Remove Digital transformation Remove Presentation Remove Risk Remove Technology
article thumbnail

MY TAKE: Why ‘basic research’ is so vital to bringing digital transformation to full fruition

The Last Watchdog

Basic research is the foundational theorizing and testing scientists pursue in order to advance their understanding of a phenomenon in the natural world, and, increasingly, in the digital realm. We need to pick-up some by-products from our cutting-edge technologies, and it should be aligned with our future technologies.”.

article thumbnail

Safeguarding the company’s risk profile after a hasty digital transformation

SC Magazine

Now that we are a full year into the new world order and the pandemic has eased up a bit, companies are taking a deep breath and starting to consider how the past 14 months fundamentally reshaped their digital transformation plans. Ben Smith, field chief technology officer, RSA.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

MY TAKE: How digital technology and the rising gig economy are exacerbating third-party risks

The Last Watchdog

Accounting for third-party risks is now mandated by regulations — with teeth. What does this mean for company decision makers, going forward, especially as digital transformation and expansion of the gig economy deepens their reliance on subcontractors? That out of the way, business can proceed with less risk.

Risk 164
article thumbnail

ISG Presents 2021 ISG Star of Excellence Awards to Hexaware, Infosys and Rackspace Technology

CyberSecurity Insiders

Connors announced Hexaware, Infosys and Rackspace as the winners of the fourth annual ISG Star of Excellence Awards for earning the highest cumulative customer experience scores across all regions, industries and technology areas. STAMFORD, Conn.–(

article thumbnail

Webinar Recap: Mitigating Cyber Risks

SecureWorld News

What is the difference between a day at the beach and managing a cyber risk assessment plan? Risk is not what happens or occurs after that risk materializes. The speakers also delve into notable topics about what risk is, what it is not, and how to analyze potential risks. A Data-Driven World and Navigating It.

article thumbnail

How Businesses Can Better Manage a Growing Attack Surface

CyberSecurity Insiders

The external attack surface of companies continues to grow, presenting threat actors with a larger opportunity to gain access to exposed assets. In many cases, hackers find it easier to attack these assets and use them as entry points into a company’s technology system than a direct attack. A Cloud Journey Filled with Oversights.

article thumbnail

RSAC insights: How ‘TPRM’ can help shrink security skills gap — while protecting supply chains

The Last Watchdog

Third-Party Risk Management ( TPRM ) has been around since the mid-1990s – and has become something of an auditing nightmare. Related: A call to share risk assessments. This is because third-party risk has become a huge problem for enterprises in the digital age. Cyber risks profiling.