
Name
                                    Full of SaaS and TOTALLY SECURE!
                                        Description
                                    How do you effectively manage the risk that the rapid and decentralized adoption of SaaS apps present to your organization, given that traditional approaches have proven effective and, in some cases, are too late to prevent any real security issues?
In this session, we’ll discuss some of the psychology behind why information security is often referred to as the “department of NO” as well as how to start shifting that perception.  You will also learn of some tactics to identify and mitigate shadow IT as well as proactive measures that may help avoid future sprawl.
                                        Speakers
                                    
                                
Date & Time
                                    Tuesday, July 23, 2024, 9:00 AM - 10:15 AM
                                        Location Name
                                    Texas 6
                                        Session Type
                                    Talk
                                        Track
                                    Technology for All
                                        Learning Level
                                    Learning
                                        Learning Objectives
                                    Attendees will leave the session with new tools, helping them to:
- understand the potential risks of SaaS sprawl and shadow IT and how to communicate them to stakeholders
- improve their ability to detect and classify the technology users are introducing into their environments
- develop an application approval process that is conducive to the pace of modern business
- intervene quicker to try and prevent risky behavior in regards to technology adoption
                                        - understand the potential risks of SaaS sprawl and shadow IT and how to communicate them to stakeholders
- improve their ability to detect and classify the technology users are introducing into their environments
- develop an application approval process that is conducive to the pace of modern business
- intervene quicker to try and prevent risky behavior in regards to technology adoption
Survey  Link