26
The Razor’s Edge: Enabling cloud while mitigating the risk of a cloud data breach

The Razor's Edge: Enabling Cloud While Mitigating the Risk of a Cloud Data Breach

Embed Size (px)

DESCRIPTION

Shadow IT. It's not a new term and certainly not a new challenge. But with only blunt-force solutions like saying "no" or blocking cloud services at the firewall, IT has not been able to do much to address the challenge. This is all changing. Business and IT leaders alike see real value in cloud services and want to take a lean-forward approach to enabling them. The reality, though, is that cloud services are not without their risks, and the risk of a data breach increases when the cloud is involved. Hear from Netskope about the risks, economic impact, and multiplier effect of a cloud data breach, and how forward-looking organizations are walking the razor’s edge to mitigate these risks while enabling the cloud.

Citation preview

Page 1: The Razor's Edge: Enabling Cloud While Mitigating the Risk of a Cloud Data Breach

The Razor’s Edge: Enabling

cloud while mitigating the risk

of a cloud data breach

Page 2: The Razor's Edge: Enabling Cloud While Mitigating the Risk of a Cloud Data Breach

Cloud App Explosion

2

Driven by individual and

line of business adoption

of cloud and mobile.

2011 2016

$21.2B

$92.8B

SaaS

Rev

enu

e

Forrester

Page 3: The Razor's Edge: Enabling Cloud While Mitigating the Risk of a Cloud Data Breach

3

There are 5,000 enterprise apps

today (and growing).

Page 4: The Razor's Edge: Enabling Cloud While Mitigating the Risk of a Cloud Data Breach

People love their cloud apps, and for good reason

Anywhere Access CollaborationProductivity

4

Page 5: The Razor's Edge: Enabling Cloud While Mitigating the Risk of a Cloud Data Breach

5

But this means sleepless nights for IT

But how bad is it?

Page 6: The Razor's Edge: Enabling Cloud While Mitigating the Risk of a Cloud Data Breach

6

Page 7: The Razor's Edge: Enabling Cloud While Mitigating the Risk of a Cloud Data Breach

The following are contributors to

the cloud multiplier effect

7

Cloud app

adoption

Mobile and

consumerization

Ease and speed

of data sharing

Page 8: The Razor's Edge: Enabling Cloud While Mitigating the Risk of a Cloud Data Breach

8

Increase use and

increase probability

If your organization had 100 cloud apps and added 25 more in a 12-month period, you would increase your probability (and expected economic impact) of a data breach by 75%

Page 9: The Razor's Edge: Enabling Cloud While Mitigating the Risk of a Cloud Data Breach

We looked at 2 data breach types

9

Loss or theft of 100,000 customer records

Theft of high-value information

Page 10: The Razor's Edge: Enabling Cloud While Mitigating the Risk of a Cloud Data Breach

Baseline cost of a data breach

10

$20.1M $11.8M

Page 11: The Razor's Edge: Enabling Cloud While Mitigating the Risk of a Cloud Data Breach

Survey respondents said…

11.8% 25.4%

probability of this happening in current environment

Page 12: The Razor's Edge: Enabling Cloud While Mitigating the Risk of a Cloud Data Breach

The probability adjusted estimated

economic impact

11.8% of $20.1 =

$2.37M25.4% of $11.8 =

$2.99M

Page 13: The Razor's Edge: Enabling Cloud While Mitigating the Risk of a Cloud Data Breach

Effects of cloud on the probability of theft or

loss of 100,000 or more customer records

13

Use of cloud services

(SaaS)

Backup and storage of sensitive and/or

confidential information

Increase use of cloud by 50% in 12 months

Page 14: The Razor's Edge: Enabling Cloud While Mitigating the Risk of a Cloud Data Breach

14

Use of cloud services

(SaaS)

Backup and storage of sensitive and/or

confidential information

Increase use of cloud by 50% in 12 months

Effects of cloud on the probability of theft of

high-value information

Page 15: The Razor's Edge: Enabling Cloud While Mitigating the Risk of a Cloud Data Breach

15

124% increase in probability of a data breach

Increase BYOD access of cloud services

Page 16: The Razor's Edge: Enabling Cloud While Mitigating the Risk of a Cloud Data Breach

Invisible to IT

16

36% of business-critical apps are in the cloud. IT isn’t aware of nearly

half of them.

30% of business information resides in the cloud.

IT doesn't have visibility into more than one third of it.

Page 17: The Razor's Edge: Enabling Cloud While Mitigating the Risk of a Cloud Data Breach

People love their cloud apps, and for good reason

17

Love doesn’t have to be blind

Page 18: The Razor's Edge: Enabling Cloud While Mitigating the Risk of a Cloud Data Breach

18

MEASURE:Discover the cloud

apps running in your

enterprise

Page 19: The Razor's Edge: Enabling Cloud While Mitigating the Risk of a Cloud Data Breach

19

MEASURE:Discover the cloud

apps running in your

enterprise

• 3rd party tools like Netskope can analyze firewall logs (and others) for this information

• Resist the urge to immediately blacklist unsanctioned apps

Page 20: The Razor's Edge: Enabling Cloud While Mitigating the Risk of a Cloud Data Breach

20

User Location Device

Time

Activity

App

Content

Risk

w/Whom

ANALYZE:Understand the context of

usage at a deeper level

Page 21: The Razor's Edge: Enabling Cloud While Mitigating the Risk of a Cloud Data Breach

21

User Location Device

Time

Activity

App

Content

Risk

w/Whom

Page 22: The Razor's Edge: Enabling Cloud While Mitigating the Risk of a Cloud Data Breach

22

ACT:Plot a course of action based

on risk, usage criticality

Page 23: The Razor's Edge: Enabling Cloud While Mitigating the Risk of a Cloud Data Breach

23

ACT:Plot a course of action based

on risk, usage criticality

• Use an objective criteria for assessing app. The Cloud Controls Matrix from CSA is good start, and vendors have taken this to a whole new level.

• After risk, look at usage, including the nature of the content. This will help triage policy enforcement next steps, especially when hundreds of apps are in play.

• Risky usage can be more important than app risk.

Page 24: The Razor's Edge: Enabling Cloud While Mitigating the Risk of a Cloud Data Breach

ACT:Plot a course of action based on risk,

usage criticality

ANALYZE:Understand the context of app usage at

a deeper level

MEASURE:Discover the cloud apps running in your

enterprise

Page 25: The Razor's Edge: Enabling Cloud While Mitigating the Risk of a Cloud Data Breach

25

The real face of shadow IT is you and me.

Ultimately, this is simply unmanaged risk.

Page 26: The Razor's Edge: Enabling Cloud While Mitigating the Risk of a Cloud Data Breach

Allow is the new block (allow is new block green

light slide)

26

SM