How to Wrangle In Shadow IT and Reduce Risk
Third-party services, apps, and tech have become fundamental to any business to continue to move to the cloud and build faster tomeet customer expectations. Often you’ll see that employees will mix personal and business accounts or sign up for free trials that may open your business to unknown third or fourth party risks.
Although it’s easy to say that you should only share your data with third parties you trust – it's difficult to accomplish in practice. If you don’t have 100% visibility and understanding into what company data is being shared with third parties, then it’s time to address your Shadow IT strategy.
Third-party risk management (TPRM) can help your teams manage third parties that your business knowingly shares data with, but taking it a step further with continuous audits and insights is crucial to addressing Shadow IT and gaining visibility into the data that your organization may unknowingly be sharing. Reducing the Shadow IT risk involves a collaborative shift and alignment across people, process, and technology within your business to be successful.
In this webinar, experienced professionals will share how they have achieved productive collaboration with other stakeholders when it comes to addressing third-party or nth party risk.
Download the webinar to learn:
- Common scenarios/examples of Shadow IT
- Which business units are impacted
- Strategies to ensure you’re business reduces Shadow IT and third-party risk
- How to gain internal alignment on reducing risk across third or nth party risk
Download Webinar
Meet the Panel
This month’s panelists have had extensive experience in Cybersecurity, IT, Engineering, and Third-Party Risk Management.
Learn more about their expertise and backgrounds.
Paul Valente
CEO @ VISO Trust
Gary Patterson
Senior Director of Enterprise Security @ The Aspen Group
David Hua
Head of Security @ Cadence
Dustin Sachs
Senior Manager, Information Security Risk Management @ World Fuel Services
Cynthia Cox
Director of Security Strategy and Planning @ Marqeta
Vesko Pehlivanov
Director of Security Engineering @ ID.me
Never Read a SOC 2 Again.
Automate 90% of your TPRM process with VISO Trust.