What Lurks in the Shadow
Offered By: BSidesLV via YouTube
Course Description
Overview
Explore the hidden dangers of shadow IT in this insightful BSidesLV conference talk. Delve into the evolving landscape of corporate security, from the era of standardized systems to the challenges posed by mobility and the Internet of Things. Examine the risks associated with shadow data, privilege abuse, and unmonitored user activities. Learn about the threat matrix surrounding the mobile workforce and the culture of indifference. Discover practical strategies for regaining control, including inventory monitoring, cloud app management, and leveraging tools like Shodan and Netskope. Gain valuable insights into navigating the complex world of modern cybersecurity and mitigating the risks lurking in the shadows of your organization's IT infrastructure.
Syllabus
Introduction
About me
Companies had standards
Mobility wasnt an issue
The internet was in place
What did people do
The unknown quantity
The Mordor of Security
The Internet of Things
Shadow Data Rules
Privilege and Responsibility
User Monitoring
Account Status
Social Media
Independent Decisions
Threat Matrix
Mobile Workforce
Culture of Indifference
Shodan
Device Driven
Regaining Control
Inventory Monitoring
Cloud Apps
Netskope
Taught by
BSidesLV
Related Courses
NeuroethicsUniversity of Pennsylvania via Coursera Fundamentals of Online Education: Planning and Application
Georgia Institute of Technology via Coursera Understanding Media by Understanding Google
Northwestern University via Coursera Wiretaps to Big Data: Privacy and Surveillance in the Age of Interconnection
Cornell University via edX Internet, les autres et moi
Certificat informatique et internet via France Université Numerique