In this Digital CIO Summit Moment, the men’s apparel manufacturer’s CEO Wendy Bennison explains why technology should be at the forefront of any company’s strategy.
CISO
Tactical threat intelligence is gathering, analyzing, and sharing data to find cyber threats and figure out how to deal with them. Learn how to set up a program.
The latest Growth Swarm podcast covers cybersecurity as a business enabler from the CEO perspective, the CMO perspective, and the industry perspective.
Chris Hughes explains what this synergy means for businesses as they continue to move to the cloud and accumulate data to drive business decisions and outcomes.
The big change of zero trust can be intimidating to some, but security leaders can tailor their communication to make the shift more palatable.
Cybersecurity data can empower C-suite executives to make informed decisions, protect their organization, and drive business growth.
Bob Evans and Chris Hughes discuss the evolving role of the CIO, and explore the relationship between a CIO and a CISO in this Digital CIO Summit moment.
Rob Wood explains how organizations can avoid complications from compliance and other requirements in financial automation projects.
Day 3 of Acceleration Economy’s Digital CIO Summit included a CISO panel, discussions around cybersecurity, digital natives, and co-creation.
CISOs and CFOs should collaborate to establish clear goals, enumerate data requirements, and identify supporting tools for financial automation projects while effectively managing risk.
If security professionals are going to position themselves as enablers to the business, then they must invest in the CISO-CFO relationship.
CISO and Acceleration Economy analyst Rob Wood explains the benefits for security leaders of knowing where data exists. Without knowing, leaders cannot do anything with it.
In this Cloud Data Strategy moment, Chris Hughes defines the areas of focus security leaders must consider when safeguarding data in the cloud.
Frank Domizio shares his thoughts on cybersecurity’s place in the C-suite today, as well as the value of customer stories on software and other technology solutions.
Contextualize what you need from data teams, so that they understand the why behind your ask, Rob Wood advises, as a way to build stronger relationships.
Rob Wood looks at why pinpointing the right data, and reaching consensus between data and security teams on that data, is critical for reducing risk.
Strong relationships between the CISO, the chief data officer, and the others involved with data will strengthen an organization’s data strategy, says Rob Wood.
To prevent data breaches, organizations must prioritize data governance; there’s a big collaboration opportunity between the CISO and CDO roles in this endeavor.
Machine learning comes with many benefits for cybersecurity, but cutting-edge bad actors are looking to exploit ML for their own gain. Chris Hughest explains how to fight “adversarial ML.”
Frank Domizio explains why cybersecurity professionals must continuously be on the lookout for ways in which the zero trust security model could become vulnerable to ever-evolving attackers.