Keeping up with the constantly evolving cyber threatscape and plugging new security gaps is never-ending. We recently gathered several members of the Code42 security team for a panel discussion about how they manage threats and mitigate risks in today’s security environment. A recording of their conversation is now available on demand.
Below are a few highlights and sneak peeks from their conversation. You can check out the full panel discussion here.
Vendor risk management in the SaaS era
Maintaining visibility across a SaaS environment can be very challenging. One action our security team has taken to help address the situation is to put more focus on vendor risk management. Watch the short clip below to learn how they have defined a set of security controls for our vendor partners — and how the team holds vendors accountable to these standards.
Managing insider threats
Not all insider threats are malicious. People sometimes make mistakes and unexpected disruptions can put data at risk. In the next video clip, our security team talks about strategies to consider when implementing a comprehensive insider threat security plan that protects against both malicious and unintended threats.
Mitigating the risk of shadow IT with an application inventory
Gartner now predicts that by 2020, one-third of successful enterprise attacks will aim at unauthorized shadow IT applications. At Code42, we know that shadow IT is a big security risk. We also know it’s a risk that we’re not going to fully eliminate. Instead, our security team is focused on increasing our visibility to what applications — authorized or not — exist in our environment. In this next video clip, our panel shares how they search for instances of potentially compromised applications, so they can take quick and effective action.
How Code42 Forensic File Search fits in the security tech stack
With the wide range of security tools that already exist, where does Code42 Forensic File Search fit in a security stack? In the next video clip, our security team talks about how they use Code42 Forensic File Search in combination with other security tools and on its own to address unique use cases. The panel also talks about innovative ways that organizations can use Code42 Forensic File Search to fill existing security gaps, instantly expanding visibility and getting answers to questions like “Where is this file in our environment?”
This is just a sample of the insider knowledge shared during our panel discussion. Don’t miss your chance to hear the full conversation, on demand, right here: Code42 Security Panel: Choosing Tools to Fill Gaps in Your Security Stack
Code42 Security Panel: Choosing Tools to Fill Gaps in Your Security Stack