CISO and Acceleration Economy analyst Rob Wood explains the benefits for security leaders of knowing where data exists. Without knowing, leaders cannot do anything with it.
Search Results: CISO (332)
In this Cloud Data Strategy moment, Chris Hughes defines the areas of focus security leaders must consider when safeguarding data in the cloud.
Wayne Sadin outlines why an overreliance on Microsoft Excel models is increasingly a problem for companies of all sizes and industries.
Además de OpenAI, Kieron Allen describe los avances de C3 AI como un disruptor en la informática de aplicaciones empresariales con IA.
Maturity models serve as roadmaps to help organizations successfully navigate their zero-trust journey. Rob Wood breaks down the benefits of one model’s iterative approach.
Environmental, social, and governance frameworks are on the rise, and they must be crafted with enough security considerations to ward off increased cyber threats.
Contextualize what you need from data teams, so that they understand the why behind your ask, Rob Wood advises, as a way to build stronger relationships.
Wayne Sadin discusses generative AI and the National Cybersecurity Strategy, “which tie together.” In both instances, C-level executives need to have their voices heard.
Zero trust, a cybersecurity framework that reduces uncertainty in access decisions, has gained popularity in recent years. CISO Chris Hughes explains zero trust, and why it matters, in detail.
Rob Wood looks at why pinpointing the right data, and reaching consensus between data and security teams on that data, is critical for reducing risk.
To implement zero trust, business leaders should know a cultural shift is required along with investment in the right tools and resources.
Strong relationships between the CISO, the chief data officer, and the others involved with data will strengthen an organization’s data strategy, says Rob Wood.
Ronak Mathur shares some of the speakers and customers in the AI, cybersecurity, and government fields that he is looking forward to hearing at the upcoming Digital CIO Summit.
To prevent data breaches, organizations must prioritize data governance; there’s a big collaboration opportunity between the CISO and CDO roles in this endeavor.
Bill Doerrfeld analiza cómo ChatGPT aporta valor a los desarrolladores de software y agillidad a la organización; y describe algunos retos previstos.
An in-depth look at automated vulnerability scanning within financial software, how it works, as well as top tools and best practices to get the job done.
Con una media de más de 1,000 fuentes internas de datos en las empresas, se requiere de una gobernanza y administración de datos centralizada.
The zero trust security framework can protect sensitive data from evolving cyber threats, says Frank Domizio.
Machine learning comes with many benefits for cybersecurity, but cutting-edge bad actors are looking to exploit ML for their own gain. Chris Hughest explains how to fight “adversarial ML.”
Frank Domizio explains why cybersecurity professionals must continuously be on the lookout for ways in which the zero trust security model could become vulnerable to ever-evolving attackers.