The Cost of Cloud Compromise and Shadow IT
With the increased use of SaaS applications, cloud account takeover and Shadow IT present an increasing security risk to organizations. As the network perimeter is replaced by a user-defined security perimeter, it becomes critical to evaluate access controls, threat detection and data security in the cloud. So how can you better protect your company?
Join us for this special webinar with experts from Proofpoint and Ponemon Institute. They will discuss the findings of the newly conducted research among IT and security professionals to determine the risk and cost of cloud account takeovers and Shadow IT. In this session, we’ll cover:
- The state of cloud usage in organizations
- Security risks and practices to secure the cloud
- Cloud compromises and the end user risk
- The cost of compromised cloud accounts
Speakers: Larry Ponemon, Ponemon Institute and Itir Clarke, Proofpoint