Shadow IT and Shadow Remote Access. How to Find It (for free!) (Session Viewing Point)


Posted on in Presentations

From the TeamViewer attack to the Nuance attack, we are just now beginning to see how often vendors have direct access to our networks. And many times, they never asked, it was just baked into the product or service they provide.
Participants
John Strand

Participant

Owner, Black Hills Information Security

Technology Infrastructure & Operations Protecting Data & the Supply Chain Ecosystem Machine Learning & Artificial Intelligence

data loss prevention data lakes artificial intelligence & machine learning


Topic

Subtopic


Share With Your Community