16
Corralling Shadow IT & Enabling Secure Adoption of Cloud Services Featuring: Andy Radle Cloud Security Architect HP Harold Byun Sr. Director Product Management Skyhigh Networks

Corralling Shadow IT & Enabling Secure Adoption …...Corralling Shadow IT & Enabling Secure Adoption of Cloud Services Featuring: Andy Radle Cloud Security Architect – HP Harold

  • Upload
    others

  • View
    6

  • Download
    0

Embed Size (px)

Citation preview

Corralling Shadow IT &

Enabling Secure Adoption of

Cloud Services

Featuring:

Andy Radle

Cloud Security Architect – HP

Harold Byun

Sr. Director Product Management – Skyhigh Networks

Shadow IT Today

CSA Congress - 2014 2

Cloud Adoption & Risk Report | 3

Cloud Adoption & Risk Report | 4

Cloud Adoption & Risk Report | 5

Average Number of Cloud Services Used per

Company

1505

907 874 851 834

756 733 694

656

428

0

200

400

600

800

1000

1200

1400

1600

a) identifying the scope of Shadow IT,

“Shadow IT”

a) identifying the scope of Shadow IT, Do we have a

Shadow IT

problem? Compliance

Privacy

Access Management

Intellectual Property Flow

How to

Manage

Shadow IT

step process

1 2 Where’s

data

going?

What are

the hard

requirements?

3

4

Stakeholders

and

policies

Risk-

based

policies

Policies

Allow / Block / Educate

Data Loss Prevention

Incident Response

5

6

7 Find

the

opportunities

Measure

and

Evolve

IT =

enabler

Q+A

1 Where’s data going?

Email:

FreeAssessment

@skyhighnetworks.com