-exchange-160407200905-thumbnail.jpg?width=120&height=120&fit=bounds presentation Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 1
Quantifying Cloud Risk for Your Corporate Leadership /slideshow/quantifying-cloud-risk-for-your-corporate-leadership/55798127 quantifyingcloudriskleadershipslideshare-151203210752-lva1-app6892
The move to the cloud has long been considered a key initiative by organizations worldwide. With this move, theres a level of increased risk that enterprises must address. Whats different is using cloud services requires abdicating some control over how systems and data are being protected. We begin this discussion on this footing. Join Scott Hogrefe, Sr. Director of Market Data for Netskope, who will lead this discussion about what CISOs need to know about: - Their cloud risk - How to quantify it for their corporate leadership and board of directors - How to convey it in the context of their overall cloud strategy]]>

The move to the cloud has long been considered a key initiative by organizations worldwide. With this move, theres a level of increased risk that enterprises must address. Whats different is using cloud services requires abdicating some control over how systems and data are being protected. We begin this discussion on this footing. Join Scott Hogrefe, Sr. Director of Market Data for Netskope, who will lead this discussion about what CISOs need to know about: - Their cloud risk - How to quantify it for their corporate leadership and board of directors - How to convey it in the context of their overall cloud strategy]]>
Thu, 03 Dec 2015 21:07:52 GMT /slideshow/quantifying-cloud-risk-for-your-corporate-leadership/55798127 Netskope@slideshare.net(Netskope) Quantifying Cloud Risk for Your Corporate Leadership Netskope The move to the cloud has long been considered a key initiative by organizations worldwide. With this move, theres a level of increased risk that enterprises must address. Whats different is using cloud services requires abdicating some control over how systems and data are being protected. We begin this discussion on this footing. Join Scott Hogrefe, Sr. Director of Market Data for Netskope, who will lead this discussion about what CISOs need to know about: - Their cloud risk - How to quantify it for their corporate leadership and board of directors - How to convey it in the context of their overall cloud strategy <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/quantifyingcloudriskleadershipslideshare-151203210752-lva1-app6892-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> The move to the cloud has long been considered a key initiative by organizations worldwide. With this move, theres a level of increased risk that enterprises must address. Whats different is using cloud services requires abdicating some control over how systems and data are being protected. We begin this discussion on this footing. Join Scott Hogrefe, Sr. Director of Market Data for Netskope, who will lead this discussion about what CISOs need to know about: - Their cloud risk - How to quantify it for their corporate leadership and board of directors - How to convey it in the context of their overall cloud strategy
Quantifying Cloud Risk for Your Corporate Leadership from Netskope
]]>
1802 7 https://cdn.slidesharecdn.com/ss_thumbnails/quantifyingcloudriskleadershipslideshare-151203210752-lva1-app6892-thumbnail.jpg?width=120&height=120&fit=bounds presentation Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 1
Lions, Tigers, and PHI, Oh My! The latest in data loss prevention in the cloud. /slideshow/lions-tigers-and-phi-oh-my-the-latest-in-data-loss-prevention-in-the-cloud/54716605 slideshare-forrester-webinar-lions-phi-ohmy-151104031850-lva1-app6891
Lets face it: When it comes to data loss prevention, were not in Kansas anymore. Any and all types of sensitive business data is now stored in the cloud and accessed from personal devices and most of the time, IT doesnt even know it. This presentation is from a webinar with our guest speaker Forrester VP and Principal Analyst John Kindervag and Netskope VP of Product Management Rajneesh Chopra. In it, they explore the following: - Trends surrounding cloud and data loss prevention - How on-premises DLP users have helped shape the design of new, cloud-based solutions - Key architectural considerations for enterprises who have invested in on-premises DLP - Pitfalls that every IT security professional should look out for when developing a cloud DLP strategy]]>

Lets face it: When it comes to data loss prevention, were not in Kansas anymore. Any and all types of sensitive business data is now stored in the cloud and accessed from personal devices and most of the time, IT doesnt even know it. This presentation is from a webinar with our guest speaker Forrester VP and Principal Analyst John Kindervag and Netskope VP of Product Management Rajneesh Chopra. In it, they explore the following: - Trends surrounding cloud and data loss prevention - How on-premises DLP users have helped shape the design of new, cloud-based solutions - Key architectural considerations for enterprises who have invested in on-premises DLP - Pitfalls that every IT security professional should look out for when developing a cloud DLP strategy]]>
Wed, 04 Nov 2015 03:18:50 GMT /slideshow/lions-tigers-and-phi-oh-my-the-latest-in-data-loss-prevention-in-the-cloud/54716605 Netskope@slideshare.net(Netskope) Lions, Tigers, and PHI, Oh My! The latest in data loss prevention in the cloud. Netskope Lets face it: When it comes to data loss prevention, were not in Kansas anymore. Any and all types of sensitive business data is now stored in the cloud and accessed from personal devices and most of the time, IT doesnt even know it. This presentation is from a webinar with our guest speaker Forrester VP and Principal Analyst John Kindervag and Netskope VP of Product Management Rajneesh Chopra. In it, they explore the following: - Trends surrounding cloud and data loss prevention - How on-premises DLP users have helped shape the design of new, cloud-based solutions - Key architectural considerations for enterprises who have invested in on-premises DLP - Pitfalls that every IT security professional should look out for when developing a cloud DLP strategy <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/slideshare-forrester-webinar-lions-phi-ohmy-151104031850-lva1-app6891-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> Lets face it: When it comes to data loss prevention, were not in Kansas anymore. Any and all types of sensitive business data is now stored in the cloud and accessed from personal devices and most of the time, IT doesnt even know it. This presentation is from a webinar with our guest speaker Forrester VP and Principal Analyst John Kindervag and Netskope VP of Product Management Rajneesh Chopra. In it, they explore the following: - Trends surrounding cloud and data loss prevention - How on-premises DLP users have helped shape the design of new, cloud-based solutions - Key architectural considerations for enterprises who have invested in on-premises DLP - Pitfalls that every IT security professional should look out for when developing a cloud DLP strategy
Lions, Tigers, and PHI, Oh My! The latest in data loss prevention in the cloud. from Netskope
]]>
1078 10 https://cdn.slidesharecdn.com/ss_thumbnails/slideshare-forrester-webinar-lions-phi-ohmy-151104031850-lva1-app6891-thumbnail.jpg?width=120&height=120&fit=bounds presentation Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 1
Autumn 2015 EMEA Netskope Cloud Report /slideshow/autumn-2015-emea-netskope-cloud-report/53597131 ns-cloud-report-oct15-emea-ig-00-151006130402-lva1-app6891
In this Netskope Cloud Report infographic, we've compiled the most interesting trends on cloud app adoption and usage based on aggregated, anonymized data from the Netskope Active Platform.]]>

In this Netskope Cloud Report infographic, we've compiled the most interesting trends on cloud app adoption and usage based on aggregated, anonymized data from the Netskope Active Platform.]]>
Tue, 06 Oct 2015 13:04:02 GMT /slideshow/autumn-2015-emea-netskope-cloud-report/53597131 Netskope@slideshare.net(Netskope) Autumn 2015 EMEA Netskope Cloud Report Netskope In this Netskope Cloud Report infographic, we've compiled the most interesting trends on cloud app adoption and usage based on aggregated, anonymized data from the Netskope Active Platform. <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/ns-cloud-report-oct15-emea-ig-00-151006130402-lva1-app6891-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> In this Netskope Cloud Report infographic, we&#39;ve compiled the most interesting trends on cloud app adoption and usage based on aggregated, anonymized data from the Netskope Active Platform.
Autumn 2015 EMEA Netskope Cloud Report from Netskope
]]>
457 7 https://cdn.slidesharecdn.com/ss_thumbnails/ns-cloud-report-oct15-emea-ig-00-151006130402-lva1-app6891-thumbnail.jpg?width=120&height=120&fit=bounds infographic Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 1
Fall 2015 Worldwide Netskope Cloud Report /slideshow/fall-2015-worldwide-netskope-cloud-report/53596868 ns-cloud-report-oct15-ww-ig-00-151006125901-lva1-app6891
In this Netskope Cloud Report infographic, we've compiled the most interesting trends on cloud app adoption and usage based on aggregated, anonymized data from the Netskope Active Platform.]]>

In this Netskope Cloud Report infographic, we've compiled the most interesting trends on cloud app adoption and usage based on aggregated, anonymized data from the Netskope Active Platform.]]>
Tue, 06 Oct 2015 12:59:01 GMT /slideshow/fall-2015-worldwide-netskope-cloud-report/53596868 Netskope@slideshare.net(Netskope) Fall 2015 Worldwide Netskope Cloud Report Netskope In this Netskope Cloud Report infographic, we've compiled the most interesting trends on cloud app adoption and usage based on aggregated, anonymized data from the Netskope Active Platform. <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/ns-cloud-report-oct15-ww-ig-00-151006125901-lva1-app6891-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> In this Netskope Cloud Report infographic, we&#39;ve compiled the most interesting trends on cloud app adoption and usage based on aggregated, anonymized data from the Netskope Active Platform.
Fall 2015 Worldwide Netskope Cloud Report from Netskope
]]>
386 7 https://cdn.slidesharecdn.com/ss_thumbnails/ns-cloud-report-oct15-ww-ig-00-151006125901-lva1-app6891-thumbnail.jpg?width=120&height=120&fit=bounds infographic Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 1
Cloud Security for Dummies Webinar The Identity Edition /slideshow/cloud-security-for-dummies-webinar-the-identity-edition/53127004 slideshare-cs4didentitywebinarslidesfinal-150923201448-lva1-app6892
Join "Cloud Security for Dummies" authors Ravi Ithal and Krishna Narayanaswamy, along with Patrick Harding, CTO from Ping Identity for this special Identity Edition of the Cloud Security for Dummies webinar series. In this panel-style discussion, the experts will compare notes, debate approaches, and share stories from the cloud security and identity and access management front lines. IT security professionals will walk away with best practices on: - Finding and assessing risk of all cloud apps running in your enterprise - Onboarding new apps and bringing them into the secure Single Sign On fold - Using identity to enable access and enforce usage and content policies - Dealing with security issues such as poor reputation users and compromised accounts - Communicating and coaching users]]>

Join "Cloud Security for Dummies" authors Ravi Ithal and Krishna Narayanaswamy, along with Patrick Harding, CTO from Ping Identity for this special Identity Edition of the Cloud Security for Dummies webinar series. In this panel-style discussion, the experts will compare notes, debate approaches, and share stories from the cloud security and identity and access management front lines. IT security professionals will walk away with best practices on: - Finding and assessing risk of all cloud apps running in your enterprise - Onboarding new apps and bringing them into the secure Single Sign On fold - Using identity to enable access and enforce usage and content policies - Dealing with security issues such as poor reputation users and compromised accounts - Communicating and coaching users]]>
Wed, 23 Sep 2015 20:14:48 GMT /slideshow/cloud-security-for-dummies-webinar-the-identity-edition/53127004 Netskope@slideshare.net(Netskope) Cloud Security for Dummies Webinar The Identity Edition Netskope Join "Cloud Security for Dummies" authors Ravi Ithal and Krishna Narayanaswamy, along with Patrick Harding, CTO from Ping Identity for this special Identity Edition of the Cloud Security for Dummies webinar series. In this panel-style discussion, the experts will compare notes, debate approaches, and share stories from the cloud security and identity and access management front lines. IT security professionals will walk away with best practices on: - Finding and assessing risk of all cloud apps running in your enterprise - Onboarding new apps and bringing them into the secure Single Sign On fold - Using identity to enable access and enforce usage and content policies - Dealing with security issues such as poor reputation users and compromised accounts - Communicating and coaching users <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/slideshare-cs4didentitywebinarslidesfinal-150923201448-lva1-app6892-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> Join &quot;Cloud Security for Dummies&quot; authors Ravi Ithal and Krishna Narayanaswamy, along with Patrick Harding, CTO from Ping Identity for this special Identity Edition of the Cloud Security for Dummies webinar series. In this panel-style discussion, the experts will compare notes, debate approaches, and share stories from the cloud security and identity and access management front lines. IT security professionals will walk away with best practices on: - Finding and assessing risk of all cloud apps running in your enterprise - Onboarding new apps and bringing them into the secure Single Sign On fold - Using identity to enable access and enforce usage and content policies - Dealing with security issues such as poor reputation users and compromised accounts - Communicating and coaching users
Cloud Security for Dummies Webinar The Identity Edition from Netskope
]]>
2324 47 https://cdn.slidesharecdn.com/ss_thumbnails/slideshare-cs4didentitywebinarslidesfinal-150923201448-lva1-app6892-thumbnail.jpg?width=120&height=120&fit=bounds presentation Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 1
Reference Architecture for Data Loss Prevention in the Cloud /slideshow/reference-architecture-for-data-loss-prevention-in-the-cloud/52868321 do-you-measure-up-reference-architecture-cloud-dlp-slideshare-150916222421-lva1-app6892
Do you measure up? A new reference architecture for data loss prevention (DLP) in the the cloud. Six key architectural tenets.]]>

Do you measure up? A new reference architecture for data loss prevention (DLP) in the the cloud. Six key architectural tenets.]]>
Wed, 16 Sep 2015 22:24:21 GMT /slideshow/reference-architecture-for-data-loss-prevention-in-the-cloud/52868321 Netskope@slideshare.net(Netskope) Reference Architecture for Data Loss Prevention in the Cloud Netskope Do you measure up? A new reference architecture for data loss prevention (DLP) in the the cloud. Six key architectural tenets. <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/do-you-measure-up-reference-architecture-cloud-dlp-slideshare-150916222421-lva1-app6892-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> Do you measure up? A new reference architecture for data loss prevention (DLP) in the the cloud. Six key architectural tenets.
Reference Architecture for Data Loss Prevention in the Cloud from Netskope
]]>
2309 4 https://cdn.slidesharecdn.com/ss_thumbnails/do-you-measure-up-reference-architecture-cloud-dlp-slideshare-150916222421-lva1-app6892-thumbnail.jpg?width=120&height=120&fit=bounds presentation Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 1
https://cdn.slidesharecdn.com/profile-photo-Netskope-48x48.jpg?cb=1583957037 Netskope is the leader in cloud app analytics and policy enforcement. We help people safely use their favorite cloud apps so the business can move fast, with confidence. www.netskope.com https://cdn.slidesharecdn.com/ss_thumbnails/nullcon-2020cloudasanattackvector-200406205023-thumbnail.jpg?width=320&height=320&fit=bounds slideshow/netskope-threat-labs-cloud-as-an-attack-vector/231514644 Netskope Threat Labs: ... https://cdn.slidesharecdn.com/ss_thumbnails/rsa2020-briefing-cloud-firstsecurityprogram-netskope-email-200311200427-thumbnail.jpg?width=320&height=320&fit=bounds slideshow/why-everyone-needs-a-cloudfirst-security-program-sasefaction-guaranteed/230094723 Why Everyone Needs a C... https://cdn.slidesharecdn.com/ss_thumbnails/galinkinfutureofcyber-191115175331-thumbnail.jpg?width=320&height=320&fit=bounds slideshow/malcon-future-of-security/194009775 MalCon Future of Security