Acceleration Economy
  • Home
  • Cloud Wars
  • Analyst Content
    • By Category
      • AI/Hyperautomation
      • Cloud/Cloud Wars
      • Cybersecurity
      • Data
    • By Interest
      • Leadership
      • Office of the CFO
      • Partners Ecosystem
      • Sustainability
    • By Industry
      • Financial Services
      • Healthcare
      • Manufacturing
      • Retail
    • By Type
      • Courses
        • Understanding the New Executive Buying Committee
      • Guidebooks
      • Digital Summits
      • Practitioner Roundtables
    • By Language
      • Español
  • Vendor Shortlists
    • All Vendors
    • AI/Hyperautomation
    • Cloud
    • Cybersecurity
    • Data
  • What we do
    • Advisory Services
    • Marketing Services
    • Event Services
  • Who we are
    • About Us
    • Practitioner Analysts
  • Subscribe
Twitter Instagram
  • Courses
  • Summit NA
  • Dynamics Communities
Twitter LinkedIn
Acceleration Economy
  • Home
  • Cloud Wars
  • Analyst Content
        • By Category
          • AI/Hyperautomation
          • Cloud/Cloud Wars
          • CybersecurityThe practice of defending computers, servers, mobile devices, electronic systems, networks, and data from malicious attacks.
          • Data
        • By Interest
          • Leadership
          • Office of the CFO
          • Partners Ecosystem
          • Sustainability
        • By Industry
          • Financial Services
          • Healthcare
          • Manufacturing
          • Retail
        • By Type
          • Courses
            • Understanding the New Executive Buying Committee
          • Guidebooks
          • Digital Summits
          • Practitioner Roundtables
        • By Language
          • Español
  • Vendor Shortlists
    • All Vendors
    • AI/Hyperautomation
    • Cloud
    • Cybersecurity
    • Data
  • What we do
    • Advisory Services
    • Marketing Services
    • Event Services
  • Who we are
    • About Us
    • Practitioner Analysts
  • Subscribe
    • Login / Register
Acceleration Economy
    • Login / Register

Cybersecurity as a Business Enabler

“Cybersecurity used to be an afterthought—now it creates & protects new business opportunities” —Chris Hughes, CISO

OFFICIAL SPONSOR |

Chris Hughes-Circle

Chris Hughes

Welcome to Cybersecurity as a Business Enabler

I am your host Chris Hughes. We will be exploring the rapidly expanding and diverse threat landscape through the lens of business growth and resiliency. On this page you will find registration links to our upcoming and on demand Cybersecurity Digital Summits, the most important “moments” from past interviews, in-depth roundtables and exclusive premium content from me and my CISO Acceleration Economy Analysts colleagues Robert Wood and Frank Domizio. I look forward to hearing from you and being a key part of your journey to make cybersecurity a business enabler at your organization!
Cybersecurity as a Business Enabler

How the Rise of Deepfakes and New Technology Challenge Traditional Cybersecurity

By Robert WoodJune 2, 2023

Deepfakes challenge the traditional cybersecurity paradigms. Rob Wood explains how in this Generative AI Digital Summit moment.

Cybersecurity as a Business Enabler

Top 3 Ways to Explain End-Point Security to Business People

By Chris HughesJune 1, 2023

It’s essential that everyone in the workforce understand how to keep their mobile phones, laptops, and other endpoint devices secure, writes Chris Hughes.

Cybersecurity as a Business Enabler

How AI Enhances Endpoint Detection and Response (EDR) for Stronger Cybersecurity

By Bill DoerrfeldMay 31, 2023

Bill Doerrfeld explains how AI is improving endpoint threat detection and accelerating response times.

Cybersecurity Minute

How Strong Endpoint Security Enhances Reputation and Builds Customer Trust

By Frank DomizioMay 30, 2023

Cyber attacks pose financial and reputational risks, which necessitate investment in strong endpoint security defenses.

AI/Hyperautomation

How Generative AI and Behavioral Analytics Bolster Cybersecurity

By Frank DomizioMay 30, 2023

From a security perspective, AI can be used against itself within the realm of behavioral analytics and malware detection.

Cybersecurity as a Business Enabler

How to Optimize Endpoint Security for Laptops and Mobile Phones

By Frank DomizioMay 30, 2023

Robust encryption, access controls, and user education help CISOs mitigate the risks of theft, insider threats, and cyber attacks against their organizations.

Cybersecurity as a Business Enabler

How to Implement Zero Trust For Remote Endpoints in the Enterprise

By Chris HughesMay 28, 2023

Implementation of zero trust security for geographically distributed endpoints is critical in the age of remote work.

AI/Hyperautomation

Innovation Profile: How IBM watsonx Helps Organizations Manage Data, AI, and Governance

By Kenny MullicanMay 26, 2023

In this profile originally featured at the Generative Ai Digital Summit, Kenny Mullican dives into IBM’s new enterprise-ready data and AI platform watsonx.

AI/Hyperautomation

Innovation Profile: How the Endor Labs Platform Leverages Generative AI for Cybersecurity

By Kieron AllenMay 26, 2023

The updated Endor Labs platform lets cybersecurity users assess open-source software using natural language search.

AI/Hyperautomation

The Ethical and Workforce Impacts of Generative AI

By Toni WittMay 26, 2023

This guidebook will help you see how generative AI can benefit your business while avoiding the pitfalls that come with adoption, all backed by practitioner guidance.

Cybersecurity Minute

How the Intersection of Machine Learning (ML), Endpoint Security Transforms Cybersecurity

By Robert WoodMay 26, 2023

Machine learning is nothing new in cybersecurity, but in recent years, it’s gotten significantly better, says Rob Wood.

Cybersecurity as a Business Enabler

8 Tangible Ways — Including Least Privilege — to Secure Event-Driven Software Architecture

By Bill DoerrfeldMay 25, 2023

EDA delivers numerous benefits in flexibility, scalibility, and responsiveness, but it also carries unique security considerations.

Cybersecurity as a Business Enabler

How Data Quality Leads to Effective Machine Learning (ML) Models in Cybersecurity

By Robert WoodMay 25, 2023

Rob Wood explains why cybersecurity ML models need clean and ample data, proper input ranges, and robust data platforms, such as the security data lake.

Data Modernization

How Rubrik Delivers Best-in-Class Data Resilience, Observability, and Remediation

By Kieron AllenMay 24, 2023

The Rubrik management platform provides data resilience, observability, and remediation. Find out what differentiates Rubrik.

AI/Hyperautomation

Acceleration Economy Introduces Practitioner Analyst Courses

By John SiefertMay 24, 2023

Acceleration Economy Practitioner Analyst Courses, a new on-demand continuing education and training framework delivered by AI, business, IT, cybersecurity, and data practitioners, will debut June 5, 2023.

Cybersecurity as a Business Enabler

How to Address the Unique Endpoint Security Requirements of Cloud Computing

By Frank DomizioMay 24, 2023

There are unique endpoint security challenges associated with cloud-based systems. Here are some strategies to address them.

Data Modernization

Goya Foods CIO Suvajit Basu on Acceleration Economy Top 10 Shortlist Company Rubrik

By Kieron AllenMay 24, 2023

Goya CIO Suvajit Basu defines air-gap functionality, anti-malware, and fast recovery times in case of disaster as key criteria used to select Rubrik.

Cybersecurity Minute

Why Leaders Should Train Their Cybersecurity Workforce in AI and ML

By Robert WoodMay 24, 2023

Your competitors are already doing it, so you do not want to put your head in the sand, says Rob Wood.

Cybersecurity Minute

Why Integrating Data Is Crucial for Scaling a Cybersecurity Strategy

By Robert WoodMay 23, 2023

The integration of machine learning and AI capabilities in cybersecurity offer opportunities for improved specificity, consistency, and scalability.

Cybersecurity as a Business Enabler

How to Minimize Insider Threats and Human Error in Endpoint Security

By Frank DomizioMay 22, 2023

The human factor plays a critical role in endpoint security, and to minimize the risks of insider threats and human error, organizations should focus on educating employees and fostering a culture of security.

1 2 3 … 37 Next

Featured Story

Why Cybersecurity Is a Critical Component of ESG Frameworks

2 months ago
Environmental, social, and governance frameworks are on the rise, and they must be crafted with enough security considerations to ward off increased cyber threats.
Read More »

Make better decisions to compete in the acceleration economy in just 5 minutes

Subscribe to our Headlines newsletter.
This field is for validation purposes and should be left unchanged.
Acceleration Economy Subscriber Content

The Ethical and Workforce Impacts of Generative AI

May 26, 2023

The Business Impact and Opportunity of Generative AI

May 16, 2023

Aligning Data and Cybersecurity Strategy

March 31, 2023

Securing Multi-Cloud Ecosystems

March 24, 2023

Securing Software-as-a-Service Applications

March 1, 2023

Retail Innovation With AI, Data, and Cybersecurity

March 1, 2023
Acceleration Economy
Twitter LinkedIn
  • Home
  • About Us
  • Privacy Policy
  • Get In Touch
  • Advertising Opportunities
  • Do not sell my information
© 2023 Acceleration Economy.

Type above and press Enter to search. Press Esc to cancel.

  • Login
Forgot Password?

Connect with

Login with Google Login with Windowslive

Lost your password? Please enter your username or email address. You will receive a link to create a new password via email.