article thumbnail

AI, cybersecurity investments and identity take center stage at RSA 2024

CIO

It was truly a good use of time attending the 33rd RSA Conference in San Francisco, along with over 40,000 attendees, networking with the leading minds in the cybersecurity industry. Above all, there was a palpable focus on what it will take to make organizations combat-ready for the next waves of cybercrime and how best to manage it all.

article thumbnail

Connecting the dots on diversity in cybersecurity recruitment

TechCrunch

Mandy Andress is the chief information security officer at Elastic , an enterprise search company, and has more than 25 years of experience in information risk management and security. In its Cybersecurity Workforce Study 2021 , industry body (ISC) 2 found that 2.7 Mandy Andress. Contributor. Share on Twitter.

Security 316
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

Trending Sources

article thumbnail

10 projects top of mind for IT leaders today

CIO

This has CIOs moving from experimenting and testing intelligence in pockets to scaling up deployments and rolling out intelligence throughout their organizations. Events like the UnitedHealthcare attack drives conversations around cybersecurity and whether companies are putting enough resources into their own security programs,” he says.

article thumbnail

Generative AI & data: Potential in cybersecurity if the risks can be curtailed

CIO

This time they’re making a $13 billion bet by partnering with OpenAI and bringing to market new products like Security Copilot to make sense of the threat landscape using the recently launched text-generating GPT-4 (more on that below). Now, Microsoft is putting a stake in the ground with its generative AI Security Copilot tool.

Security 322
article thumbnail

Monetizing Analytics Features: Why Data Visualizations Will Never Be Enough

Think your customers will pay more for data visualizations in your application? Five years ago they may have. But today, dashboards and visualizations have become table stakes. Discover which features will differentiate your application and maximize the ROI of your embedded analytics. Brought to you by Logi Analytics.

article thumbnail

Top 10 governance, risk, and compliance certifications

CIO

It’s crucial to ensure your organization is operating lawfully in every country it operates, that your business is protected from cybersecurity threats, and that your company both manages risk and establishes processes to govern those tasks. Why are GRC certifications important? Is GRC certification worth it?

article thumbnail

2 Innovations That Can Tip the Balance in Cybersecurity

CIO

Army Major General and Vice President and Federal Chief Security Officer for Palo Alto Networks What critical innovations can change the balance in cybersecurity, providing those of us responsible for defending our organizations with more capabilities against those who would do us harm? This is not just a theoretical exercise.

Security 316
article thumbnail

Software Composition Analysis: The New Armor for Your Cybersecurity

Speaker: Blackberry, OSS Consultants, & Revenera

64% of organizations have been impacted by a software supply chain attack and 60% of data breaches are due to unpatched software vulnerabilities. Today’s technology leaders play a more strategic role in establishing cybersecurity strategy for their organizations. In the U.S. alone, cyber losses totaled $10.3 billion in 2022.

article thumbnail

The Unexpected Cost of Data Copies

An organization’s data is copied for many reasons, namely ingesting datasets into data warehouses, creating performance-optimized copies, and building BI extracts for analysis. Read this whitepaper to learn: Why organizations frequently end up with unnecessary data copies.