SlideShare a Scribd company logo
© 2014 CipherCloud | All rights
reserved
1
Shadow IT: The CISO Perspective
Panel Discussion with Security Experts
Paul Simmonds
CEO, Global Identity
Foundation
Former CISO, AstraZeneca
Rob McGillen
Chief Information Officer
Grant Thornton International
Chenxi Wang
VP, Cloud Security & of
Strategy
CipherCloud
© 2014 CipherCloud | All rights
reserved
2
Panelists
Rob McGillen
Chief Information Officer
Global head of technology
and CIO Responsible for
global IT shared services and
technology lead for 40,000
employees in 130 countries.
Drives global IT
transformation, cyber-
security, accounting practices
with cloud computing.
Paul Simmonds
CEO, Global Identity
Foundation
Co-Founder Jericho Forum
Co-Editor, Cloud Security
Alliance
Former CISO, AstraZeneca
Leading expert in
information security, de-
perimeterization, global
corporate architecture and
alignment of security and
business strategies.
Chenxi Wang, PhD
VP, Cloud Security,
CipherCloud
VP Strategy, Intel Security
VP Forrester Research
Technology expert and
strategist in cloud, mobile, and
enterprise security. Prominent
industry analyst and public
speaker and trusted advisor
for IT executives. Former
professor of computer
engineering at Carnegie
Mellon
Willy Leichter
Global Director, Cloud
Security
CipherCloud
Expert in helping Global
1000 companies meet
security and compliance
challenges as they
migrate business-critical
applications to the cloud.
Moderator
© 2014 CipherCloud | All rights
reserved
3
Scale of Enterprise Cloud Usage
The average
global
enterprise
utilizes over
1,100 cloud
applications
“
“
NA
EU
© 2014 CipherCloud | All rights
reserved
4
Extent of Enterprise Shadow IT
86% of cloud
applications
used by
enterprises
are
unsanctioned
Shadow IT
“
“
© 2014 CipherCloud | All rights
reserved
5
Cloud Collaboration Example
Assessmentofmajormediacompany
• 1100+ separatecloudapps
discovered
• 24%identified ashighrisk
• 113separatecollaborationappsin
use
• Cloudstoragesecondlargest
category
© 2014 CipherCloud | All rights
reserved
6
Defining ‘Shadow IT’
• What does it mean to you?
• How big is the problem?
• How did we get here?
Rob McGillen
Chief Information
Officer
Paul Simmonds
CEO, Global Identity
Foundation
Former CISO, AstraZeneca
Chenxi Wang, PhD
VP, Cloud Security,
CipherCloud
© 2014 CipherCloud | All rights
reserved
7
What are the risks?
• Examples of runaway Shadow IT
• Regulatory, legal and governance
risks
• Who owns the problem?
Rob McGillen
Chief Information
Officer
Paul Simmonds
CEO, Global Identity
Foundation
Former CISO, AstraZeneca
Chenxi Wang, PhD
VP, Cloud Security,
CipherCloud
© 2014 CipherCloud | All rights
reserved
8
Addressing the
problem
• Balancing meeting employee
needs
with saying “no”
• How to get actionable visibility
• Positive examples of companies
meeting the challenge
Rob McGillen
Chief Information
Officer
Paul Simmonds
CEO, Global Identity
Foundation
Former CISO, AstraZeneca
Chenxi Wang, PhD
VP, Cloud Security,
CipherCloud
© 2014 CipherCloud | All rights
reserved
9
Rob McGillen
RobMcgillen@gti.gt.
com
Paul Simmonds
paul.simmonds@globali
dentityfoundation.org
Chenxi Wang, PhD
cwang@ciphercloud.c
om
@chenxiwang
Willy Leichter
wleichter@ciphercloud.
com
@willyleichter
Q&A
© 2014 CipherCloud | All rights
reserved
10
500+ Employees
Company
3.0+ Million
Active Users
13 Industries
25 Countries
7 Languages
P 13 Patents
About CipherCloud
Solutions
Cloud Discovery
Cloud DLP
Strong Encryption
Tokenization
Activity Monitoring
Anomaly Detection
Customers
5 out of 10
Top US Banks
3 out of 5
Top Health Providers
Top 2 Global
Telecomm Company
40% of Global
Mail Delivery
Largest US
Media Company
3 out of 5
Top Pharmaceuticals
© 2014 CipherCloud | All rights
reserved
11
More Information
Watch On-Demand Recorded Webinar:
Shadow IT: The CISO Perspective on
Regaining Control
Visit our new:
Global Compliance Resource Center
For additional information :
• Website: www.ciphercloud.com
• Email: info@ciphercloud.com
• Phone: +1 855-5CIPHER
Twitter.com/ciphercloud
Youtube.com/user/CipherCloudVideo
Linkedin.com/company/ciphercloud
Facebook.com/ciphercloud
Connect with Us!

More Related Content

PPTX
CIO's Guide to Enterprise Cloud Adoption
PPTX
Webinar: Enable ServiceNow with Data Security, Visibility, and Compliance
PPTX
Understanding Global Data Protection Laws: Webinar
PPTX
Making Cloud Security Part of Your DNA Webinar Slides
PPTX
Office 365 in Focus. Security and Governance Strategies from the Experts - We...
PPTX
Cloud Security for Dummies Webinar — The Identity Edition
PPTX
Salesforce Security with Visibility, Control & Data Protection
PPTX
CipherCloud for Salesforce - Solution Overview
CIO's Guide to Enterprise Cloud Adoption
Webinar: Enable ServiceNow with Data Security, Visibility, and Compliance
Understanding Global Data Protection Laws: Webinar
Making Cloud Security Part of Your DNA Webinar Slides
Office 365 in Focus. Security and Governance Strategies from the Experts - We...
Cloud Security for Dummies Webinar — The Identity Edition
Salesforce Security with Visibility, Control & Data Protection
CipherCloud for Salesforce - Solution Overview

What's hot (20)

PPTX
Webinar bitglass - complete deck-2
PPTX
Bitglass Webinar - A Primer on CASBs and Cloud Security
PDF
ServiceNow Webinar 12/1: Simplify Security Operations - Detect, Prioritize an...
PPTX
Jervis Hui - No Tradeoffs: Cloud Security & Privacy Don't Need To Be At Odds
PPTX
Bitglass Webinar - Top 6 CASB Use Cases
PDF
Jisc cloud services: helping our members deliver their cloud strategies
PPTX
Data Privacy, Security, and Sovereignty in a Cloudy World
PPTX
Mitigating the Top 5 Cloud Security Threats
PPTX
CipherCloud Technology Overview: Encryption
PPTX
CipherCloud Webinar - Cloud Encryption & Tokenization 101
PDF
ThinAir Endpoint Visibility Security HIMSS2018 Brian_Reed
PPTX
Bitglass Webinar - 5 Cloud Security Best Practices for 2018
PDF
Security Risks: The Threat is Real
PPTX
CASB Cases: How Your Peers are Securing the Cloud
PDF
Robert Hurlbut - Threat Modeling for Secure Software Design
PPTX
Data Masking With The Delphix Dynamic Data Platform
PDF
Brochure Security
PPTX
CipherCloud Technology Overview: Tokenization
PPTX
WatchGuard Firewall & Network Security
PDF
Zero trust in a hybrid architecture
Webinar bitglass - complete deck-2
Bitglass Webinar - A Primer on CASBs and Cloud Security
ServiceNow Webinar 12/1: Simplify Security Operations - Detect, Prioritize an...
Jervis Hui - No Tradeoffs: Cloud Security & Privacy Don't Need To Be At Odds
Bitglass Webinar - Top 6 CASB Use Cases
Jisc cloud services: helping our members deliver their cloud strategies
Data Privacy, Security, and Sovereignty in a Cloudy World
Mitigating the Top 5 Cloud Security Threats
CipherCloud Technology Overview: Encryption
CipherCloud Webinar - Cloud Encryption & Tokenization 101
ThinAir Endpoint Visibility Security HIMSS2018 Brian_Reed
Bitglass Webinar - 5 Cloud Security Best Practices for 2018
Security Risks: The Threat is Real
CASB Cases: How Your Peers are Securing the Cloud
Robert Hurlbut - Threat Modeling for Secure Software Design
Data Masking With The Delphix Dynamic Data Platform
Brochure Security
CipherCloud Technology Overview: Tokenization
WatchGuard Firewall & Network Security
Zero trust in a hybrid architecture
Ad

Similar to Shadow IT: The CISO Perspective on Regaining Control (20)

PPTX
Shedding Light on Shadow IT for File Sharing
PDF
Bringing Cloud Computing Out of the Shadows: Shine the light on Shadow IT wit...
PDF
Ciphercloud Solutions Overview hsa oct2011
PDF
Top Cyber News Magazine - Oct 2022
PDF
Top Cyber News MAGAZINE. October 2022. Matthew Rosenquist.pdf
PPTX
Shadow IT Risk and Reward
PPTX
CRI "Lessons From The Front Lines" March 26th Dublin
PDF
Introducing IBM Cloud Security Enforcer, CASB, IDaaS and Threat Prevention
PDF
Enabling Secure Use of Cloud Applications
PPTX
CSA Atlanta Q1'2016 Chapter Meeting
PDF
IntelAdapt
PDF
The Secure Path to Value in the Cloud by Denny Heaberlin
PPTX
Dawn of the Intelligence Age by Dr. Anton Ravindran
PPTX
How to Bring Shadow IT to the Light
PPTX
Global Megatrends in Cybersecurity – A Survey of 1,000 CxOs
PPTX
Practical risk management for the multi cloud
PPTX
Cyber Security in the market place: HP CTO Day
PDF
cybersecurity-250
PPTX
Segurdad de red para la generacion de la nube symantec
Shedding Light on Shadow IT for File Sharing
Bringing Cloud Computing Out of the Shadows: Shine the light on Shadow IT wit...
Ciphercloud Solutions Overview hsa oct2011
Top Cyber News Magazine - Oct 2022
Top Cyber News MAGAZINE. October 2022. Matthew Rosenquist.pdf
Shadow IT Risk and Reward
CRI "Lessons From The Front Lines" March 26th Dublin
Introducing IBM Cloud Security Enforcer, CASB, IDaaS and Threat Prevention
Enabling Secure Use of Cloud Applications
CSA Atlanta Q1'2016 Chapter Meeting
IntelAdapt
The Secure Path to Value in the Cloud by Denny Heaberlin
Dawn of the Intelligence Age by Dr. Anton Ravindran
How to Bring Shadow IT to the Light
Global Megatrends in Cybersecurity – A Survey of 1,000 CxOs
Practical risk management for the multi cloud
Cyber Security in the market place: HP CTO Day
cybersecurity-250
Segurdad de red para la generacion de la nube symantec
Ad

More from CipherCloud (8)

PPTX
Cyber Security Lessons from the NSA
PPTX
Cloud Visibility & Cloud Data Loss Prevention Approaches
PPTX
CipherCloud at DreamForce 2014!
PDF
Encryption Crackability
PPTX
Customer Success Story by CipherCloud
PDF
A Casestudy on Salesforce Cloud Security
PPTX
CipherCloud's Solutions for Salesforce Chatter
PPTX
CipherCloud for Any App
Cyber Security Lessons from the NSA
Cloud Visibility & Cloud Data Loss Prevention Approaches
CipherCloud at DreamForce 2014!
Encryption Crackability
Customer Success Story by CipherCloud
A Casestudy on Salesforce Cloud Security
CipherCloud's Solutions for Salesforce Chatter
CipherCloud for Any App

Recently uploaded (20)

PDF
Video forgery: An extensive analysis of inter-and intra-frame manipulation al...
PDF
Architecture types and enterprise applications.pdf
PDF
WOOl fibre morphology and structure.pdf for textiles
PPTX
Final SEM Unit 1 for mit wpu at pune .pptx
PDF
Hybrid model detection and classification of lung cancer
PPTX
Tartificialntelligence_presentation.pptx
PDF
From MVP to Full-Scale Product A Startup’s Software Journey.pdf
PDF
A novel scalable deep ensemble learning framework for big data classification...
PPTX
1. Introduction to Computer Programming.pptx
PDF
ENT215_Completing-a-large-scale-migration-and-modernization-with-AWS.pdf
PDF
Zenith AI: Advanced Artificial Intelligence
PDF
DASA ADMISSION 2024_FirstRound_FirstRank_LastRank.pdf
PPTX
OMC Textile Division Presentation 2021.pptx
PDF
Getting started with AI Agents and Multi-Agent Systems
PDF
Developing a website for English-speaking practice to English as a foreign la...
PPTX
Programs and apps: productivity, graphics, security and other tools
PPTX
MicrosoftCybserSecurityReferenceArchitecture-April-2025.pptx
PPTX
observCloud-Native Containerability and monitoring.pptx
PPTX
TechTalks-8-2019-Service-Management-ITIL-Refresh-ITIL-4-Framework-Supports-Ou...
PDF
Profit Center Accounting in SAP S/4HANA, S4F28 Col11
Video forgery: An extensive analysis of inter-and intra-frame manipulation al...
Architecture types and enterprise applications.pdf
WOOl fibre morphology and structure.pdf for textiles
Final SEM Unit 1 for mit wpu at pune .pptx
Hybrid model detection and classification of lung cancer
Tartificialntelligence_presentation.pptx
From MVP to Full-Scale Product A Startup’s Software Journey.pdf
A novel scalable deep ensemble learning framework for big data classification...
1. Introduction to Computer Programming.pptx
ENT215_Completing-a-large-scale-migration-and-modernization-with-AWS.pdf
Zenith AI: Advanced Artificial Intelligence
DASA ADMISSION 2024_FirstRound_FirstRank_LastRank.pdf
OMC Textile Division Presentation 2021.pptx
Getting started with AI Agents and Multi-Agent Systems
Developing a website for English-speaking practice to English as a foreign la...
Programs and apps: productivity, graphics, security and other tools
MicrosoftCybserSecurityReferenceArchitecture-April-2025.pptx
observCloud-Native Containerability and monitoring.pptx
TechTalks-8-2019-Service-Management-ITIL-Refresh-ITIL-4-Framework-Supports-Ou...
Profit Center Accounting in SAP S/4HANA, S4F28 Col11

Shadow IT: The CISO Perspective on Regaining Control

  • 1. © 2014 CipherCloud | All rights reserved 1 Shadow IT: The CISO Perspective Panel Discussion with Security Experts Paul Simmonds CEO, Global Identity Foundation Former CISO, AstraZeneca Rob McGillen Chief Information Officer Grant Thornton International Chenxi Wang VP, Cloud Security & of Strategy CipherCloud
  • 2. © 2014 CipherCloud | All rights reserved 2 Panelists Rob McGillen Chief Information Officer Global head of technology and CIO Responsible for global IT shared services and technology lead for 40,000 employees in 130 countries. Drives global IT transformation, cyber- security, accounting practices with cloud computing. Paul Simmonds CEO, Global Identity Foundation Co-Founder Jericho Forum Co-Editor, Cloud Security Alliance Former CISO, AstraZeneca Leading expert in information security, de- perimeterization, global corporate architecture and alignment of security and business strategies. Chenxi Wang, PhD VP, Cloud Security, CipherCloud VP Strategy, Intel Security VP Forrester Research Technology expert and strategist in cloud, mobile, and enterprise security. Prominent industry analyst and public speaker and trusted advisor for IT executives. Former professor of computer engineering at Carnegie Mellon Willy Leichter Global Director, Cloud Security CipherCloud Expert in helping Global 1000 companies meet security and compliance challenges as they migrate business-critical applications to the cloud. Moderator
  • 3. © 2014 CipherCloud | All rights reserved 3 Scale of Enterprise Cloud Usage The average global enterprise utilizes over 1,100 cloud applications “ “ NA EU
  • 4. © 2014 CipherCloud | All rights reserved 4 Extent of Enterprise Shadow IT 86% of cloud applications used by enterprises are unsanctioned Shadow IT “ “
  • 5. © 2014 CipherCloud | All rights reserved 5 Cloud Collaboration Example Assessmentofmajormediacompany • 1100+ separatecloudapps discovered • 24%identified ashighrisk • 113separatecollaborationappsin use • Cloudstoragesecondlargest category
  • 6. © 2014 CipherCloud | All rights reserved 6 Defining ‘Shadow IT’ • What does it mean to you? • How big is the problem? • How did we get here? Rob McGillen Chief Information Officer Paul Simmonds CEO, Global Identity Foundation Former CISO, AstraZeneca Chenxi Wang, PhD VP, Cloud Security, CipherCloud
  • 7. © 2014 CipherCloud | All rights reserved 7 What are the risks? • Examples of runaway Shadow IT • Regulatory, legal and governance risks • Who owns the problem? Rob McGillen Chief Information Officer Paul Simmonds CEO, Global Identity Foundation Former CISO, AstraZeneca Chenxi Wang, PhD VP, Cloud Security, CipherCloud
  • 8. © 2014 CipherCloud | All rights reserved 8 Addressing the problem • Balancing meeting employee needs with saying “no” • How to get actionable visibility • Positive examples of companies meeting the challenge Rob McGillen Chief Information Officer Paul Simmonds CEO, Global Identity Foundation Former CISO, AstraZeneca Chenxi Wang, PhD VP, Cloud Security, CipherCloud
  • 9. © 2014 CipherCloud | All rights reserved 9 Rob McGillen RobMcgillen@gti.gt. com Paul Simmonds paul.simmonds@globali dentityfoundation.org Chenxi Wang, PhD cwang@ciphercloud.c om @chenxiwang Willy Leichter wleichter@ciphercloud. com @willyleichter Q&A
  • 10. © 2014 CipherCloud | All rights reserved 10 500+ Employees Company 3.0+ Million Active Users 13 Industries 25 Countries 7 Languages P 13 Patents About CipherCloud Solutions Cloud Discovery Cloud DLP Strong Encryption Tokenization Activity Monitoring Anomaly Detection Customers 5 out of 10 Top US Banks 3 out of 5 Top Health Providers Top 2 Global Telecomm Company 40% of Global Mail Delivery Largest US Media Company 3 out of 5 Top Pharmaceuticals
  • 11. © 2014 CipherCloud | All rights reserved 11 More Information Watch On-Demand Recorded Webinar: Shadow IT: The CISO Perspective on Regaining Control Visit our new: Global Compliance Resource Center For additional information : • Website: www.ciphercloud.com • Email: info@ciphercloud.com • Phone: +1 855-5CIPHER Twitter.com/ciphercloud Youtube.com/user/CipherCloudVideo Linkedin.com/company/ciphercloud Facebook.com/ciphercloud Connect with Us!