Главная
Study mode:
on
1
Intro
2
Genes background
3
Agenda
4
Definition of Shadow IT
5
Shadow IT Risks
6
Possible Solutions
7
My Shadow IT Story
8
The Worst Case Scenario
9
Supported OS
10
Mod Security
11
Lessons Learned
12
Any Questions
Description:
Explore the challenges and solutions surrounding Shadow IT in this 33-minute conference talk from BSides Tampa 2019. Delve into Gene Cronk's background and personal experiences as he defines Shadow IT, outlines its associated risks, and proposes potential mitigation strategies. Learn about the worst-case scenarios, supported operating systems, and enhanced security measures. Gain valuable insights from the lessons learned and participate in a Q&A session to deepen your understanding of securing Shadow IT in modern organizations.

Securing Shadow IT

Add to list