Cloud 101CircleEventsBlog
Master CSA’s Security, Trust, Assurance, and Risk program—download the STAR Prep Kit for essential tools to enhance your assurance!

Download Publication

Cloud and Web Security Challenges in 2022
Cloud and Web Security Challenges in 2022
Who it's for:
  • cloud security practitioners
  • cybersecurity professionals

Cloud and Web Security Challenges in 2022

Release Date: 08/16/2022

Working Group: Top Threats

Organizations’ work environments have undergone rapid but lasting changes in the face of the recent health crisis. Remote work became a necessity and many organizations were forced to accelerate their digital transformation as a result. Simultaneously, multiple newsworthy supply chain attacks occurred, drawing attention to a growing number of cloud and web attacks targeting people with access to business data. 

Organizations are struggling to adapt their overall security strategies to this changing landscape. In order to get a better understanding of the industry’s current knowledge, attitudes, and opinions regarding cloud and web security risks, Proofpoint commissioned CSA to develop a survey report. The survey was conducted online by CSA in May 2022 and received 960 responses from IT and security professionals from organizations of various sizes and locations. Key areas of interest included:
  • Top concerns regarding cloud and web threats
  • Solutions for protecting against cloud and web threats
  • Current cloud governance strategies
Respondents were asked questions about the primary cloud and web security objectives for 2022, the most concerning cloud applications targeted in attacks, the effectiveness of current cloud and web security solutions, the maturity level of organizations’ cloud governance, and more. Read this report for the full analysis of their responses.

Key Takeaways: 
  • 43% percent of organizations listed protecting customer data as their primary cloud and web security objective for 2022.
  • Third parties and partners represent a high level of risk. 58% of organizations indicated that third parties and suppliers were the target of attacks.
  • Rapid digital transformation has left organizations struggling with their approach to cloud and web threats. On average, organizations are utilizing between 3-4 different solutions, but only 16% are using some form of web security to address cloud and web threats.
Download this Resource

Prefer to access this resource without an account? Download it now.

Bookmark
Share
Related resources
Top Threats to Cloud Computing 2024
Top Threats to Cloud Computing 2024
Cloud Controls Matrix and CAIQ v4
Cloud Controls Matrix and CAIQ v4
The State of Security Remediation 2024
The State of Security Remediation 2024
Establishing an Always-Ready State with Continuous Controls Monitoring
Establishing an Always-Ready State with Continuous Controls Monitoring
Published: 11/21/2024
Managing AI Risk: Three Essential Frameworks to Secure Your AI Systems
Managing AI Risk: Three Essential Frameworks to Secure Your AI Systems
Published: 11/19/2024
Top Threat #5 - Third Party Tango: Dancing Around Insecure Resources
Top Threat #5 - Third Party Tango: Dancing Around Insecure Resources
Published: 11/18/2024
The Rocky Path of Managing AI Security Risks in IT Infrastructure
The Rocky Path of Managing AI Security Risks in IT Infrastructure
Published: 11/15/2024

Acknowledgements

Josh Buker
Josh Buker
Research Analyst, CSA

Josh Buker

Research Analyst, CSA

Sean Heide
Sean Heide
Technical Research Director, CSA

Sean Heide

Technical Research Director, CSA

Alex Kaluza
Alex Kaluza
Research Analyst, CSA

Alex Kaluza

Research Analyst, CSA

John Yeoh
John Yeoh
Global Vice President of Research, CSA

John Yeoh

Global Vice President of Research, CSA

With over 15 years of experience in research and technology, John excels at executive-level leadership, relationship management, and strategy development. He is a published author, technologist, and researcher with areas of expertise in cybersecurity, cloud computing, information security, and next generation technology (IoT, Big Data, SecaaS, Quantum). John specializes in risk management, third party assessment, GRC, data protection, incid...

Read more

Hillary Baron
Hillary Baron
Senior Technical Director - Research, CSA

Hillary Baron

Senior Technical Director - Research, CSA

Are you a research volunteer? Request to have your profile displayed on the website here.

Interested in helping develop research with CSA?

Related Certificates & Training