Cloud 101CircleEventsBlog
Don't miss out! Join us for the free, virtual Global AI Symposium from October 22nd - 24th—register today!

Download Publication

Cloud and Web Security Challenges in 2022
Cloud and Web Security Challenges in 2022
Who it's for:
  • cloud security practitioners
  • cybersecurity professionals

Cloud and Web Security Challenges in 2022

Release Date: 08/16/2022

Working Group: Top Threats

Organizations’ work environments have undergone rapid but lasting changes in the face of the recent health crisis. Remote work became a necessity and many organizations were forced to accelerate their digital transformation as a result. Simultaneously, multiple newsworthy supply chain attacks occurred, drawing attention to a growing number of cloud and web attacks targeting people with access to business data. 

Organizations are struggling to adapt their overall security strategies to this changing landscape. In order to get a better understanding of the industry’s current knowledge, attitudes, and opinions regarding cloud and web security risks, Proofpoint commissioned CSA to develop a survey report. The survey was conducted online by CSA in May 2022 and received 960 responses from IT and security professionals from organizations of various sizes and locations. Key areas of interest included:
  • Top concerns regarding cloud and web threats
  • Solutions for protecting against cloud and web threats
  • Current cloud governance strategies
Respondents were asked questions about the primary cloud and web security objectives for 2022, the most concerning cloud applications targeted in attacks, the effectiveness of current cloud and web security solutions, the maturity level of organizations’ cloud governance, and more. Read this report for the full analysis of their responses.

Key Takeaways: 
  • 43% percent of organizations listed protecting customer data as their primary cloud and web security objective for 2022.
  • Third parties and partners represent a high level of risk. 58% of organizations indicated that third parties and suppliers were the target of attacks.
  • Rapid digital transformation has left organizations struggling with their approach to cloud and web threats. On average, organizations are utilizing between 3-4 different solutions, but only 16% are using some form of web security to address cloud and web threats.
Download this Resource

Prefer to access this resource without an account? Download it now.

Bookmark
Share
Related resources
Top Threats to Cloud Computing 2024
Top Threats to Cloud Computing 2024
Cloud Controls Matrix and CAIQ v4
Cloud Controls Matrix and CAIQ v4
The State of Security Remediation 2024
The State of Security Remediation 2024
The Cybersecurity Landscape in the Benelux Region and Beyond
The Cybersecurity Landscape in the Benelux Region and Beyond
Published: 10/23/2024
Six Key Use Cases for Continuous Controls Monitoring
Six Key Use Cases for Continuous Controls Monitoring
Published: 10/23/2024
7 Ways Data Access Governance Increases Data ROI
7 Ways Data Access Governance Increases Data ROI
Published: 10/23/2024
Top Threat #4 - Cloudy with a Chance of Breach: The Cloud Security Strategy Storm
Top Threat #4 - Cloudy with a Chance of Breach: The Cloud Security ...
Published: 10/21/2024
Defending Against the Cloud Adversary: Detection and Response in the Cloud
Defending Against the Cloud Adversary: Detection and Response in th...
October 24 | Online

Acknowledgements

Josh Buker
Josh Buker
Research Analyst, CSA

Josh Buker

Research Analyst, CSA

Sean Heide
Sean Heide
Technical Research Director, CSA

Sean Heide

Technical Research Director, CSA

Alex Kaluza
Alex Kaluza
Research Analyst, CSA

Alex Kaluza

Research Analyst, CSA

John Yeoh
John Yeoh
Global Vice President of Research, CSA

John Yeoh

Global Vice President of Research, CSA

With over 15 years of experience in research and technology, John excels at executive-level leadership, relationship management, and strategy development. He is a published author, technologist, and researcher with areas of expertise in cybersecurity, cloud computing, information security, and next generation technology (IoT, Big Data, SecaaS, Quantum). John specializes in risk management, third party assessment, GRC, data protection, incid...

Read more

Hillary Baron
Hillary Baron
Senior Technical Director - Research, CSA

Hillary Baron

Senior Technical Director - Research, CSA

Are you a research volunteer? Request to have your profile displayed on the website here.

Interested in helping develop research with CSA?

Related Certificates & Training