Coping Successfully with Shadow IT

This webinar occured on February 19, 2014

About This Webinar

Coping Successfully with Shadow IT

Shadow IT is here to stay – deal with it. Reacting swiftly and effectively to shadow IT requests could start you on the journey to trusted operator status.

The business has made a purchase without involving IT, and like it or not, it’s up to you integrate it into your systems. While it may be an indication of a larger problem, right now you need a process to deal with the incident at hand. Provide the business with efficient and effective service and convert shadow IT incidents into opportunities to build a better relationship with the business.

We explored the following to help us understand the research landscape:

  • Why does shadow IT occur?
  • What is the first step in dealing with an instance of shadow IT?
  • How can we minimize the business interruption effects of shadow IT?
  • Is there any benefit to be gained from shadow IT?
  • How can we gauge our success with dealing with shadow IT?

This is an On-Demand webinar:

This webinar was previously recorded. To view our upcoming live sessions visit our Webinars page.

Featured Speaker

David Yackness
Research Director and Executive Advisor, CIO Practice
Read Bio

GET HELP Contact Us
VL Methodology