A Logo

Feel free to include my content in your page via my
RSS feed

Help Irongeek.com pay for
bandwidth and research equipment:

Subscribestar or Patreon

Search Irongeek.com:

Irongeek Button
Social-engineer-training Button

Help Irongeek.com pay for bandwidth and research equipment:


What Lurks in the Shadow - Cheryl Biswas BSides Las Vegas 2015 (Hacking Illustrated Series InfoSec Tutorial Videos)

What Lurks in the Shadow
Cheryl Biswas

What Lurks in the Shadow: Addressing the Growing Security Risk of Shadow IT & Shadow Data Welcome to the Mordor of security, where the eye of BYOD reigns supreme, and the proliferation of easy-to-use devices is creating an unprecedented level of end user entitlement. A little knowledge has become a very dangerous thing by letting people “help themselves” to data and network access. This is the world of Shadow Data/Shadow IT, where rules are known but not observed; where risks are taken regardless of known consequences; and where “keep it secret” definitely does not keep IT safe. What happens when users or employees take it upon themselves to decide what tech they want to use and how they want to implement it? As the IoT proliferates, and human nature takes its course, we cannot out-engineer human failings and susceptibility. Because that device, and the freedom to use it as the user sees fit, override anything we currently put in place.

Back to Las Vegas 2015 video list

15 most recent posts on Irongeek.com:

    If you would like to republish one of the articles from this site on your webpage or print journal please contact IronGeek.

    Copyright 2020, IronGeek
    Louisville / Kentuckiana Information Security Enthusiast