Artwork
iconShare
 
Manage episode 492953111 series 3675981
Content provided by Dr Jason Edwards. All podcast content including episodes, graphics, and podcast descriptions are uploaded and provided directly by Dr Jason Edwards or their podcast platform partner. If you believe someone is using your copyrighted work without your permission, you can follow the process outlined here https://staging.podcastplayer.com/legal.

Shadow IT introduces risk outside of sanctioned governance. This episode teaches you how to audit unsanctioned applications, unauthorized system use, and spreadsheet-based end-user tools. You will also learn how to identify detection methods, review compensating controls, and evaluate policies to reduce shadow IT exposure—skills that frequently appear on the CISA exam. Ready to start your journey with confidence? Learn more at BareMetalCyber.com.

  continue reading

105 episodes