According to Gartner, by 2020, a third of all cybersecurity attacks experienced by enterprises will be from their shadow IT resources. A sobering statistic. Most organisational concerns around shadow IT, focus on data loss, security, and unauthorised applications. However, the key to combatting the influx of unauthorised software and cloud services into your organisation is helping to educate your stakeholders to the true cost of shadow IT. In this session we will discuss how a CISO can most effectively engage with Shadow IT to turn the relationship from the traditional adversarial to an effective partnership that benefits both the Shadow IT group and the security program.
- Where does shadow IT originate from and why?
- Understanding the specific threats posed from shadow IT to the organisation
- Can shadow IT ever be a good thing for your business?
- Creating some guiding principles for turning shadow IT from foe to friend and improving organisational security