<img height="1" width="1" style="display:none;" alt="" src="https://dc.ads.linkedin.com/collect/?pid=306561&amp;fmt=gif">
Skip to content

Latest Posts

How AI Innovation Can Speed Up Post-Pandemic Business Recoveries

CDAO Fall 2020 highlighted AI strategies and technologies that industry leaders are using to accelerate their recoveries from COVID-19 AI looks set to play a key role in America’s post-pandemic business recovery. As enterprises refocus on their core objectives, advanced AI technologies will enhance ...

Our Upcoming Events

Articles

7 Key Reflections from CISO Singapore 2025

CISO Singapore 2025 brought together security leaders, business executives, and innovators to explore how cyber security is evolving in an era of constant change. Across keynotes, panels, and hallway conversations, one theme was clear: cyber security is no longer just defence — it’s a business ...

Can't Hire an AI Translator? Grow Your Own

Finding talent to bridge the technical and strategic is crucial to the long-term success of AI projects – nurturing this role in-house requires cross-departmental exposure By Eoin Connolly For years, organizations have been told that if they want to successfully integrate AI, they need to close the ...

Reports

CISOs Can't Afford to Ignore Active Directory

Old, avoided and potentially vulnerable, Active Directory and identity stores can be a major risk waiting to materialise. While multiple security layers often exist to protect organisations from outside threats, the fundamental configurations and hygiene of identity management storage systems are ...

Unlocking the Potential of Interoperability in Federal Government

Data is the backbone of modern governance, but fragmented, siloed systems hinder the ability of federal agencies to make informed decisions, respond to crises, and drive innovation. Without interoperability, data is trapped—isolated in departments, stored in incompatible formats, and duplicated ...

CISOs Can't Afford to Ignore Active Directory

Old, avoided and potentially vulnerable, Active Directory and identity stores can be a major risk waiting to materialise. While multiple security layers often exist to protect organisations from outside threats, the fundamental configurations and hygiene of identity management storage systems are ...

Podcasts

The Must-Dos for a Highly Capable Cyber Team

Transformation Executive Deepa Bradley and Let’sWeCan Co-Founder Daniel Shore talk about building highly capable cyber teams In this week’s episode of the Business of Infosec podcast, host Michelle Ribeiro is joined by Transformation Executive Deepa Bradley and Let’sWeCan Co-Founder Daniel Shore. ...

Former CISO Rob Wiggan Debunks Cyber Insurance Myths

Rob Wiggan shares insights on career change and how to adopt a winning cyber insurance approach In this week’s episode of the Business of Infosec podcast, host Michelle Ribeiro is joined by Rob Wiggan, a former CISO and accomplished IT professional with more than 25 years of industry experience. ...

Former CISO Rob Wiggan Debunks Cyber Insurance Myths

Rob Wiggan shares insights on career change and how to adopt a winning cyber insurance approach In this week’s episode of the Business of Infosec podcast, host Michelle Ribeiro is joined by Rob Wiggan, a former CISO and accomplished IT professional with more than 25 years of industry experience. ...

Videos

Moody's: Navigating the Future with Data Webinar On-Demand

Join Erum Manzoor, Haroon Abbu, and Alaa Mousawi for this on-demand webinar, moderated by Moody's, that dives into the dynamic interplay of data governance and risk management in modern enterprises This webinar, moderated by Moody’s Steve Kleinmann and featuring thought leaders Erum Manzoor, Haroon ...