Remove Digital transformation Remove Government Remove Security Remove White Paper
article thumbnail

5 key areas for governments to responsibly deploy generative AI

IBM Big Data Hub

In 2024, the ongoing process of digitalization further enhances the efficiency of government programs and the effectiveness of policies, as detailed in a previous white paper. Two critical elements driving this digital transformation are data and artificial intelligence (AI).

article thumbnail

Setting the standards in cybersecurity, part I: governance

CGI

Setting the standards in cybersecurity, part I: governance. Cybersecurity is firmly on the critical path for digital enterprises, with board-level accountability. In this first of a three-part blog series, I explore the role of cybersecurity standards in the larger IT governance context. Tue, 07/23/2019 - 23:17.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Part 1: OMG! Not another digital transformation article! Is it about understanding the business drivers?

ARMA International

Now information technologies and the information revolution are again transforming society. The COVID-19 pandemic further accelerated the transformation from many years to just a couple of years. This 3-part series will discuss digital transformation (DT) from several perspectives. The Genesis of Digital Transformation.

article thumbnail

Want to be a hybrid cloud winner? The recipe for XaaS success

IBM Big Data Hub

We’ve found in this new IBM-sponsored IDC white paper that the shift to delivering IT-as-a-service is foundational and extends the strategic transformation of IT infrastructure, adding even more value to the business. In fact, IDC estimates that IT infrastructure-related spending will grow by a modest 4.5%

Cloud 71
article thumbnail

10 measures for good IT security governance

CGI

10 measures for good IT security governance. Too often we see organizations implement technical security safeguards, but fail to implement proper security policies or procedures. As a result, weak practices persist that undermine security and expose assets to significant risk. harini.kottees….

article thumbnail

Own Your Cloud Security

Thales Cloud Protection & Licensing

theme will help to encourage personal accountability and proactive behavior in digital privacy, security best practices, common cyber threats and cybersecurity careers. As part of their digital transformation process, more and more businesses are moving to the cloud. The NCSAM 2019 focuses on personal accountability.

Cloud 115
article thumbnail

bA Data-Centric Approach to DEFEND

Thales Cloud Protection & Licensing

Consistent with the federal government’s deployment of Information Security Continuous Monitoring (ISCM), the CDM program is a dynamic approach to fortifying the cybersecurity of government networks and systems. DEFEND is the fourth phase of the Department of Homeland Security’s CDM program.