Description
Week 5: Brown Bag Lunch Presentation
Congratulations! You've been asked to prepare a short presentation for one of the company's Brown Bag Lunch training events.Choose one of the following articles to present to the attendees. After reading the article, prepare a set of talking points / speaker notes (one page) which highlight key information about the article and why Padgett-Beale employees should "care" about the topic.
1. Selecting the Right Cloud Operating Model: Privacy and Data Security in the Cloud
2. How to get the most from a managed IT services provider
3. Shadow IT: Mitigating Security Risks
Reading:
https://www.isaca.org/Journal/archives/2014/Volume...
https://www.cio.com/article/2930498/it-strategy/wh...
Explanation & Answer
Attached.
Surname
Name
Course
Professor
Date
Shadow IT
Shadow IT is the use IT solutions and security measures in an organization deployed by other
departments rather than the IT department. The organization might decide to use shadow IT on
such applications as personal purpose applications, productivity application or the information
that an organization does not want to have on the internet or on their network. Most companies
have been reported to be using the shadow IT rather than the IT department. The main aim of
every organization is to be as productive as possible. Most companies view the IT department as
a threat to forward progress due to the high costs incurred with the department.
However, shadow IT is not secure enough for cloud applications since secure steps and sound
policies that the IT department follows are not applied. IT department has all the resources and
knowledge required to contain and prevent any ris...