Managing Shadow IT Across Your EnterpriseFormAssembly CTO and CIO on How to Secure Data From Shadow IT Security Lapses
It used to be a stray printer on a network, but today shadow IT comes in all shapes and sizes - and poses serious security threats. Jeff Keating and Jaineesh Davda of FormAssembly discuss how to manage shadow IT and protect your critical data.
In this video interview with Information Security Media Group, Keating and Davda discuss:
- The new shadow IT - and why it's a top concern;
- How shadow IT often ties back to poor data management;
- How to manage and monitor data access.
Keating has over 20 years of experience building and managing data-enabled platforms and products in regulated industries, where security, privacy and compliance are paramount. He has built his perspective while serving in multiple roles from software development and infrastructure management to vulnerability management and corporate IT while building capabilities to earn and keep industry accreditations.
Davda has developed his expertise over 20 years in software infrastructure, architecture, operations, compliance and security. During that time, he has gained a comprehensive perspective on the risks and challenges inherent in digital data collection as well as solutions to common industry pitfalls.