ChaptersEventsBlog
Share how your organization is preparing for the agentic shift in identity governance. Take the Securing AI Agents Survey by October 10 →

Download Publication

Cloud and Web Security Challenges in 2022
Cloud and Web Security Challenges in 2022
Who it's for:
  • cloud security practitioners
  • cybersecurity professionals

Cloud and Web Security Challenges in 2022

Release Date: 08/16/2022

Working Group: Top Threats

Organizations’ work environments have undergone rapid but lasting changes in the face of the recent health crisis. Remote work became a necessity and many organizations were forced to accelerate their digital transformation as a result. Simultaneously, multiple newsworthy supply chain attacks occurred, drawing attention to a growing number of cloud and web attacks targeting people with access to business data. 

Organizations are struggling to adapt their overall security strategies to this changing landscape. In order to get a better understanding of the industry’s current knowledge, attitudes, and opinions regarding cloud and web security risks, Proofpoint commissioned CSA to develop a survey report. The survey was conducted online by CSA in May 2022 and received 960 responses from IT and security professionals from organizations of various sizes and locations. Key areas of interest included:
  • Top concerns regarding cloud and web threats
  • Solutions for protecting against cloud and web threats
  • Current cloud governance strategies
Respondents were asked questions about the primary cloud and web security objectives for 2022, the most concerning cloud applications targeted in attacks, the effectiveness of current cloud and web security solutions, the maturity level of organizations’ cloud governance, and more. Read this report for the full analysis of their responses.

Key Takeaways: 
  • 43% percent of organizations listed protecting customer data as their primary cloud and web security objective for 2022.
  • Third parties and partners represent a high level of risk. 58% of organizations indicated that third parties and suppliers were the target of attacks.
  • Rapid digital transformation has left organizations struggling with their approach to cloud and web threats. On average, organizations are utilizing between 3-4 different solutions, but only 16% are using some form of web security to address cloud and web threats.
Download this Resource

Prefer to access this resource without an account? Download it now.

Bookmark
Share
Related resources
Beyond the Hype: A Benchmark Study of AI Agents in the SOC
Beyond the Hype: A Benchmark Study of AI Agents...
AI Controls Matrix
AI Controls Matrix
State of SaaS Security Report 2025
State of SaaS Security Report 2025
Why Data Protection Is Now a National Security Matter: Understanding the Bulk Data Rule
Why Data Protection Is Now a National Security Matter: Understandin...
Published: 10/06/2025
Role Engineering for Modern Access Control
Role Engineering for Modern Access Control
Published: 10/01/2025
Zero Trust Architecture: Principle Driven Security Strategy for Organizations and Security Leaders
Zero Trust Architecture: Principle Driven Security Strategy for Org...
Published: 09/30/2025
Aligning Risk-Based Security with Business Goals: Bridging the Gap Between IT and Leadership
Aligning Risk-Based Security with Business Goals: Bridging the Gap ...
Published: 09/30/2025

Acknowledgements

Josh Buker
Josh Buker
Research Analyst, CSA

Josh Buker

Research Analyst, CSA

Sean Heide
Sean Heide

Sean Heide

Alex Kaluza
Alex Kaluza
Research Analyst, CSA

Alex Kaluza

Research Analyst, CSA

John Yeoh
John Yeoh
Chief Scientific Officer, CSA

John Yeoh

Chief Scientific Officer, CSA

With over 15 years of experience in research and technology, John excels at executive-level leadership, relationship management, and strategy development. He is a published author, technologist, and researcher with areas of expertise in cybersecurity, cloud computing, information security, and next generation technology (IoT, Big Data, SecaaS, Quantum). John specializes in risk management, third party assessment, GRC, data protection, incid...

Read more

Hillary Baron
Hillary Baron
AVP of Research, CSA

Hillary Baron

AVP of Research, CSA

Are you a research volunteer? Request to have your profile displayed on the website here.

Interested in helping develop research with CSA?

Related Certificates & Training