Skip navigation EPAM
Dark Mode
Light Mode
CONTACT US

Bringing Shadow IT to Light: How to Build an Effective Risk Strategy

Today, shadow IT is an organizational reality. Without proper management and oversight, it can quickly spin out of control and expose your company to many risks.

During this one-hour discussion, our experts explore how to:

  • Connect applying privacy regulations, such as CCPA, GDPR, HIPAA and GLBA, to Shadow IT initiatives
  • Build an effective Shadow IT strategy that works for all stakeholders
  • Share what compliance and regulatory challenges you need to consider while charting your roadmap

Speakers:

Sam Rehman
CISO & Head of Cybersecurity, EPAM Systems

Mr. Rehman leads EPAM's internal and external security functions as Chief Information Security Officer, SVP. In his role, he is responsible for all aspects of information security in the company.
With 30+ years of experience in both software product engineering and security, he is a proven technology expert and evangelist with patented inventions in software security, cloud computing, storage systems and distributed computing.  While his most recent role was as Head of Digital Engineering Business of Cognizant, and prior to that, as the CTO of Arxan, a security industry leader in application self-protection products, Sam was previously EPAM's CTO and Co-Head of Global Delivery.

Boris Khazin
Head of Governance, Risk & Compliance, EPAM Systems 

Mr. Khazin has more than 20 years of experience in Risk Strategy, Compliance, Governance, Process Improvement, Management, and Leadership with top global banks, investment firms and insurance. Boris holds a Bachelor of Science degree in Behavioral Economics from Pennsylvania State University and an MBA from PACE University. Boris is a pragmatic, disciplined, and hands-on technical and functional expert with extensive consulting experience.

Scott Bridgen
Global Offering Manager of GRC, OneTrus

Watch Now

Thank you!

Click here to watch the webinar to learn how your organization can deal with shadow IT and cybersecurity issues that can arise.

Oops, something went wrong.

Please try again.

* Indicates required fields

*Please complete required fields

GET IN TOUCH

Hi! We’d love to hear from you.

Want to talk to us about your business needs?