Remove Business Continuity Remove Healthcare Remove Security Remove Systems Review
article thumbnail

Guarding the gates: a look at critical infrastructure security in 2023

CIO

As the end of 2023 approaches, it becomes imperative to assess the current landscape of cybersecurity threats, explore potential strategies to combat them, and explore the new practice measures that can be taken. Our interconnected online world is no longer separate from our lives, businesses, or our global economy.

article thumbnail

Inside CIOs’ response to the CrowdStrike outage — and the lessons they learned

CIO

Catholic Health’s IT systems and those of its partners were crashing, with one of its radiology vendors being among the first to experience technical difficulties. It has a triage team that is set up to assemble IT staff and establish a command center for cybersecurity and other incidents, says Mainiero, Catholic Health’s SVP and CDIO. “We

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

Trending Sources

article thumbnail

Cybersecurity Snapshot: North Korea’s Cyber Spies Hunt for Nuclear Secrets, as Online Criminals Ramp Up AI Use in the EU

Tenable

Meanwhile, the risk concerns that healthcare leaders have about generative AI. And a poll on water plant cybersecurity. Cybersecurity and Infrastructure Security Agency (CISA), the FBI and law enforcement agencies from the U.S., healthcare organizations. Plus, what Europol found about the use of AI for cybercrime.

article thumbnail

8 data strategy mistakes to avoid

CIO

How enterprises gather, store, cleanse, access, and secure their data can be a major factor in their ability to meet corporate goals. Organizations often get services and applications up and running without having put stewardship in place,” says Marc Johnson, CISO and senior advisor at Impact Advisors, a healthcare management consulting firm.

Strategy 335
article thumbnail

Architect defense-in-depth security for generative AI applications using the OWASP Top 10 for LLMs

AWS Machine Learning - AI

Many customers are looking for guidance on how to manage security, privacy, and compliance as they develop generative AI applications. We first delve into the vulnerabilities, threats, and risks that arise from the implementation, deployment, and use of LLM solutions, and provide guidance on how to start innovating with security in mind.

article thumbnail

What COVID-19 Response Strategies Tell Us About the Business-Cybersecurity Disconnect

Tenable

As organizations around the world raced to develop strategies to respond to the COVID-19 pandemic, an independent business risk study shows cybersecurity leaders were largely left out. Yet, many cybersecurity leaders are still struggling to get a seat at the table. . COVID-related scams were the No.

article thumbnail

What's on Cybersecurity Experts’ Minds: RSA Conference 2021

Palo Alto Networks

Once again, it has been my privilege to help review submissions for the RSA Conference 2021, specifically for the hackers and threats stream. While this year has been tough for so many people in so many ways, I’m glad many cybersecurity experts still found the time to submit proposals to be speakers.