The road to shadow IT is paved with good intentions — when users create unofficial solutions to roadblocks without the oversight or approval of the IT department, they can introduce unknown risks to your environment. Examples of shadow IT may include a user opting for using a personal file-sharing service when they have difficulty collaborating with a teammate or using an unmanaged device to bypass security controls and directly log into a web-accessible cloud service. These workarounds may address the immediate need of the user…but leave a bigger problem for admins to discover later. This not only causes operational issues but introduces greater risk when faced with situations requiring an immediate response. Join Duo Security and (ISC)2 March 2, 2021 at 1:00pm GMT as we discuss solving shadow IT challenges with a focus on usability and preventing risky workarounds by removing the obstacles that invite them. This session will examine the rise of shadow IT through the shift to remote work and best practices you can implement to better defend your users and data. We’ll also focus on: · How your shadow IT defense strategy starts with access control · The conditions that lead to shadow IT, and how to prevent them · How to establish user and device trust without adding friction to user access

Hora

14:00 - 15:00 hs GMT+1

Organizador

(ISC)² Security Briefings - EMEA
Compartir
Enviar a un amigo
Mi email *
Email destinatario *
Comentario *
Repite estos números *
Control de seguridad
Abril / 2021 1395 webinars
Lunes
Martes
Miércoles
Jueves
Viernes
Sábado
Domingo
Lun 29 de Abril de 2021
Mar 30 de Abril de 2021
Mié 31 de Abril de 2021
Jue 01 de Abril de 2021
Vie 02 de Abril de 2021
Sáb 03 de Abril de 2021
Dom 04 de Abril de 2021
Lun 05 de Abril de 2021
Mar 06 de Abril de 2021
Mié 07 de Abril de 2021
Jue 08 de Abril de 2021
Vie 09 de Abril de 2021
Sáb 10 de Abril de 2021
Dom 11 de Abril de 2021
Lun 12 de Abril de 2021
Mar 13 de Abril de 2021
Mié 14 de Abril de 2021