Overview
Syllabus
0:05 Introduction: Mac Admins vs Shadow IT
3:18 Defining Shadow IT: Beyond Unauthorized Software
6:56 Why Shadow IT Matters: Security, Compliance, Operational Risk
8:00 Shadow IT in Mac Environments: Homebrew, OAuth SaaS, BYOD
10:33 Visibility with Jamf Pro: Extension Attributes as Your Glasses
12:03 Tracking Homebrew: Version, Casks, and Cross-Referencing with Polypane
13:11 Remediation: Education, Policies, and Restricted Software
14:44 BYOD Challenges: Personal Devices as Hidden Shadow IT
17:18 Get Well's BYOD Journey: Google MDM, Jamf Pro, and Account-Driven Enrollment
22:27 Third-Party Tools: Polypane for OAuth and SaaS Monitoring
28:28 Shadow AI: The New Frontier of Unauthorized Tools
32:10 Takeaways: Diligence, BYOD Strategy, Browser Management, and Shadow AI Preparedness
Taught by
Jamf