Remove CISO Remove Risk Remove Webinar
article thumbnail

Live Webinar: Overcoming Generative AI Data Leakage Risks

The Hacker News

As the adoption of generative AI tools, like ChatGPT, continues to surge, so does the risk of data exposure. According to Gartner’s "Emerging Tech: Top 4 Security Risks of GenAI" report, privacy and data security is one of the four major emerging risks within generative AI.

Risk 117
article thumbnail

Webinar Recap: Critical Concerns for Healthcare Providers in 2024

Security Boulevard

Baptist Health CISO James Case shared insights on transforming cybersecurity through a risk-focused lens at a recent webinar we hosted. The discussion was moderated by Axio President, David White and Read More The post Webinar Recap: Critical Concerns for Healthcare Providers in 2024 appeared first on Axio.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

What Your Auditor Looks for in Your Risk Management Process

Security Boulevard

TrustCloud teamed up with Dansa D’Arata Soucia on our Risk Rodeo webinar, to discuss everything you need to know to wrangle up risks with confidence. The post What Your Auditor Looks for in Your Risk Management Process appeared first on Security Boulevard.

Risk 97
article thumbnail

4 Key Takeaways from "XDR is the Perfect Solution for SMEs" webinar

The Hacker News

Many SMEs understand this risk firsthand. In a recent survey, 58% of CISOs of SMEs said that their risk of attack was higher compared to enterprises. So, you may be surprised to learn that small and medium enterprises (SMEs) are actually more frequent targets of cyberattacks.

CISO 91
article thumbnail

These Roles Require Cybersecurity Training

CyberSecurity Insiders

That means cybersecurity training and education so that key stakeholders understand the risks that businesses are facing, and which strategies are most effective for protection. Even if a company employs a Chief Information Security Officer (CISO) or Chief Security Officer (CSO), the position may still report to the CIO.

article thumbnail

Vendor Risk Management from the Inside Out

Security Boulevard

Join Eclysium CISO Allan Alford as he explains why external assessments and questionnaires are insufficient for vendors providing your IT infrastructure products. The post Vendor Risk Management from the Inside Out appeared first on Eclypsium | Supply Chain Security for the Modern Enterprise.

Risk 64
article thumbnail

Water utility CISO offers tips to stay secure as IT and OT converge

SC Magazine

Kristin Sanders, CISO for the Albuquerque Bernalillo County Water Utility Authority, revealed how New Mexico’s largest water and wastewater utility has been addressing the security challenge. However, such modernization is not without risk. Route 66 runs through downtown Albuquerque, New Mexico. Asaavedra32, CC BY-SA 3.0

CISO 82