What Lurks in the Shadow
Offered By: BSidesLV via YouTube
Course Description
Overview
Explore the hidden dangers of shadow IT in this insightful BSidesLV conference talk. Delve into the evolving landscape of corporate security, from the era of standardized systems to the challenges posed by mobility and the Internet of Things. Examine the risks associated with shadow data, privilege abuse, and unmonitored user activities. Learn about the threat matrix surrounding the mobile workforce and the culture of indifference. Discover practical strategies for regaining control, including inventory monitoring, cloud app management, and leveraging tools like Shodan and Netskope. Gain valuable insights into navigating the complex world of modern cybersecurity and mitigating the risks lurking in the shadows of your organization's IT infrastructure.
Syllabus
Introduction
About me
Companies had standards
Mobility wasnt an issue
The internet was in place
What did people do
The unknown quantity
The Mordor of Security
The Internet of Things
Shadow Data Rules
Privilege and Responsibility
User Monitoring
Account Status
Social Media
Independent Decisions
Threat Matrix
Mobile Workforce
Culture of Indifference
Shodan
Device Driven
Regaining Control
Inventory Monitoring
Cloud Apps
Netskope
Taught by
BSidesLV
Related Courses
Web Science: How the Web Is Changing the WorldUniversity of Southampton via FutureLearn Develop Java Embedded Applications Using a Raspberry Pi
Oracle via Independent Introducción a Raspberry Pi (Ver-2)
Galileo University via Independent Fog Networks and the Internet of Things
Princeton University via Coursera Digital Media and Marketing Principles
University of Illinois at Urbana-Champaign via Coursera