January Event: Options for Managing and Securing Shadow IT
Event Information
Description
Options for Managing and Securing Shadow IT and Sanctioned Cloud Applications
Speaker: Rebecca Harvey, Information Security Specialist at Data Strategy
The Cloud needs a control point for the following reasons:
VISIBILITY: Uncover Shadow IT usage and understand content flowing into and out of the cloud
THREAT PROTECTION: Detect and prevent data exfiltration, insider threat, compromised accounts, and malware
COMPLIANCE: Achieve compliance by automating the enforcement and implementation of policies
DATA SECURITY: Protect data from unauthorized access stemming from a security breach or inadvertent disclosure
For these reasons cloud security technologies have emerged, automating and enforcing policies, as well as acting as data brokers between the client and their shadow IT and sanctioned cloud services. There are several different approaches to cloud security that we will explore from a product-agnostic perspective, and we’ll discuss the changes in the marketplace as these technologies have taken hold over the last couple of years. We’ll also explore how cloud security tools can interoperate with on-prem solutions and security orchestration tools.