richard rushing

10
2014 Shadow IT …What Lurks inside… Richard Rushing CISO Motorola Mobility [email protected] Twitter: @secrich LinkedIN: Richard Rushing

Upload: davegbe

Post on 03-Aug-2015

55 views

Category:

Business


2 download

TRANSCRIPT

Page 1: Richard Rushing

2014 Shadow IT …What Lurks inside…

Richard Rushing CISO Motorola Mobility [email protected] Twitter: @secrich LinkedIN: Richard Rushing

Page 2: Richard Rushing

• Why Do we Live in the Shadows – People – Process – Technology – Culture – Organization

Page 3: Richard Rushing

Typical Change for IT – Not in our DNA

Desired End State Current State Developed End State

Page 4: Richard Rushing

• What is you Percentage of SHADOW IT?

• What is the IT Organization Percentage of Happy or Satisfied ?

• What is the number of Project you delivered Late or Over budget?

• You know the percentage now

Page 5: Richard Rushing

Mondays suck………….the rest of the week does too!

• World is a dangerous place.

Page 6: Richard Rushing

If we do not Change We will Fail Threats have grown to a level where we can not win

Page 7: Richard Rushing

Who’s Shadow is cast in your Organization – Marketing – Sales – Software Development (Non-IT) – HR – Legal – Facilities

Page 8: Richard Rushing

Common Shadows

• Cloud Services – Amazon, Google, etc..

• Data Transfer – DropBox, Box

• Collaboration – GotoMeeting, Webex

• Marketing – Everything PR, Ad, Agency

• Video Streaming - YouTube

• Wireless Networks – Yours does not work well

• BYOD – Phones, Tablets, Computers

• Email – Business over Personal

• Social Media – Facebook, Google+

Page 9: Richard Rushing

Solutions Fix the IT Issues / Outreach Program

Talk to the Levels below – Where the Action is

Amnesty Program – Take over Systems

Create Common Programs for Common Issues

Page 10: Richard Rushing

All Solutions should have BOS – Bring your own Security

Can not Beat them Join them Data Transfer – DropBox, Box, etc – Have Enterprise Additions

Cloud – Create Enterprise Managed Instances (Amazon, Google, etc)

Video Streaming – Ask reasons for the “Out Source”

Collaboration – Standardize, use the shadows to help test

BYOD – It’s a Policy Issue, Give the user choices you find you solve 95 percent

Wireless – Fix it and monitor of Access Points