13
SHADOW IT: PRIVACY AND RECORD MANAGER CONCERNS Linda Rush February 22, 2019

SHADOW IT: PRIVACY AND RECORD MANAGER CONCERNS...SHADOW IT: PRIVACY AND RECORD MANAGER CONCERNS Linda Rush February 22, 2019 . Disclaimer The statements and opinions made during this

  • Upload
    others

  • View
    6

  • Download
    0

Embed Size (px)

Citation preview

Page 1: SHADOW IT: PRIVACY AND RECORD MANAGER CONCERNS...SHADOW IT: PRIVACY AND RECORD MANAGER CONCERNS Linda Rush February 22, 2019 . Disclaimer The statements and opinions made during this

SHADOW IT:

PRIVACY AND

RECORD MANAGER

CONCERNS

Linda Rush

February 22, 2019

Page 2: SHADOW IT: PRIVACY AND RECORD MANAGER CONCERNS...SHADOW IT: PRIVACY AND RECORD MANAGER CONCERNS Linda Rush February 22, 2019 . Disclaimer The statements and opinions made during this

Disclaimer

The statements and opinions made during this presentation are those of the presenter only and do not necessarily reflect the official policy or position of any organization, employer or company.

2

Page 3: SHADOW IT: PRIVACY AND RECORD MANAGER CONCERNS...SHADOW IT: PRIVACY AND RECORD MANAGER CONCERNS Linda Rush February 22, 2019 . Disclaimer The statements and opinions made during this

What is Shadow IT?

• IT systems and solutions built, used and/or managed

without explicit organizational (IT) approval (or proper

licensing)

• Can be used on corporate devices/systems or cloud

• Any resource or applications

3

Page 4: SHADOW IT: PRIVACY AND RECORD MANAGER CONCERNS...SHADOW IT: PRIVACY AND RECORD MANAGER CONCERNS Linda Rush February 22, 2019 . Disclaimer The statements and opinions made during this

Unapproved Excel macros

Employee supplied software

File sharing apps

Social media

Collaboration tools (Slack, Monday.com)

SaaS, PaaS, IaaS

Examples of Shadow IT

Communication Apps (Skype, WebEx)

Productivity Apps (Evernote, Trello)

Messaging apps (WhatsApp, Viber)

Physical devices (flash drives, external drives)

Cloud storage (Dropbox, Google Drive)

BYOD (smartphone, tablet)

4

Page 5: SHADOW IT: PRIVACY AND RECORD MANAGER CONCERNS...SHADOW IT: PRIVACY AND RECORD MANAGER CONCERNS Linda Rush February 22, 2019 . Disclaimer The statements and opinions made during this

By 2020 1/3 of successful

attacks experienced by companies will be on shadow IT

resources (Gartner)

Shadow IT 30% to 40% of IT

spending in large enterprises (Gartner)

Shadow IT comprises

50% or more of IT

spending (Everest Group)

CIOs underestimate

number of cloud shadow IT by a

factor of 15 to 22 (Cisco)

DOES YOUR COMPANY HAVE

SHADOW IT?

18.1 % of files

uploaded to cloud-based file-sharing and collaboration services contain

sensitive data (McAfee)

83% of

organizations don’t

know the number

of Shadow IT apps

in use by their staff

(Cloud Security

Alliance)

Page 6: SHADOW IT: PRIVACY AND RECORD MANAGER CONCERNS...SHADOW IT: PRIVACY AND RECORD MANAGER CONCERNS Linda Rush February 22, 2019 . Disclaimer The statements and opinions made during this

Why do employees use Shadow IT?

Tech savvy employees (using applications/devices for personal use)

Increased capabilities of cloud computing

Company IT solutions seen as not efficient or cost-effective

Common Practice

Industry-specific/cross industry SaaS

6

Page 7: SHADOW IT: PRIVACY AND RECORD MANAGER CONCERNS...SHADOW IT: PRIVACY AND RECORD MANAGER CONCERNS Linda Rush February 22, 2019 . Disclaimer The statements and opinions made during this

Opportunities for Company

• Business more competitive

• Employee engagement with technology can lead to productivity

• Less need for employee training and management

• Relieve IT dept from supporting physical infrastructure

• Lead to innovations in business process/operations

• Cost savings

• Business-critical processes developed – efficient and effective operations

Page 8: SHADOW IT: PRIVACY AND RECORD MANAGER CONCERNS...SHADOW IT: PRIVACY AND RECORD MANAGER CONCERNS Linda Rush February 22, 2019 . Disclaimer The statements and opinions made during this

Risks to Company

Security/Privacy Data breaches Introduction of viruses,

malware, etc. Use of

unauthorized/unsecured devices

Insufficient security controls (i.e. encryption, access)

Duplication of systems Loss of respect for IT organization

Third Party Rights License compliance no license/improper use Intellection Property

violations infringement/combination Customer audit

Corporate/Record Management

Loss of control of data Company records/information

leaving Duplication of records data Regulatory audit Lack of integration/consistency

among corporate users Loss of access to

records/information (IT blocks)

Page 9: SHADOW IT: PRIVACY AND RECORD MANAGER CONCERNS...SHADOW IT: PRIVACY AND RECORD MANAGER CONCERNS Linda Rush February 22, 2019 . Disclaimer The statements and opinions made during this

As a records manager, why should you care?

Increased Risk for Security Violations

Company data stored & used by

unauthorized systems

Control of company data

Integrated information governance

approach

What is a “business record”

vs company information

Unauthorized access to

company records

9

Page 10: SHADOW IT: PRIVACY AND RECORD MANAGER CONCERNS...SHADOW IT: PRIVACY AND RECORD MANAGER CONCERNS Linda Rush February 22, 2019 . Disclaimer The statements and opinions made during this

Privacy Concerns

Data Protection

Data Subject Rights

Data Minimization

Transparency

Retention Accountability

Security

Vendor Management

Cross Border

Transfers

10

Page 11: SHADOW IT: PRIVACY AND RECORD MANAGER CONCERNS...SHADOW IT: PRIVACY AND RECORD MANAGER CONCERNS Linda Rush February 22, 2019 . Disclaimer The statements and opinions made during this

What should your company do?

DISCOVER/IDENTIFY MANAGE/GOVERN

11

Page 12: SHADOW IT: PRIVACY AND RECORD MANAGER CONCERNS...SHADOW IT: PRIVACY AND RECORD MANAGER CONCERNS Linda Rush February 22, 2019 . Disclaimer The statements and opinions made during this

Notable Breaches in 2018

Page 13: SHADOW IT: PRIVACY AND RECORD MANAGER CONCERNS...SHADOW IT: PRIVACY AND RECORD MANAGER CONCERNS Linda Rush February 22, 2019 . Disclaimer The statements and opinions made during this

QUESTIONS?

Linda Rush

[email protected]

13