Acceleration Economy
  • Home
  • Cloud Wars
  • Analyst Content
    • By Category
      • AI/Hyperautomation
      • Cloud/Cloud Wars
      • Cybersecurity
      • Data
    • By Interest
      • Leadership
      • Office of the CFO
      • Partners Ecosystem
      • Sustainability
    • By Industry
      • Financial Services
      • Healthcare
      • Manufacturing
      • Retail
    • By Type
      • Courses
        • Understanding the New Executive Buying Committee
      • Guidebooks
      • Digital Summits
      • Practitioner Roundtables
    • By Language
      • Español
  • Vendor Shortlists
    • All Vendors
    • AI/Hyperautomation
    • Cloud
    • Cybersecurity
    • Data
  • What we do
    • Advisory Services
    • Marketing Services
    • Event Services
  • Who we are
    • About Us
    • Practitioner Analysts
  • Subscribe
Twitter Instagram
  • Courses
  • Summit NA
  • Dynamics Communities
Twitter LinkedIn
Acceleration Economy
  • Home
  • Cloud Wars
  • Analyst Content
        • By Category
          • AI/Hyperautomation
          • Cloud/Cloud Wars
          • CybersecurityThe practice of defending computers, servers, mobile devices, electronic systems, networks, and data from malicious attacks.
          • Data
        • By Interest
          • Leadership
          • Office of the CFO
          • Partners Ecosystem
          • Sustainability
        • By Industry
          • Financial Services
          • Healthcare
          • Manufacturing
          • Retail
        • By Type
          • Courses
            • Understanding the New Executive Buying Committee
          • Guidebooks
          • Digital Summits
          • Practitioner Roundtables
        • By Language
          • Español
  • Vendor Shortlists
    • All Vendors
    • AI/Hyperautomation
    • Cloud
    • Cybersecurity
    • Data
  • What we do
    • Advisory Services
    • Marketing Services
    • Event Services
  • Who we are
    • About Us
    • Practitioner Analysts
  • Subscribe
    • Login / Register
Acceleration Economy
    • Login / Register

Cybersecurity as a Business Enabler

“Cybersecurity used to be an afterthought—now it creates & protects new business opportunities” —Chris Hughes, CISO

OFFICIAL SPONSOR |

Chris Hughes-Circle

Chris Hughes

Welcome to Cybersecurity as a Business Enabler

I am your host Chris Hughes. We will be exploring the rapidly expanding and diverse threat landscape through the lens of business growth and resiliency. On this page you will find registration links to our upcoming and on demand Cybersecurity Digital Summits, the most important “moments” from past interviews, in-depth roundtables and exclusive premium content from me and my CISO Acceleration Economy Analysts colleagues Robert Wood and Frank Domizio. I look forward to hearing from you and being a key part of your journey to make cybersecurity a business enabler at your organization!
Cybersecurity Minute

How Endpoint Security Protects Your Organization

By Frank DomizioMay 19, 2023

Endpoint security tools like Palo Alto Networks’ Cortex protect organizations from cyber threats and are especially necessary in the era of remote work.

Healthcare

How to Balance Ethical Considerations With Generative AI Benefits in Healthcare

By Paul SwiderMay 19, 2023

By addressing transparency, accountability, fairness, and privacy, healthcare organizations can harness generative AI’s transformative power while upholding the highest standards of ethical conduct.

Cybersecurity Minute

How Cybersecurity Leaders Should Frame Strategic Threat Intelligence Conversations

By Robert WoodMay 18, 2023

Security leaders should have conversations with key personnel in HR, finance, and sales/marketing to ensure alignment between security and business goals.

AI/Hyperautomation

Introducing the Acceleration Economy Process Mining Battleground

By Tom SmithMay 18, 2023

John Siefert, Dave Colford, and Tom Smith discuss Acceleration Economy’s upcoming Process Mining Battleground and the key questions that will be addressed for tech buyers.

AI/Hyperautomation

The Business Impact and Opportunity of Generative AI

By Aaron BackMay 16, 2023

With all the uncertainties around generative AI, there are certainties as well: AI is nothing without data, it’s critical that AI by kept in check by cybersecurity, and cloud technology makes AI possible and scalable.

Cybersecurity Minute

Why Cybersecurity Relies on the Intersection of Incident Response and Threat Intelligence

By Frank DomizioMay 16, 2023

These two complementary cybersecurity practices, when combined, enable organizations to quickly and effectively identify and mitigate potential cyber threats.

CXO Minute

Why Strategic Partnerships Are Essential to Enterprise Growth, Competitiveness

By Janet SchijnsMay 16, 2023

Janet Schijns discusses the power of strategic partnerships to navigate challenges, unlock opportunities, and achieve sustainable growth in the digital economy.

CXO

How Generative AI Transforms Core Processes — and Changes the CIO’s Role

By Kenny MullicanMay 16, 2023

Generative AI transforms the role of the CIO, making them a central figure in driving innovation, strategy, and decision-making within organizations.

Cybersecurity Minute

How to Make Cloud Security Relatable for Non-Tech Stakeholders

By Frank DomizioMay 15, 2023

Try framing cloud security conversations in terms of business outcomes and using analogies for better results.

AI/Hyperautomation

Why Artificial Intelligence (AI) Must Be Ethical and Explainable

By Aaron BackMay 15, 2023

Understanding why ethical AI and explainable AI are foundational elements to generative AI is critical to moving forward.

CXO

On Location at IBM Think: How Co-Creation Makes AI, Hybrid Cloud Transitions Easier

By Aaron BackMay 15, 2023

In this special interview, Aaron Back speaks with Kenny Mullican about the top trends and takeaways from last week’s IBM Think 2023 event in Orlando.

CXO

How Generative AI Enables Partners to Accelerate Development, Innovation

By Janet SchijnsMay 13, 2023

While generative AI is still a relative newcomer in the channel, it’s already starting to create an impact in several ways.

Cybersecurity as a Business Enabler

How Threat Intelligence Streamlines Operational Tasks For Data-Driven Cybersecurity

By Robert WoodMay 12, 2023

Leveraging threat intelligence for operational needs can make organizations more effective and adaptable in modern cybersecurity operations.

Cybersecurity Minute

How the Microsoft DevOps Threat Matrix Helps Optimize Cybersecurity

By Chris HughesMay 11, 2023

The new resource provides intelligence on malicious actors and attack vectors, especially those used in recent software supply chain attacks.

Cybersecurity as a Business Enabler

Why Cybersecurity Teams Need an Incident Coordinator

By Frank DomizioMay 11, 2023

A communications point person is essential after a breach; they keep everyone in the loop, enabling cybersecurity folks to focus on cybersecurity.

Partners Ecosystem

How Working With Multiple Partners Helps Align Cloud and Cybersecurity Strategies

By Janet SchijnsMay 11, 2023

Working with multiple partners delivers the best outcomes for enterprises looking to integrate critical elements of modern business infrastructure.

Cloud Wars

On Location at IBM Think: How Watsonx Will Drive Safe and Effective Enterprise AI Use

By Kenny MullicanMay 10, 2023

From watsonx and will.i.am to co-creation and creativity, the first-day news, topics, and presentations at IBM Think were timely and thought-provoking, says Kenny Mullican.

Cybersecurity Minute

How Cyber Threat Intelligence Prevents Data Breaches

By Frank DomizioMay 10, 2023

Organizations need to invest in the right people, processes, and technologies to protect themselves from online threats in particular.

Cybersecurity as a Business Enabler

How Data Loss Prevention Helps Implement Uniform Security Policies in SaaS Applications

By John SiefertMay 10, 2023

Lookout Chief Strategy Officer Aaron Cockerill explains how DLP helps CEOs and CISOs optimize cybersecurity in SaaS environments.

Cybersecurity as a Business Enabler

How to Mitigate Cybersecurity Risks in Your CI/CD Pipeline

By Bill DoerrfeldMay 10, 2023

Bill Doerrfeld analyzes the state of modern CI/CD security, reviews the most common risks, and offers some safeguarding suggestions.

Previous 1 2 3 4 … 37 Next

Featured Story

Why Cybersecurity Is a Critical Component of ESG Frameworks

2 months ago
Environmental, social, and governance frameworks are on the rise, and they must be crafted with enough security considerations to ward off increased cyber threats.
Read More »

Make better decisions to compete in the acceleration economy in just 5 minutes

Subscribe to our Headlines newsletter.
This field is for validation purposes and should be left unchanged.
Acceleration Economy Subscriber Content

The Ethical and Workforce Impacts of Generative AI

May 26, 2023

The Business Impact and Opportunity of Generative AI

May 16, 2023

Aligning Data and Cybersecurity Strategy

March 31, 2023

Securing Multi-Cloud Ecosystems

March 24, 2023

Securing Software-as-a-Service Applications

March 1, 2023

Retail Innovation With AI, Data, and Cybersecurity

March 1, 2023
Acceleration Economy
Twitter LinkedIn
  • Home
  • About Us
  • Privacy Policy
  • Get In Touch
  • Advertising Opportunities
  • Do not sell my information
© 2023 Acceleration Economy.

Type above and press Enter to search. Press Esc to cancel.

  • Login
Forgot Password?

Connect with

Login with Google Login with Windowslive

Lost your password? Please enter your username or email address. You will receive a link to create a new password via email.