Circle
Events
Blog

Download Publication

Cloud and Web Security Challenges in 2022
Cloud and Web Security Challenges in 2022
Who it's for:
  • cloud security practitioners
  • cybersecurity professionals

Cloud and Web Security Challenges in 2022

Release Date: 08/16/2022

Working Group: Top Threats

Organizations’ work environments have undergone rapid but lasting changes in the face of the recent health crisis. Remote work became a necessity and many organizations were forced to accelerate their digital transformation as a result. Simultaneously, multiple newsworthy supply chain attacks occurred, drawing attention to a growing number of cloud and web attacks targeting people with access to business data. 

Organizations are struggling to adapt their overall security strategies to this changing landscape. In order to get a better understanding of the industry’s current knowledge, attitudes, and opinions regarding cloud and web security risks, Proofpoint commissioned CSA to develop a survey report. The survey was conducted online by CSA in May 2022 and received 960 responses from IT and security professionals from organizations of various sizes and locations. Key areas of interest included:
  • Top concerns regarding cloud and web threats
  • Solutions for protecting against cloud and web threats
  • Current cloud governance strategies
Respondents were asked questions about the primary cloud and web security objectives for 2022, the most concerning cloud applications targeted in attacks, the effectiveness of current cloud and web security solutions, the maturity level of organizations’ cloud governance, and more. Read this report for the full analysis of their responses.

Key Takeaways: 
  • 43% percent of organizations listed protecting customer data as their primary cloud and web security objective for 2022.
  • Third parties and partners represent a high level of risk. 58% of organizations indicated that third parties and suppliers were the target of attacks.
  • Rapid digital transformation has left organizations struggling with their approach to cloud and web threats. On average, organizations are utilizing between 3-4 different solutions, but only 16% are using some form of web security to address cloud and web threats.

Download this Resource

LoginCreate Account

Prefer to access this resource without an account? Download it now.

Acknowledgements

Josh Buker Headshot
Josh Buker
Research Analyst, CSA

Josh Buker

Research Analyst, CSA

This person does not have a biography listed with CSA.

Sean Heide Headshot
Sean Heide
Research Analyst, CSA

Sean Heide

Research Analyst, CSA

This person does not have a biography listed with CSA.

Alex Kaluza Headshot
Alex Kaluza
Research Analyst, CSA

Alex Kaluza

Research Analyst, CSA

This person does not have a biography listed with CSA.

John Yeoh Headshot
John Yeoh
Global Vice President of Research, CSA

John Yeoh

Global Vice President of Research, CSA

With over 15 years of experience in research and technology, John excels at executive-level leadership, relationship management, and strategy development. He is a published author, technologist, and researcher with areas of expertise in cybersecurity, cloud computing, information security, and next generation technology (IoT, Big Data, SecaaS, Quantum). John specializes in risk management, third party assessment, GRC, data protection, incid...

Read more

Are you a research volunteer? Request to have your profile displayed on the website here.

Interested in helping develop research with CSA?