YoVDO

Securing Shadow IT

Offered By: YouTube

Tags

Conference Talks Courses Cybersecurity Courses Risk Management Courses Shadow IT Courses

Course Description

Overview

Save Big on Coursera Plus. 7,000+ courses at $160 off. Limited Time Only!
Explore the challenges and solutions surrounding Shadow IT in this 33-minute conference talk from BSides Tampa 2019. Delve into Gene Cronk's background and personal experiences as he defines Shadow IT, outlines its associated risks, and proposes potential mitigation strategies. Learn about the worst-case scenarios, supported operating systems, and enhanced security measures. Gain valuable insights from the lessons learned and participate in a Q&A session to deepen your understanding of securing Shadow IT in modern organizations.

Syllabus

Intro
Genes background
Agenda
Definition of Shadow IT
Shadow IT Risks
Possible Solutions
My Shadow IT Story
The Worst Case Scenario
Supported OS
Mod Security
Lessons Learned
Any Questions


Related Courses

Building Geospatial Apps on Postgres, PostGIS, & Citus at Large Scale
Microsoft via YouTube
Unlocking the Power of ML for Your JavaScript Applications with TensorFlow.js
TensorFlow via YouTube
Managing the Reactive World with RxJava - Jake Wharton
ChariotSolutions via YouTube
What's New in Grails 2.0
ChariotSolutions via YouTube
Performance Analysis of Apache Spark and Presto in Cloud Environments
Databricks via YouTube