What They Do In the Shadows (of IT)

Logo
Presented by

Richard Archdeacon, Advisory CISO, Duo Security, Josh Green, Tech Eng., Duo Security, B. Dunlap, Moderator

About this talk

The road to shadow IT is paved with good intentions — when users create unofficial solutions to roadblocks without the oversight or approval of the IT department, they can introduce unknown risks to your environment. Examples of shadow IT may include a user opting for using a personal file-sharing service when they have difficulty collaborating with a teammate or using an unmanaged device to bypass security controls and directly log into a web-accessible cloud service. These workarounds may address the immediate need of the user…but leave a bigger problem for admins to discover later. This not only causes operational issues but introduces greater risk when faced with situations requiring an immediate response. Join Duo Security and (ISC)2 March 2, 2021 at 1:00pm GMT as we discuss solving shadow IT challenges with a focus on usability and preventing risky workarounds by removing the obstacles that invite them. This session will examine the rise of shadow IT through the shift to remote work and best practices you can implement to better defend your users and data. We’ll also focus on: · How your shadow IT defense strategy starts with access control · The conditions that lead to shadow IT, and how to prevent them · How to establish user and device trust without adding friction to user access
Related topics:

More from this channel

Upcoming talks (11)
On-demand talks (392)
Subscribers (93605)
ISC2 Security Briefings EMEA offers members in Europe, the Middle East and Africa a chance to learn about the latest trends, tools and best practices in cyber, information, software and infrastructure security while earning CPEs