Remove Compliance Remove Insurance Remove Security Remove Strategy
article thumbnail

As insurers look to be more agile, data mesh strategies take centerstage

CIO

In an era of business where every industry requires its stakeholders to be capable of quick pivots and sharp turns, siloed information that ultimately slows decision-making can be the ultimate vulnerability. In this way, data may just be the ultimate disruptor – a fact that the insurance industry knows all too well.

Insurance 206
article thumbnail

How to manage third-party cybersecurity risks that are too costly to ignore

TechCrunch

Jon Siegler Contributor Share on Twitter Jon Siegler , co-founder and chief product officer of LogicGate , has over a decade of experience in designing customer-centric enterprise risk and compliance systems. How to manage third-party cybersecurity risks that are too costly to ignore by Ram Iyer originally published on TechCrunch

How To 246
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

CISOs are not just the keepers of our data – they must be its custodians

CIO

According to Deep Instinct’s research , 75% of security professionals observed an increase in cyberattacks in 2023, with 85% of them attributing the rise to generative AI. Changes to social expectations surrounding privacy have led to individuals wanting transparency and security from the entities that collect and process our data.

Data 282
article thumbnail

Patient data is at greater risk than ever. AI can help

CIO

Sensitive personal and medical information can be used in multiple ways, from identity theft and insurance fraud to ransomware attacks. The good news is that AI can be used to improve security. Used well, AI can also boost the security posture of healthcare organisations.

article thumbnail

What’s the state of Zero Trust security?

CIO

Zero Trust adoption is accelerating, with over half of organizations reporting they have adopted Zero Trust Security, according to research independently conducted by leading security research firm Ponemon Institute, sponsored by Hewlett Packard Enterprise. What’s driving the adoption of Zero Trust Security?

Study 202
article thumbnail

Enabling a data-driven IT modernization strategy

CIO

While formulating their IT modernization strategies, they’d do well to regard data assets with business opportunities in mind. This is their chance to consider: what innovative capabilities can be unlocked from siloed data that could carry them into the future and how would understanding that inform technology modernization decisions?

Strategy 218
article thumbnail

What the Digital Operational Resilience Act means for you

CIO

But while there’s plenty of excitement and change underway, security risks and vulnerabilities have continued to follow right alongside that innovation. But what exactly does this policy mean for IT security? And how can businesses ensure they’re ready? So, who needs to adhere to DORA?