Is it Possible to Create a Culture of Secure Collaboration?

Watch Now

To watch this webinar you’ll need an Infosecurity Magazine account. Log in or sign up below.

Log in
Sign up

Get up-to-the-minute news and opinions, plus access to a wide assortment of Information Security resources that will keep you current and informed.

This will be used to identify you if you take part in our online comments.

Your password should:

  • be at least eight characters long
  • be no more than 25 characters long
  • contain at least one uppercase, lowercase and special character
  • contain at least one digit
  • only contain alphanumeric characters or ~!@#$%^&*()_-+=?.

For more information explaining how we use your information please see our privacy policy.

By registering you agree with our terms and conditions.

Defending against employee-based risks doesn’t always involve monitoring those with malicious intent. Oftentimes, in their desire to move information and ideas more quickly and efficiently, employees will step outside the restrictions established by corporate IT and organizational policies. In doing so, many employees open up their organizations to a host of data security risks by using cloud-based information sharing tools that lack the compliance and risk controls often required by highly regulated industries. 

A recent survey by ReRez of more than 3000 organizations found that 40% experienced exposure of confidential information via unsanctioned cloud storage and information transfer, a phenomenon it labeled as “rogue cloud” deployments. This point was illustrated by this past summer’s breach at Dropbox, where reused login credentials for some of its users were compromised because they were lifted by hackers from another website. This unintentional breach scenario resulted in the loss of corporate data stored on the site, and caused Dropbox to unveil new security features that, although a positive step,  were not mandatory for all users. 
The answer to this non-malicious insider threat is not the creation of a highly restrictive collaborative process, but rather to implement one that understands the drivers for easy collaboration and information sharing, while deploying a set of diverse tools that provide the appropriate risk and compliance controls.  In this scenario the user has the ability to continue to do the ad hoc file sharing that has produced productivity gains while still protecting corporate policies. 
This webinar will discuss:
  • The role of user education in preventing “rouge cloud” scenarios
  • How to provide safe and secure alternatives to information/file sharing – and encourage their adoption – rather than handing down restrictive policies on the use of cloud-based collaborative tools
  • How to properly balance risk vs productivity when sharing data with third parties, including co-workers, partners, and vendors




Photo of Drew Amorosi

Drew Amorosi

Deputy Editor, Infosecurity Magazine

Photo of Steve Durbin

Steve Durbin

CEO, Information Security Forum

Should you watch this webinar your information may be shared with the sponsors indicated above. Please see Infosecurity Magazine’s privacy policy for more information.