Episode 50: Shadow IT and End-User Computing
Shadow IT introduces risk outside the view of central IT. In this episode, you will learn how to identify and audit unauthorized tools, spreadsheets, applications, and systems created by business units. We also cover end-user computing controls, policies, and monitoring, which are increasingly tested in Domain 4 scenarios. Ready to start your journey with confidence? Learn more at BareMetalCyber.com.
