YoVDO

Shadow IT and Shadow Remote Access - How to Find It

Offered By: RSA Conference via YouTube

Tags

RSA Conference Courses Cybersecurity Courses Network Security Courses Wireshark Courses IoT security Courses Vulnerability Management Courses Shadow IT Courses

Course Description

Overview

Discover how to identify and address shadow IT and unauthorized remote access in this 50-minute RSA Conference talk. Learn about the risks associated with vendor access to networks, often implemented without explicit permission. Explore real-world examples, including the TeamViewer and Nuance attacks, to understand the scope of the problem. Gain insights into vulnerability management changes, IoT security challenges in healthcare settings, and effective network monitoring techniques. Master the use of tools like Tshark, Wireshark, Zeek, and Real Intelligence Threat Analytics (RITA) to detect long connections and potential beacons. Apply these practical strategies to enhance your organization's security posture and mitigate risks associated with shadow IT and remote access vulnerabilities.

Syllabus

RSAConference 2020 San Francisco February 24-28 Moscone Center
Goals
Changes in Vulnerability Management
Quick Question...
Egypt, Beau, Joff and my Fridge...
IoT Case Study: Hospital in Wyoming
An Exception..
Tshark Hunting
Wireshark
Zeek and User Agent Strings
Real Intelligence Threat Analytics
RITA and Long Connections
RITA and Beacons
Apply!
Process


Taught by

RSA Conference

Related Courses

AZ-220 - Microsoft Certified: Azure IoT Developer Specialty
A Cloud Guru
Advanced IoT Systems Integration and Industrial Applications
LearnQuest via Coursera
AWS IoT: Developing and Deploying an Internet of Things
Amazon Web Services via edX
Assessing and Managing Secure IoT Applications and Devices
LearnQuest via Coursera
Securing the IoT Landscape: From Inception to Architecture
LearnQuest via Coursera