Coping Successfully with Shadow IT

This webinar occured on February 19, 2014

About This Webinar

Coping Successfully with Shadow IT

Shadow IT is here to stay – deal with it. Reacting swiftly and effectively to shadow IT requests could start you on the journey to trusted operator status.

The business has made a purchase without involving IT, and like it or not, it’s up to you integrate it into your systems. While it may be an indication of a larger problem, right now you need a process to deal with the incident at hand. Provide the business with efficient and effective service and convert shadow IT incidents into opportunities to build a better relationship with the business.

We explored the following to help us understand the research landscape:

  • Why does shadow IT occur?
  • What is the first step in dealing with an instance of shadow IT?
  • How can we minimize the business interruption effects of shadow IT?
  • Is there any benefit to be gained from shadow IT?
  • How can we gauge our success with dealing with shadow IT?

This is an On-Demand webinar:

This webinar was previously recorded. To view our upcoming live sessions visit our Webinars page.

Featured Speaker

David Yackness
Director, CIO Advisory
Read Bio

Help lead your peers

Help make our research the best it can be. Sign-up for a phone interview with our analyst and share your experience with this project.

Research Interview

Exclusive workshops for the early bird

We are offering upcoming workshops to qualified companies to help us “road-test” our research. Sign-up to see if this valuable offer is right for you.

Exclusive Workshop
GET HELP Contact Us
VL Methodology