Hi [[ session.user.profile.firstName ]]

Shadow IT – Risk and Reality

While technology can be a difference maker for organizations, when employees or business go “rogue” and bring in products and services without permission, it can cause problems. This phenomenon, known as “Shadow IT”, is spreading as technology solutions become more plentiful and can be purchased wit
While technology can be a difference maker for organizations, when employees or business go “rogue” and bring in products and services without permission, it can cause problems. This phenomenon, known as “Shadow IT”, is spreading as technology solutions become more plentiful and can be purchased with a credit card and the click of a button. This opens up a Pandora’s Box of problems for the enterprise. Join (ISC)2 and Accellion on August 18, 2011 at 12:00pm Noon Eastern for a roundtable discussion on this emerging threat and find out what the risks, realities and solutions are.
Recorded Aug 18 2011 65 mins
Your place is confirmed,
we'll send you email reminders
Presented by
Paula Skokowski, VP of Products, Accellion; Darrin Reynolds, CISSP, VP, Infosec, DAS, Div of Omnicom, Rob Ayoub, CISSP, Frost
Presentation preview: Shadow IT – Risk and Reality
Recommended for you:
  • Date
  • Rating
  • Views

Embed in website or blog

Successfully added emails: 0
Remove all
  • Title: Shadow IT – Risk and Reality
  • Live at: Aug 18 2011 4:00 pm
  • Presented by: Paula Skokowski, VP of Products, Accellion; Darrin Reynolds, CISSP, VP, Infosec, DAS, Div of Omnicom, Rob Ayoub, CISSP, Frost
  • From:
Your email has been sent.
or close
You must be logged in to email this