
Sign up to save your podcasts
Or


Edward Henriquez's "Decoded: The Cybersecurity Podcast" episode on Shadow IT uses a newscast format to explain this hidden use of unapproved technology within organizations. The podcast defines Shadow IT as hardware, software, or services adopted without IT oversight, highlighting the risks it poses through unmonitored data and security vulnerabilities. It explores the reasons behind Shadow IT, suggesting it often stems from slow IT processes rather than malicious intent. The episode further details real-world impacts of Shadow IT leading to data breaches and offers practical steps for discovery, education, governance, and continuous monitoring to mitigate these risks. Ultimately, the podcast positions Shadow IT not as a threat itself, but as an indicator of unmet user needs and advocates for a balanced approach between security and enabling innovation.
By Edward Henriquez4.8
44 ratings
Edward Henriquez's "Decoded: The Cybersecurity Podcast" episode on Shadow IT uses a newscast format to explain this hidden use of unapproved technology within organizations. The podcast defines Shadow IT as hardware, software, or services adopted without IT oversight, highlighting the risks it poses through unmonitored data and security vulnerabilities. It explores the reasons behind Shadow IT, suggesting it often stems from slow IT processes rather than malicious intent. The episode further details real-world impacts of Shadow IT leading to data breaches and offers practical steps for discovery, education, governance, and continuous monitoring to mitigate these risks. Ultimately, the podcast positions Shadow IT not as a threat itself, but as an indicator of unmet user needs and advocates for a balanced approach between security and enabling innovation.

56,402 Listeners

7,999 Listeners

175 Listeners

134 Listeners

25 Listeners