Cloud Wars
  • Home
  • Top 10
  • CW Minute
  • CW Podcast
  • Categories
    • AI and Copilots
    • Innovation & Leadership
    • Cybersecurity
    • Data
  • Member Resources
    • Cloud Wars AI Agent
    • Digital Summits
    • Guidebooks
    • Reports
  • About Us
    • Our Story
    • Tech Analysts
    • Marketing Services
  • Summit NA
  • Dynamics Communities
  • Ask Copilot
Twitter Instagram
  • Summit NA
  • Dynamics Communities
  • AI Copilot Summit NA
  • Ask Cloud Wars
Twitter LinkedIn
Cloud Wars
  • Home
  • Top 10
  • CW Minute
  • CW Podcast
  • Categories
    • AI and CopilotsWelcome to the Acceleration Economy AI Index, a weekly segment where we cover the most important recent news in AI innovation, funding, and solutions in under 10 minutes. Our goal is to get you up to speed – the same speed AI innovation is taking place nowadays – and prepare you for that upcoming customer call, board meeting, or conversation with your colleague.
    • Innovation & Leadership
    • CybersecurityThe practice of defending computers, servers, mobile devices, electronic systems, networks, and data from malicious attacks.
    • Data
  • Member Resources
    • Cloud Wars AI Agent
    • Digital Summits
    • Guidebooks
    • Reports
  • About Us
    • Our Story
    • Tech Analysts
    • Marketing Services
    • Login / Register
Cloud Wars
    • Login / Register
Home » Podcast: Creating a Culture to Value Data
Cybersecurity

Podcast: Creating a Culture to Value Data

A Back @ IT Podcast Episode
Aaron BackBy Aaron BackSeptember 7, 2021Updated:April 13, 20234 Mins Read
Facebook Twitter LinkedIn Email
To adjust the volume hover the cursor over the volume bar
Share
Facebook Twitter LinkedIn Email

The value of data has been vastly underestimated. Additionally, it’s sometimes viewed as “out of sight, out of mind” – until a data breach happens.

So, how can this be rectified?

Cue the CFO. You might think this is something the CIO should manage. And, you would be partly correct. However, the CFO needs hands-on involvement in how, when, why, and what is being invested in technology.

Data as an essential asset should be important enough to a line item on the balance sheet. This creates visibility to the organization and the value that the CFO has placed on the data.

Jason Yaeger, CEO of Tenacity

In this “Back @ IT” episode, I’m joined by Jason Yaeger, CEO of Tenacity Cloud. We chat about security, privacy, value, and the importance of the CFO’s role in creating a culture to value data.

Highlights

02:03: Jason outlines his 25-year experience in technology. He has worked with the healthcare and financial industries. Additionally, he has led teams as Operations Manager, VP of Operations and Product Development, and Chief Security and Revenue Officer.

06:26: Security should be viewed holistically. Previously, a focus on just the ingress or egress of legacy on-premise systems was more simplistic. However, the points of access have increased dramatically.

09:51: Web-enabled devices are everywhere. But, do they all make sense? Do we need AI-infused smokers or grills?

If the CFO can’t assign value to their data…then it’s not very easy to justify spending money on securing it.

Jason Yaeger | CEO, Tenacity

13:15: Many times there is a false sense of security that’s pervasive through an organization. This can lead to bad decisions and costly fines for non-compliance.

15:22: More than 25% – actually closer to 50% – of data breaches are the result of infrastructure mistakes. The goal of Tenacity is to help companies focus on proactive security.

18:21: Data privacy laws and compliance regulations are forcing companies to make data a central asset. If a company were to violate a GDPR rule and is fined, that means the data has value. But, if it’s not on the balance sheet, then it’s not visible.

21:39: Business leaders are asking the wrong questions. Instead of asking, “How much does this cost?”, decision-makers should be asking, “If we don’t do this, what are we saying ‘No’ to?” The investment to mitigate the risk is far less costly than the outcome of a data breach.

25:19: Security shouldn’t be viewed as a hindrance to the business objectives. For example, if your company processes credit cards from customer purchases, you need to be PCI compliant. If you aren’t compliant, this can be a loss of business from customers and vendors.

Alignment in the top top level leadership – the CIO, CFO, and CEO – plays a critical role. And, the CFO needs to make it known, “Anything from a security perspective needs to be brought to my desk”.

33:42: It’s critical that CFOs implement accounting rules to further assign value to the data. However, this is only one part of the solution. The other part is to create a culture to value data. This helps investors, employees, and customers realize that the data is not valueless.

36:50: Insurance for data does help somewhat. But, unlike a physical item that could be stolen, if data is stolen, it can’ be undone – it’s permanent. And, the increase in ransomware attacks should be a wake-up call to start placing greater value on company data.


Tenacity Cloud: Improve Security. Manage Costs. Stay Compliant.

Tenacity Cloud is to help companies mitigate security threats, fix misconfigurations, and manage cloud spend from one intuitive platform.

The platform provides:

  • Cloud Asset Management: Delivers comprehensive visibility across all your deployed resources.
  • Security Posture: Provides real time insights of your Cloud Security Posture Management (CSPM). This is analyzed from workloads, networks, user activity, data and configurations to prioritize and remediate threats to your cloud.
  • Budget Intelligence: Get immediate, detailed access to current and past cloud spend so you know where it’s going.
  • Compliance Monitoring: Track compliance scores over time, identify open issues immediately and track your teams progress towards remediation.
https://vimeo.com/551579987
  • Facebook
  • Twitter
  • LinkedIn

Back @ IT Podcast data data cloud data privacy featured Future Office of the CXO podcast security
Share. Facebook Twitter LinkedIn Email
Aaron Back
  • Website
  • Twitter
  • LinkedIn

Aaron Back (Bearded Analyst), Chief Content Officer for Acceleration Economy, focuses on empowering individuals and organizations with the information they need to make crucial decisions. He surfaces practical insights through podcasts, news desk interviews, analysis reports, and more to equip you with what you need to #competefast in the acceleration economy. | 🎧 Love listening to podcasts wherever you go? Then check out my "Back @ IT" podcast and listen wherever you get your podcasts delivered: https://back-at-it.simplecast.com #wdfa

Related Posts

IBM Tackles AI Data Complexity with New watsonx.data Integration and Intelligence Software

June 20, 2025

Enterprises Ramp Up Use of Multiple AI Models, Third-Party Apps, and AI-Native Innovators

June 20, 2025

Microsoft Introduces AI Model Safety Rankings to Guide Developer Choices on Azure

June 20, 2025

The New Christian Klein: Supercharges SAP and Helps Europe Avoid Data-Center Disaster

June 19, 2025
Add A Comment

Comments are closed.

Recent Posts
  • IBM Tackles AI Data Complexity with New watsonx.data Integration and Intelligence Software
  • Enterprises Ramp Up Use of Multiple AI Models, Third-Party Apps, and AI-Native Innovators
  • Microsoft Introduces AI Model Safety Rankings to Guide Developer Choices on Azure
  • The New Christian Klein: Supercharges SAP and Helps Europe Avoid Data-Center Disaster
  • Inside Rabbit’s Strategy to Automate Cloud Cost Optimization for Engineering Teams with Balazs Molnar | Cloud Wars Live

  • Ask Cloud Wars AI Agent
  • Tech Guidebooks
  • Industry Reports
  • Newsletters

Join Today

Most Popular Guidebooks

Accelerating GenAI Impact: From POC to Production Success

November 1, 2024

ExFlow from SignUp Software: Streamlining Dynamics 365 Finance & Operations and Business Central with AP Automation

September 10, 2024

Delivering on the Promise of Multicloud | How to Realize Multicloud’s Full Potential While Addressing Challenges

July 19, 2024

Zero Trust Network Access | A CISO Guidebook

February 1, 2024

Advertisement
Cloud Wars
Twitter LinkedIn
  • Home
  • About Us
  • Privacy Policy
  • Get In Touch
  • Marketing Services
  • Do not sell my information
© 2025 Cloud Wars.

Type above and press Enter to search. Press Esc to cancel.

  • Login
Forgot Password?
Lost your password? Please enter your username or email address. You will receive a link to create a new password via email.