What We Do in the Shadows – Gaining Visibility & Control Over Non-traditional I.T.
Abacode’s Chief Technology Officer (CTO) and Chief Information Security Officer (CISO), Jeremy Rasmussen, will be giving a talk at the next Tampa Bay ISC² Chapter Meeting.
With ubiquitous mobile/wireless, IoT devices, cloud computing, social media, etc., our enterprise has little semblance to the traditional castle concept. It’s more like an amorphous blob, or worse, the Beta XII-A entity from ST:TOS “Day of the Dove.” So, what can we do about it? In this talk, I’ll provide real-world examples of things I have seen in 20+ years of infosec audits and provide advice on best practices for addressing “shadow IT.” For example, how do you really protect/monitor IoT devices? Or, how do you protect/monitor social media? How do you ensure that everything comes under centralized control for provisioning, I&A, access control, etc.? I don’t have all the answers but will at least try to get you out of the shadows and shine a light that will make the cockroaches scatter. – Jeremy Rasmussen, CISSP, CEH, PMP