There are companies big and small that are well-known for never resting on their laurels, but always innovating and improving. Some companies, such as Apple and Google, are viewed as leaders in their respective spaces because they are consistently at the forefront of many of the world’s most important technological advancements, always impressing consumers with…
Expert Panel: Recommended Ways For Consumers To Better Protect Their Privacy Online
Many of us spend hours each day online. Find out how attaching a price to your data can help improve your privacy.
Podcast: Data Privacy Detective – Identity Management
Digital identities can be managed to increase security and minimize data breach risk. I had the pleasure of speaking to the Data Privacy Detective in his latest Podcast. Join me as we explore the questions: What is identity management? How can an automated approach help increase cyber security? What should consumers demand from companies and…
Flow And Automation Against The Glut Of IT
Today, the average business has over 187 applications, requiring users to switch context 1,200 times. How can CIOs and IT departments quickly take back control?
Expert Panel: 16 Tech-Related Risk Factors Company Executives Often OverlookExpert Pannel:
Technology is interwoven with the majority of business processes these days, and while that comes with big benefits, it also adds big risks. My answer and the contribution of 15 other members of the Forbes Technology Council: Now on Forbes!
Be Safe: Take Control of your Digital Identity Now
Data breaches are a Weekly ritual. Here are three easy steps to take care of your digital identity and why to take them.
Why should we care about digital identities?
In a world where our digital accounts, our digital identities, get stolen by the second, we should protect them from attackers. Follow me through this lightning talk on why you should take care of your digital identities and how to protect them.
Great Expectations: Solving The Pain Points Of Managing User Identities
When it comes to managing user identities and logging into IT systems, different stakeholders have different expectations. For starters, employees focus on usability and how to minimize the interruption of their workflow. The IT department, for obvious reasons, is focused on security and manageability, and management always keeps an eye on the bottom line.Balancing employees’…
NACD: Three Action Items to Get Started with Better Cybersecurity Oversight
Boards often delegate oversight of the cybersecurity strategy to executives, outside consultants, or at most one board member. It is possible to take your oversight to the next level with a few simple changes.
Grit, Vision, Refocus in Life, IT, and the Boardroom
5000..2500..1000..50..10..5..4..3..2..1 Running my first 5k race has been a challenging experience. There were numerous moments when giving up felt like the best choice. Yet, quitting would have meant never experiencing crossing the finish line and not experiencing the joy of reaching the goal. Like running a race, the hard decisions that come with running an…