AI is increasingly mainstream, so it’s more important than ever to make sure that all organizations implement smart, unbiased security protocols.
risk
Kenny Mullican explains how hyperautomation can have far-reaching implications on every aspect of a business – going well beyond IT.
Wayne Sadin explains why multiple updates to crew scheduling software SkySolver won’t fix Southwest Airlines technical debt issues.
Think your company is immune to a SWA-style meltdown? Not so fast. Wayne Sadin explains why CXOs must implement technology oversight in four key areas: capacity risk, project risk, disaster risk, and technical debt.
In episode 41, Wayne Sadin uses the airline’s recent flight cancellation crisis to demonstrate the need to look at all of your IT risks, not just one of them.
Artificial intelligence is now a front-line tool in combating cyber threats and delivering data-driven insights. AI expert and Acceleration Economy Practitioner Analyst, Ronak Mathur explores the capabilities of AI to bolster cybersecurity measures.
Analyst Robert Wood shares the three areas CISOs should focus on to improve their performance: data, supply chain risk, and team cultures.
CISO practitioner analyst Chris Hughes emphasizes why today’s CISOs need to prioritize their agenda to quantify risk, embrace zero trust, and fight talent burnout
HYCU founder and CEO Simon Taylor shares his perspective on hybrid/multi-cloud, ransomware, and keeping customers’ data safe.
Pushing its sweeping co-creation model with global banks to new levels, IBM will help these financial institutions become more secure, compliant, and resilient but also boost performance.
Here is a tale of two former bosses and their differing styles toward the supplier community. There’s a lesson here in that the low-risk option on the surface may be hurtful in the long run.
Janet looks at this year’s Verizon Data Breach Investigations Report (DBIR) and singles out a few facts that can help organizations evaluate risk in partnership strategy.
Cybersecurity has evolved beyond the “office of ‘no'” to a true business enabler that requires an on-going vigilant effort to keep a resilient security posture
Penetration testing is an inherently manual process and runs in contrast to the DevSecOps movement, so where does it fit in? Robert Wood delves into it.
It’s common for the C-suite to look at cybersecurity efforts with fear, uncertainty, and doubt (FUD). Here’s why that needs to stop, and how to do it.
Managing AI bias empowers organizations to unlock AI’s tremendous opportunity to drive positive outcomes, writes Robert Wood in this look at the new NIST AI playbook’s main takeaways on the topic.
Quantifying cyber risk helps board members and other business leaders see the importance of cybersecurity investment. As Chris Hughes explains, the FAIR model offers a framework to do this.
Robert Wood explores several areas of risk that can emerge with the adoption of low-code/no-code applications.
Janet Schijns looks at the impact a partner can have, both positive and negative, on your firm’s data project, and offers tips on vetting and choosing the right ones.
Driving down the IAM environment’s complexity should be a major priority for all organizations, especially given the common problem of attracting and retaining technical talent.