Class Central is learner-supported. When you buy through links on our site, we may earn an affiliate commission.

YouTube

Shadow IT Battlefield - The CyberHaven Breach and Defenses That Worked

Security BSides San Francisco via YouTube

Overview

Coursera Spring Sale
40% Off Coursera Plus Annual!
Grab it
Learn how proactive Shadow IT controls and allowlist strategies can protect organizations from major security breaches through this 31-minute conference talk examining the CyberHaven breach case study. Explore the critical risks that Shadow IT poses to enterprise security and discover how implementing proactive allowlist strategies minimized business disruption for over 40 million users during a significant security incident. Gain practical insights into continuous monitoring frameworks, examine real-world metrics from the breach response, and acquire a actionable blueprint for developing robust Shadow IT defenses. Understand the specific controls that proved effective in containing the impact and learn how to implement similar protective measures in your organization's security architecture.

Syllabus

BSidesSF 2025 - Shadow IT Battlefield: The CyberHaven Breach and...(Rohit Bansal, Zach Pritchard)

Taught by

Security BSides San Francisco

Reviews

Start your review of Shadow IT Battlefield - The CyberHaven Breach and Defenses That Worked

Never Stop Learning.

Get personalized course recommendations, track subjects and courses with reminders, and more.

Someone learning on their laptop while sitting on the floor.