You can't secure what you can't see. While many organizations are actively embracing cloud apps as a strategic part of their IT infrastructure, many employees or lines of business are adopting additional ad hoc cloud services to aid business productivity or for personal applications. Known as "Shadow IT", these additional cloud apps and services bypass the oversight of IT, and may introduce risk or cost inefficiencies. This session will explore this issue, along with approaches.