Shadow IT Battlefield - The CyberHaven Breach and Defenses That Worked
Security BSides San Francisco via YouTube
The Most Addictive Python and SQL Courses
Power BI Fundamentals - Create visualizations and dashboards from scratch
Overview
Coursera Spring Sale
40% Off Coursera Plus Annual!
Grab it
Learn how proactive Shadow IT controls and allowlist strategies can protect organizations from major security breaches through this 31-minute conference talk examining the CyberHaven breach case study. Explore the critical risks that Shadow IT poses to enterprise security and discover how implementing proactive allowlist strategies minimized business disruption for over 40 million users during a significant security incident. Gain practical insights into continuous monitoring frameworks, examine real-world metrics from the breach response, and acquire a actionable blueprint for developing robust Shadow IT defenses. Understand the specific controls that proved effective in containing the impact and learn how to implement similar protective measures in your organization's security architecture.
Syllabus
BSidesSF 2025 - Shadow IT Battlefield: The CyberHaven Breach and...(Rohit Bansal, Zach Pritchard)
Taught by
Security BSides San Francisco