Remove Digital transformation Remove Government Remove Risk
article thumbnail

The C-Suite Power Shift: Why CIOs, CTOs, and CISOs Must Realign to Survive

Jane Frankland

Today, the Chief Technology Officer (CTO) and Chief Information Security Officer (CISO) are rising in prominence—fuelled by the accelerating demands of AI innovation, cybersecurity, and digital transformation. The digital era has brought with it not just new technologies, but new power dynamics. Risks slip through the cracks.

CISO 130
article thumbnail

How boards can manage digital governance in the age of AI

BH Consulting

This rapid transformation creates a challenge for boards tasked with balancing emerging risks and strategic opportunities. In a presentation titled Digital governance for boards and senior executives: AI, cybersecurity, and privacy , she called on her extensive experience advising boards on these areas.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

UK Cybersecurity Weekly News Roundup – 31 March 2025

Security Boulevard

A worrying 64% of public sector IT leaders said they are unsure about best practices, with legacy systems worsening the risk. As digital transformation accelerates, public infrastructure like energy and healthcare face increasing exposure to ransomware and espionage. Full migration should be completed by 2035.

article thumbnail

ISACA impressions: AI, risk and resilience feature at the 2025 conference

BH Consulting

The ISACA Ireland Chapter Conference on 11 April brought together thought leaders in AI, cybersecurity, auditing, governance, and quantum computing. What stood out wasnt just the topics, but how interconnected these seemingly distinct domains are becoming in todays fast-evolving digital landscape.

Risk 59
article thumbnail

Protecting Oil and Gas Industry Infrastructure: Strategies for Resilience

SecureWorld News

Digital transformation: The integration of IoT, SCADA systems, and advanced analytics has increased operational efficiency but also expanded the attack surface. Regularly updating and patching systems, including antivirus software, firewalls, and SCADA networks, can mitigate this risk.

article thumbnail

Healthcare Cybersecurity Market Soars: Key Trends and Insights

SecureWorld News

This surge is driven by a convergence of factorsfrom a spike in ransom ware attacks to the digital transformation of healthcarethat CISOs and healthcare executives must understand and act upon. Breaches can disrupt care delivery and put lives at risk, not to mention lead to hefty compliance fines.

article thumbnail

A Risk-Based Approach to Securing Data in Microsoft 365 with Copilot

Thales Cloud Protection & Licensing

This is particularly crucial for sectors such as financial services, government, and healthcare. One Size Does Not Fit All Risk-based controls are not one-size-fits-all; they depend on your industry, operational regions, and overall risk appetite. Sensitivity labels should be defined based on your organization's risk tolerance.

Risk 62