SlideShare ist ein Scribd-Unternehmen logo
1 von 11
© 2014 CipherCloud | All rights
reserved
1
Shadow IT: The CISO Perspective
Panel Discussion with Security Experts
Paul Simmonds
CEO, Global Identity
Foundation
Former CISO, AstraZeneca
Rob McGillen
Chief Information Officer
Grant Thornton International
Chenxi Wang
VP, Cloud Security & of
Strategy
CipherCloud
© 2014 CipherCloud | All rights
reserved
2
Panelists
Rob McGillen
Chief Information Officer
Global head of technology
and CIO Responsible for
global IT shared services and
technology lead for 40,000
employees in 130 countries.
Drives global IT
transformation, cyber-
security, accounting practices
with cloud computing.
Paul Simmonds
CEO, Global Identity
Foundation
Co-Founder Jericho Forum
Co-Editor, Cloud Security
Alliance
Former CISO, AstraZeneca
Leading expert in
information security, de-
perimeterization, global
corporate architecture and
alignment of security and
business strategies.
Chenxi Wang, PhD
VP, Cloud Security,
CipherCloud
VP Strategy, Intel Security
VP Forrester Research
Technology expert and
strategist in cloud, mobile, and
enterprise security. Prominent
industry analyst and public
speaker and trusted advisor
for IT executives. Former
professor of computer
engineering at Carnegie
Mellon
Willy Leichter
Global Director, Cloud
Security
CipherCloud
Expert in helping Global
1000 companies meet
security and compliance
challenges as they
migrate business-critical
applications to the cloud.
Moderator
© 2014 CipherCloud | All rights
reserved
3
Scale of Enterprise Cloud Usage
The average
global
enterprise
utilizes over
1,100 cloud
applications
“
“
NA
EU
© 2014 CipherCloud | All rights
reserved
4
Extent of Enterprise Shadow IT
86% of cloud
applications
used by
enterprises
are
unsanctioned
Shadow IT
“
“
© 2014 CipherCloud | All rights
reserved
5
Cloud Collaboration Example
Assessmentofmajormediacompany
• 1100+ separatecloudapps
discovered
• 24%identified ashighrisk
• 113separatecollaborationappsin
use
• Cloudstoragesecondlargest
category
© 2014 CipherCloud | All rights
reserved
6
Defining ‘Shadow IT’
• What does it mean to you?
• How big is the problem?
• How did we get here?
Rob McGillen
Chief Information
Officer
Paul Simmonds
CEO, Global Identity
Foundation
Former CISO, AstraZeneca
Chenxi Wang, PhD
VP, Cloud Security,
CipherCloud
© 2014 CipherCloud | All rights
reserved
7
What are the risks?
• Examples of runaway Shadow IT
• Regulatory, legal and governance
risks
• Who owns the problem?
Rob McGillen
Chief Information
Officer
Paul Simmonds
CEO, Global Identity
Foundation
Former CISO, AstraZeneca
Chenxi Wang, PhD
VP, Cloud Security,
CipherCloud
© 2014 CipherCloud | All rights
reserved
8
Addressing the
problem
• Balancing meeting employee
needs
with saying “no”
• How to get actionable visibility
• Positive examples of companies
meeting the challenge
Rob McGillen
Chief Information
Officer
Paul Simmonds
CEO, Global Identity
Foundation
Former CISO, AstraZeneca
Chenxi Wang, PhD
VP, Cloud Security,
CipherCloud
© 2014 CipherCloud | All rights
reserved
9
Rob McGillen
RobMcgillen@gti.gt.
com
Paul Simmonds
paul.simmonds@globali
dentityfoundation.org
Chenxi Wang, PhD
cwang@ciphercloud.c
om
@chenxiwang
Willy Leichter
wleichter@ciphercloud.
com
@willyleichter
Q&A
© 2014 CipherCloud | All rights
reserved
10
500+ Employees
Company
3.0+ Million
Active Users
13 Industries
25 Countries
7 Languages
P 13 Patents
About CipherCloud
Solutions
Cloud Discovery
Cloud DLP
Strong Encryption
Tokenization
Activity Monitoring
Anomaly Detection
Customers
5 out of 10
Top US Banks
3 out of 5
Top Health Providers
Top 2 Global
Telecomm Company
40% of Global
Mail Delivery
Largest US
Media Company
3 out of 5
Top Pharmaceuticals
© 2014 CipherCloud | All rights
reserved
11
More Information
Watch On-Demand Recorded Webinar:
Shadow IT: The CISO Perspective on
Regaining Control
Visit our new:
Global Compliance Resource Center
For additional information :
• Website: www.ciphercloud.com
• Email: info@ciphercloud.com
• Phone: +1 855-5CIPHER
Twitter.com/ciphercloud
Youtube.com/user/CipherCloudVideo
Linkedin.com/company/ciphercloud
Facebook.com/ciphercloud
Connect with Us!

Weitere ähnliche Inhalte

Was ist angesagt?

Brochure Security
Brochure SecurityBrochure Security
Brochure Security
bryanpsu
 

Was ist angesagt? (20)

Webinar bitglass - complete deck-2
Webinar   bitglass - complete deck-2Webinar   bitglass - complete deck-2
Webinar bitglass - complete deck-2
 
Bitglass Webinar - A Primer on CASBs and Cloud Security
Bitglass Webinar - A Primer on CASBs and Cloud SecurityBitglass Webinar - A Primer on CASBs and Cloud Security
Bitglass Webinar - A Primer on CASBs and Cloud Security
 
ServiceNow Webinar 12/1: Simplify Security Operations - Detect, Prioritize an...
ServiceNow Webinar 12/1: Simplify Security Operations - Detect, Prioritize an...ServiceNow Webinar 12/1: Simplify Security Operations - Detect, Prioritize an...
ServiceNow Webinar 12/1: Simplify Security Operations - Detect, Prioritize an...
 
Jervis Hui - No Tradeoffs: Cloud Security & Privacy Don't Need To Be At Odds
Jervis Hui - No Tradeoffs: Cloud Security & Privacy Don't Need To Be At OddsJervis Hui - No Tradeoffs: Cloud Security & Privacy Don't Need To Be At Odds
Jervis Hui - No Tradeoffs: Cloud Security & Privacy Don't Need To Be At Odds
 
Bitglass Webinar - Top 6 CASB Use Cases
Bitglass Webinar - Top 6 CASB Use CasesBitglass Webinar - Top 6 CASB Use Cases
Bitglass Webinar - Top 6 CASB Use Cases
 
Jisc cloud services: helping our members deliver their cloud strategies
Jisc cloud services: helping our members deliver their cloud strategiesJisc cloud services: helping our members deliver their cloud strategies
Jisc cloud services: helping our members deliver their cloud strategies
 
Data Privacy, Security, and Sovereignty in a Cloudy World
Data Privacy, Security, and Sovereignty in a Cloudy WorldData Privacy, Security, and Sovereignty in a Cloudy World
Data Privacy, Security, and Sovereignty in a Cloudy World
 
Mitigating the Top 5 Cloud Security Threats
Mitigating the Top 5 Cloud Security ThreatsMitigating the Top 5 Cloud Security Threats
Mitigating the Top 5 Cloud Security Threats
 
CipherCloud Technology Overview: Encryption
CipherCloud Technology Overview: EncryptionCipherCloud Technology Overview: Encryption
CipherCloud Technology Overview: Encryption
 
CipherCloud Webinar - Cloud Encryption & Tokenization 101
CipherCloud Webinar - Cloud Encryption & Tokenization 101CipherCloud Webinar - Cloud Encryption & Tokenization 101
CipherCloud Webinar - Cloud Encryption & Tokenization 101
 
ThinAir Endpoint Visibility Security HIMSS2018 Brian_Reed
ThinAir Endpoint Visibility Security HIMSS2018 Brian_ReedThinAir Endpoint Visibility Security HIMSS2018 Brian_Reed
ThinAir Endpoint Visibility Security HIMSS2018 Brian_Reed
 
Bitglass Webinar - 5 Cloud Security Best Practices for 2018
Bitglass Webinar - 5 Cloud Security Best Practices for 2018Bitglass Webinar - 5 Cloud Security Best Practices for 2018
Bitglass Webinar - 5 Cloud Security Best Practices for 2018
 
Security Risks: The Threat is Real
Security Risks: The Threat is RealSecurity Risks: The Threat is Real
Security Risks: The Threat is Real
 
CASB Cases: How Your Peers are Securing the Cloud
CASB Cases: How Your Peers are Securing the CloudCASB Cases: How Your Peers are Securing the Cloud
CASB Cases: How Your Peers are Securing the Cloud
 
Robert Hurlbut - Threat Modeling for Secure Software Design
Robert Hurlbut - Threat Modeling for Secure Software DesignRobert Hurlbut - Threat Modeling for Secure Software Design
Robert Hurlbut - Threat Modeling for Secure Software Design
 
Data Masking With The Delphix Dynamic Data Platform
Data Masking With The Delphix Dynamic Data PlatformData Masking With The Delphix Dynamic Data Platform
Data Masking With The Delphix Dynamic Data Platform
 
Brochure Security
Brochure SecurityBrochure Security
Brochure Security
 
CipherCloud Technology Overview: Tokenization
CipherCloud Technology Overview: TokenizationCipherCloud Technology Overview: Tokenization
CipherCloud Technology Overview: Tokenization
 
WatchGuard Firewall & Network Security
WatchGuard Firewall & Network SecurityWatchGuard Firewall & Network Security
WatchGuard Firewall & Network Security
 
Zero trust in a hybrid architecture
Zero trust in a hybrid architectureZero trust in a hybrid architecture
Zero trust in a hybrid architecture
 

Ähnlich wie Shadow IT: The CISO Perspective on Regaining Control

Ähnlich wie Shadow IT: The CISO Perspective on Regaining Control (20)

OS17 Brochure
OS17 BrochureOS17 Brochure
OS17 Brochure
 
The 10 most trusted companies in enterprise security 2019
The 10 most trusted companies in enterprise security 2019The 10 most trusted companies in enterprise security 2019
The 10 most trusted companies in enterprise security 2019
 
Sleeping well with cloud services
Sleeping well with cloud servicesSleeping well with cloud services
Sleeping well with cloud services
 
Carbon Black: 32 Security Experts on Changing Endpoint Security
Carbon Black: 32 Security Experts on Changing Endpoint SecurityCarbon Black: 32 Security Experts on Changing Endpoint Security
Carbon Black: 32 Security Experts on Changing Endpoint Security
 
How to Connect Your Server Room to the Board Room – Before a Data Breach Occurs
How to Connect Your Server Room to the Board Room – Before a Data Breach OccursHow to Connect Your Server Room to the Board Room – Before a Data Breach Occurs
How to Connect Your Server Room to the Board Room – Before a Data Breach Occurs
 
CWIN17 telford gdpr or how to eat the elephant a bit at a time - andy powell
CWIN17 telford   gdpr or how to eat the elephant a bit at a time - andy powellCWIN17 telford   gdpr or how to eat the elephant a bit at a time - andy powell
CWIN17 telford gdpr or how to eat the elephant a bit at a time - andy powell
 
Responding to Cybersecurity Threats: What SMEs and Professional Accountants N...
Responding to Cybersecurity Threats: What SMEs and Professional Accountants N...Responding to Cybersecurity Threats: What SMEs and Professional Accountants N...
Responding to Cybersecurity Threats: What SMEs and Professional Accountants N...
 
Responding to the Pandemic: Information Security and Technology Trends
Responding to the Pandemic: Information Security and Technology Trends Responding to the Pandemic: Information Security and Technology Trends
Responding to the Pandemic: Information Security and Technology Trends
 
How to Build a Winning Cybersecurity Team
How to Build a Winning Cybersecurity TeamHow to Build a Winning Cybersecurity Team
How to Build a Winning Cybersecurity Team
 
Trustwave: 7 Experts on Transforming Your Threat Detection & Response Strategy
Trustwave: 7 Experts on Transforming Your Threat Detection & Response StrategyTrustwave: 7 Experts on Transforming Your Threat Detection & Response Strategy
Trustwave: 7 Experts on Transforming Your Threat Detection & Response Strategy
 
Jason Tooley – Welcome to Vision Solution Day EMEA
Jason Tooley – Welcome to Vision Solution Day EMEAJason Tooley – Welcome to Vision Solution Day EMEA
Jason Tooley – Welcome to Vision Solution Day EMEA
 
10 Most Influential Leaders in Cybersecurity, 2022.pdf
10 Most Influential Leaders in Cybersecurity, 2022.pdf10 Most Influential Leaders in Cybersecurity, 2022.pdf
10 Most Influential Leaders in Cybersecurity, 2022.pdf
 
Global CCISO Forum 2018 | Anthony Dupree "Evolving Role of the CISO: Reshapin...
Global CCISO Forum 2018 | Anthony Dupree "Evolving Role of the CISO: Reshapin...Global CCISO Forum 2018 | Anthony Dupree "Evolving Role of the CISO: Reshapin...
Global CCISO Forum 2018 | Anthony Dupree "Evolving Role of the CISO: Reshapin...
 
10 Most Influential Leaders in Cybersecurity 2022.pdf
10 Most Influential Leaders in Cybersecurity 2022.pdf10 Most Influential Leaders in Cybersecurity 2022.pdf
10 Most Influential Leaders in Cybersecurity 2022.pdf
 
Alfresco Virtual DevCon 2020 - Security First!
Alfresco Virtual DevCon 2020 - Security First!Alfresco Virtual DevCon 2020 - Security First!
Alfresco Virtual DevCon 2020 - Security First!
 
Cybersecurity Snapshot December_2019
Cybersecurity Snapshot December_2019Cybersecurity Snapshot December_2019
Cybersecurity Snapshot December_2019
 
Cybersecurity for Your Law Firm: Data Security and Data Encryption
Cybersecurity for Your Law Firm: Data Security and Data EncryptionCybersecurity for Your Law Firm: Data Security and Data Encryption
Cybersecurity for Your Law Firm: Data Security and Data Encryption
 
Cyber Job Fair Job Seeker Handbook Oct 29, 2014, Baltimore, MD
Cyber Job Fair Job Seeker Handbook Oct 29, 2014, Baltimore, MDCyber Job Fair Job Seeker Handbook Oct 29, 2014, Baltimore, MD
Cyber Job Fair Job Seeker Handbook Oct 29, 2014, Baltimore, MD
 
Azure Security.pdf
Azure Security.pdfAzure Security.pdf
Azure Security.pdf
 
Azure security
Azure securityAzure security
Azure security
 

Mehr von CipherCloud

Shedding Light on Shadow IT for File Sharing
Shedding Light on Shadow IT for File SharingShedding Light on Shadow IT for File Sharing
Shedding Light on Shadow IT for File Sharing
CipherCloud
 
Encryption Crackability
Encryption CrackabilityEncryption Crackability
Encryption Crackability
CipherCloud
 

Mehr von CipherCloud (9)

Cyber Security Lessons from the NSA
Cyber Security Lessons from the NSACyber Security Lessons from the NSA
Cyber Security Lessons from the NSA
 
Cloud Visibility & Cloud Data Loss Prevention Approaches
 Cloud Visibility & Cloud Data Loss Prevention Approaches Cloud Visibility & Cloud Data Loss Prevention Approaches
Cloud Visibility & Cloud Data Loss Prevention Approaches
 
Shedding Light on Shadow IT for File Sharing
Shedding Light on Shadow IT for File SharingShedding Light on Shadow IT for File Sharing
Shedding Light on Shadow IT for File Sharing
 
CipherCloud at DreamForce 2014!
CipherCloud at DreamForce 2014!CipherCloud at DreamForce 2014!
CipherCloud at DreamForce 2014!
 
Encryption Crackability
Encryption CrackabilityEncryption Crackability
Encryption Crackability
 
Customer Success Story by CipherCloud
Customer Success Story by CipherCloudCustomer Success Story by CipherCloud
Customer Success Story by CipherCloud
 
A Casestudy on Salesforce Cloud Security
A Casestudy on Salesforce Cloud SecurityA Casestudy on Salesforce Cloud Security
A Casestudy on Salesforce Cloud Security
 
CipherCloud's Solutions for Salesforce Chatter
CipherCloud's Solutions for Salesforce ChatterCipherCloud's Solutions for Salesforce Chatter
CipherCloud's Solutions for Salesforce Chatter
 
CipherCloud for Any App
CipherCloud for Any AppCipherCloud for Any App
CipherCloud for Any App
 

Kürzlich hochgeladen

Tales from a Passkey Provider Progress from Awareness to Implementation.pptx
Tales from a Passkey Provider  Progress from Awareness to Implementation.pptxTales from a Passkey Provider  Progress from Awareness to Implementation.pptx
Tales from a Passkey Provider Progress from Awareness to Implementation.pptx
FIDO Alliance
 
TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...
TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...
TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...
TrustArc
 

Kürzlich hochgeladen (20)

The Metaverse: Are We There Yet?
The  Metaverse:    Are   We  There  Yet?The  Metaverse:    Are   We  There  Yet?
The Metaverse: Are We There Yet?
 
Observability Concepts EVERY Developer Should Know (DevOpsDays Seattle)
Observability Concepts EVERY Developer Should Know (DevOpsDays Seattle)Observability Concepts EVERY Developer Should Know (DevOpsDays Seattle)
Observability Concepts EVERY Developer Should Know (DevOpsDays Seattle)
 
Using IESVE for Room Loads Analysis - UK & Ireland
Using IESVE for Room Loads Analysis - UK & IrelandUsing IESVE for Room Loads Analysis - UK & Ireland
Using IESVE for Room Loads Analysis - UK & Ireland
 
Tales from a Passkey Provider Progress from Awareness to Implementation.pptx
Tales from a Passkey Provider  Progress from Awareness to Implementation.pptxTales from a Passkey Provider  Progress from Awareness to Implementation.pptx
Tales from a Passkey Provider Progress from Awareness to Implementation.pptx
 
Vector Search @ sw2con for slideshare.pptx
Vector Search @ sw2con for slideshare.pptxVector Search @ sw2con for slideshare.pptx
Vector Search @ sw2con for slideshare.pptx
 
Choosing the Right FDO Deployment Model for Your Application _ Geoffrey at In...
Choosing the Right FDO Deployment Model for Your Application _ Geoffrey at In...Choosing the Right FDO Deployment Model for Your Application _ Geoffrey at In...
Choosing the Right FDO Deployment Model for Your Application _ Geoffrey at In...
 
Event-Driven Architecture Masterclass: Engineering a Robust, High-performance...
Event-Driven Architecture Masterclass: Engineering a Robust, High-performance...Event-Driven Architecture Masterclass: Engineering a Robust, High-performance...
Event-Driven Architecture Masterclass: Engineering a Robust, High-performance...
 
Design Guidelines for Passkeys 2024.pptx
Design Guidelines for Passkeys 2024.pptxDesign Guidelines for Passkeys 2024.pptx
Design Guidelines for Passkeys 2024.pptx
 
Google I/O Extended 2024 Warsaw
Google I/O Extended 2024 WarsawGoogle I/O Extended 2024 Warsaw
Google I/O Extended 2024 Warsaw
 
Human Expert Website Manual WCAG 2.0 2.1 2.2 Audit - Digital Accessibility Au...
Human Expert Website Manual WCAG 2.0 2.1 2.2 Audit - Digital Accessibility Au...Human Expert Website Manual WCAG 2.0 2.1 2.2 Audit - Digital Accessibility Au...
Human Expert Website Manual WCAG 2.0 2.1 2.2 Audit - Digital Accessibility Au...
 
Linux Foundation Edge _ Overview of FDO Software Components _ Randy at Intel.pdf
Linux Foundation Edge _ Overview of FDO Software Components _ Randy at Intel.pdfLinux Foundation Edge _ Overview of FDO Software Components _ Randy at Intel.pdf
Linux Foundation Edge _ Overview of FDO Software Components _ Randy at Intel.pdf
 
The Value of Certifying Products for FDO _ Paul at FIDO Alliance.pdf
The Value of Certifying Products for FDO _ Paul at FIDO Alliance.pdfThe Value of Certifying Products for FDO _ Paul at FIDO Alliance.pdf
The Value of Certifying Products for FDO _ Paul at FIDO Alliance.pdf
 
Where to Learn More About FDO _ Richard at FIDO Alliance.pdf
Where to Learn More About FDO _ Richard at FIDO Alliance.pdfWhere to Learn More About FDO _ Richard at FIDO Alliance.pdf
Where to Learn More About FDO _ Richard at FIDO Alliance.pdf
 
TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...
TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...
TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...
 
UiPath manufacturing technology benefits and AI overview
UiPath manufacturing technology benefits and AI overviewUiPath manufacturing technology benefits and AI overview
UiPath manufacturing technology benefits and AI overview
 
TopCryptoSupers 12thReport OrionX May2024
TopCryptoSupers 12thReport OrionX May2024TopCryptoSupers 12thReport OrionX May2024
TopCryptoSupers 12thReport OrionX May2024
 
Intro to Passkeys and the State of Passwordless.pptx
Intro to Passkeys and the State of Passwordless.pptxIntro to Passkeys and the State of Passwordless.pptx
Intro to Passkeys and the State of Passwordless.pptx
 
WebRTC and SIP not just audio and video @ OpenSIPS 2024
WebRTC and SIP not just audio and video @ OpenSIPS 2024WebRTC and SIP not just audio and video @ OpenSIPS 2024
WebRTC and SIP not just audio and video @ OpenSIPS 2024
 
How Red Hat Uses FDO in Device Lifecycle _ Costin and Vitaliy at Red Hat.pdf
How Red Hat Uses FDO in Device Lifecycle _ Costin and Vitaliy at Red Hat.pdfHow Red Hat Uses FDO in Device Lifecycle _ Costin and Vitaliy at Red Hat.pdf
How Red Hat Uses FDO in Device Lifecycle _ Costin and Vitaliy at Red Hat.pdf
 
Portal Kombat : extension du réseau de propagande russe
Portal Kombat : extension du réseau de propagande russePortal Kombat : extension du réseau de propagande russe
Portal Kombat : extension du réseau de propagande russe
 

Shadow IT: The CISO Perspective on Regaining Control

  • 1. © 2014 CipherCloud | All rights reserved 1 Shadow IT: The CISO Perspective Panel Discussion with Security Experts Paul Simmonds CEO, Global Identity Foundation Former CISO, AstraZeneca Rob McGillen Chief Information Officer Grant Thornton International Chenxi Wang VP, Cloud Security & of Strategy CipherCloud
  • 2. © 2014 CipherCloud | All rights reserved 2 Panelists Rob McGillen Chief Information Officer Global head of technology and CIO Responsible for global IT shared services and technology lead for 40,000 employees in 130 countries. Drives global IT transformation, cyber- security, accounting practices with cloud computing. Paul Simmonds CEO, Global Identity Foundation Co-Founder Jericho Forum Co-Editor, Cloud Security Alliance Former CISO, AstraZeneca Leading expert in information security, de- perimeterization, global corporate architecture and alignment of security and business strategies. Chenxi Wang, PhD VP, Cloud Security, CipherCloud VP Strategy, Intel Security VP Forrester Research Technology expert and strategist in cloud, mobile, and enterprise security. Prominent industry analyst and public speaker and trusted advisor for IT executives. Former professor of computer engineering at Carnegie Mellon Willy Leichter Global Director, Cloud Security CipherCloud Expert in helping Global 1000 companies meet security and compliance challenges as they migrate business-critical applications to the cloud. Moderator
  • 3. © 2014 CipherCloud | All rights reserved 3 Scale of Enterprise Cloud Usage The average global enterprise utilizes over 1,100 cloud applications “ “ NA EU
  • 4. © 2014 CipherCloud | All rights reserved 4 Extent of Enterprise Shadow IT 86% of cloud applications used by enterprises are unsanctioned Shadow IT “ “
  • 5. © 2014 CipherCloud | All rights reserved 5 Cloud Collaboration Example Assessmentofmajormediacompany • 1100+ separatecloudapps discovered • 24%identified ashighrisk • 113separatecollaborationappsin use • Cloudstoragesecondlargest category
  • 6. © 2014 CipherCloud | All rights reserved 6 Defining ‘Shadow IT’ • What does it mean to you? • How big is the problem? • How did we get here? Rob McGillen Chief Information Officer Paul Simmonds CEO, Global Identity Foundation Former CISO, AstraZeneca Chenxi Wang, PhD VP, Cloud Security, CipherCloud
  • 7. © 2014 CipherCloud | All rights reserved 7 What are the risks? • Examples of runaway Shadow IT • Regulatory, legal and governance risks • Who owns the problem? Rob McGillen Chief Information Officer Paul Simmonds CEO, Global Identity Foundation Former CISO, AstraZeneca Chenxi Wang, PhD VP, Cloud Security, CipherCloud
  • 8. © 2014 CipherCloud | All rights reserved 8 Addressing the problem • Balancing meeting employee needs with saying “no” • How to get actionable visibility • Positive examples of companies meeting the challenge Rob McGillen Chief Information Officer Paul Simmonds CEO, Global Identity Foundation Former CISO, AstraZeneca Chenxi Wang, PhD VP, Cloud Security, CipherCloud
  • 9. © 2014 CipherCloud | All rights reserved 9 Rob McGillen RobMcgillen@gti.gt. com Paul Simmonds paul.simmonds@globali dentityfoundation.org Chenxi Wang, PhD cwang@ciphercloud.c om @chenxiwang Willy Leichter wleichter@ciphercloud. com @willyleichter Q&A
  • 10. © 2014 CipherCloud | All rights reserved 10 500+ Employees Company 3.0+ Million Active Users 13 Industries 25 Countries 7 Languages P 13 Patents About CipherCloud Solutions Cloud Discovery Cloud DLP Strong Encryption Tokenization Activity Monitoring Anomaly Detection Customers 5 out of 10 Top US Banks 3 out of 5 Top Health Providers Top 2 Global Telecomm Company 40% of Global Mail Delivery Largest US Media Company 3 out of 5 Top Pharmaceuticals
  • 11. © 2014 CipherCloud | All rights reserved 11 More Information Watch On-Demand Recorded Webinar: Shadow IT: The CISO Perspective on Regaining Control Visit our new: Global Compliance Resource Center For additional information : • Website: www.ciphercloud.com • Email: info@ciphercloud.com • Phone: +1 855-5CIPHER Twitter.com/ciphercloud Youtube.com/user/CipherCloudVideo Linkedin.com/company/ciphercloud Facebook.com/ciphercloud Connect with Us!