Managing Shadow IT Realities with A Remote Workforce

Logo
Presented by

Scott Bridgen, GRC Consulting Director, One Trust; Brandon Dunlap, Moderator

About this talk

Business teams have been enabled by technology solutions effectively so that their reliance on centralized teams such as IT and security has decreased significantly. The cyber threat landscape continues to evolve and organizations need to be prepared to identify vulnerabilities and points for exposure, including unforeseen shadow IT applications. As businesses have been forced to adapt to new working realities, how has the shift to a remote workforce impacted businesses' ability to identify undocumented systems and vulnerabilities? Join One Trust and (ISC)2 on Thursday, July 28, 2020 at 1:00PM BST as we discuss some of the contributing factors to shadow IT, the potential impacts and risk exposure, and some best practices in protecting stakeholders across the business. We’ll also examine: · Key roles and responsibilities to align an effective defense in your risk management program · Identify processes that fuel and encourage shadow IT practices · Best practices to engage line of business employees to educate and promote cyber threat awareness
Related topics:

More from this channel

Upcoming talks (11)
On-demand talks (392)
Subscribers (93587)
ISC2 Security Briefings EMEA offers members in Europe, the Middle East and Africa a chance to learn about the latest trends, tools and best practices in cyber, information, software and infrastructure security while earning CPEs