Description: Welcome to the Mordor of security, where the eye of BYOD reigns supreme, and the proliferation of easy-to-use devices is creating
an unprecedented level of end user entitlement. A little knowledge has become a very dangerous thing by letting people “help themselves” to data and network access. Because who needs guidelines when you have Google? This is the world of Shadow Data/Shadow IT, where rules are known but not observed; where risks are taken regardless of known consequences; and where “keep it secret” definitely does not keep IT safe. What happens when users take it upon themselves to decide what tech they want to use and how they want to implement it? As the IoT proliferates, human nature will take its course. But all our technology cannot out-engineer human failings and susceptibility. Because that device, and the freedom to use it as the user sees fit, override anything we currently put in place. So how do we regain control? What will become our "one ring to rule them all"?
For More Information Please Visit:- http://www.bsidesto.ca/
Tags:
Disclaimer: We are a infosec video aggregator and this video is linked from an external website. The original author may be different from the user re-posting/linking it here. Please do not assume the authors to be same without verifying.