Security Considerations About Shadow IT: Detecting, Mitigating, and Protecting Your Environment
As organizations continue to evolve digitally, the surge of Shadow IT – the use of unauthorized technologies, devices, and applications within a company – has become a pressing concern. These undocumented assets can pose significant security risks, often acting as unnoticed entry points for cyber threats. This session sheds light on the multifaceted challenge of Shadow IT, providing attendees with insights on detecting its presence, mitigating associated risks, and safeguarding organizational environments against potential breaches. By exploring real-world scenarios, tools, and best practices, we'll offer a guide to manage and respond to the challenge that Shadow IT presents.
Sign in to ITAPA Health&Care 2025
Marek Chmel
He is a seasoned cloud solutions architect with a specialization in data, cloud and security at Konica Minolta. With an illustrious career spanning over 15 years, Marek combines his technical expertise with exceptional speaking and training skills. Recognized for his in-depth knowledge of SQL Server, Azure, and cybersecurity, he is an influential figure in the tech community and has been distinguished as a Data Platform MVP between 2012 and 2020. In his roles as principal database administrator and sr. cloud solutions architect, he has helped both internal & external customers on their projects for complex enterprise environments. With his long-time colleague and co-speaker, Marek published 3 books covering various data management and da…
See more info about the speaker