CIOs are no longer the gatekeepers of tech. The gate itself has collapsed. Here’s what you can do now. Unauthorized use of tech and data, aka shadow IT and shadow AI, has bedeviled security teams and compliance officers for decades. “Individual workers may decide to use it without telling anyone and may even hide their use from their coworkers. Its stealth usage adds to the risks associated with it,” explains Kris Bondi, CEO and co-founder of Mimoto AI. Unfortunately, tech teams are losing the fight, especially with the onslaught of cheap and easily accessible AI. The gate has finally crashed, and the gatekeepers must now take a new approach. “We often see shadow IT as an elimination game, where organizations are trying to eliminate these services one by one. This is an ever-losing battle. Security teams can work to eliminate these services with automation, but this can lead to many broken workflows and an additional burden to already very overwhelmed analysts,” says Kyle Kurdziolek, BigID’s VP of security. “Instead of eliminating risk entirely, focus on minimizing damage when things go wrong,” suggests Ilia Badeev, head of data science at Trevolution Group, one of the largest travel ticket consolidators in the US for niche markets. “Build resilience, not just restriction.” Continue reading here.
We provide communication in written form only
pr@dyninno.com
Phone
+44 7391 796792
v.veltmane@dyninno.com
j.kondratovica@dynatech.lv
Phone
+37 120 65 5702
+37 129 61 3971
karnika.bahuguna@dyninno.in
i.cerevco@datapro.md
Phone
+37 379 420400
j.carreno@dyninno.com
Phone
+571 314 49 00053
We do not comment on anything which might negatively impact our business, our partnerships, our employees, or our competitors
We are happy to provide information at any time of day or night but ask you to understand that we require up to two hours to prepare any statement