Cloud 101CircleEventsBlog
Join AT&T's experts & CSA's Troy Leach on April 4 to boost your cyber resilience in 2024!

Download Publication

Cloud and Web Security Challenges in 2022
Cloud and Web Security Challenges in 2022
Who it's for:
  • cloud security practitioners
  • cybersecurity professionals

Cloud and Web Security Challenges in 2022

Release Date: 08/16/2022

Working Group: Top Threats

Organizations’ work environments have undergone rapid but lasting changes in the face of the recent health crisis. Remote work became a necessity and many organizations were forced to accelerate their digital transformation as a result. Simultaneously, multiple newsworthy supply chain attacks occurred, drawing attention to a growing number of cloud and web attacks targeting people with access to business data. 

Organizations are struggling to adapt their overall security strategies to this changing landscape. In order to get a better understanding of the industry’s current knowledge, attitudes, and opinions regarding cloud and web security risks, Proofpoint commissioned CSA to develop a survey report. The survey was conducted online by CSA in May 2022 and received 960 responses from IT and security professionals from organizations of various sizes and locations. Key areas of interest included:
  • Top concerns regarding cloud and web threats
  • Solutions for protecting against cloud and web threats
  • Current cloud governance strategies
Respondents were asked questions about the primary cloud and web security objectives for 2022, the most concerning cloud applications targeted in attacks, the effectiveness of current cloud and web security solutions, the maturity level of organizations’ cloud governance, and more. Read this report for the full analysis of their responses.

Key Takeaways: 
  • 43% percent of organizations listed protecting customer data as their primary cloud and web security objective for 2022.
  • Third parties and partners represent a high level of risk. 58% of organizations indicated that third parties and suppliers were the target of attacks.
  • Rapid digital transformation has left organizations struggling with their approach to cloud and web threats. On average, organizations are utilizing between 3-4 different solutions, but only 16% are using some form of web security to address cloud and web threats.
Download this Resource

Prefer to access this resource without an account? Download it now.

Bookmark
Share
Related resources
The State of Security Remediation 2024
The State of Security Remediation 2024
Data Loss Prevention and Data Security Survey Report
Data Loss Prevention and Data Security Survey R...
Third-Party Vendor Risk Management in Healthcare
Third-Party Vendor Risk Management in Healthcare
How to Secure Business-Critical Applications
How to Secure Business-Critical Applications
Published: 03/28/2024
6 Surprising Findings from the CSA State of Security Remediation Report
6 Surprising Findings from the CSA State of Security Remediation Re...
Published: 03/28/2024
Everything You Need to Know About the EU AI Act
Everything You Need to Know About the EU AI Act
Published: 03/27/2024
Salesforce Data Security Challenges in Wake of the Recent Breach
Salesforce Data Security Challenges in Wake of the Recent Breach
Published: 03/26/2024

Acknowledgements

Josh Buker
Josh Buker
Research Analyst, CSA

Josh Buker

Research Analyst, CSA

This person does not have a biography listed with CSA.

Sean Heide
Sean Heide
Technical Research Director, CSA

Sean Heide

Technical Research Director, CSA

This person does not have a biography listed with CSA.

Alex Kaluza
Alex Kaluza
Research Analyst, CSA

Alex Kaluza

Research Analyst, CSA

This person does not have a biography listed with CSA.

John Yeoh
John Yeoh
Global Vice President of Research, CSA

John Yeoh

Global Vice President of Research, CSA

With over 15 years of experience in research and technology, John excels at executive-level leadership, relationship management, and strategy development. He is a published author, technologist, and researcher with areas of expertise in cybersecurity, cloud computing, information security, and next generation technology (IoT, Big Data, SecaaS, Quantum). John specializes in risk management, third party assessment, GRC, data protection, incid...

Read more

Hillary Baron
Hillary Baron
Senior Technical Director - Research, CSA

Hillary Baron

Senior Technical Director - Research, CSA

This person does not have a biography listed with CSA.

Are you a research volunteer? Request to have your profile displayed on the website here.

Interested in helping develop research with CSA?

Related Certificates & Training