SlideShare a Scribd company logo
CISO Platform
Playbook Roundtable
Shadow IT Risks and
Controls
Build Tangible Community Goods Through
Sharing & Collaboration
Frameworks, Checklists, Playbooks..
CISO Platform Vision
• Build tangible community goods
• What our community has achieved:
• 300+ check-lists, frameworks & playbooks
• Platform for comparing security products
• Task force initiatives to solve specific industry problems
• Kid’s cyber safety initiatives
What is Shadow IT?
• Non-IT IT
• Products
• Business IT
• Cloud
• SaaS Applications
• Test Environment / Labs
• Data
• Spreadsheats
• Online Storage Solutions
• Video , Images
• Shared Folders
• Mobile Devices
• 3rd Party Vendors
• Vendor Driven PoCs
• End Points
• Liberal Access Controls and Policies
• Internal Employees
• Shared IT
Why Shadow IT?
• Evolution vs Innovation
• Policy Restrictions
• Policy Violations
• Restrictive
• Partnership with business and IT – Security is missing
• Business Needs and Restrictions
• Improve Productivity
• Organizational Architecture is missing
• Awareness and connect between business and IT
• Manufacturing
• Slow Turnaround time to setup software
Risks
• No standardization
• Unknown risks
• Security breaches
• Data leaks
Types
• Third party email service
• Third party applications – whatspp, box
• Unknown assets
• Custom applications / individual built applications / scripts
• Database
• Cloud Buckets, S3
• Github ..online code repository
• Online Free tools / SaaS
• API
• Owner change of assets (person has left)
• Data in non electronical/ Physical forms
• Shadow accounts/privileges
Types
• Shared / Leaked / Default / Weak / Written down passwords
• Backdoors
• IoT
• Rogue devices
• BYOD
• CCTV – source and data destination; set-top box
• 3rd party
• 4th party
• Supply chain
Shadow IT Risk Management Controls
• People
• Governance
• Awareness and Training
• Regular, Retraining and Reassessment
• Behavior Analysis
• Top Down Approach
• Awareness of Board of Directors
• Technology
• Detection
• Internal Asset Discovery
• LAN Sweepers
• Continuous Discover external Assets
• Leaked Password Discovery and Enforcement
• Password Cracking and Verification tool
• CASB
Shadow IT Risk Management Controls
• Process
• Detection
• Asset Inventory Program
• Create a Corporate Communication Program
• Control at Asset Purchase level
• Control at money outflow approach
• Prevention
• Regular Discovery of Assets
• 3rd Party Vendor Monitoring
• Automated based detection and alerts (Crawlers)
• SAST and DAST
Shadow IT Risk Management Controls
• Non-IT IT
• Governance
• Cloud
• SaaS Applications
• Data
• Spreadsheets
• Online Storage Solutions
• Video , Images
• Shared Folders
Shadow IT Risk Management Controls
• Test Environment / Labs
• Mobile Devices
• 3rd Party Vendors
• Vendor Driven PoCs
• End Points
• Liberal Access Controls and Policies
• Internal Employees
• Shared IT
Thank You

More Related Content

PDF
Big data analytics for legal fact finding
PPTX
Erik Nachbahr "Dealership Technology"
PDF
MISA Cloud workshop_ Security and risk mgmt
PDF
Computer Forensics – What Every Lawyer Needs to Know
PDF
Christopher Biedermann, EmiTel Ltd: Cybersecurity and the Internet of Things
KEY
Open Source & Citizen Science
PPTX
Self defending data webinar (feb13)
PPTX
Sample presentation
Big data analytics for legal fact finding
Erik Nachbahr "Dealership Technology"
MISA Cloud workshop_ Security and risk mgmt
Computer Forensics – What Every Lawyer Needs to Know
Christopher Biedermann, EmiTel Ltd: Cybersecurity and the Internet of Things
Open Source & Citizen Science
Self defending data webinar (feb13)
Sample presentation

What's hot (19)

PPTX
Sample presentation
PDF
Karel Obluk (Evolution Equity Partners) - Cybersecurity: Challenges and Oppor...
PDF
Information security and research data
PPTX
Information security - what is going on 2016
PDF
Content Blocking: End-user Perspectives
PDF
MISA Cloud Workshop_ ipc privacy in the cloud
PPTX
Data security
PPTX
CAIE - IGCSE - Computer Science and ICT
PPTX
Achieving Caribbean Cybersecuirty
PDF
Digital Assets Inventory Presentation-BMO-04-22.pdf
PDF
IoT PPT Deck
PPTX
Privacy in a digital world
PDF
Idc security graphic
PDF
Protecting Your Business from Unauthorized IBM i Access
PPTX
Shining a Light on Cyber Threats from the Dark Web
PPT
DSS ITSEC 2013 Conference 07.11.2013 - CERT.LV
PPTX
Things Security
PDF
TechCoastRodriguezFinal
Sample presentation
Karel Obluk (Evolution Equity Partners) - Cybersecurity: Challenges and Oppor...
Information security and research data
Information security - what is going on 2016
Content Blocking: End-user Perspectives
MISA Cloud Workshop_ ipc privacy in the cloud
Data security
CAIE - IGCSE - Computer Science and ICT
Achieving Caribbean Cybersecuirty
Digital Assets Inventory Presentation-BMO-04-22.pdf
IoT PPT Deck
Privacy in a digital world
Idc security graphic
Protecting Your Business from Unauthorized IBM i Access
Shining a Light on Cyber Threats from the Dark Web
DSS ITSEC 2013 Conference 07.11.2013 - CERT.LV
Things Security
TechCoastRodriguezFinal
Ad

Similar to Shadow it risks & control managing the unknown unknowns in the deep & dark web (20)

PDF
DSS ITSEC CONFERENCE - Spector360 as productivity and security tool - Riga NO...
PPTX
Securing Your Digital Files from Legal Threats
PDF
CNIT 121: 2 IR Management Handbook
PPTX
Data Breaches and Security Rights in SharePoint Webinar
PDF
Track 5 session 1 - st dev con 2016 - need for security for iot
PPTX
DSS.LV - Principles Of Data Protection - March2015 By Arturs Filatovs
PPTX
Understanding Zero Trust Security for IBM i
PDF
Forensics intro
PPTX
Improve IT Security and Compliance with Mainframe Data in Splunk
PPTX
Webinar - Compliance with the Microsoft Cloud- 2017-04-19
PDF
Accelerating Regulatory Compliance for IBM i Systems
PPTX
IBM i Security SIEM Integration
PPTX
ITAM Portfolio-The Big Umbrella-Slideshare.pptx
PDF
Office 365 Security Features That Nonprofits Should Know and Use
PPT
Intrusion detection 2001
PPTX
Protect your Database with Data Masking & Enforced Version Control
PPTX
Tsc2021 cyber-issues
PPTX
The New Framework for Modern Data Privacy and Security
PPT
Managing Your Digital Footprint - 2012 National BDPA Conference Presentation
PPTX
Cyber security
DSS ITSEC CONFERENCE - Spector360 as productivity and security tool - Riga NO...
Securing Your Digital Files from Legal Threats
CNIT 121: 2 IR Management Handbook
Data Breaches and Security Rights in SharePoint Webinar
Track 5 session 1 - st dev con 2016 - need for security for iot
DSS.LV - Principles Of Data Protection - March2015 By Arturs Filatovs
Understanding Zero Trust Security for IBM i
Forensics intro
Improve IT Security and Compliance with Mainframe Data in Splunk
Webinar - Compliance with the Microsoft Cloud- 2017-04-19
Accelerating Regulatory Compliance for IBM i Systems
IBM i Security SIEM Integration
ITAM Portfolio-The Big Umbrella-Slideshare.pptx
Office 365 Security Features That Nonprofits Should Know and Use
Intrusion detection 2001
Protect your Database with Data Masking & Enforced Version Control
Tsc2021 cyber-issues
The New Framework for Modern Data Privacy and Security
Managing Your Digital Footprint - 2012 National BDPA Conference Presentation
Cyber security
Ad

More from Priyanka Aash (20)

PPTX
AI Code Generation Risks (Ramkumar Dilli, CIO, Myridius)
PDF
From Chatbot to Destroyer of Endpoints - Can ChatGPT Automate EDR Bypasses (1...
PDF
Cracking the Code - Unveiling Synergies Between Open Source Security and AI.pdf
PDF
Oh, the Possibilities - Balancing Innovation and Risk with Generative AI.pdf
PDF
Lessons Learned from Developing Secure AI Workflows.pdf
PDF
Cyber Defense Matrix Workshop - RSA Conference
PDF
A Constitutional Quagmire - Ethical Minefields of AI, Cyber, and Privacy.pdf
PDF
Securing AI - There Is No Try, Only Do!.pdf
PDF
GenAI Opportunities and Challenges - Where 370 Enterprises Are Focusing Now.pdf
PDF
Coordinated Disclosure for ML - What's Different and What's the Same.pdf
PDF
10 Key Challenges for AI within the EU Data Protection Framework.pdf
PDF
Techniques for Automatic Device Identification and Network Assignment.pdf
PDF
Keynote : Presentation on SASE Technology
PDF
Keynote : AI & Future Of Offensive Security
PDF
Redefining Cybersecurity with AI Capabilities
PDF
Demystifying Neural Networks And Building Cybersecurity Applications
PDF
Finetuning GenAI For Hacking and Defending
PDF
(CISOPlatform Summit & SACON 2024) Kids Cyber Security .pdf
PDF
(CISOPlatform Summit & SACON 2024) Regulation & Response In Banks.pdf
PDF
(CISOPlatform Summit & SACON 2024) Cyber Insurance & Risk Quantification.pdf
AI Code Generation Risks (Ramkumar Dilli, CIO, Myridius)
From Chatbot to Destroyer of Endpoints - Can ChatGPT Automate EDR Bypasses (1...
Cracking the Code - Unveiling Synergies Between Open Source Security and AI.pdf
Oh, the Possibilities - Balancing Innovation and Risk with Generative AI.pdf
Lessons Learned from Developing Secure AI Workflows.pdf
Cyber Defense Matrix Workshop - RSA Conference
A Constitutional Quagmire - Ethical Minefields of AI, Cyber, and Privacy.pdf
Securing AI - There Is No Try, Only Do!.pdf
GenAI Opportunities and Challenges - Where 370 Enterprises Are Focusing Now.pdf
Coordinated Disclosure for ML - What's Different and What's the Same.pdf
10 Key Challenges for AI within the EU Data Protection Framework.pdf
Techniques for Automatic Device Identification and Network Assignment.pdf
Keynote : Presentation on SASE Technology
Keynote : AI & Future Of Offensive Security
Redefining Cybersecurity with AI Capabilities
Demystifying Neural Networks And Building Cybersecurity Applications
Finetuning GenAI For Hacking and Defending
(CISOPlatform Summit & SACON 2024) Kids Cyber Security .pdf
(CISOPlatform Summit & SACON 2024) Regulation & Response In Banks.pdf
(CISOPlatform Summit & SACON 2024) Cyber Insurance & Risk Quantification.pdf

Recently uploaded (20)

PDF
Agricultural_Statistics_at_a_Glance_2022_0.pdf
PDF
Architecting across the Boundaries of two Complex Domains - Healthcare & Tech...
PPTX
Digital-Transformation-Roadmap-for-Companies.pptx
PDF
KodekX | Application Modernization Development
PDF
Blue Purple Modern Animated Computer Science Presentation.pdf.pdf
PDF
Review of recent advances in non-invasive hemoglobin estimation
PPTX
Cloud computing and distributed systems.
PPTX
Big Data Technologies - Introduction.pptx
PDF
Reach Out and Touch Someone: Haptics and Empathic Computing
PPT
Teaching material agriculture food technology
PDF
Building Integrated photovoltaic BIPV_UPV.pdf
PDF
Machine learning based COVID-19 study performance prediction
PPTX
Spectroscopy.pptx food analysis technology
PDF
Diabetes mellitus diagnosis method based random forest with bat algorithm
PDF
Chapter 3 Spatial Domain Image Processing.pdf
PDF
The Rise and Fall of 3GPP – Time for a Sabbatical?
PDF
Profit Center Accounting in SAP S/4HANA, S4F28 Col11
PDF
Electronic commerce courselecture one. Pdf
PPTX
Effective Security Operations Center (SOC) A Modern, Strategic, and Threat-In...
PDF
Build a system with the filesystem maintained by OSTree @ COSCUP 2025
Agricultural_Statistics_at_a_Glance_2022_0.pdf
Architecting across the Boundaries of two Complex Domains - Healthcare & Tech...
Digital-Transformation-Roadmap-for-Companies.pptx
KodekX | Application Modernization Development
Blue Purple Modern Animated Computer Science Presentation.pdf.pdf
Review of recent advances in non-invasive hemoglobin estimation
Cloud computing and distributed systems.
Big Data Technologies - Introduction.pptx
Reach Out and Touch Someone: Haptics and Empathic Computing
Teaching material agriculture food technology
Building Integrated photovoltaic BIPV_UPV.pdf
Machine learning based COVID-19 study performance prediction
Spectroscopy.pptx food analysis technology
Diabetes mellitus diagnosis method based random forest with bat algorithm
Chapter 3 Spatial Domain Image Processing.pdf
The Rise and Fall of 3GPP – Time for a Sabbatical?
Profit Center Accounting in SAP S/4HANA, S4F28 Col11
Electronic commerce courselecture one. Pdf
Effective Security Operations Center (SOC) A Modern, Strategic, and Threat-In...
Build a system with the filesystem maintained by OSTree @ COSCUP 2025

Shadow it risks & control managing the unknown unknowns in the deep & dark web

  • 2. Build Tangible Community Goods Through Sharing & Collaboration Frameworks, Checklists, Playbooks..
  • 3. CISO Platform Vision • Build tangible community goods • What our community has achieved: • 300+ check-lists, frameworks & playbooks • Platform for comparing security products • Task force initiatives to solve specific industry problems • Kid’s cyber safety initiatives
  • 4. What is Shadow IT? • Non-IT IT • Products • Business IT • Cloud • SaaS Applications • Test Environment / Labs • Data • Spreadsheats • Online Storage Solutions • Video , Images • Shared Folders • Mobile Devices • 3rd Party Vendors • Vendor Driven PoCs • End Points • Liberal Access Controls and Policies • Internal Employees • Shared IT
  • 5. Why Shadow IT? • Evolution vs Innovation • Policy Restrictions • Policy Violations • Restrictive • Partnership with business and IT – Security is missing • Business Needs and Restrictions • Improve Productivity • Organizational Architecture is missing • Awareness and connect between business and IT • Manufacturing • Slow Turnaround time to setup software
  • 6. Risks • No standardization • Unknown risks • Security breaches • Data leaks
  • 7. Types • Third party email service • Third party applications – whatspp, box • Unknown assets • Custom applications / individual built applications / scripts • Database • Cloud Buckets, S3 • Github ..online code repository • Online Free tools / SaaS • API • Owner change of assets (person has left) • Data in non electronical/ Physical forms • Shadow accounts/privileges
  • 8. Types • Shared / Leaked / Default / Weak / Written down passwords • Backdoors • IoT • Rogue devices • BYOD • CCTV – source and data destination; set-top box • 3rd party • 4th party • Supply chain
  • 9. Shadow IT Risk Management Controls • People • Governance • Awareness and Training • Regular, Retraining and Reassessment • Behavior Analysis • Top Down Approach • Awareness of Board of Directors • Technology • Detection • Internal Asset Discovery • LAN Sweepers • Continuous Discover external Assets • Leaked Password Discovery and Enforcement • Password Cracking and Verification tool • CASB
  • 10. Shadow IT Risk Management Controls • Process • Detection • Asset Inventory Program • Create a Corporate Communication Program • Control at Asset Purchase level • Control at money outflow approach • Prevention • Regular Discovery of Assets • 3rd Party Vendor Monitoring • Automated based detection and alerts (Crawlers) • SAST and DAST
  • 11. Shadow IT Risk Management Controls • Non-IT IT • Governance • Cloud • SaaS Applications • Data • Spreadsheets • Online Storage Solutions • Video , Images • Shared Folders
  • 12. Shadow IT Risk Management Controls • Test Environment / Labs • Mobile Devices • 3rd Party Vendors • Vendor Driven PoCs • End Points • Liberal Access Controls and Policies • Internal Employees • Shared IT