article thumbnail

Redefining customer experience: How AI is revolutionizing Mastercard

CIO Business Intelligence

Our B2B customer service teams receive approximately 700,000 support cases annually through multiple channels, and as new customers and additional Mastercard services and products come online, we expect support case volume to reach 1 million by 2025.

CTO 330
article thumbnail

‘The key is the cloud’: How to keep up with the speed of innovation

CIO Business Intelligence

Michael Riecica, director of security strategy and risk in Rockwell Automation ’s Chief Information Security Office, will drill into the security aspects of cloud strategy. And hear how the U.S. Federal Reserve System leverages cloud smart strategies from System CIO Ghada Ijam.

Cloud 328
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Fixmo Announces Expanded Collaboration with Samsung, Enhanced Support for Samsung KNOX Secure Mobile Platform

CTOvision

“We are very pleased to have Fixmo as a partner in delivering solutions that take full advantage of the KNOX platform and support our new Enterprise Mobility Management system”, said Dr. Injong Rhee, Senior Vice President and Head of B2B R&D Group, IT & Mobile Division at Samsung Electronics. “The

Mobile 242
article thumbnail

The Importance of an Online Encryption Policy

CTOvision

It covers the systematic data management of the company and can also be referred to as information security policy standards when working in an on-premise, cloud, or a hybrid-computing environment. Corporate B2B and B2C companies. About the author: Dan Virgillito is cyber security expert living in the United Kingdom.

Policies 283
article thumbnail

The 4 pillars of the Zscaler Zero Trust Exchange: Customers share their successes

CIO Business Intelligence

The attack surface now extends to home offices, cloud applications, and public clouds, and there is an ever-increasing risk of lateral threat movement within highly interconnected hub-and-spoke networks protected by castle-and-moat security models. I look at ZDX to know where the problem is.

article thumbnail

Microsoft details ‘largest cybersecurity engineering effort in history’ — securing its own code

GeekWire

(GeekWire File Photo / Dan DeLong) Microsoft also named the 13 people who now serve as deputy chief information security officers (CISOs) in its product groups (see below), following up on a part of the plan that was announced in May , as well.

article thumbnail

Jio showcases enablement of secure IoT over Blockchain platform

TM Forum

They can configure a Blockchain network to meet their requirements and information security guidelines. because they can rapidly generate B2B or B2B2X business models as a result of digital transformation, without having to invest in use case journeys, operational lifecycles and networking infrastructure.

Security 130