Cloud Wars
  • Home
  • Top 10
  • CW Minute
  • CW Podcast
  • Categories
    • AI and Copilots
    • Innovation & Leadership
    • Cybersecurity
    • Data
  • Member Resources
    • Cloud Wars AI Agent
    • Digital Summits
    • Guidebooks
    • Reports
  • About Us
    • Our Story
    • Tech Analysts
    • Marketing Services
  • Ask Copilot
  • Agentic AI Battleground
Twitter Instagram
  • Summit NA
  • Dynamics Communities
  • AI Copilot Summit NA
  • Ask Cloud Wars
Twitter LinkedIn
Cloud Wars
  • Home
  • Top 10
  • CW Minute
  • CW Podcast
  • Categories
    • AI and CopilotsWelcome to the Acceleration Economy AI Index, a weekly segment where we cover the most important recent news in AI innovation, funding, and solutions in under 10 minutes. Our goal is to get you up to speed – the same speed AI innovation is taking place nowadays – and prepare you for that upcoming customer call, board meeting, or conversation with your colleague.
    • Innovation & Leadership
    • CybersecurityThe practice of defending computers, servers, mobile devices, electronic systems, networks, and data from malicious attacks.
    • Data
  • Member Resources
    • Cloud Wars AI Agent
    • Digital Summits
    • Guidebooks
    • Reports
  • About Us
    • Our Story
    • Tech Analysts
    • Marketing Services
  • Agentic AI Battleground
    • Login / Register
Cloud Wars
    • Login / Register
Home » How Business Units Can Work With CISOs to Protect Sensitive Data
Cybersecurity Minute

How Business Units Can Work With CISOs to Protect Sensitive Data

Frank DomizioBy Frank DomizioFebruary 20, 2023Updated:February 20, 20231 Min Read
Facebook Twitter LinkedIn Email
To adjust the volume hover the cursor over the volume bar
Share
Facebook Twitter LinkedIn Email
Acceleration Economy Cybersecurity

In episode 48 of the Cybersecurity Minute, Frank Domizio defines where sensitive data resides within different business units of an organization and the responsibilities of those business units.

This episode is sponsored by Acceleration Economy’s Digital CIO Summit, taking place April 4-6. Register for the free event here. Tune in to the event to hear from CIO practitioners discuss their modernization and growth strategies.

Highlights

00:38 — In today’s digital world, sensitive data is a critical asset that must be protected from unauthorized access, theft, or abuse.

00:59 — Sensitive data can be found across many places in an organization, including:

  • Finance departments
  • Human resource departments
  • Marketing
  • Operations

Each business unit generates some sort of sensitive data and individual units must take the proper security precautions to protect the data.

01:31 — Frank suggests that it is imperative for business units to partner with CISOs to ensure the overall security of an organization. By partnering with CISOs, business units can benefit from the expertise and resources of the security team, which includes access to security tools and technologies, training on best practices for data protection, and support in the event of a security incident.

02:35 — By understanding where sensitive data resides and partnering with the security team to implement strong security measures, companies can ensure that their sensitive data remains secure and protected no matter where in our business it exists.


Want more cybersecurity insights? Visit the Cybersecurity channel:

Acceleration Economy Cybersecurity

CISO Cybersecurity Cybersecurity Minute data featured security teams
Share. Facebook Twitter LinkedIn Email
Frank Domizio
  • LinkedIn

Frank Domizio is an Acceleration Economy Analyst focusing on Cybersecurity. As a retired Philadelphia Police Officer, Frank got his start in cybersecurity while he was detailed to the FBI as a digital forensic examiner. Since then, Frank has held many positions in and around the federal government specializing in Cyber Threat Intelligence and Incident Response. Now, as a Federal Civilian for an Executive Branch Agency, Frank is a student of the strategy and leadership that goes into making a successful cybersecurity program. He is also an adjunct professor of cybersecurity at the University of Maryland Global Campus. Frank holds a Bachelor of Science in Computing Security Technology from Drexel University and a Master of Science in Cyber and Information Security from Capitol College as well as many industry certifications. As a Federal Government Employee Frank’s views are his own, not representing that of the U.S. Government or any agency.

Related Posts

Aneel Bhusri: Workday’s Reluctant and Remarkable CEO

February 16, 2026

As AI Becomes Agentic, Microsoft Bets on Premium Content with Publisher Marketplace

February 13, 2026

AWS and NTT DATA Announce Multi-Year AI and Cloud Transformation Partnership

February 13, 2026

AI Boom: $1.63 Trillion Backlog for Microsoft, Oracle, AWS, Google Cloud

February 12, 2026
Add A Comment

Comments are closed.

Recent Posts
  • Aneel Bhusri: Workday’s Reluctant and Remarkable CEO
  • As AI Becomes Agentic, Microsoft Bets on Premium Content with Publisher Marketplace
  • AWS and NTT DATA Announce Multi-Year AI and Cloud Transformation Partnership
  • AI Boom: $1.63 Trillion Backlog for Microsoft, Oracle, AWS, Google Cloud
  • Hyperscalers’ Backlog Hits $1.63 Trillion, Spurring $645B in 2026 CapEx

  • Ask Cloud Wars AI Agent
  • Tech Guidebooks
  • Industry Reports
  • Newsletters

Join Today

Most Popular Guidebooks and Reports

Driving Business Transformation with Agentic AI and ServiceNow

January 9, 2026

The Agentic Enterprise: How Microsoft and Industry Leaders Are Redefining Work Through AI

September 2, 2025

SAP Business Network: A B2B Trading Partner Platform for Resilient Supply Chains

July 10, 2025

Using Agents and Copilots In M365 Modern Work

March 11, 2025

Advertisement
Cloud Wars
Twitter LinkedIn
  • Home
  • About Us
  • Privacy Policy
  • Get In Touch
  • Marketing Services
  • Do not sell my information
© 2026 Cloud Wars.

Type above and press Enter to search. Press Esc to cancel.

  • Login
Forgot Password?
Lost your password? Please enter your username or email address. You will receive a link to create a new password via email.
body::-webkit-scrollbar { width: 7px; } body::-webkit-scrollbar-track { border-radius: 10px; background: #f0f0f0; } body::-webkit-scrollbar-thumb { border-radius: 50px; background: #dfdbdb }