Bob Evans and Chris Hughes discuss the evolving role of the CIO, and explore the relationship between a CIO and a CISO in this Digital CIO Summit moment.
CISO
Rob Wood explains how organizations can avoid complications from compliance and other requirements in financial automation projects.
Day 3 of Acceleration Economy’s Digital CIO Summit included a CISO panel, discussions around cybersecurity, digital natives, and co-creation.
CISOs and CFOs should collaborate to establish clear goals, enumerate data requirements, and identify supporting tools for financial automation projects while effectively managing risk.
If security professionals are going to position themselves as enablers to the business, then they must invest in the CISO-CFO relationship.
CISO and Acceleration Economy analyst Rob Wood explains the benefits for security leaders of knowing where data exists. Without knowing, leaders cannot do anything with it.
In this Cloud Data Strategy moment, Chris Hughes defines the areas of focus security leaders must consider when safeguarding data in the cloud.
Frank Domizio shares his thoughts on cybersecurity’s place in the C-suite today, as well as the value of customer stories on software and other technology solutions.
Contextualize what you need from data teams, so that they understand the why behind your ask, Rob Wood advises, as a way to build stronger relationships.
Rob Wood looks at why pinpointing the right data, and reaching consensus between data and security teams on that data, is critical for reducing risk.
Strong relationships between the CISO, the chief data officer, and the others involved with data will strengthen an organization’s data strategy, says Rob Wood.
To prevent data breaches, organizations must prioritize data governance; there’s a big collaboration opportunity between the CISO and CDO roles in this endeavor.
Machine learning comes with many benefits for cybersecurity, but cutting-edge bad actors are looking to exploit ML for their own gain. Chris Hughest explains how to fight “adversarial ML.”
Frank Domizio explains why cybersecurity professionals must continuously be on the lookout for ways in which the zero trust security model could become vulnerable to ever-evolving attackers.
Bill Doerrfeld explains reveals why old-fashioned compliance practices can’t guarantee successful outcomes; real-time data and automation can help.
The right people, processes, and technology can help mitigate the security risks of a multi-cloud environment, says analyst Frank Domizio.
Developers need guidance from CISOs to protect corporate data stores, ensure compliance, and spot disgruntled employees, and more, analysts Chris Hughes and Paul Swider explain.
Organizations aiming to be “data intelligent” must have a foundation of data governance in place that spans all facets of the business. Why? Customer dazzle which leads to revenue growth.
Wayne Sadin shares why the advent of generative AI puts pressure on organizations to tighten up their data and security strategies to avoid bias and protect sensitive data.
Knowing the types of data that cybercriminals target for identity theft, financial fraud, or other malicious activities helps security teams implement effective protection.