SlideShare a Scribd company logo
June 2019
Adapting to the New Reality of 
Evolving Cloud Threats
Cloud Security Threat Report (CSTR)
Copyright © 2019 Symantec Corporation SYMANTEC CONFIDENTIAL – LIMITED USECSTR | CLOUD SECURITY THREAT REPORT | Volume 1 | June 2019
Key Insights 
Cloud becoming the business backbone: 
53% of all compute workload are in the cloud
Visibility is a challenge:
93% struggle to keep tabs on cloud workloads 
Loss of control:
93% report oversharing sensitive data
Data for sale on dark web:
68% have evidence their data has been for sale
Security can’t keep up:
54% say cloud security maturity can’t keep up
Copyright © 2019 Symantec Corporation SYMANTEC CONFIDENTIAL – LIMITED USECSTR | CLOUD SECURITY THREAT REPORT | Volume 1 | June 2019
Key Insights 
Immature security practices add to risk:
65% don‘t implement MFA with IaaS 
80% don’t use encryption 
Open door for Lateral Movement:
64% of cloud security incidents are due to unauthorized access
Insiders can be a threat:
accidental insider ranked #3 threat to cloud infrastructure
Behind the times: 
85% are not using CIS best security practices 
Users behaving badly: 
weak passwords (37%) and poor password hygiene 
(34%) top list of bad behaviors
Copyright © 2019 Symantec Corporation SYMANTEC CONFIDENTIAL – LIMITED USE
CLOUD IS AT THE TIPPING POINT:
Few are Ready
CSTRCloud Security Threat Report
Volume 1 | June 2019
CSTR | CLOUD SECURITY THREAT REPORT | Volume 1 | June 2019
Copyright © 2019 Symantec Corporation SYMANTEC CONFIDENTIAL – LIMITED USECSTR | CLOUD SECURITY THREAT REPORT | Volume 1 | June 2019
Cloud is Becoming the Business
53%
of all compute workload has 
now been migrated 
to the cloud
cloud grew at 16% in 
past 12 months 
expected to grow at 22%
next 12 months
Copyright © 2019 Symantec Corporation SYMANTEC CONFIDENTIAL – LIMITED USECSTR | CLOUD SECURITY THREAT REPORT | Volume 1 | June 2019
1807CLOUD
APPS
Cloud Use Underestimated 
1/3 Say Lack of Visibility Causing Issues
1/3participants say poor 
visibility made identifying 
threats more difficult 
PERCEPTION
REALITY
452
Cloud Applications in Use
30%
Data and Cloud 
duplication
34%
Difficult to manage
27%
Rise in Shadow IT
29%
Repetitive Costs
27%
Lack of Control over 
Data Access
23%
Inability to Identify 
Threats
Top Issues Caused by Lack of Visibility
Copyright © 2019 Symantec Corporation SYMANTEC CONFIDENTIAL – LIMITED USECSTR | CLOUD SECURITY THREAT REPORT | Volume 1 | June 2019
IoT Use Skyrocketing—Creating Risk
increase in IaaS incidents 
related to IoT devices 
20%
increase number of IoT devices 
connected to IaaS
Past 12 Months
71%
Copyright © 2019 Symantec Corporation SYMANTEC CONFIDENTIAL – LIMITED USE
THREE QUARTERS OF 
COMPANIES EXPERIENCED 
INCIDENTS DUE TO CLOUD 
SECURITY IMMATURITY
CSTRCloud Security Threat Report
Volume 1 | June 2019
CSTR | CLOUD SECURITY THREAT REPORT | Volume 1 | June 2019
Copyright © 2019 Symantec Corporation SYMANTEC CONFIDENTIAL – LIMITED USECSTR | CLOUD SECURITY THREAT REPORT | Volume 1 | June 2019
Skills and Best Practices are Lacking
not using Center for 
Internet Security  best 
practices*
*Symantec Internal Data
neglect to implement multi‐
factor authentication 
65%85% 93%
need to enhance cloud 
security skills
Copyright © 2019 Symantec Corporation SYMANTEC CONFIDENTIAL – LIMITED USECSTR | CLOUD SECURITY THREAT REPORT | Volume 1 | June 2019
Data Compliance Compromised by
Immature Cloud Culture
believe oversharing cloud stored 
files containing compliance
data is a problem
93% 68%
have evidence that their 
data had been for sale on 
the dark web
Copyright © 2019 Symantec Corporation SYMANTEC CONFIDENTIAL – LIMITED USE
TOP THREATS:
Is your Focus Where it Should be?
CSTRCloud Security Threat Report
Volume 1 | June 2019
CSTR | CLOUD SECURITY THREAT REPORT | Volume 1 | June 2019
Copyright © 2019 Symantec Corporation SYMANTEC CONFIDENTIAL – LIMITED USECSTR | CLOUD SECURITY THREAT REPORT | Volume 1 | June 2019
Are you Guarding the Door while Attacks 
Come in the Window? 
64%
cloud security incidents 
caused by unauthorized 
access*
*Symantec internal data
Most Investigated Cloud Infrastructure Attacks
24%
21%
11%
11%
Data breaches
Cloud malware injection
DDOS
Cross‐cloud attacks
Copyright © 2019 Symantec Corporation SYMANTEC CONFIDENTIAL – LIMITED USECSTR | CLOUD SECURITY THREAT REPORT | Volume 1 | June 2019
Emerging Threats to Cloud Infrastructure
THE TOP THREETHREATS
Managing
identity and
authentication Phishing
Accidental
inside
threats
45% 43% 42%
The three highest threat categories, according to the external 
survey respondents, are:
Copyright © 2019 Symantec Corporation SYMANTEC CONFIDENTIAL – LIMITED USECSTR | CLOUD SECURITY THREAT REPORT | Volume 1 | June 2019
Risky Employees not Being Investigated
9 out of 10 
have encountered
high‐risk 
employee behavior
at the same time, only 7% of 
participants are
investigating 
insider threats
37%
36%
35%
34%
32%
Weak passwords/bad 
password policies
Downloading or using cloud apps 
without telling IT (shadow IT)
Using their own device 
for work purposes
Poor password hygiene (storing 
them on an Excel or notepad)
Using personal email for 
corporate documents to avoid 
attachment limitations
Copyright © 2019 Symantec Corporation SYMANTEC CONFIDENTIAL – LIMITED USE
YOU CAN’T STOP 
THE CLOUD:
Now What?
CSTRCloud Security Threat Report
Volume 1 | June 2019
CSTR | CLOUD SECURITY THREAT REPORT | Volume 1 | June 2019
Copyright © 2019 Symantec Corporation SYMANTEC CONFIDENTIAL – LIMITED USECSTR | CLOUD SECURITY THREAT REPORT | Volume 1 | June 2019
Best Practices:
Building an Effective Cloud Security Strategy 
Symantec Cloud Security ‐ research results
develop a governance 
strategy supported by a 
cloud center of 
excellence 
embrace a zero‐
trust model
promote shared 
responsibility
use automation and 
artificial intelligence
wherever possible
augment in‐house 
cloud security 
expertise with 
managed services
Copyright © 2019 Symantec Corporation SYMANTEC CONFIDENTIAL – LIMITED USE
QUESTIONS
Learn More at https://go.symantec.com/CSTR
CSTRCloud Security Threat Report
Volume 1 | June 2019
CSTR | CLOUD SECURITY THREAT REPORT | Volume 1 | June 2019
Copyright © 2019 Symantec Corporation SYMANTEC CONFIDENTIAL – LIMITED USECSTR | CLOUD SECURITY THREAT REPORT | Volume 1| June 2019

More Related Content

PDF
Symantec Webinar Cloud Security Threat Report
Symantec
 
PDF
2019 08-27 sikkerhetsfestivalen-cloud_security_infinitystones_present_en
Monica Verma
 
PPTX
Cybersecurity in the Cognitive Era: Priming Your Digital Immune System
IBM Security
 
PPTX
The State of Ransomware 2020
Netpluz Asia Pte Ltd
 
PDF
M-Trends® 2013: Attack the Security Gap
FireEye, Inc.
 
PDF
Cyber Risk Management in 2017: Challenges & Recommendations
Ulf Mattsson
 
PPTX
How to Improve Threat Detection & Simplify Security Operations
IBM Security
 
PDF
Orchestrate Your Security Defenses; Protect Against Insider Threats
IBM Security
 
Symantec Webinar Cloud Security Threat Report
Symantec
 
2019 08-27 sikkerhetsfestivalen-cloud_security_infinitystones_present_en
Monica Verma
 
Cybersecurity in the Cognitive Era: Priming Your Digital Immune System
IBM Security
 
The State of Ransomware 2020
Netpluz Asia Pte Ltd
 
M-Trends® 2013: Attack the Security Gap
FireEye, Inc.
 
Cyber Risk Management in 2017: Challenges & Recommendations
Ulf Mattsson
 
How to Improve Threat Detection & Simplify Security Operations
IBM Security
 
Orchestrate Your Security Defenses; Protect Against Insider Threats
IBM Security
 

What's hot (20)

PPTX
2018 State of Cyber Resilience Insurance
Accenture Insurance
 
PPTX
How Aetna Mitigated 701 Malware Infections on Mobile Devices
Skycure
 
PDF
Symantec Webinar: What Cyber Threats Are Lurking in Your Network?
Symantec
 
PDF
Impacts cloud remote_workforce
Rodrigo Varas
 
PPTX
Valuing Data in the Age of Ransomware
IBM Security
 
PDF
Hexis Cyber Solutions: Rules of Engagement for Cyber Security Automation
barbara bogue
 
PDF
Security Incident Response Readiness Survey
Rahul Neel Mani
 
PDF
Adam Bulava GCC 2019
ImekDesign
 
PPTX
Cloud security enforcer - Quick steps to avoid the blind spots of shadow it
IBM Security
 
PDF
Why network based security
Alan Rudd
 
PDF
16231
James Grant
 
PDF
Symantec cyber-resilience
Symantec
 
PPTX
Mobile Security: 2016 Wrap-Up and 2017 Predictions
Skycure
 
PDF
Future of Cybersecurity 2016 - M.Rosenquist
Matthew Rosenquist
 
PPTX
Adapted from an ESG report - Seeing Is Securing - Protecting Against Advanced...
Proofpoint
 
PPTX
Disrupting the Malware Kill Chain - What's New from Palo Alto Networks.
Scalar Decisions
 
PPTX
Cybersecurity In The Cognitive Era: Priming Your Digital Immune System
IBM Security
 
PDF
Must Know Cyber Security Stats of 2016
DWP Information Architects Inc.
 
PPTX
IBM Security QRadar
Virginia Fernandez
 
PPTX
Automation: Embracing the Future of SecOps
IBM Security
 
2018 State of Cyber Resilience Insurance
Accenture Insurance
 
How Aetna Mitigated 701 Malware Infections on Mobile Devices
Skycure
 
Symantec Webinar: What Cyber Threats Are Lurking in Your Network?
Symantec
 
Impacts cloud remote_workforce
Rodrigo Varas
 
Valuing Data in the Age of Ransomware
IBM Security
 
Hexis Cyber Solutions: Rules of Engagement for Cyber Security Automation
barbara bogue
 
Security Incident Response Readiness Survey
Rahul Neel Mani
 
Adam Bulava GCC 2019
ImekDesign
 
Cloud security enforcer - Quick steps to avoid the blind spots of shadow it
IBM Security
 
Why network based security
Alan Rudd
 
Symantec cyber-resilience
Symantec
 
Mobile Security: 2016 Wrap-Up and 2017 Predictions
Skycure
 
Future of Cybersecurity 2016 - M.Rosenquist
Matthew Rosenquist
 
Adapted from an ESG report - Seeing Is Securing - Protecting Against Advanced...
Proofpoint
 
Disrupting the Malware Kill Chain - What's New from Palo Alto Networks.
Scalar Decisions
 
Cybersecurity In The Cognitive Era: Priming Your Digital Immune System
IBM Security
 
Must Know Cyber Security Stats of 2016
DWP Information Architects Inc.
 
IBM Security QRadar
Virginia Fernandez
 
Automation: Embracing the Future of SecOps
IBM Security
 
Ad

Similar to Symantec Cloud Security Threat Report (20)

PPTX
Roadmap of Cyber-security from On-Prem to Cloud Journey - Trend Micro
Prime Infoserv
 
PDF
Trend Micro Solutions Overview
John D. Haden
 
PDF
The Top 5 Challenges Facing Security Operations: Report Insights - Adarma
online Marketing
 
PDF
What has changed in Corporate Cybersecurity?
Nixu Corporation
 
PDF
Strategies to combat new, innovative cyber threats in 2019
SrikanthRaju7
 
PPTX
State of cybersecurity report 2020- Post Covid 19
HarryJake1
 
PDF
Cybersecurity Challenges in Retail 2020: How to Prevent Retail Theft
Intellias
 
PPTX
Nube, Cumplimiento y Amenazas avanzadas: Consideraciones de Seguridad para la...
Cristian Garcia G.
 
PDF
Inteligentní ochrana osobních údajů v procesu digitální transformace
MarketingArrowECS_CZ
 
PPTX
PCM Vision 2019 Keynote: Gary Miglicco
PCM
 
PDF
PaloAlto Enterprise Security Solution
Prime Infoserv
 
PPTX
Evolution security controls towards Cloud Services
Hugo Rodrigues
 
PPTX
Csa UK agm 2019 - Chris J Hodson - Visibility in the cloud
Cloud Security Alliance, UK chapter
 
PDF
2018 State of Cyber Resilience for Insurance
Accenture Insurance
 
PPTX
Responding to Cybersecurity Threats: What SMEs and Professional Accountants N...
International Federation of Accountants
 
PPTX
Netpluz | Protecting your Business with eSentinel | 360° Cyber Security Simpl...
Netpluz Asia Pte Ltd
 
PDF
The State of Cyber Defense Report by Kroll - CY 2023
Ryan Frunnile
 
PDF
Debunked: 5 Myths About Zero Trust Security
Centrify Corporation
 
PDF
Dell Technologies Cyber Security playbook
Margarete McGrath
 
PDF
Top 10 cybersecurity predictions for 2016 by Matthew Rosenquist
Matthew Rosenquist
 
Roadmap of Cyber-security from On-Prem to Cloud Journey - Trend Micro
Prime Infoserv
 
Trend Micro Solutions Overview
John D. Haden
 
The Top 5 Challenges Facing Security Operations: Report Insights - Adarma
online Marketing
 
What has changed in Corporate Cybersecurity?
Nixu Corporation
 
Strategies to combat new, innovative cyber threats in 2019
SrikanthRaju7
 
State of cybersecurity report 2020- Post Covid 19
HarryJake1
 
Cybersecurity Challenges in Retail 2020: How to Prevent Retail Theft
Intellias
 
Nube, Cumplimiento y Amenazas avanzadas: Consideraciones de Seguridad para la...
Cristian Garcia G.
 
Inteligentní ochrana osobních údajů v procesu digitální transformace
MarketingArrowECS_CZ
 
PCM Vision 2019 Keynote: Gary Miglicco
PCM
 
PaloAlto Enterprise Security Solution
Prime Infoserv
 
Evolution security controls towards Cloud Services
Hugo Rodrigues
 
Csa UK agm 2019 - Chris J Hodson - Visibility in the cloud
Cloud Security Alliance, UK chapter
 
2018 State of Cyber Resilience for Insurance
Accenture Insurance
 
Responding to Cybersecurity Threats: What SMEs and Professional Accountants N...
International Federation of Accountants
 
Netpluz | Protecting your Business with eSentinel | 360° Cyber Security Simpl...
Netpluz Asia Pte Ltd
 
The State of Cyber Defense Report by Kroll - CY 2023
Ryan Frunnile
 
Debunked: 5 Myths About Zero Trust Security
Centrify Corporation
 
Dell Technologies Cyber Security playbook
Margarete McGrath
 
Top 10 cybersecurity predictions for 2016 by Matthew Rosenquist
Matthew Rosenquist
 
Ad

More from Symantec (20)

PDF
Symantec Enterprise Security Products are now part of Broadcom
Symantec
 
PDF
Symantec Webinar | National Cyber Security Awareness Month: Fostering a Secur...
Symantec
 
PDF
Symantec Webinar | National Cyber Security Awareness Month: Protect IT
Symantec
 
PDF
Symantec Webinar | National Cyber Security Awareness Month: Secure IT
Symantec
 
PDF
Symantec Webinar | National Cyber Security Awareness Month - Own IT
Symantec
 
PDF
Symantec Webinar: Preparing for the California Consumer Privacy Act (CCPA)
Symantec
 
PDF
Symantec Webinar | How to Detect Targeted Ransomware with MITRE ATT&CK
Symantec
 
PDF
Symantec Mobile Security Webinar
Symantec
 
PDF
Symantec Webinar | Security Analytics Breached! Next Generation Network Foren...
Symantec
 
PDF
Symantec Webinar | Implementing a Zero Trust Framework to Secure Modern Workf...
Symantec
 
PDF
Symantec Webinar | Tips for Successful CASB Projects
Symantec
 
PDF
Symantec Webinar: GDPR 1 Year On
Symantec
 
PDF
Symantec ISTR 24 Webcast 2019
Symantec
 
PDF
Symantec Best Practices for Cloud Security: Insights from the Front Lines
Symantec
 
PDF
Symantec - The Importance of Building Your Zero Trust Program on a Solid Plat...
Symantec
 
PDF
Symantec Webinar | Redefining Endpoint Security- How to Better Secure the End...
Symantec
 
PDF
Symantec Webinar Using Advanced Detection and MITRE ATT&CK to Cage Fancy Bear
Symantec
 
PDF
GDPR Breach Notification Demystifying What the Regulators Want
Symantec
 
PDF
Symantec Internet Security Threat Report (ISTR) 23 Webinar
Symantec
 
PDF
Symantec Webinar Part 6 of 6 GDPR Compliance, Breach Notification, Detection,...
Symantec
 
Symantec Enterprise Security Products are now part of Broadcom
Symantec
 
Symantec Webinar | National Cyber Security Awareness Month: Fostering a Secur...
Symantec
 
Symantec Webinar | National Cyber Security Awareness Month: Protect IT
Symantec
 
Symantec Webinar | National Cyber Security Awareness Month: Secure IT
Symantec
 
Symantec Webinar | National Cyber Security Awareness Month - Own IT
Symantec
 
Symantec Webinar: Preparing for the California Consumer Privacy Act (CCPA)
Symantec
 
Symantec Webinar | How to Detect Targeted Ransomware with MITRE ATT&CK
Symantec
 
Symantec Mobile Security Webinar
Symantec
 
Symantec Webinar | Security Analytics Breached! Next Generation Network Foren...
Symantec
 
Symantec Webinar | Implementing a Zero Trust Framework to Secure Modern Workf...
Symantec
 
Symantec Webinar | Tips for Successful CASB Projects
Symantec
 
Symantec Webinar: GDPR 1 Year On
Symantec
 
Symantec ISTR 24 Webcast 2019
Symantec
 
Symantec Best Practices for Cloud Security: Insights from the Front Lines
Symantec
 
Symantec - The Importance of Building Your Zero Trust Program on a Solid Plat...
Symantec
 
Symantec Webinar | Redefining Endpoint Security- How to Better Secure the End...
Symantec
 
Symantec Webinar Using Advanced Detection and MITRE ATT&CK to Cage Fancy Bear
Symantec
 
GDPR Breach Notification Demystifying What the Regulators Want
Symantec
 
Symantec Internet Security Threat Report (ISTR) 23 Webinar
Symantec
 
Symantec Webinar Part 6 of 6 GDPR Compliance, Breach Notification, Detection,...
Symantec
 

Recently uploaded (20)

PDF
Orbitly Pitch Deck|A Mission-Driven Platform for Side Project Collaboration (...
zz41354899
 
PDF
How Open Source Changed My Career by abdelrahman ismail
a0m0rajab1
 
PDF
Economic Impact of Data Centres to the Malaysian Economy
flintglobalapac
 
PPTX
AI and Robotics for Human Well-being.pptx
JAYMIN SUTHAR
 
PDF
A Day in the Life of Location Data - Turning Where into How.pdf
Precisely
 
PDF
Get More from Fiori Automation - What’s New, What Works, and What’s Next.pdf
Precisely
 
PDF
Make GenAI investments go further with the Dell AI Factory
Principled Technologies
 
PDF
Software Development Methodologies in 2025
KodekX
 
PPTX
The-Ethical-Hackers-Imperative-Safeguarding-the-Digital-Frontier.pptx
sujalchauhan1305
 
PPTX
New ThousandEyes Product Innovations: Cisco Live June 2025
ThousandEyes
 
PDF
Event Presentation Google Cloud Next Extended 2025
minhtrietgect
 
PPTX
What-is-the-World-Wide-Web -- Introduction
tonifi9488
 
PDF
Brief History of Internet - Early Days of Internet
sutharharshit158
 
PPTX
cloud computing vai.pptx for the project
vaibhavdobariyal79
 
PDF
Accelerating Oracle Database 23ai Troubleshooting with Oracle AHF Fleet Insig...
Sandesh Rao
 
PDF
Responsible AI and AI Ethics - By Sylvester Ebhonu
Sylvester Ebhonu
 
PPTX
Applied-Statistics-Mastering-Data-Driven-Decisions.pptx
parmaryashparmaryash
 
PDF
The Future of Artificial Intelligence (AI)
Mukul
 
PDF
Automating ArcGIS Content Discovery with FME: A Real World Use Case
Safe Software
 
PDF
Advances in Ultra High Voltage (UHV) Transmission and Distribution Systems.pdf
Nabajyoti Banik
 
Orbitly Pitch Deck|A Mission-Driven Platform for Side Project Collaboration (...
zz41354899
 
How Open Source Changed My Career by abdelrahman ismail
a0m0rajab1
 
Economic Impact of Data Centres to the Malaysian Economy
flintglobalapac
 
AI and Robotics for Human Well-being.pptx
JAYMIN SUTHAR
 
A Day in the Life of Location Data - Turning Where into How.pdf
Precisely
 
Get More from Fiori Automation - What’s New, What Works, and What’s Next.pdf
Precisely
 
Make GenAI investments go further with the Dell AI Factory
Principled Technologies
 
Software Development Methodologies in 2025
KodekX
 
The-Ethical-Hackers-Imperative-Safeguarding-the-Digital-Frontier.pptx
sujalchauhan1305
 
New ThousandEyes Product Innovations: Cisco Live June 2025
ThousandEyes
 
Event Presentation Google Cloud Next Extended 2025
minhtrietgect
 
What-is-the-World-Wide-Web -- Introduction
tonifi9488
 
Brief History of Internet - Early Days of Internet
sutharharshit158
 
cloud computing vai.pptx for the project
vaibhavdobariyal79
 
Accelerating Oracle Database 23ai Troubleshooting with Oracle AHF Fleet Insig...
Sandesh Rao
 
Responsible AI and AI Ethics - By Sylvester Ebhonu
Sylvester Ebhonu
 
Applied-Statistics-Mastering-Data-Driven-Decisions.pptx
parmaryashparmaryash
 
The Future of Artificial Intelligence (AI)
Mukul
 
Automating ArcGIS Content Discovery with FME: A Real World Use Case
Safe Software
 
Advances in Ultra High Voltage (UHV) Transmission and Distribution Systems.pdf
Nabajyoti Banik
 

Symantec Cloud Security Threat Report