<img height="1" width="1" style="display:none;" alt="" src="https://dc.ads.linkedin.com/collect/?pid=306561&amp;fmt=gif">
Skip to content

Latest Posts

AI Integrity and Risks: A Boardroom Priority for Data Leaders

The integrity of AI is fundamentally tied to the integrity of data—if the data that feeds AI models is flawed, biased, or ungoverned, the risks of misinformation, regulatory violations, and reputational damage increase exponentially. As AI adoption accelerates, data and AI leaders face a growing ...

Our Upcoming Events

Articles

How Malaysia’s Data Leaders Are Reimagining Analytics in 2025

"We have frameworks — but how do we bring them to life?" That single line, shared during a research call with one of Malaysia’s top data leaders, perfectly captures where many organisations are in their data journey. The excitement around AI, predictive analytics, and personalisation is real — but ...

Reports

CISOs Can't Afford to Ignore Active Directory

Old, avoided and potentially vulnerable, Active Directory and identity stores can be a major risk waiting to materialise. While multiple security layers often exist to protect organisations from outside threats, the fundamental configurations and hygiene of identity management storage systems are ...

Unlocking the Potential of Interoperability in Federal Government

Data is the backbone of modern governance, but fragmented, siloed systems hinder the ability of federal agencies to make informed decisions, respond to crises, and drive innovation. Without interoperability, data is trapped—isolated in departments, stored in incompatible formats, and duplicated ...

The New Era of Gen AI: Enabled by Logical Data Management

Many organizations are still struggling to implement a data foundation that can scale across the increasing number of data sources and increasing volumes of data required by Gen AI; enable all Gen AI applications and other data consumers to access the data they need in real time, and in a safe and ...

AI in Government: Building on Data, Context, and Trust for Success

The AI Readiness Imperative for Federal Agencies In an era where AI adoption is accelerating, federal agencies must balance innovation with responsibility. AI presents transformative opportunities—optimizing workflows, reducing costs, and improving public services—but only if built on a strong ...

The New Era of Gen AI: Enabled by Logical Data Management

Many organizations are still struggling to implement a data foundation that can scale across the increasing number of data sources and increasing volumes of data required by Gen AI; enable all Gen AI applications and other data consumers to access the data they need in real time, and in a safe and ...

Podcasts

The Must-Dos for a Highly Capable Cyber Team

Transformation Executive Deepa Bradley and Let’sWeCan Co-Founder Daniel Shore talk about building highly capable cyber teams In this week’s episode of the Business of Infosec podcast, host Michelle Ribeiro is joined by Transformation Executive Deepa Bradley and Let’sWeCan Co-Founder Daniel Shore. ...

Former CISO Rob Wiggan Debunks Cyber Insurance Myths

Rob Wiggan shares insights on career change and how to adopt a winning cyber insurance approach In this week’s episode of the Business of Infosec podcast, host Michelle Ribeiro is joined by Rob Wiggan, a former CISO and accomplished IT professional with more than 25 years of industry experience. ...

Former CISO Rob Wiggan Debunks Cyber Insurance Myths

Rob Wiggan shares insights on career change and how to adopt a winning cyber insurance approach In this week’s episode of the Business of Infosec podcast, host Michelle Ribeiro is joined by Rob Wiggan, a former CISO and accomplished IT professional with more than 25 years of industry experience. ...

Videos

ANZ Bank Exec Discusses Key DevOps Challenges for Australians

Elizaveta Konovalova unravels the intersections of DevOps, DevSecOps, and the need for scalability. The demands of a rapidly changing tech and threat landscape has made building sophisticated Continuous Integration and Continuous Delivery pipelines and application security measures absolutely ...