Remove categories thought-leadership
article thumbnail

The Power of Partnerships: Unlocking the Full Potential of Enterprise Data with Reltio

Reltio

This dedicated space allows our partners to share their thought leadership, showcase their solutions, and demonstrate the novel ways we work together to help our customers drive business value through data. That’s why we’re excited to announce the launch of our new Partners Showcase on the Reltio website.

article thumbnail

As a CISO, Are You a Builder, Fixer, or Scale Operator?

Lenny Zeltser

Consider the following thoughtful examples: Jeff Pollard, Jinan Budge, and Paul McKay help CISOs determine if they’re at the right place by identifying over six types of leaders : Transformational, post-breach, tactical, etc. (This post was co-authored by Yael Nagler and Lenny Zeltser.) There are many ways of grouping security leaders.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Balancing AI: Do good and avoid harm

IBM Big Data Hub

” As a child, I thought it was cringeworthy grammar and I would correct him, insisting it should be “do well.” Generative AI is opening doors and creating new opportunities and risks for organizations globally, with human resources (HR) leadership playing a key role in managing these challenges.

article thumbnail

Buyer's Guide 2024 - coming soon

CILIP

While inviting professionals and providers into thoughtful dialogue, sharing their experiences of the sector, the Buyers’ Guide showcases the latest services and products on offer, addressing the many challenges faced by our members. The Annual Buyers’ Guide is one of the tools that it is using to enable this.

article thumbnail

Think Ransomware Can’t Put You Out of Business?

Adam Levin

No industry, category, size, or group is safe from this cyber scourge. Germany, Japan, France, and China thought companies were to blame, with 40 percent saying CEOs should be doing a better job. Another 23 percent thought the CEO should face a prison sentence. 1-99-employee companies are a target. We hear about the big ones.

article thumbnail

Hidden Biases in Cybersecurity Reviews – And How to Use Them

eSecurity Planet

For example, when surveying the market for email security, survey results should include respondents from each category that might represent different needs. The survey should have representation from categories such as: Company size: small to large Industry vertical: healthcare, energy, etc.

article thumbnail

NEW TECH: This free tool can help gauge, manage third-party cyber risk; it’s called ‘VRMMM’

The Last Watchdog

Broken into eight categories, VRMMM covers more than 200 program elements that, in effect, forms the basis of a well-run third party risk management program. Maturity levels in eight different vendor risk management categories contained in the VRMMM either held steady in 2017, or increased modestly, compared to 2016.

Risk 147