Shadow IT Battlefield - The CyberHaven Breach and Defenses That Worked
Security BSides San Francisco via YouTube
Power BI Fundamentals - Create visualizations and dashboards from scratch
AI, Data Science & Cloud Certificates from Google, IBM & Meta
Overview
Google, IBM & Meta Certificates — All 10,000+ Courses at 40% Off
One annual plan covers every course and certificate on Coursera. 40% off for a limited time.
Get Full Access
Learn how proactive Shadow IT controls and allowlist strategies can protect organizations from major security breaches through this 31-minute conference talk examining the CyberHaven breach case study. Explore the critical risks that Shadow IT poses to enterprise security and discover how implementing proactive allowlist strategies minimized business disruption for over 40 million users during a significant security incident. Gain practical insights into continuous monitoring frameworks, examine real-world metrics from the breach response, and acquire a actionable blueprint for developing robust Shadow IT defenses. Understand the specific controls that proved effective in containing the impact and learn how to implement similar protective measures in your organization's security architecture.
Syllabus
BSidesSF 2025 - Shadow IT Battlefield: The CyberHaven Breach and...(Rohit Bansal, Zach Pritchard)
Taught by
Security BSides San Francisco