Strategic advice to leverage new technologies

Technology is at the heart of nearly every enterprise, enabling new business models and strategies, and serving as the catalyst to industry convergence. Leveraging the right technology can improve business outcomes, providing intelligence and insights that help you make more informed and accurate decisions. From finding patterns in data through data science, to curating relevant insights with data analytics, to the predictive abilities and innumerable applications of AI, to solving challenging business problems with ML, NLP, and knowledge graphs, technology has brought decision-making to a more intelligent level. Keep pace with the technology trends, opportunities, applications, and real-world use cases that will move your organization closer to its transformation and business goals.

Subscribe to the Technology Advisor

Recently Published

San Murugesan looks at how artificial intelligence (AI) strategies can enhance information systems security. He calls this “cyber AI” and discusses how activities such as monitoring, threat hunting, and incident response can benefit from AI/machine learning solutions. The article covers the use of AI in behavioral analytics, threat intelligence, ransomware attack detection, smart identity governance, online fraud detection, deepfakes, and risk assessment. Finally, the author points out the potential for malicious use of AI in the increasing occurrence of cyber threats. His thoughtful piece provides a deep exploration of the nexus between AI and cybersecurity from an expert viewpoint.
Abhijit Dasgupta, an accom­plished security risk leader with extensive experience in building and leading security risk and digital governance practices globally, comments on the changing threat landscape and highlights the enhanced risk from both new remote work practices across businesses as a result of COVID as well as from cryptocurrencies. He suggests strategies such as zero trust, perimeter-less, and multi-cloud.
James Motherway, a senior threat hunt analyst, offers practical insights on proactive defense with threat hunting and deception. He believes that, as cyberattacks become bolder and more widespread, reactive security is not enough. Even worse, many organizations suffer from detection blind spots or collect lots of data that does not help. Motherway believes security teams have no choice but to invest in proactive capabilities to protect their operations.
The authors describe how systemic risk should be factored in as a board priority and how to enhance preparedness. They argue that in terms of bolstering cybersecurity, the corporate boardroom is “too frequently a non­existent or under­performing control point for many organizations.” Zukis and Barsky go on to discuss the vulnerability of today’s highly connected and complex systems to systemic risks that can cause damage to the entire system. Finally, their article illustrates how boardroom mechanisms for governing digital and cyber risk can benefit enterprises.
In this issue of CBTJ, we address the question, “Why are cyberattacks on the rise, and what strategies/practices can organizations adopt to address and minimize the chance of these attacks?” Our five articles were carefully selected to highlight the strategies that enterprises can follow to enhance their security posture.
Cybersecurity vulnerability management for medical devices is an area of concern for both medical device manufacturers and healthcare delivery organizations. The issues related to updates, configuration, and patch management are extremely challenging in the medical domain, especially with ransomware attacks designed to exploit well-known technologies used in medical devices. The article describes a centralized service and continuous patch delivery that can be adopted as an industry practice for medical device manufacturers, and is an important read for all cybersecurity and healthcare professionals.
Increasingly, organizations are adopting a decentralized approach to R&D, carrying out a significant amount of activity within the business units. This Advisor explores the challenge of gaining R&D insight, from project management systems that don't fit the bill, to the need for better system configuration.
Good data is honestly and ethically sourced, fully contextualized, reliable, resilient, widely available, and well-understood. How can this be achieved? Contemplating these characteristics, we are led directly to principles and programs for data/information governance, ethics, and the organizational structures needed to support and drive their success. This Advisor explores the path forward to good data.