SlideShare a Scribd company logo
1 of 31
Download to read offline
Google confidential | Do not distribute
Be A Hero
Combat Cloud Security Threats with Google Apps
Unlimited and Cloudlock
Hayley Bakst
hayley.bakst@cloudlock.com
Global Alliances
Mahshad Haeri
Mahshad@google.com
Senior Solutions Engineer
Google confidential | Do not distribute
What to expect?
1. New security threats in the cloud
2. How Google Apps Unlimited + CloudLock can help save you
from these villians
a. Protect your users
b. Protect your sensitive data
c. Protection against malware
d. Gain visibility into user activities
2
Google confidential | Do not distribute
What’s so scary?
According to the latest IBM X-
Force Research report, the
average consolidated total cost of
a data breach is $3.8 million
3
Google confidential | Do not distribute
What Can Go Wrong?
● Accidental publication
● Configuration error
● Hacked systems
● Phishing
● Weak passwords
● Poor device
security
● Low Visibility
● Insider threat
Damage, Lawsuits
& Fines
Lost IP, Business &
Reputation
Privacy Violations
4
Google confidential | Do not distribute
Business (Public SaaS) People Custom Apps (PaaS & IaaS)
Legacy Security
Solutions
ON-PREMISECLOUD
CyberSecurity
Fabric
Messaging & Collaboration
Sales & marketing
HR & Skills
Finance
Sharepoint
Apps
App Server
Database
force.com
The Era of Full Cloud is upon us
5
Google confidential | Do not distribute
Changing IT models requires a new security paradigm
APPS DATA USERS
NETWORK
NEW MODEL:
People-Centric Security
IDENTITY CLOUD
DEVICE /
NETWORK
OLD MODEL:
Network-Based Security
ACCOUNTS
6
Google confidential | Do not distribute 7
World Class Data Centers
Global Private Network
Back End Security
Application Security
Google Apps Security
End User Security
Google confidential | Do not distribute
Cyber Report: The 1% Who Can Do Damage
8
Google confidential | Do not distribute
Gartner Report: Minding the SaaS Gaps
9
Google confidential | Do not distribute
Cloud Access Security Broker (CASB) with CloudLock
force.com
What Shadow
Apps are my users
using?
What do users do
in my Cloud Apps?
How do I identify
compromised
Accounts?
Are Shadow Apps
connected to
sanctioned Ones ?
Do I have sensitive
/Toxic /regulated
data in the cloud?
How do I encrypt/
Quarantine
sensitive data in
the cloud?
SaaS
force.com
PaaS and IaaS IDaaS
10
Google confidential | Do not distribute
How can we help?
APPSACCOUNTS
DATA
+
Data Breach
Data Security/Compliance (Cloud
DLP/Encryption)
Compromised Accounts
Threat Protection (UEBA)
Cloud Malware
Visibility (Apps Firewall)
Data Loss Prevention
DLP for email and Drive
User interaction audits and
information Discovery
Drive Audit logs, Vault
Fine-Grained Admin Controls
OU level Drive controls
11
Google confidential | Do not distribute
Users
We do love our users, but 95% of
security attacks involve human
error
12
Google confidential | Do not distribute
Is phishing effective?*
3%
The most obvious
phishing webpages
Trick users
3%
of the time
13%
Average
phishing webpages
Trick users
13%
of the time
Trick users
45%
of the time
Hijackers
move fast
20%
20% of accounts
are accessed within
30 minutes
of being phished
* Google study of manual hackers
The most
believable phishing
webpages
45%
13
Google confidential | Do not distribute
Two factor authentication (Security key management)
14
Google confidential | Do not distribute
Visibility into user interactions (Drive Audit Logs)
15
Google confidential | Do not distribute
Making Sense of your Global Cloud Activities
16
Google confidential | Do not distribute
Example of why you need User Behavior Entity Analytics
North America
9:00 AM ET
▪ Login to:
Africa
10:00 AM ET
▪ Data export
from:
● Distance from the US to the Central African Republic: 7,362 miles
● At a speed of 800 mph, it would take 9.2 hours to travel between
them
17
Google confidential | Do not distribute
eDiscovery and Archive (Vault)
● Quick and easy legal discovery (email, Drive content)
● Preserve company data (email and Documents retention policies and holds)
● Export and Share results
18
Google confidential | Do not distribute
Security at Application level
Google confidential | Do not distribute
3rd Party Applications
20
Google confidential | Do not distribute 21
3rd Party Application CARI score and classification
Google confidential | Do not distribute
Fine tuned admin controls: Drive Data Access at Org level
22
Google confidential | Do not distribute
CloudLock is embedded within the
UI of a SWG
Extensibility: Shadow IT Discovery Integration
23
Google confidential | Do not distribute
Data Leak Prevention
Google confidential | Do not distribute
Create trusted relationships between domains
25
Google confidential | Do not distribute
Fine tuned admin controls: Managing Sharing by OU
26
Google confidential | Do not distribute
Advanced Data Loss Prevention
● Predefined content detectors (Internationalized)
● Optical Character Recognition (OCR)
● Content thresholds settings (control # of false positives)
27
^4[0-9]{12}(?:[0-9]{3})?$
Google confidential | Do not distribute
CloudLock Encryption Management for Google
File and Folder-Level Encryption
Protect your most sensitive content within Google Drive from unauthorized access
User and Policy-Driven
Enterprise-Owned Keys
On-Premises or In Cloud
Preserve real-time co-authoring
28
Google confidential | Do not distribute
Where to get your cloud security superpowers?
APPS
ACCOUNTS
DATA
+
Protect your Company Data from
being lost, stolen, and exposed
Protect against Cloud
malware, phishing attacks,
and other breaches
Protect your corporate
accounts and safeguard
your users
29
Google confidential | Do not distribute
1. Contact your Google account manager
2. Contact Hayley.Bakst@cloudlock.com to learn more about
Cloudlock:
What now?
First 5 Attendees to contact Hayley will
get a CloudLock Cyber Security
Assessments for FREE !!!!!
30
Google confidential | Do not distribute
Thank You
Questions?
31

More Related Content

What's hot

Microsoft Office 365 Security and Compliance
Microsoft Office 365 Security and ComplianceMicrosoft Office 365 Security and Compliance
Microsoft Office 365 Security and ComplianceDavid J Rosenthal
 
Mitigating the Top 5 Cloud Security Threats
Mitigating the Top 5 Cloud Security ThreatsMitigating the Top 5 Cloud Security Threats
Mitigating the Top 5 Cloud Security ThreatsBitglass
 
How to get deeper administration insights into your tenant
How to get deeper administration insights into your tenantHow to get deeper administration insights into your tenant
How to get deeper administration insights into your tenantRobert Crane
 
Thr30117 - Securely logging to Microsoft 365
Thr30117 - Securely logging to Microsoft 365Thr30117 - Securely logging to Microsoft 365
Thr30117 - Securely logging to Microsoft 365Robert Crane
 
2020-03-05 Secure IT day 2020 Abalon - comment protéger votre environnement ...
2020-03-05 Secure IT day 2020  Abalon - comment protéger votre environnement ...2020-03-05 Secure IT day 2020  Abalon - comment protéger votre environnement ...
2020-03-05 Secure IT day 2020 Abalon - comment protéger votre environnement ...Patrick Guimonet
 
Webinar bitglass - complete deck-2
Webinar   bitglass - complete deck-2Webinar   bitglass - complete deck-2
Webinar bitglass - complete deck-2Bitglass
 
Microsoft Cloud App Security CASB
Microsoft Cloud App Security CASBMicrosoft Cloud App Security CASB
Microsoft Cloud App Security CASBAmmar Hasayen
 
Introducing IBM Cloud Security Enforcer, CASB, IDaaS and Threat Prevention
Introducing IBM Cloud Security Enforcer, CASB, IDaaS and Threat PreventionIntroducing IBM Cloud Security Enforcer, CASB, IDaaS and Threat Prevention
Introducing IBM Cloud Security Enforcer, CASB, IDaaS and Threat PreventionIBM Security
 
Crossing the Chasm from On-prem to Cloud: Managing Identities in a Hybrid World
Crossing the Chasm from On-prem to Cloud: Managing Identities in a Hybrid WorldCrossing the Chasm from On-prem to Cloud: Managing Identities in a Hybrid World
Crossing the Chasm from On-prem to Cloud: Managing Identities in a Hybrid WorldOneLogin
 
Defcon 27 - Phishing in the Cloud Era
Defcon 27 - Phishing in the Cloud EraDefcon 27 - Phishing in the Cloud Era
Defcon 27 - Phishing in the Cloud EraNetskope
 
Forcepoint Advanced Malware Detection
Forcepoint Advanced Malware DetectionForcepoint Advanced Malware Detection
Forcepoint Advanced Malware DetectionForcepoint LLC
 
MCAS High Level Architecture May 2021
MCAS High Level Architecture May 2021MCAS High Level Architecture May 2021
MCAS High Level Architecture May 2021Matt Soseman
 
CASB: Securing your cloud applications
CASB: Securing your cloud applicationsCASB: Securing your cloud applications
CASB: Securing your cloud applicationsForcepoint LLC
 
20180120 spsbre - we are moving to the cloud what about security
20180120   spsbre - we are moving to the cloud what about security20180120   spsbre - we are moving to the cloud what about security
20180120 spsbre - we are moving to the cloud what about securityArjan Cornelissen
 
Identity and Data protection with Enterprise Mobility Security in ottica GDPR
Identity and Data protection with Enterprise Mobility Security in ottica GDPRIdentity and Data protection with Enterprise Mobility Security in ottica GDPR
Identity and Data protection with Enterprise Mobility Security in ottica GDPRJürgen Ambrosi
 
Webinar - Bitglass and CyberEdge - Hidden Security Threats
Webinar - Bitglass and CyberEdge - Hidden Security ThreatsWebinar - Bitglass and CyberEdge - Hidden Security Threats
Webinar - Bitglass and CyberEdge - Hidden Security ThreatsBitglass
 
Microsoft EMS Enterprise Mobility and Security Architecture Poster
Microsoft EMS Enterprise Mobility and Security Architecture PosterMicrosoft EMS Enterprise Mobility and Security Architecture Poster
Microsoft EMS Enterprise Mobility and Security Architecture PosterAmmar Hasayen
 
Ciso Platform Webcast: Shadow Data Exposed
Ciso Platform Webcast: Shadow Data ExposedCiso Platform Webcast: Shadow Data Exposed
Ciso Platform Webcast: Shadow Data ExposedElastica Inc.
 

What's hot (20)

Microsoft Office 365 Security and Compliance
Microsoft Office 365 Security and ComplianceMicrosoft Office 365 Security and Compliance
Microsoft Office 365 Security and Compliance
 
Mitigating the Top 5 Cloud Security Threats
Mitigating the Top 5 Cloud Security ThreatsMitigating the Top 5 Cloud Security Threats
Mitigating the Top 5 Cloud Security Threats
 
How to get deeper administration insights into your tenant
How to get deeper administration insights into your tenantHow to get deeper administration insights into your tenant
How to get deeper administration insights into your tenant
 
Thr30117 - Securely logging to Microsoft 365
Thr30117 - Securely logging to Microsoft 365Thr30117 - Securely logging to Microsoft 365
Thr30117 - Securely logging to Microsoft 365
 
2020-03-05 Secure IT day 2020 Abalon - comment protéger votre environnement ...
2020-03-05 Secure IT day 2020  Abalon - comment protéger votre environnement ...2020-03-05 Secure IT day 2020  Abalon - comment protéger votre environnement ...
2020-03-05 Secure IT day 2020 Abalon - comment protéger votre environnement ...
 
Webinar bitglass - complete deck-2
Webinar   bitglass - complete deck-2Webinar   bitglass - complete deck-2
Webinar bitglass - complete deck-2
 
Microsoft Cloud App Security CASB
Microsoft Cloud App Security CASBMicrosoft Cloud App Security CASB
Microsoft Cloud App Security CASB
 
Introducing IBM Cloud Security Enforcer, CASB, IDaaS and Threat Prevention
Introducing IBM Cloud Security Enforcer, CASB, IDaaS and Threat PreventionIntroducing IBM Cloud Security Enforcer, CASB, IDaaS and Threat Prevention
Introducing IBM Cloud Security Enforcer, CASB, IDaaS and Threat Prevention
 
Crossing the Chasm from On-prem to Cloud: Managing Identities in a Hybrid World
Crossing the Chasm from On-prem to Cloud: Managing Identities in a Hybrid WorldCrossing the Chasm from On-prem to Cloud: Managing Identities in a Hybrid World
Crossing the Chasm from On-prem to Cloud: Managing Identities in a Hybrid World
 
Defcon 27 - Phishing in the Cloud Era
Defcon 27 - Phishing in the Cloud EraDefcon 27 - Phishing in the Cloud Era
Defcon 27 - Phishing in the Cloud Era
 
Forcepoint Advanced Malware Detection
Forcepoint Advanced Malware DetectionForcepoint Advanced Malware Detection
Forcepoint Advanced Malware Detection
 
MCAS High Level Architecture May 2021
MCAS High Level Architecture May 2021MCAS High Level Architecture May 2021
MCAS High Level Architecture May 2021
 
CASB: Securing your cloud applications
CASB: Securing your cloud applicationsCASB: Securing your cloud applications
CASB: Securing your cloud applications
 
CASB — Your new best friend for safe cloud adoption?
CASB — Your new best friend for safe cloud adoption? CASB — Your new best friend for safe cloud adoption?
CASB — Your new best friend for safe cloud adoption?
 
20180120 spsbre - we are moving to the cloud what about security
20180120   spsbre - we are moving to the cloud what about security20180120   spsbre - we are moving to the cloud what about security
20180120 spsbre - we are moving to the cloud what about security
 
Identity and Data protection with Enterprise Mobility Security in ottica GDPR
Identity and Data protection with Enterprise Mobility Security in ottica GDPRIdentity and Data protection with Enterprise Mobility Security in ottica GDPR
Identity and Data protection with Enterprise Mobility Security in ottica GDPR
 
Webinar - Bitglass and CyberEdge - Hidden Security Threats
Webinar - Bitglass and CyberEdge - Hidden Security ThreatsWebinar - Bitglass and CyberEdge - Hidden Security Threats
Webinar - Bitglass and CyberEdge - Hidden Security Threats
 
Microsoft EMS Enterprise Mobility and Security Architecture Poster
Microsoft EMS Enterprise Mobility and Security Architecture PosterMicrosoft EMS Enterprise Mobility and Security Architecture Poster
Microsoft EMS Enterprise Mobility and Security Architecture Poster
 
Ciso Platform Webcast: Shadow Data Exposed
Ciso Platform Webcast: Shadow Data ExposedCiso Platform Webcast: Shadow Data Exposed
Ciso Platform Webcast: Shadow Data Exposed
 
Cloud App Security
Cloud App SecurityCloud App Security
Cloud App Security
 

Viewers also liked

Protecting your Data in Google Apps
Protecting your Data in Google AppsProtecting your Data in Google Apps
Protecting your Data in Google AppsElastica Inc.
 
Google Cloud Platform: Prototype ->Production-> Planet scale
Google Cloud Platform: Prototype ->Production-> Planet scaleGoogle Cloud Platform: Prototype ->Production-> Planet scale
Google Cloud Platform: Prototype ->Production-> Planet scaleIdan Tohami
 
Introduction to Google Cloud Platform Technologies
Introduction to Google Cloud Platform TechnologiesIntroduction to Google Cloud Platform Technologies
Introduction to Google Cloud Platform TechnologiesChris Schalk
 
Google Cloud Technologies Overview
Google Cloud Technologies OverviewGoogle Cloud Technologies Overview
Google Cloud Technologies OverviewChris Schalk
 
Google Cloud Platform Empowers TensorFlow and Machine Learning
Google Cloud Platform Empowers TensorFlow and Machine LearningGoogle Cloud Platform Empowers TensorFlow and Machine Learning
Google Cloud Platform Empowers TensorFlow and Machine LearningDataWorks Summit/Hadoop Summit
 
Understanding cloud with Google Cloud Platform
Understanding cloud with Google Cloud PlatformUnderstanding cloud with Google Cloud Platform
Understanding cloud with Google Cloud PlatformDr. Ketan Parmar
 
A Tour of Google Cloud Platform
A Tour of Google Cloud PlatformA Tour of Google Cloud Platform
A Tour of Google Cloud PlatformColin Su
 

Viewers also liked (8)

Protecting your Data in Google Apps
Protecting your Data in Google AppsProtecting your Data in Google Apps
Protecting your Data in Google Apps
 
Google Cloud Platform: Prototype ->Production-> Planet scale
Google Cloud Platform: Prototype ->Production-> Planet scaleGoogle Cloud Platform: Prototype ->Production-> Planet scale
Google Cloud Platform: Prototype ->Production-> Planet scale
 
Introduction to Google Cloud Platform Technologies
Introduction to Google Cloud Platform TechnologiesIntroduction to Google Cloud Platform Technologies
Introduction to Google Cloud Platform Technologies
 
Google Cloud Technologies Overview
Google Cloud Technologies OverviewGoogle Cloud Technologies Overview
Google Cloud Technologies Overview
 
Google Cloud Platform Empowers TensorFlow and Machine Learning
Google Cloud Platform Empowers TensorFlow and Machine LearningGoogle Cloud Platform Empowers TensorFlow and Machine Learning
Google Cloud Platform Empowers TensorFlow and Machine Learning
 
Google Cloud Platform
Google Cloud Platform Google Cloud Platform
Google Cloud Platform
 
Understanding cloud with Google Cloud Platform
Understanding cloud with Google Cloud PlatformUnderstanding cloud with Google Cloud Platform
Understanding cloud with Google Cloud Platform
 
A Tour of Google Cloud Platform
A Tour of Google Cloud PlatformA Tour of Google Cloud Platform
A Tour of Google Cloud Platform
 

Similar to Be A Hero: Combat Cloud Security Threats with Google Apps Unlimited & CloudLock

Empowering the Cloud Through G Suite
Empowering the Cloud Through G SuiteEmpowering the Cloud Through G Suite
Empowering the Cloud Through G SuiteBitglass
 
Top Threats Facing Organizations Cloud / SaaS Data
Top Threats Facing Organizations Cloud / SaaS DataTop Threats Facing Organizations Cloud / SaaS Data
Top Threats Facing Organizations Cloud / SaaS DataSysCloud
 
Cloud Application Security Best Practices To follow.pdf
Cloud Application Security Best Practices To follow.pdfCloud Application Security Best Practices To follow.pdf
Cloud Application Security Best Practices To follow.pdfTechugo
 
Power Saturday 2019 E1 - Office 365 security
Power Saturday 2019 E1 - Office 365 securityPower Saturday 2019 E1 - Office 365 security
Power Saturday 2019 E1 - Office 365 securityPowerSaturdayParis
 
Ordering the Chaos: Combatting Teams and SharePoint Content Sprawl
Ordering the Chaos: Combatting Teams and SharePoint Content SprawlOrdering the Chaos: Combatting Teams and SharePoint Content Sprawl
Ordering the Chaos: Combatting Teams and SharePoint Content SprawlChristian Buckley
 
Cloud Application Security Best Practices To follow.pdf
Cloud Application Security Best Practices To follow.pdfCloud Application Security Best Practices To follow.pdf
Cloud Application Security Best Practices To follow.pdfTechugo
 
Bitglass Webinar - 5 Cloud Security Best Practices for 2018
Bitglass Webinar - 5 Cloud Security Best Practices for 2018Bitglass Webinar - 5 Cloud Security Best Practices for 2018
Bitglass Webinar - 5 Cloud Security Best Practices for 2018Bitglass
 
How to Extend Security and Compliance Within Box
How to Extend Security and Compliance Within BoxHow to Extend Security and Compliance Within Box
How to Extend Security and Compliance Within BoxElastica Inc.
 
Reduciendo riesgos a través de controles de acceso, manejo de privilegios y a...
Reduciendo riesgos a través de controles de acceso, manejo de privilegios y a...Reduciendo riesgos a través de controles de acceso, manejo de privilegios y a...
Reduciendo riesgos a través de controles de acceso, manejo de privilegios y a...Bruno Caseiro
 
Redefining Security in the Cloud
Redefining Security in the CloudRedefining Security in the Cloud
Redefining Security in the CloudMike Spaulding
 
The 15 best cloud security practices
The 15 best cloud security practices The 15 best cloud security practices
The 15 best cloud security practices Cloudride LTD
 
Google Case Study: Becoming Unphisable: Towards Simpler, Stronger Authenticat...
Google Case Study: Becoming Unphisable: Towards Simpler, Stronger Authenticat...Google Case Study: Becoming Unphisable: Towards Simpler, Stronger Authenticat...
Google Case Study: Becoming Unphisable: Towards Simpler, Stronger Authenticat...FIDO Alliance
 
Cloud Types and Security- Which one is right for you?
Cloud Types and Security- Which one is right for you?Cloud Types and Security- Which one is right for you?
Cloud Types and Security- Which one is right for you?Fuji Xerox Asia Pacific
 
Data Governance Trends and Best Practices To Implement Today
Data Governance Trends and Best Practices To Implement TodayData Governance Trends and Best Practices To Implement Today
Data Governance Trends and Best Practices To Implement TodayDATAVERSITY
 
Teknisen tietoturvan minimivaatimukset
Teknisen tietoturvan minimivaatimuksetTeknisen tietoturvan minimivaatimukset
Teknisen tietoturvan minimivaatimuksetTeemu Tiainen
 
Security and Audit for Big Data
Security and Audit for Big DataSecurity and Audit for Big Data
Security and Audit for Big DataNicolas Morales
 
google-apps-security-and-compliance-whitepaper (1)
google-apps-security-and-compliance-whitepaper (1)google-apps-security-and-compliance-whitepaper (1)
google-apps-security-and-compliance-whitepaper (1)Mohit Sharma
 
CASBs and Office 365 (with Argyle)
CASBs and Office 365 (with Argyle)CASBs and Office 365 (with Argyle)
CASBs and Office 365 (with Argyle)Bitglass
 
All You Need to Know About 5 Biggest Cloud Security Risks and How One Can Avo...
All You Need to Know About 5 Biggest Cloud Security Risks and How One Can Avo...All You Need to Know About 5 Biggest Cloud Security Risks and How One Can Avo...
All You Need to Know About 5 Biggest Cloud Security Risks and How One Can Avo...Skyline IT Management
 

Similar to Be A Hero: Combat Cloud Security Threats with Google Apps Unlimited & CloudLock (20)

Empowering the Cloud Through G Suite
Empowering the Cloud Through G SuiteEmpowering the Cloud Through G Suite
Empowering the Cloud Through G Suite
 
Top Threats Facing Organizations Cloud / SaaS Data
Top Threats Facing Organizations Cloud / SaaS DataTop Threats Facing Organizations Cloud / SaaS Data
Top Threats Facing Organizations Cloud / SaaS Data
 
Cloud Application Security Best Practices To follow.pdf
Cloud Application Security Best Practices To follow.pdfCloud Application Security Best Practices To follow.pdf
Cloud Application Security Best Practices To follow.pdf
 
Power Saturday 2019 E1 - Office 365 security
Power Saturday 2019 E1 - Office 365 securityPower Saturday 2019 E1 - Office 365 security
Power Saturday 2019 E1 - Office 365 security
 
Ordering the Chaos: Combatting Teams and SharePoint Content Sprawl
Ordering the Chaos: Combatting Teams and SharePoint Content SprawlOrdering the Chaos: Combatting Teams and SharePoint Content Sprawl
Ordering the Chaos: Combatting Teams and SharePoint Content Sprawl
 
Cloud Application Security Best Practices To follow.pdf
Cloud Application Security Best Practices To follow.pdfCloud Application Security Best Practices To follow.pdf
Cloud Application Security Best Practices To follow.pdf
 
Bitglass Webinar - 5 Cloud Security Best Practices for 2018
Bitglass Webinar - 5 Cloud Security Best Practices for 2018Bitglass Webinar - 5 Cloud Security Best Practices for 2018
Bitglass Webinar - 5 Cloud Security Best Practices for 2018
 
How to Extend Security and Compliance Within Box
How to Extend Security and Compliance Within BoxHow to Extend Security and Compliance Within Box
How to Extend Security and Compliance Within Box
 
Reduciendo riesgos a través de controles de acceso, manejo de privilegios y a...
Reduciendo riesgos a través de controles de acceso, manejo de privilegios y a...Reduciendo riesgos a través de controles de acceso, manejo de privilegios y a...
Reduciendo riesgos a través de controles de acceso, manejo de privilegios y a...
 
Practical Security for the Cloud
Practical Security for the CloudPractical Security for the Cloud
Practical Security for the Cloud
 
Redefining Security in the Cloud
Redefining Security in the CloudRedefining Security in the Cloud
Redefining Security in the Cloud
 
The 15 best cloud security practices
The 15 best cloud security practices The 15 best cloud security practices
The 15 best cloud security practices
 
Google Case Study: Becoming Unphisable: Towards Simpler, Stronger Authenticat...
Google Case Study: Becoming Unphisable: Towards Simpler, Stronger Authenticat...Google Case Study: Becoming Unphisable: Towards Simpler, Stronger Authenticat...
Google Case Study: Becoming Unphisable: Towards Simpler, Stronger Authenticat...
 
Cloud Types and Security- Which one is right for you?
Cloud Types and Security- Which one is right for you?Cloud Types and Security- Which one is right for you?
Cloud Types and Security- Which one is right for you?
 
Data Governance Trends and Best Practices To Implement Today
Data Governance Trends and Best Practices To Implement TodayData Governance Trends and Best Practices To Implement Today
Data Governance Trends and Best Practices To Implement Today
 
Teknisen tietoturvan minimivaatimukset
Teknisen tietoturvan minimivaatimuksetTeknisen tietoturvan minimivaatimukset
Teknisen tietoturvan minimivaatimukset
 
Security and Audit for Big Data
Security and Audit for Big DataSecurity and Audit for Big Data
Security and Audit for Big Data
 
google-apps-security-and-compliance-whitepaper (1)
google-apps-security-and-compliance-whitepaper (1)google-apps-security-and-compliance-whitepaper (1)
google-apps-security-and-compliance-whitepaper (1)
 
CASBs and Office 365 (with Argyle)
CASBs and Office 365 (with Argyle)CASBs and Office 365 (with Argyle)
CASBs and Office 365 (with Argyle)
 
All You Need to Know About 5 Biggest Cloud Security Risks and How One Can Avo...
All You Need to Know About 5 Biggest Cloud Security Risks and How One Can Avo...All You Need to Know About 5 Biggest Cloud Security Risks and How One Can Avo...
All You Need to Know About 5 Biggest Cloud Security Risks and How One Can Avo...
 

Recently uploaded

Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Mattias Andersson
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfAlex Barbosa Coqueiro
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLScyllaDB
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsPixlogix Infotech
 
Search Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdfSearch Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdfRankYa
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Mark Simos
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Commit University
 
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc
 
TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024Lonnie McRorey
 
Artificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxArtificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxhariprasad279825
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationSlibray Presentation
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity PlanDatabarracks
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
Story boards and shot lists for my a level piece
Story boards and shot lists for my a level pieceStory boards and shot lists for my a level piece
Story boards and shot lists for my a level piececharlottematthew16
 
What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024Stephanie Beckett
 
DSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningDSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningLars Bell
 
Powerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time ClashPowerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time Clashcharlottematthew16
 

Recently uploaded (20)

Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdf
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQL
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and Cons
 
Search Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdfSearch Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdf
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!
 
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
 
DMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special EditionDMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special Edition
 
TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024
 
Artificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxArtificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptx
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck Presentation
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity Plan
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
Story boards and shot lists for my a level piece
Story boards and shot lists for my a level pieceStory boards and shot lists for my a level piece
Story boards and shot lists for my a level piece
 
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptxE-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
 
What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024
 
DSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningDSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine Tuning
 
Powerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time ClashPowerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time Clash
 

Be A Hero: Combat Cloud Security Threats with Google Apps Unlimited & CloudLock

  • 1. Google confidential | Do not distribute Be A Hero Combat Cloud Security Threats with Google Apps Unlimited and Cloudlock Hayley Bakst hayley.bakst@cloudlock.com Global Alliances Mahshad Haeri Mahshad@google.com Senior Solutions Engineer
  • 2. Google confidential | Do not distribute What to expect? 1. New security threats in the cloud 2. How Google Apps Unlimited + CloudLock can help save you from these villians a. Protect your users b. Protect your sensitive data c. Protection against malware d. Gain visibility into user activities 2
  • 3. Google confidential | Do not distribute What’s so scary? According to the latest IBM X- Force Research report, the average consolidated total cost of a data breach is $3.8 million 3
  • 4. Google confidential | Do not distribute What Can Go Wrong? ● Accidental publication ● Configuration error ● Hacked systems ● Phishing ● Weak passwords ● Poor device security ● Low Visibility ● Insider threat Damage, Lawsuits & Fines Lost IP, Business & Reputation Privacy Violations 4
  • 5. Google confidential | Do not distribute Business (Public SaaS) People Custom Apps (PaaS & IaaS) Legacy Security Solutions ON-PREMISECLOUD CyberSecurity Fabric Messaging & Collaboration Sales & marketing HR & Skills Finance Sharepoint Apps App Server Database force.com The Era of Full Cloud is upon us 5
  • 6. Google confidential | Do not distribute Changing IT models requires a new security paradigm APPS DATA USERS NETWORK NEW MODEL: People-Centric Security IDENTITY CLOUD DEVICE / NETWORK OLD MODEL: Network-Based Security ACCOUNTS 6
  • 7. Google confidential | Do not distribute 7 World Class Data Centers Global Private Network Back End Security Application Security Google Apps Security End User Security
  • 8. Google confidential | Do not distribute Cyber Report: The 1% Who Can Do Damage 8
  • 9. Google confidential | Do not distribute Gartner Report: Minding the SaaS Gaps 9
  • 10. Google confidential | Do not distribute Cloud Access Security Broker (CASB) with CloudLock force.com What Shadow Apps are my users using? What do users do in my Cloud Apps? How do I identify compromised Accounts? Are Shadow Apps connected to sanctioned Ones ? Do I have sensitive /Toxic /regulated data in the cloud? How do I encrypt/ Quarantine sensitive data in the cloud? SaaS force.com PaaS and IaaS IDaaS 10
  • 11. Google confidential | Do not distribute How can we help? APPSACCOUNTS DATA + Data Breach Data Security/Compliance (Cloud DLP/Encryption) Compromised Accounts Threat Protection (UEBA) Cloud Malware Visibility (Apps Firewall) Data Loss Prevention DLP for email and Drive User interaction audits and information Discovery Drive Audit logs, Vault Fine-Grained Admin Controls OU level Drive controls 11
  • 12. Google confidential | Do not distribute Users We do love our users, but 95% of security attacks involve human error 12
  • 13. Google confidential | Do not distribute Is phishing effective?* 3% The most obvious phishing webpages Trick users 3% of the time 13% Average phishing webpages Trick users 13% of the time Trick users 45% of the time Hijackers move fast 20% 20% of accounts are accessed within 30 minutes of being phished * Google study of manual hackers The most believable phishing webpages 45% 13
  • 14. Google confidential | Do not distribute Two factor authentication (Security key management) 14
  • 15. Google confidential | Do not distribute Visibility into user interactions (Drive Audit Logs) 15
  • 16. Google confidential | Do not distribute Making Sense of your Global Cloud Activities 16
  • 17. Google confidential | Do not distribute Example of why you need User Behavior Entity Analytics North America 9:00 AM ET ▪ Login to: Africa 10:00 AM ET ▪ Data export from: ● Distance from the US to the Central African Republic: 7,362 miles ● At a speed of 800 mph, it would take 9.2 hours to travel between them 17
  • 18. Google confidential | Do not distribute eDiscovery and Archive (Vault) ● Quick and easy legal discovery (email, Drive content) ● Preserve company data (email and Documents retention policies and holds) ● Export and Share results 18
  • 19. Google confidential | Do not distribute Security at Application level
  • 20. Google confidential | Do not distribute 3rd Party Applications 20
  • 21. Google confidential | Do not distribute 21 3rd Party Application CARI score and classification
  • 22. Google confidential | Do not distribute Fine tuned admin controls: Drive Data Access at Org level 22
  • 23. Google confidential | Do not distribute CloudLock is embedded within the UI of a SWG Extensibility: Shadow IT Discovery Integration 23
  • 24. Google confidential | Do not distribute Data Leak Prevention
  • 25. Google confidential | Do not distribute Create trusted relationships between domains 25
  • 26. Google confidential | Do not distribute Fine tuned admin controls: Managing Sharing by OU 26
  • 27. Google confidential | Do not distribute Advanced Data Loss Prevention ● Predefined content detectors (Internationalized) ● Optical Character Recognition (OCR) ● Content thresholds settings (control # of false positives) 27 ^4[0-9]{12}(?:[0-9]{3})?$
  • 28. Google confidential | Do not distribute CloudLock Encryption Management for Google File and Folder-Level Encryption Protect your most sensitive content within Google Drive from unauthorized access User and Policy-Driven Enterprise-Owned Keys On-Premises or In Cloud Preserve real-time co-authoring 28
  • 29. Google confidential | Do not distribute Where to get your cloud security superpowers? APPS ACCOUNTS DATA + Protect your Company Data from being lost, stolen, and exposed Protect against Cloud malware, phishing attacks, and other breaches Protect your corporate accounts and safeguard your users 29
  • 30. Google confidential | Do not distribute 1. Contact your Google account manager 2. Contact Hayley.Bakst@cloudlock.com to learn more about Cloudlock: What now? First 5 Attendees to contact Hayley will get a CloudLock Cyber Security Assessments for FREE !!!!! 30
  • 31. Google confidential | Do not distribute Thank You Questions? 31