
Shadow IT
Panic! Sensitive company data leaked by a private smartphone. For many an IT manager or CIO this is their worst nightmare. And that’ s completely understandable. As an IT manager, you are not, or not sufficiently, in control of your organisations IT infrastructure. Due to the multiplicity of innovative communication possibilities, Shadow IT is becoming increasingly widespread.
The term Shadow IT is used to describe all IT assets used by employees within an organisation but which are outside the control (and often out of sight) of the IT department. In short, Shadow IT refers to all applications, Cloud Services and hardware that are not approved, managed or secured by an organisations IT department.
In this workshop, we discuss the 6 biggest business risks of Shadow IT and how to address them. Small steps, interesting insights and experiences shared based on more than 20 years of practical experience in this field.
Download here the slide deck of the workshop
More workshops

Organizational Behavior Management

Focusing on customers as a key to success

Manage your service delivery and compliancy with ISM and 4me

USM and 4me

The future of UX is conversational.

Governance, Risk and Compliance

The Art of Multi-Sourcing

Enterprise Service Management with Freshservice

Quick and easy grip on service management with USM

Cyber Asset Attack Surface Management

How to choose your ITSM / ESM tool

The Human Factor in Service Management

Experience Level Agreements

Service Improvement Planning

Shift-left & Automation

Self-service and Chat

Software Asset Management and Licence Management

Shadow IT
