This is a cross post from original source at FireCompass here
shadow (2)
Key Discussion Points :
- What is Shadow IT?
- What are the types of Shadow IT?
- Practical demo using open source tools
- Controls to manage shadow IT risk
Reason Of Risk :
- No standardization
- Unknown risks
- Security breaches
- Data leaks
Types O
CISO Platform
A global community of 5K+ Senior IT Security executives and 40K+ subscribers with the vision of meaningful collaboration, knowledge, and intelligence sharing to fight the growing cyber security threats.
Join CISO Community Share Your Knowledge (Post A Blog)

