Securing Shadow IT
Offered By: YouTube
Course Description
Overview
Explore the challenges and solutions surrounding Shadow IT in this 33-minute conference talk from BSides Tampa 2019. Delve into Gene Cronk's background and personal experiences as he defines Shadow IT, outlines its associated risks, and proposes potential mitigation strategies. Learn about the worst-case scenarios, supported operating systems, and enhanced security measures. Gain valuable insights from the lessons learned and participate in a Q&A session to deepen your understanding of securing Shadow IT in modern organizations.
Syllabus
Intro
Genes background
Agenda
Definition of Shadow IT
Shadow IT Risks
Possible Solutions
My Shadow IT Story
The Worst Case Scenario
Supported OS
Mod Security
Lessons Learned
Any Questions
Related Courses
Microsoft Cybersecurity Stack: Securing Enterprise InformationLinkedIn Learning The Cybersecurity Threat Landscape
LinkedIn Learning Shadow IT: Protecting Your Organization with Microsoft 365
LinkedIn Learning The Cybersecurity Threat Landscape (2019)
LinkedIn Learning Building a Co-Creative Enterprise with ManageEngine - IT Collaboration and Automation
Microsoft via YouTube