Shadow IT and Shadow Remote Access. How to Find It (for free!)


Posted on in Presentations

From the TeamViewer attack to the Nuance attack, we are just now beginning to see how often vendors have direct access to our networks. And many times, they never asked, it was just baked into the product or service they provide.

Access This and Other RSAC Conference Presentations with Your Free RSAC Membership

Your RSAC Membership also includes AI-powered summaries, mind maps, and slides for Conference presentations, Group Discussions with experts, and more.

Watch Now >>
Participants
John Strand

Participant

Owner, Black Hills Information Security


Share With Your Community