Overview
Save Big on Coursera Plus. 7,000+ courses at $160 off. Limited Time Only!
Explore the hidden dangers of shadow IT in this insightful BSidesLV conference talk. Delve into the evolving landscape of corporate security, from the era of standardized systems to the challenges posed by mobility and the Internet of Things. Examine the risks associated with shadow data, privilege abuse, and unmonitored user activities. Learn about the threat matrix surrounding the mobile workforce and the culture of indifference. Discover practical strategies for regaining control, including inventory monitoring, cloud app management, and leveraging tools like Shodan and Netskope. Gain valuable insights into navigating the complex world of modern cybersecurity and mitigating the risks lurking in the shadows of your organization's IT infrastructure.
Syllabus
Introduction
About me
Companies had standards
Mobility wasnt an issue
The internet was in place
What did people do
The unknown quantity
The Mordor of Security
The Internet of Things
Shadow Data Rules
Privilege and Responsibility
User Monitoring
Account Status
Social Media
Independent Decisions
Threat Matrix
Mobile Workforce
Culture of Indifference
Shodan
Device Driven
Regaining Control
Inventory Monitoring
Cloud Apps
Netskope
Taught by
BSidesLV