YoVDO

What Lurks in the Shadow

Offered By: BSidesLV via YouTube

Tags

Security BSides Courses Internet of Things Courses Cybersecurity Courses Privacy Courses Data Protection Courses Cloud Application Security Courses

Course Description

Overview

Explore the hidden dangers of shadow IT in this insightful BSidesLV conference talk. Delve into the evolving landscape of corporate security, from the era of standardized systems to the challenges posed by mobility and the Internet of Things. Examine the risks associated with shadow data, privilege abuse, and unmonitored user activities. Learn about the threat matrix surrounding the mobile workforce and the culture of indifference. Discover practical strategies for regaining control, including inventory monitoring, cloud app management, and leveraging tools like Shodan and Netskope. Gain valuable insights into navigating the complex world of modern cybersecurity and mitigating the risks lurking in the shadows of your organization's IT infrastructure.

Syllabus

Introduction
About me
Companies had standards
Mobility wasnt an issue
The internet was in place
What did people do
The unknown quantity
The Mordor of Security
The Internet of Things
Shadow Data Rules
Privilege and Responsibility
User Monitoring
Account Status
Social Media
Independent Decisions
Threat Matrix
Mobile Workforce
Culture of Indifference
Shodan
Device Driven
Regaining Control
Inventory Monitoring
Cloud Apps
Netskope


Taught by

BSidesLV

Related Courses

Cloud Application Security
University of Minnesota via Coursera
Cybersecurity in the Cloud
University of Minnesota via Coursera
Aplicando seguridad en apps con Azure
Coursera Project Network via Coursera
Microsoft 365 Security: Information Protection Implementation and Management
Pluralsight
Implementing and Managing Microsoft 365 Information Protection
Pluralsight