Corralling Shadow IT &
Enabling Secure Adoption of
Cloud Services
Featuring:
Andy Radle
Cloud Security Architect – HP
Harold Byun
Sr. Director Product Management – Skyhigh Networks
Shadow IT Today
CSA Congress - 2014 2
Cloud Adoption & Risk Report | 3
Cloud Adoption & Risk Report | 4
Cloud Adoption & Risk Report | 5
Average Number of Cloud Services Used per
Company
1505
907 874 851 834
756 733 694
656
428
0
200
400
600
800
1000
1200
1400
1600
a) identifying the scope of Shadow IT,
“Shadow IT”
a) identifying the scope of Shadow IT, Do we have a
Shadow IT
problem? Compliance
Privacy
Access Management
Intellectual Property Flow
How to
Manage
Shadow IT
step process
1 2 Where’s
data
going?
What are
the hard
requirements?
3
4
Stakeholders
and
policies
Risk-
based
policies
Policies
Allow / Block / Educate
Data Loss Prevention
Incident Response
5
6
7 Find
the
opportunities
Measure
and
Evolve
1 Where’s data going?
Email:
FreeAssessment
@skyhighnetworks.com