How effectively does your organization manage shadow IT to mitigate security risks?
Very effectively (With strict policies and monitoring in place)27%
Moderately effectively (But improvements could be made)57%
Not effectively (As shadow IT is not actively addressed)16%
Not applicable (As shadow IT is not a concern in our organization)1%
83 PARTICIPANTS
996 views1 Comment
Sort by:
Content you might like
I'm looking to create several strategic roadmap documents for senior management for a variety of platforms including ServiceNow and Salesforce. I need to consider the following points also: • Higher level "Why we are doing it" • Wider business benefits • Business Objective based • Need to include things being Secure & Resilient • Consider Tech Debt Does anyone have any examples of something similar they would be willing to share to give my ideas on the format and approach?
What is the general community sense of TikTok out there these days?
We opted to block it from our corporate devices and networks prior to the official US Government ban both from an infosec perspective, and also to avoid the politics of its use. Our marketing department has pushed several times to have some controlled access because they believe it can be used as a recruiting tool. So far they have not challenged this with any credible data to back that belief up, but we will be re-engaging with them on this topic again soon and expect more pressure.
I'm curious what the general perception is out in the community? Have you encountered any credible information security threats or has this "threat" been revealed to be a political paper one? I'm not seeking recommendations for what we should do, more to gauge what others are doing and how you're basing your decision.
At what stage is your organization on cyber resiliency?
We don't have an approved cyber resiliency strategy13%
We have an approved cyber resiliency strategy56%
We are executing our cyber resiliency strategy56%
We have a bunker site which will be used as a secure isolated recovery environment for recovery17%
We have cyber recovery capability12%
We have a secure isolated recovery environment13%
Strongly Agree29%
Agree63%
Disagree10%
Strongly Disagree1%
We use a CASB tool to identify all applications running in the organization.