Remove Fractional CTO Remove Government Remove Security Remove Social
article thumbnail

8 data strategy mistakes to avoid

CIO

How enterprises gather, store, cleanse, access, and secure their data can be a major factor in their ability to meet corporate goals. Unfortunately, the road to data strategy success is fraught with challenges, so CIOs and other technology leaders need to plan and execute carefully. Overlooking these data resources is a big mistake.

Strategy 335
article thumbnail

Regulatory uncertainty overshadows gen AI despite pace of adoption

CIO

Gen AI has the potential to magnify existing risks around data privacy laws that govern how sensitive data is collected, used, shared, and stored. Data governance In traditional application development, enterprises have to be careful that end users aren’t allowed access to data they don’t have permission to see.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Cybersecurity Snapshot: Attackers Pounce on Unpatched Vulns, DBIR Says, as Critical Infrastructure Orgs Benefit from CISA’s Alert Program

Tenable

“While the adoption of artificial intelligence to gain access to valuable corporate assets is a concern on the horizon, a failure to patch basic vulnerabilities has threat actors not needing to advance their approach,” Chris Novak, Verizon’s Senior Director of Cybersecurity Consulting said in a statement this week. 1, 2022 to Oct.

article thumbnail

CIOs in transition: 5 tips for landing your next IT leadership job

CIO

They manage networking with other professional development activities such as attending conferences, reading leadership books, and participating in social media. Never pass up the opportunity to have a conversation with someone, regardless of their level or area of expertise,” suggests Kevin Miller, CTO of IFS North America. “If

article thumbnail

Better, faster decisions: Why businesses thrive on real-time data

CIO

Gathering and processing data quickly enables organizations to assess options and take action faster, leading to a variety of benefits, said Elitsa Krumova ( @Eli_Krumova ), a digital consultant, thought leader and technology influencer. When I was coming up in InfoSec, we could only do vulnerability scanning between midnight and 6 am.

Data 271
article thumbnail

Symantec Government Symposium 11 March 2014 at the Renaissance Hotel Washington DC

CTOvision

By Bob Gourley DC seems to have a cyber security related event every week. All those factors together make the Symantec Government Symposium of 11 March 2014 one to pay attention to. Learn how agencies are turning to BYOD to ensure security and ROI. Visit [link] symposium for more information. Wolf Tombe , CTO, U.S.

Security 104
article thumbnail

2014 Analyst Forum: Cyber Security Panel Recap

CTOvision

Academia, government, and industry came together to provide a comprehensive approach to investigating how we can better extract knowledge from information. Elkus and Moran also recognized the continuously changing nature of the cybersecurity landscape. See our overall event recap here.