Mitigating Risks From Shadow IT
We respect your privacy, by clicking ‘Watch On Demand’ you agree to receive our e-newsletter, including information on Podcasts, Webinars, event discounts and online learning opportunities. For further information on how we process and monitor your personal data click here. You can unsubscribe at anytime.
Watch On-Demand
Though shadow IT is not a new phenomenon, it can still be risky business. Moreover, current world events may be fueling a new wave of shadow IT.
Most employees don't consider themselves an insider threat because, for the most part, they're just trying to improve their productivity. However, by signing up for cloud services and interacting with their phones using consumable APIs, a bad actor may be able to tap into the company network or exfiltrate data without raising suspicion. In fact, some behavior is so subtle that even machine learning-powered behavioral tracking and anomaly detection mechanisms may miss it.
Working with third parties is inevitable, as is the risk presented by potential shadow IT. Limiting your organization’s exposure due to shadow IT doesn’t have to be an arduous task.
In this webinar we offer steps you can take to better identify third parties, as well as assess them and mitigate risks. We'll also highlight the reality of the risks shadow IT presents to organizations today and help you better understand how to protect your business.
By attending you will:
- Learn practical steps to identify shadow IT
- Understand the lifecycle of working with third parties
- See how emerging technologies can help reduce risk
- Gain insight into how to monitor your IT vendors
Presenters:
Scott Bridgen serves as a GRC Consulting Manager for OneTrust GRC– a purpose-built software designed to operationalise integrated risk management. In his role, Scott is responsible for driving the development and delivery of OneTrust's integrated risk management product as well as driving the refinement of the toolset and offerings. He advises companies throughout their risk management implementations to establish processes to support operations and align with their enterprise objectives, including adopting industry best practices and adhering to requirements relating to relevant standards, frameworks, and laws (e.g. ISO, NIST, SIG and more). Scott works with clients to realise the extent of their risk exposure, helping clients to map their digital infrastructure, assess risks, combat threats, monitor ongoing performance, and document evidence throughout the risk lifecycle.
We respect your privacy, by clicking ‘Watch On Demand’ you agree to receive our e-newsletter, including information on Podcasts, Webinars, event discounts and online learning opportunities. For further information on how we process and monitor your personal data click here. You can unsubscribe at anytime.
Watch On-Demand