1. Resources
  2. Video


The Good, the Bad, and the Ugly: How to Illuminate & Mitigate Shadow IT

Speakers: James Tommey, Senior Director IT, CS DISCO; Trevor Bruner, Principal Product Manager, SailPoint

Shadow IT is a dangerous, yet a common feature of companies adopting SaaS products. The ease for individuals to sign up for free or low-cost tools coupled with the simplicity of integrating those tools with your business-critical applications means that it is more important than ever to detect Shadow IT quickly and deal with it effectively. Attend this session for a lively discussion on the good, the bad, and the ugly sides of shadow IT, along with a deep dive into the strategies and tactics to mitigate the risks to your business.

Discover more resources to help your organization
automate identity processes

automate simplify thumbnail image
Automate and simplify
Identity Security at Scale

Uncover how automation is key to helping organizations minimize risk and increase organizational efficiencies.

Read the blog
7 best practices thumbnail image
7 Best Practices for Identity Security

Looking to develop a next-gen identity security solution? Here are seven steps we’ve identified to make it easier.

Read article
thumbnail image of an ebook
Securing a “Work from Anywhere” Workforce

Learn why identity is essential at helping secure worker access wherever they may be.

Get the ebook

Discover the
journey forward

Accelerate your identity security transformation with confidence. Assess the maturity of your identity capabilities.