Audit , CISO Trainings , Finance & Banking

Managing Shadow IT Across Your Enterprise

FormAssembly CTO and CIO on How to Secure Data From Shadow IT Security Lapses
Jeff Keating, CTO, FormAssembly; Jaineesh Davda, CIO, FormAssembly

It used to be a stray printer on a network, but today shadow IT comes in all shapes and sizes - and poses serious security threats. Jeff Keating and Jaineesh Davda of FormAssembly discuss how to manage shadow IT and protect your critical data.

In this video interview with Information Security Media Group, Keating and Davda discuss:

  • The new shadow IT - and why it's a top concern;
  • How shadow IT often ties back to poor data management;
  • How to manage and monitor data access.

Keating has over 20 years of experience building and managing data-enabled platforms and products in regulated industries, where security, privacy and compliance are paramount. He has built his perspective while serving in multiple roles from software development and infrastructure management to vulnerability management and corporate IT while building capabilities to earn and keep industry accreditations.

Davda has developed his expertise over 20 years in software infrastructure, architecture, operations, compliance and security. During that time, he has gained a comprehensive perspective on the risks and challenges inherent in digital data collection as well as solutions to common industry pitfalls.

About the Author

Tom Field

Tom Field

Senior Vice President, Editorial, ISMG

Field is responsible for all of ISMG's 28 global media properties and its team of journalists. He also helped to develop and lead ISMG's award-winning summit series that has brought together security practitioners and industry influencers from around the world, as well as ISMG's series of exclusive executive roundtables.

Around the Network

Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing, you agree to our use of cookies.