If you are not redirected, click here.

Shadow SaaS refers to unauthorized or unsanctioned Software-as-a-Service (SaaS) applications that employees or departments use without the knowledge or approval of their organization's IT or security teams. It is a subset of Shadow IT, which broadly includes any IT systems, devices, software, or services used outside the control of official IT governance.


While these tools may improve short-term productivity, they introduce significant security risks to data security, operations and more.  In today's SaaS App-centric world where employees log into hundreds of platforms daily, managing Shadow SaaS has become a security nightmare. 


For CISOs and security leaders, this session will cover the security implications of Shadow SaaS and the right strategies for addressing it. Seats are limited to facilitate meaningful discussion, so sign up today!

Webinar starts in:

days
hours
minutes
seconds
00
00
00
00
days
hours
minutes
seconds

What’s Covered

Defining Shadow SaaS

  • Examples of Shadow SaaS
  • Why Shadow SaaS Happens

Security Risks & Challenges

  • Overview of security implications
  • Why using Third Party Identity Providers can exacerbate the problem
  • OAuth Scope Management Challenges

Managing Shadow SaaS in Your Enterprise

  • A layered approach for addressing Shadow SaaS
  • Mitigation using SquareX Browser Detection and Response
  • Balancing security posture and innovation

Q&A 

Speakers

John Carse

Field CISO, SquareX

John Carse is Field CISO at SquareX, bringing over two decades of cybersecurity expertise to the role. His journey in cybersecurity began in 2003 while working with the US Navy, leading to extensive experience across Japan, Bahrain, Hawaii and Singapore. Prior to joining SquareX, John held executive security roles at major organizations including Dyson, Rakuten, Expedia Group, and JPMorgan.


At SquareX, John combines his deep technical knowledge and business experience to help enterprises understand and defend against browser-based attacks. A seasoned technologist with multiple cloud security patents, he holds an MBA in Entrepreneurship from IE Business School and a Bachelor's in Computer and Information Science from the University of Maryland Global Campus.

Take control of your Shadow SaaS risk with SquareX. Our Browser Detection and Response (BDR) solution detects OAuth scope violations, prevents data leakage to unauthorized applications, and gives you complete visibility into your true SaaS footprint.
Request a demo to discover blind spots in your current security approach.

Copyright © 2025. All rights reserved.