logo

It used to be a stray printer on a network, but today shadow IT comes in all shapes and sizes - and poses serious security threats. Jeff Keating and Jaineesh Davda of FormAssembly discuss how to manage shadow IT and protect your critical data.

In this video interview with Information Security Media Group, Keating and Davda discuss:

  • The new shadow IT - and why it's a top concern;
  • How shadow IT often ties back to poor data management;
  • How to manage and monitor data access.

Embedded Code Headline

image

Embedded Code Headline

image

Lorem ipsum dolor sit amet

Lorem ipsum dolor sit amet, consectetur adipiscing elit, sed do eiusmod tempor incididunt ut labore et dolore magna aliqua. Ut enim ad minim veniam, quis nostrud exercitation ullamco laboris nisi ut aliquip ex ea commodo consequat. Duis aute irure dolor in reprehenderit in voluptate velit esse cillum dolore eu fugiat nulla pariatur. Excepteur sint occaecat cupidatat non proident, sunt in culpa qui officia deserunt mollit anim id est laborum.


speaker

Speaker One

Title

Company

speaker

Speaker Two

Title

Company

speaker

Speaker Three

Title

Company

speaker

Speaker Four

Title

Company

speaker

Speaker Five

Title

Company

speaker

Speaker Six

Title

Company