Remove CISO Remove Risk Remove Webinar
article thumbnail

Live Webinar: Overcoming Generative AI Data Leakage Risks

The Hacker News

As the adoption of generative AI tools, like ChatGPT, continues to surge, so does the risk of data exposure. According to Gartner’s "Emerging Tech: Top 4 Security Risks of GenAI" report, privacy and data security is one of the four major emerging risks within generative AI.

Risk 95
article thumbnail

Webinar Recap: Critical Concerns for Healthcare Providers in 2024

Security Boulevard

Baptist Health CISO James Case shared insights on transforming cybersecurity through a risk-focused lens at a recent webinar we hosted. The discussion was moderated by Axio President, David White and Read More The post Webinar Recap: Critical Concerns for Healthcare Providers in 2024 appeared first on Axio.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Vendor Risk Management from the Inside Out

Security Boulevard

Join Eclysium CISO Allan Alford as he explains why external assessments and questionnaires are insufficient for vendors providing your IT infrastructure products. The post Vendor Risk Management from the Inside Out appeared first on Eclypsium | Supply Chain Security for the Modern Enterprise.

Risk 64
article thumbnail

What Your Auditor Looks for in Your Risk Management Process

Security Boulevard

TrustCloud teamed up with Dansa D’Arata Soucia on our Risk Rodeo webinar, to discuss everything you need to know to wrangle up risks with confidence. The post What Your Auditor Looks for in Your Risk Management Process appeared first on Security Boulevard.

Risk 97
article thumbnail

4 Key Takeaways from "XDR is the Perfect Solution for SMEs" webinar

The Hacker News

Many SMEs understand this risk firsthand. In a recent survey, 58% of CISOs of SMEs said that their risk of attack was higher compared to enterprises. So, you may be surprised to learn that small and medium enterprises (SMEs) are actually more frequent targets of cyberattacks.

CISO 85
article thumbnail

Get an Untrusted Security Advisor! Have Fun, Reduce Fail!

Anton on Security

If you look at LinkedIn, many consultants present themselves as trusted advisors to CISOs or their teams. Let’s think about the use cases where using an untrusted security advisor is quite effective and the risks are minimized. The risks are low and the value is there. Given the controls we have, how would you test X?

article thumbnail

Cybersecurity Snapshot: New Guides Offer Best Practices for Preventing Shadow AI and for Deploying Secure Software Updates

Security Boulevard

And get the latest on the top “no-nos” for software security; the EU’s new cyber law; and CISOs’ communications with boards. 1 - CSA: How to prevent “shadow AI” As organizations scale up their AI adoption, they must closely track their AI assets to secure them and mitigate their cyber risk.