This site uses cookies to improve your experience. To help us insure we adhere to various privacy regulations, please select your country/region of residence. If you do not select a country, we will assume you are from the United States. Select your Cookie Settings or view our Privacy Policy and Terms of Use.
Cookie Settings
Cookies and similar technologies are used on this website for proper function of the website, for tracking performance analytics and for marketing purposes. We and some of our third-party providers may use cookie data for various purposes. Please review the cookie settings below and choose your preference.
Used for the proper function of the website
Used for monitoring website traffic and interactions
Cookie Settings
Cookies and similar technologies are used on this website for proper function of the website, for tracking performance analytics and for marketing purposes. We and some of our third-party providers may use cookie data for various purposes. Please review the cookie settings below and choose your preference.
Strictly Necessary: Used for the proper function of the website
Performance/Analytics: Used for monitoring website traffic and interactions
It was an interesting case study of global cyber impact, says Charles Clancy, CTO at Mitre. In a countersuit, CrowdStrike blamed Delta for the airlines problems, saying that other airlines were able to recover much faster, and that the contract between the two companies meant Delta wasnt allowed to sue for damages.
Organizations are giving more priority to development of informationsecurity policies, as protecting their assets is one of the prominent things that needs to be considered. So an organization makes different strategies in implementing a security policy successfully. Get Management Support. Write Policies. Implement policies.
“If you bring the right portfolio of experience,” including data knowledge, business acumen, and informationsecurity, “I think any industry will pay relative to their market for their selection of a CIO,” Stephenson says. CIO and CTO positions have become much more important as leadership is starting to look at AI, Janulaitis says.
Robert Ford, vice president, enterprise strategy, at CoreStack will discuss how to unlock greater cloud value. Find out how to use generative AI to enhance customer experience at a presentation from Marci Maddox, research vice president for IDC’s Persuasive Content and Digital Experience Management Software Program.
“With a focus on automation for customer service and telesales functions, we’re looking at intelligent automation solutions that can help improve customer engagement and self-help capabilities,” says Chris Pendergast, the company’s SVP and CTO.
During interview today with GovMatters.tv I'll be discussing an observation many of us in the enterprise technology community have been discussing lately. There is a growing consensus in the enterprise tech community (CIO, CTO, CISO) regarding the Cambrian Explosion of great capabilities in the tech sector.
You need to know where the data’s coming from, how it’s transformed, and what the outputs are,” says Nick Amabile, CEO at DAS42, a data consulting firm. That can include learning how to verify that correct controls are in place, models are isolated, and they’re appropriately used, he says. AI is a black box.
Governance is who does what, how, and based on what data,” says Tilcia Toledo, senior managing director with FTI Consulting. Governance is about who is in the room, what are they allowed to do or not do, what’s the data they rely on, and what’s the cadence of their actions.” More on IT governance: What is IT governance?
This post provides the views of the leadership team of Cognitio Corp , a consultancy with experience defending both government and commercial enterprises. Cognitio is a strategic consulting firm that supports companies and government agencies in developing cyber awareness, remediation, and containment strategies for cyber risk.
That sense of purpose and yearning to do meaningful work is the ace in the hole for Optum Enterprise CTO Francois Charette, who has hired a number of Silicon Valley technologists in recent months. All of XPO’s technology is proprietary and built in-house and CIO Jay Silberkleit has hired a lot of developers from Silicon Valley companies.
And, but really, when I look back on that, you know, like, that was a shifting time for how people saw and treated the word hacker you know, when I grew up. You had to figure out how to configure Kermit, get passwords to get on. And then, you know, not pay any fair, fair market prices on any consulting. Back to growing up.
Investigate FedRAMP and its role in standardizing cloud security and what the program means to federal agencies. Event attendees will also hear about how to securely manage big data, cloud computing, mobility, social networking, critical infrastructure and more! Visit [link] symposium for more information. Coast Guard.
And then there are others like SmileDirectClub, that create images in order to answer the question of how to better serve their customers. Or, more specifically, to help people understand how their teeth can be corrected. And do I deeply understand how to apply it to my business to get value?” There’s a lot yet to come.”
We organize all of the trending information in your field so you don't have to. Join 83,000+ users and stay up to date on the latest articles your peers are reading.
You know about us, now we want to get to know you!
Let's personalize your content
Let's get even more personalized
We recognize your account from another site in our network, please click 'Send Email' below to continue with verifying your account and setting a password.
Let's personalize your content