Security in the Digital DNA Shadow AI and the Governance Gap: What Leaders Must Do Now Security By Design - Part 2 Business Risk is the possibility that an event will eventually lead to a reduction in a company’s Employee Training & Awareness Program Management: Planning for Success Unleashing Business Potential: The Power of Adaptive Enterprise Architecture In the digital age, businesses must adopt an adaptive Enterprise Architecture to succeed. AI Value Realization What Does AI Offer Users of Mainstream Enterprise Systems? Leaders and managers of businesses, non-profit organizations, government agencies and others have What Does AI Offer Humankind? Information technology in general and AI in particular serve as assistants to humankind in proble AI In Mainstream Enterprise Applications This article is one of a series on the subject of Artificial Intelligence in mainstream enterpris Artificial Intelligence For All, Responsibly As we look towards the turn of another year, it is a time of introspection for many organizations The Legacy Of ELIZA Recent dramatic advancements in Machine Learning (ML) and Natural Language Processing (NLP) have Salesforce: Well Architected Solutions 15 Best Practices In Salesforce Development Many businesses have decided to use Salesforce's customer relationship management solution. The Benefits Of Salesforce Communities The technologies that we use transform into a better alternative continuously. Search Category - Any -AI Value RecognitionProgram Management: Planning for SuccessSalesforce: Well Architected SolutionsSecurity in the Digital DNA Content Type - Any -ArticleBlogWebinarPodcasts Sort by - Any -LatestTrendingFeatured Apply Featured Article Zero Trust As An Enterprise Security Model The traditional idea of the well-defined network perimeter is outdated in a world where organizations are increasingly moving applications and data to cloud services, embracing a highly mobile remo Laszlo S. Gonc CISSP, First Senior Fellow, DivIHN Cybersecurity Center of Excellence Featured Article Third-Party Supply Chain Risk During The COVID-19 Organizations – public and private – have felt the impact of the COVID-19 outbreak on our supply chains as suppliers have diminished workforces and capacity. Laszlo S. Gonc CISSP, First Senior Fellow, DivIHN Cybersecurity Center of Excellence Featured Article Employee Security Awareness Training Can security awareness training change behavior and reduce cyber risk? CIOs and CISOs realize human error is perhaps the biggest weakness in any information security program. Laszlo S. Gonc CISSP, First Senior Fellow, DivIHN Cybersecurity Center of Excellence Featured Article Managing Business Risk in the context of increased remote The COVID-19 outbreak is an unstable dynamic situation and has the potential to be incredibly impactful and disruptive to our organizations – corporate, non-profits, and governments alike. Laszlo S. Gonc CISSP, First Senior Fellow, DivIHN Cybersecurity Center of Excellence Featured Article Cybersecurity Incident Response Preparedness An incident response framework provides a structure to support incident response operations. A framework typically provides guidance on what needs to be done, but not on how it is done. Laszlo S. Gonc CISSP, First Senior Fellow, DivIHN Cybersecurity Center of Excellence Blog Zero Trust – Securing Your Business Traditional security models have been challenged as millions across the world have transitioned to remote work models wherever possible. Laszlo S. Gonc CISSP, First Senior Fellow, DivIHN Cybersecurity Center of Excellence Blog IoT Medical Device Cybersecurity Healthcare data and medical devices would be aggressively targeted by ransomware attacks since early 2017 has proven to be true Laszlo S. Gonc CISSP, First Senior Fellow, DivIHN Cybersecurity Center of Excellence