This site uses cookies to improve your experience. To help us insure we adhere to various privacy regulations, please select your country/region of residence. If you do not select a country, we will assume you are from the United States. Select your Cookie Settings or view our Privacy Policy and Terms of Use.
Cookie Settings
Cookies and similar technologies are used on this website for proper function of the website, for tracking performance analytics and for marketing purposes. We and some of our third-party providers may use cookie data for various purposes. Please review the cookie settings below and choose your preference.
Used for the proper function of the website
Used for monitoring website traffic and interactions
Cookie Settings
Cookies and similar technologies are used on this website for proper function of the website, for tracking performance analytics and for marketing purposes. We and some of our third-party providers may use cookie data for various purposes. Please review the cookie settings below and choose your preference.
Strictly Necessary: Used for the proper function of the website
Performance/Analytics: Used for monitoring website traffic and interactions
And executives see a high potential in streamlining the sales funnel, real-time data analysis, personalized customer experience, employee onboarding, incident resolution, fraud detection, financial compliance, and supply chain optimization. Customer gains Customer experiences are well-suited for an agentic boost as well.
If not, Thorogood recommends IT leaders build platforms that savvy business managers can use and encourage or require compliance with enterprise standards and processes. Double down on cybersecurity In 2025, there will be an even greater need for CIOs to fully understand the current cybersecurity threat landscape.
According to a Gartner’s report , about 75% of compliance leaders say they still lack the confidence to effectively run and report on program outcomes despite the added scrutiny on data privacy and protection and newly added regulations over the last several years. Image Credits: anecdotes.
Security was another constant challenge. In response, traders formed alliances, hired guards and even developed new paths to bypass high-risk areas just as modern enterprises must invest in cybersecurity strategies, encryption and redundancy to protect their valuable data from breaches and cyberattacks.
Ecosystem warrior: Enterprise architects manage the larger ecosystem, addressing challenges like sustainability, vendor management, compliance and risk mitigation. Infrastructure architecture: Building the foundational layers of hardware, networking and cloud resources that support the entire technology ecosystem.
The survey points to a fundamental misunderstanding among many business leaders regarding the data work needed to deploy most AI tools, says John Armstrong, CTO of Worldly, a supply chain sustainability data insights platform. Theres a perspective that well just throw a bunch of data at the AI, and itll solve all of our problems, he says.
What is playing on the minds of senior IT executives confronted with the multiple challenges of cybersecurity and compliance? One attendee, a global head of cybersecurity, shared insights into navigating ISO and SOC certifications – referring to it the “certification jungle”. Here are five main takeaways from the event.
Both types of gen AI have their benefits, says Ken Ringdahl, the companys CTO. The main commercial model, from OpenAI, was quicker and easier to deploy and more accurate right out of the box, but the open source alternatives offered security, flexibility, lower costs, and, with additional training, even better accuracy.
CIOs must tie resilience investments to tangible outcomes like data protection, regulatory compliance, and AI readiness. However, CIOs must still demonstrate measurable outcomes and communicate these imperatives to senior leadership to secure investment. To respond, CIOs are doubling down on organizational resilience.
They include Kleiner Perkins, Optum Ventures (United Health), Kaiser Permanente, Alphabet’s Gradient Ventures, Soma Capital, Gaingels and Flexport; as well as a number of individual investors such as Jon Oberheide (Duo SecurityCTO), Ash Devata (VP/GM for Zero Trust and Duo at Cisco) and Leore Avidar (Alt CEO).
The challenges don’t end once those requirements are met, as the project teams need to secure executive buy-in, which may be hindered by resistance to new technologies. A cloud-first approach ensures better data security, compliance with regulations, and scalability for AI-driven innovation,” says Domingues.
While certifications for security management practices like SOC 2 and ISO 27001 have been around for a while, the number of companies that now request that their software vendors go through (and pass) the audits to be in compliance with these continues to increase. ” Bridgecrew announces $14M Series A to automate cloud security.
In our inaugural episode, Michael “Siko” Sikorski, CTO and VP of Engineering and Threat Intelligence at Unit 42 answers that question and speaks to the profound influence of artificial intelligence in an interview with David Moulton, Director of thought leadership for Unit 42. Threat Vector is your compass in the world of cybersecurity.
Drata , a startup that helps businesses get their SOC 2 compliance, today announced that it has raised a $3.2 At the end of the day, tools like Drata are meant to get you through an audit, but at the same time, the idea here is also to give you a better idea of your own security posture. to help automate security audits.
Too quickly people are running to AI as a solution instead of asking if its really what they want, or whether its automation or another tool thats needed instead, says Guerrier, currently serving as CTO at the charity Save the Children. Are we prepared to handle the ethical, legal, and compliance implications of AI deployment?
SAP CTO Juergen Mueller will step down from SAP’s executive board at the end of September. “I I want to address an incident at a past company event where my behavior was inappropriate. I regret being inconsiderate and sincerely apologize to everyone affected. I recognize my behavior at that moment did not reflect our values at SAP.
Virtually every company relied on cloud, connectivity, and security solutions, but no technology organization provided all three. Leaders across every industry depend on its resilient cloud platform operated by a team of industry veterans and experts with extensive networking, connectivity, and security expertise.
Eureka , a Tel Aviv-based startup that provides enterprises with tools to manage security risks across their various data stores, today announced that it has raised an $8 million seed round led by YL Ventures. “Security leaders are especially excited about Eureka’s policy translation engine,” Hayun explained.
Security weaknesses arise Security and risk vulnerabilities are important signs that modernization is immediately necessary. He notes that recent surveys by Gartner and Forrester show that over 50% of organizations cite security and efficiency as their main reasons for modernizing their legacy systems and data applications.
Data architecture principles According to David Mariani , founder and CTO of semantic layer platform AtScale, six principles form the foundation of modern data architecture: View data as a shared asset. Ensure security and access controls. Ensure data governance and compliance. Choose the right tools and technologies.
Security and technology teams are under increasing pressure to strengthen their organizations cybersecurity posture. According to the National Cybersecurity Alliance , ransomware attacks, identity theft, assaults on critical infrastructure and AI-powered scams are all expected to escalate in 2025.
Jit , a startup that helps developers automate product security by codifying their security plans and workflows as code that can then be managed in a code repository like GitHub, today announced that it has raised a $38.5 “Creating a security plan or program is too time-consuming for high-velocity dev and product teams. .
Data silos, lack of standardization, and uncertainty over compliance with privacy regulations can limit accessibility and compromise data quality, but modern data management can overcome those challenges. If the data volume is insufficient, it’s impossible to build robust ML algorithms.
Skepticism from IT practitioners is natural, given they will have to work out how to deploy and maintain AI agents, says Tim Armandpour, CTO at PagerDuty. IT practitioners are cautious due to concerns around accuracy, transparency, security, and integration complexities, says Chahar, echoing Mikhailovs critiques.
Sym , a new platform that makes it easier for developers to integrate security and privacy workflows into their process, today announced that it has raised a $9 million Series A round led by Amplify Partners. Angel investors include former Google CISO Gerhard Eschelbeck , Atlassian CTO Sri Viswanath and Jason Warner , the CTO of GitHub.
Talk may be cheap, but when it comes to IT security, strategic conversations with colleagues, business partners, and other relevant parties can be priceless. Such discussions ensure the integration of cybersecurity initiatives and resource requirements in the enterprise’s business goals and objectives,” he adds.
CIOs must develop comprehensive strategies to mitigate risks such as cybersecurity threats, data privacy issues, and compliance challenges. For example, as businesses migrate to cloud platforms, CIOs must ensure robust data protection mechanisms are in place to prevent security breaches and maintain regulatory compliance.
By Andy Nallappan, ChiefTechnologyOfficer and Head of Software Business Operations, Broadcom Software. Broadcom Software CTO Andy Nallappan. About Andy Nallappan : Andy is the ChiefTechnologyOfficer and Head of Software Business Operations for Broadcom Software. Broadcom Software.
As more companies adopt low-code/no-code tools to build their line-of-business applications, it’s maybe no surprise that we are now seeing a new crop of services in this ecosystem that focus on keeping these tools secure. The round was led by Vertex Ventures and UpWest. . Image Credits: Zenity.
As a result, managing risks and ensuring compliance to rules and regulations along with the governing mechanisms that guide and guard the organization on its mission have morphed from siloed duties to a collective discipline called GRC. What is GRC? GRC is overarching.
At Gitex Global 2024, a panel of top cybersecurity leaders delivered a clear message: cybersecurity is no longer just the responsibility of the cybersecurity team or the ChiefInformationSecurityOfficer (CISO). Cybersecurity must be at the core of every organization.
We discuss the M&A landscape that CTOs need to be aware of, why customer centricity is at the heart of any successful merger, and how to keep business value at the focus of futuristic software tactics. All of this right here, right now, on the Modern CTO Podcast!
The reasons include higher than expected costs, but also performance and latency issues; security, data privacy, and compliance concerns; and regional digital sovereignty regulations that affect where data can be located, transported, and processed. Adding vaults is needed to secure secrets.
Jim Chilton is an award-winning CIO who serves as the chieftechnologyofficer of Cengage Group, an innovative disruptor in the edtech space. As a business and technology executive, Chilton leverages his unique experiences to drive innovation and optimize technology throughout the company.
Security operations teams face a daunting task these days, fending off malicious hackers and their increasingly sophisticated approaches to cracking into networks. That also represents a gap in the market: building tools to help those security teams do their jobs. It’s time for security teams to embrace security data lakes.
Cybersecurity The February ransomware attack on UnitedHealth Group’s Change Healthcare unit reinforced cybersecurity as a pressing concern for executives across the country, and the continuing fallout that includes a federal investigation keeping the issue in the spotlight. Foundry / CIO.com 3. Risk management came in at No.
Its an advanced job title, with cloud architects typically reporting to the IT director, CIO, CTO, or other technology executives. If youre still early in your career, youll want to consider a formal degree program, starting with a background in computer science, programming, networking, and security.
One effective approach to tackling that has been collaboration: not just applying an array of services to address the issue, but creating environments to help those building cybersecurity to work better together. Advent made some waves in the cybersecurity industry last year when it partnered with Crosspoint to acquire Forescout for $1.9
Cybersecurity is one of the most high-profile topics for organizations today and one of their biggest sources of risk. Conducting a holistic review of the organization to identify areas of vulnerability and improve network security is a proactive measure that no organization should overlook. By Matt Southmayd.
As Jyothirlatha, CTO of Godrej Capital tells us, Being a pandemic-born NBFC (non-banking financial company), a technology-first approach helps us drive business growth. Since technology evolves rapidly, ensuring seamless adoption while keeping business teams aligned requires continuous change management.
SwipeGuide ChiefTechnologyOfficer Sue Li has worked in the tech industry for over a decade, with a degree in educational technology and instructional design from Harvard University’s Technology, Innovation, and Education programme for her master’s degree. It’s going to be very, very powerful.”.
The breach of FireEye and SolarWinds by hackers working on behalf of Russian intelligence is “the nightmare scenario that has worried cybersecurity experts for years,” reports Zack Whittaker. 2020 was a disaster, but the pandemic put security in the spotlight. Stage Light on Black. Image Credits: Fotograzia / Getty Images.
Six months after securing a $23 million Series A round, Ketch , a startup providing online privacy regulation and data compliance, brought in an additional $20 million in A1 funding, this time led by Acrew Capital. In 2020, Ketch introduced its data control platform for programmatic privacy, governance and security.
This adage is especially true when it comes to cybersecurity. But with technical leadership, good security standards can make a world of difference. ISO 27001 and 27002 : Focused on helping organizations manage the security of assets including financial information, intellectual property and employee data.
We organize all of the trending information in your field so you don't have to. Join 49,000+ users and stay up to date on the latest articles your peers are reading.
You know about us, now we want to get to know you!
Let's personalize your content
Let's get even more personalized
We recognize your account from another site in our network, please click 'Send Email' below to continue with verifying your account and setting a password.
Let's personalize your content