Search:
Latest Posts
Finding talent to bridge the technical and strategic is crucial to the long-term success of AI projects – nurturing this role in-house requires cross-departmental exposure By Eoin Connolly For years, organizations have been told that if they want to successfully integrate AI, they need to close the ...
Gen AI for Threat Intelligence: A 3-Step Guide to Minimizing Model-Leak Risk
Tammy Klotz, CISO at materials manufacturer Trinseo, explains how she leverages transformative tools without ...
‘Rogue Agents’ and Why Autonomous Models Will Force Tech Leaders to Build AI Better
Mastercard's Fellow of Data & AI and AI Truth’s founder on the risks of unsanctioned agentic AI and the need for ...
Our Upcoming Events
Articles
Can't Hire an AI Translator? Grow Your Own
Finding talent to bridge the technical and strategic is crucial to the long-term success of AI projects – nurturing this role in-house requires cross-departmental exposure By Eoin Connolly For years, organizations have been told that if they want to successfully integrate AI, they need to close the ...
How is CSL Using Data and AI to Innovate and Improve Outcomes?
In the biotech world, every insight could change a life — but how do you turn oceans of complex data into real-world breakthroughs? In this special interview, Milica Ng, CSL’s Senior Director, Head Data Science, sits down with Corinium’s Vanessa Jalleh to unpack the role of analytics and AI in ...
The Breach is Over. Are We Smarter? Turning Incident Response into Institutional Memory with Krishna Bagla
Corinium’s Maddie Abe engaged with Krishna Bagla, Manager Cyber Security Operations & Implementation of NSW Education Standards Authority, to explore what’s holding us back and what it might take to shift. Cyber incidents are a given. Repeated blind spots shouldn’t be. Too often, when a breach ...
The Human Firewall: Reframing Cyber Security from Technology to Trust with ISACA's Jenny Tan
As cyber threats grow in scale and impact, organisations are being forced to rethink how they define and manage risk. In this interview, Corinium’s Vanessa Jalleh speaks with ISACA’s Jenny Tan about why resilience starts with mindset — and how cyber leaders can elevate the conversation beyond IT, ...
The Breach is Over. Are We Smarter? Turning Incident Response into Institutional Memory with Krishna Bagla
Corinium’s Maddie Abe engaged with Krishna Bagla, Manager Cyber Security Operations & Implementation of NSW Education Standards Authority, to explore what’s holding us back and what it might take to shift. Cyber incidents are a given. Repeated blind spots shouldn’t be. Too often, when a breach ...
Reports
Tiger Analytics "Delivering Real-Time Operational Insights for PTP with Databricks Lakehouse"
Pelabuhan Tanjung Pelepas (PTP), Malaysia’s leading transshipment port, embarked on a digital transformation journey with Tiger Analytics to enhance its data capabilities. By implementing a modern data lakehouse architecture powered by Databricks, PTP aimed to centralize its data, streamline ...
ThoughtSpot's "The Data Leader's Checklist for Leveraging Agentic AI"
This ThoughtSpot report provides a comprehensive, actionable guide for data leaders looking to harness the power of Agentic AI to modernize analytics, drive innovation, and empower business users. It outlines a step-by-step checklist to transition from legacy dashboards and manual reporting to ...
CISOs Can't Afford to Ignore Active Directory
Old, avoided and potentially vulnerable, Active Directory and identity stores can be a major risk waiting to materialise. While multiple security layers often exist to protect organisations from outside threats, the fundamental configurations and hygiene of identity management storage systems are ...
Unlocking the Potential of Interoperability in Federal Government
Data is the backbone of modern governance, but fragmented, siloed systems hinder the ability of federal agencies to make informed decisions, respond to crises, and drive innovation. Without interoperability, data is trapped—isolated in departments, stored in incompatible formats, and duplicated ...
CISOs Can't Afford to Ignore Active Directory
Old, avoided and potentially vulnerable, Active Directory and identity stores can be a major risk waiting to materialise. While multiple security layers often exist to protect organisations from outside threats, the fundamental configurations and hygiene of identity management storage systems are ...
Podcasts
Australia’s Award-Winning Jalpa Bhavsar: Leveraging Transferable Skills to Break into Cyber
Jalpa Bhavsar shares insights on how to leverage soft skills and build technical knowledge to pursue a successful career in cybersecurity In this episode of the Business of Infosec podcast, host Michelle Ribeiro is joined by mentor, speaker, podcaster and award-winning Cybersecurity Professional, ...
The Must-Dos for a Highly Capable Cyber Team
Transformation Executive Deepa Bradley and Let’sWeCan Co-Founder Daniel Shore talk about building highly capable cyber teams In this week’s episode of the Business of Infosec podcast, host Michelle Ribeiro is joined by Transformation Executive Deepa Bradley and Let’sWeCan Co-Founder Daniel Shore. ...
Former CISO Rob Wiggan Debunks Cyber Insurance Myths
Rob Wiggan shares insights on career change and how to adopt a winning cyber insurance approach In this week’s episode of the Business of Infosec podcast, host Michelle Ribeiro is joined by Rob Wiggan, a former CISO and accomplished IT professional with more than 25 years of industry experience. ...
Australia’s Award-Winning Jay Hira: Key to Zero Trust Success is Strategy, Not Tools
Jay Hira shares insights on Zero Trust imperative, collaboration, and diversity and inclusion in cybersecurity In this week’s episode of the Business of Infosec podcast, host Michelle Ribeiro is joined by award-winning Cybersecurity Strategist, Jay Hira. Together they walk through Jay’s computer ...
Former CISO Rob Wiggan Debunks Cyber Insurance Myths
Rob Wiggan shares insights on career change and how to adopt a winning cyber insurance approach In this week’s episode of the Business of Infosec podcast, host Michelle Ribeiro is joined by Rob Wiggan, a former CISO and accomplished IT professional with more than 25 years of industry experience. ...
Videos
The Executive Playbook for Scalable, Secure, and Strategic AI Adoption
Ritendra Banerjee, Head of Business Insights at a major global insurer, explores what it really takes to embed AI into the DNA of a business—from data trust to cultural readiness. AI adoption is no longer a tech-side experiment—it’s a C-suite imperative. But with scale comes complexity, and with ...
Moody's: Navigating the Future with Data Webinar On-Demand
Join Erum Manzoor, Haroon Abbu, and Alaa Mousawi for this on-demand webinar, moderated by Moody's, that dives into the dynamic interplay of data governance and risk management in modern enterprises This webinar, moderated by Moody’s Steve Kleinmann and featuring thought leaders Erum Manzoor, Haroon ...
The Future of AI in Asset Management: A Conversation with Matthew Curnow of Wood
Matthew Curnow the Head of Digital Strategy, Data Management & AI at Wood explores the evolving role of AI in engineering and operations in this interview with Corinium’s Eleen Meleng. Matthew Curnow shares his thoughts on how AI is becoming a core component in various industries, including ...
Agresh Doshi: What insights in advancing data, AI and analytics are changing the public sector?
Corinium’s Vanessa Jalleh had the opportunity to speak to the Bureau of Meteorology’s Digital Development and Solutions Manager, Agresh Doshi. Agresh Doshi, the Bureau of Meteorology’s Digital Development and Solutions Manager, shares his thoughts on advancing data, AI, and analytics in the modern ...
The Future of AI in Asset Management: A Conversation with Matthew Curnow of Wood
Matthew Curnow the Head of Digital Strategy, Data Management & AI at Wood explores the evolving role of AI in engineering and operations in this interview with Corinium’s Eleen Meleng. Matthew Curnow shares his thoughts on how AI is becoming a core component in various industries, including ...