round table ciso

We were happy to participate in a community round table organized by CISO Platform

Key Discussion Points : 

  • What is Shadow IT?
  • What are the types of Shadow IT?
  • Practical demo using open source tools
  • Controls to manage shadow IT risk

Reason Of Risk : 

  • No standardization
  • Unknown risks
  • Security breaches
  • Data leaks

Types Of Risks :

  • Third party email service
  • Third party applications – whatspp, box
  • Unknown assets
  • Custom applications / individual built applications / scripts
  • Database
  • Cloud Buckets, S3
  • Github code repository
  • Online Free tools / SaaS
  • API
  • Owner change of assets (person has left)
  • Data in non electronical/ Physical forms
  • Shadow accounts/privileges
  • Shared / Leaked / Default / Weak / Written down passwords
  • Backdoors
  • IoT
  • Rogue devices
  • BYOD
  • CCTV – source and data destination; set-top box
  • 3rd party
  • 4th party
  • Supply chain

READ MORE >> Recommendation to Prevent Shadow IT

E-mail me when people leave their comments –

CISO Platform

You need to be a member of CISO Platform to add comments!

Join CISO Platform

CISO Platform

A global community of 5K+ Senior IT Security executives and 40K+ subscribers with the vision of meaningful collaboration, knowledge, and intelligence sharing to fight the growing cyber security threats.

Join CISO Community Share Your Knowledge (Post A Blog)