article thumbnail

The NIS2 Directive: why cyber-resilience is the new normal for European organisations

CIO

Due to be adopted as law by member states by October 2024, the EU Network and Information Systems (NIS2) Directive is the most important cybersecurity legislation ever enacted across member states. One of the biggest challenges will be NIS2’s emphasis on boosting supply chain security, widely acknowledged as a major potential weakness.

article thumbnail

CIO Australia Webinar: Overcoming Barriers to Application Modernisation with SAP

CIO

In the first of this two part CIO webinar series ‘Driving business success with true enterprise applications’, a group of leading tech leaders heard from DXC Technology, customer Ventia and analysts Ecosystm about the challenges and benefits of “Overcoming barriers to application modernisation with SAP.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Cybersecurity Snapshot: U.S. Gov’t Unpacks AI Threat to Banks, as NCSC Urges OT Teams to Protect Cloud SCADA Systems

Tenable

Plus, how to cut cyber risk when migrating SCADA systems to the cloud. National Cyber Security Centre (NCSC) issued guidance on cloud-hosted supervisory control and data acquisition (SCADA) systems, stressing that cybersecurity must be “a key consideration” with these migrations. “The Meanwhile, why CISA is fed up with SQLi flaws.

article thumbnail

Stepping up to the challenge of a global conglomerate CIO role

CIO

IT systems and resources must be rationalized and unified, and differing cultures must often be maneuvered toward alignment to ensure success going forward. However, I wasn’t awestruck because of my involvement in the due diligence of the merger and acquisition process from day one.

article thumbnail

Reaching Unreachable Candidates

Speaker: Patrick Dempsey and Andrew Erpelding of ZoomInfo

Export results: Easily export candidate data (including contact info) to Excel, shared with colleagues to review or upload in bulk to a recruiter's applicant tracking system. Watch this On-Demand Webinar today to see how ZoomInfo for Recruiters can work to get you talented candidates results.

article thumbnail

Cybersecurity Snapshot: Get the Latest on Deepfake Threats, Open Source Risks, AI System Security and Ransomware Gangs

Tenable

Tasked with securing your org’s new AI systems? 1 - Google: The ins and outs of securing AI systems As businesses adopt artificial intelligence (AI) and cybersecurity teams get tasked with protecting these complex new systems, a fundamental question looms: When defending AI systems, what changes and what stays the same?

article thumbnail

The Shift toward Intelligent Automation

DataRobot

With these technologies, business users can easily build, deploy, and manage software robots that emulate humans actions interacting with digital systems and software. The RPA bot sends an automated email to the case handlers for review. Analytics and RPA: Suspicious cases are generated and prioritized.