Shadow IT and Shadow Remote Access. How to Find It (for free!)

Posted on in Presentations

From the TeamViewer attack to the Nuance attack, we are just now beginning to see how often vendors have direct access to our networks. And many times, they never asked, it was just baked into the product or service they provide.

Interested? We have you covered! This popular session will also be streamed live in The Session Viewing Point, West Level 2 Room 2004.

John Strand


Owner, Black Hills Information Security

Technology Infrastructure & Operations Protecting Data & the Supply Chain Ecosystem Machine Learning & Artificial Intelligence

data loss prevention data lakes artificial intelligence & machine learning



Share With Your Community