Cloud Cybersecurity in Under 5 Minutes

Video Statistics and Information

Video
Captions Word Cloud
Reddit Comments
Captions
welcome my name is bare I'm the VP of Marketing clack thank you for joining us for a whiteboard session today's topic is cloud cybersecurity so what we want to cover today is fundamentally what are the core threats that we see in the cloud and what are the technologies that you can deploy in your organization to better protect yourself from these potential threats in the cloud when we talk to sizzles they are fundamentally worried about three core things one is the identity of their users how are they accessing applications who are they and are we giving them the right access to enter the organization the second piece is what devices those users are using to access your corporate environment your data and your applications now we could do an entire whiteboard based on those two topics but for today we want to focus on the third block specifically the cloud itself number one the first and most important use case are compromised accounts so if you are able to basically pretend or gain access to the username and passwords of a corporate employee you can you can be that person and you can basically without that person's permission you can act as if you were that person so that's the number one concern here be the technology that's being used to help prevent these compromised accounts is what we would call Yui ba and Yui be a stands for users and entity behavior analytics and what does that mean so Yui ba basically means that you're able to understand the behavioral patterns of your users you can detect anonymizing behavior an example would be if you have a sales user accessing his or her Salesforce application and you're seeing a massive amount of export downloads which would be an indication for potentially malicious behavior or you're seeing a user with the same credentials accessing an account from Israel from the US and from China on at the same time which would also be indicated for whole potential account compromises so you want to be able to detect that the second foot area is what we call cloud native so this is a new era of malware this is not a traditional antivirus kind of malware these are applications that are granted access through OAuth tokens to programmatic interfaces in your applications so an example would be granting access to an application through a Google credentials and allowing a person to allow an application to have access to your Google information which could be malicious you could have malware apps that pretend to be a different application when granted access now all of a sudden have a path directly to your hope information the technology that we that is being used to solve that is apps firewall and you want to really look at having visibility and discover those applications that are kind of off network that are in a cloud to cloud network based that are not your traditional applications and that you want to really be concerned about and the third piece is obviously you want to look at data breaches and data prevention the technology we use here are what we call cloud DLP and the error here is every organization has certain data that they're concerned about combination of either your personal identifiable information PII in combination with payment credit card information PCI in combination with your intellectual property really forms the basis for toxic data and you want to make sure that you have visibility into one data breaches but you also want to have visibility into potential oversharing in your organization either with people inside the organization or with people outside the organization so that's a quick synopsis of top three threats in the cloud the top three use cases and three technologies you can use to better protect the organization hopefully that was insightful for you today and we look forward to having you join us soon again if you want to learn more please feel free to join us on our website at wwlp.com
Info
Channel: CloudLock
Views: 47,190
Rating: undefined out of 5
Keywords: cloud cybersecurity, account compromise, ueba, cloud-native malware, apps firewall, data breaches, cloud dlp
Id: k2684fuzHLs
Channel Id: undefined
Length: 4min 17sec (257 seconds)
Published: Wed Mar 30 2016
Related Videos
Note
Please note that this website is currently a work in progress! Lots of interesting data and statistics to come.