- What is Shadow IT? How will you define it?
- Why is Shadow IT is a problem from various perspectives such compliance, security, business operations etc.?
- How is the Shadow IT really created?
- How to detect Shadow IT?
- How to prevent Shadow IT?
Here is a link to the details: https://www.cisoplatform.com/profiles/blogs/shadow-it-you-cannot-protect-what-you-cant-see