Why Data Ethics Is a Growing CISO Priority
Dark Reading
AUGUST 3, 2020
With data collection growing, and increased concern about how it is handled, a synergy between security and data teams will be essential.
Dark Reading
AUGUST 3, 2020
With data collection growing, and increased concern about how it is handled, a synergy between security and data teams will be essential.
Security Boulevard
MAY 2, 2024
Chris Clements, VP of Solutions Architecture at CISO Global “Hey Alexa, are you stealing my company’s data?” In an age where manufacturers have decided that just about every device needs to be “smart,” it’s becoming difficult to avoid the data collection and privacy invasion that are often baked into these devices.
This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.
Anton on Security
DECEMBER 10, 2021
A new CISO comes in, tries to champion the implementation of a new tool, the CISO is gone after a short amount of time?—?like like most CISOs, and then a new CISO comes in and tries it all over again. Data collection failures still plague many SOCs. Buy what you would use, and use what brings value!
The Last Watchdog
OCTOBER 23, 2023
Influxes of data ingestion and the flat architecture of data lakes have led to difficulties in extracting value from repositories. Each data lake can be connected to the threat detection platform which can analyze and detect threats using a unified set of detection logic and advanced AI, with real-time normalization.
The Last Watchdog
JULY 30, 2018
This has left many CISOs questioning if today’s incumbent cybersecurity solutions are enough. This has left many CISOs to questions whether or not today’s cybersecurity categories are still relevant. CISO need to change the conversation. Categorizing solutions. They are not on the front lines fighting the cybersecurity battle.
Veracode Security
SEPTEMBER 11, 2020
We were notified of a zero-day vulnerability, and our CISO requested a report on the location of the risk within the enterprise. When they announced a major struts vulnerability targeting SWIFT, my CISO wanted to know exactly where we could find it in our applications. Does this sound familiar? This happened to me.
BH Consulting
MARCH 26, 2025
Make digital risk a board-level responsibility Directors should integrate AI governance, cybersecurity, and data protection into corporate strategy. Take a risk-based approach Identify, assess, and mitigate risks related to cybersecurity, AI ethics, and personal data protection.
Let's personalize your content