Our website uses cookies

Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing Infosecurity Magazine, you agree to our use of cookies.

Okay, I understand Learn more

Is it Possible to Create a Culture of Secure Collaboration?

Watch Now

To watch this webinar you’ll need an Infosecurity Magazine account. Log in or sign up below.

Log In

Sign Up

Get up-to-the-minute news and opinions, plus access to a wide assortment of Information Security resources that will keep you current and informed.

This will be used to identify you if you take part in our online comments.
Your password should be at least six characters long. It is case sensitive. Passwords can only consist of alphanumeric characters or ~!@#$%^&*()_-+=?.

Infosecurity Magazine collects personal information when you register for our magazine and sponsored content. We will use this information to deliver the product or service for which you are registering.

We will also share your information with the declared sponsor of any webinar, whitepaper or virtual event for which you register and this sponsor is clearly indicated on each event page. You can opt out at any time in your user account.

For more information explaining how we use your information please see our privacy policy.

By registering you agree with our terms and conditions and privacy policy.

Defending against employee-based risks doesn’t always involve monitoring those with malicious intent. Oftentimes, in their desire to move information and ideas more quickly and efficiently, employees will step outside the restrictions established by corporate IT and organizational policies. In doing so, many employees open up their organizations to a host of data security risks by using cloud-based information sharing tools that lack the compliance and risk controls often required by highly regulated industries. 

A recent survey by ReRez of more than 3000 organizations found that 40% experienced exposure of confidential information via unsanctioned cloud storage and information transfer, a phenomenon it labeled as “rogue cloud” deployments. This point was illustrated by this past summer’s breach at Dropbox, where reused login credentials for some of its users were compromised because they were lifted by hackers from another website. This unintentional breach scenario resulted in the loss of corporate data stored on the site, and caused Dropbox to unveil new security features that, although a positive step,  were not mandatory for all users. 
 
The answer to this non-malicious insider threat is not the creation of a highly restrictive collaborative process, but rather to implement one that understands the drivers for easy collaboration and information sharing, while deploying a set of diverse tools that provide the appropriate risk and compliance controls.  In this scenario the user has the ability to continue to do the ad hoc file sharing that has produced productivity gains while still protecting corporate policies. 
 
This webinar will discuss:
 
  • The role of user education in preventing “rouge cloud” scenarios
  • How to provide safe and secure alternatives to information/file sharing – and encourage their adoption – rather than handing down restrictive policies on the use of cloud-based collaborative tools
  • How to properly balance risk vs productivity when sharing data with third parties, including co-workers, partners, and vendors

 

 

Speakers

Drew Amorosi

Drew Amorosi Deputy Editor, Infosecurity Magazine

Steve Durbin

Managing Director, Information Security Forum

    Brought to You by

    Should you register for this event your information will be shared with the sponsor indicated above. See our privacy policy for more information.