article thumbnail

What’s Missing in Most CISO’s Security Risk Management Strategies

CIO Business Intelligence

By Dr. May Wang, CTO of IoT Security at Palo Alto Networks and the Co-founder, Chief Technology Officer (CTO), and board member of Zingbox. At the foundation of cybersecurity is the need to understand your risks and how to minimize them. Individuals and organizations often think about risk in terms of what they’re trying to protect.

article thumbnail

How data from IoT devices is changing supply chain analytics

CIO Business Intelligence

That is changing with the introduction of inexpensive IoT-based data loggers that can be attached to shipments. Ultimately, businesses didn’t have the ability to analyze this data, gain insights or build apps around the outputs. The future of the supply chain is IoT-driven. Setting them up is a byzantine, time-consuming process.

IoT 105
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

Trending Sources

article thumbnail

Why adaptability is the new digital transformation

CIO Business Intelligence

In addition, whereas resilience is a risk management strategy, adaptability is both a risk management and an innovation strategy. The philosophy behind adaptive systems is more about innovation than risk management.

article thumbnail

What is GRC? The rising importance of governance, risk, and compliance

CIO Business Intelligence

As a result, managing risks and ensuring compliance to rules and regulations along with the governing mechanisms that guide and guard the organization on its mission have morphed from siloed duties to a collective discipline called GRC. These executive lead risk or compliance departments with dedicated teams. What is GRC?

Risk 104
article thumbnail

How adopting sustainability as a service can drive business success and help the planet

CIO Business Intelligence

This is designed to help manufacturing, transportation and other industries accelerate sustainability initiatives and make data-driven decisions to reduce their carbon footprint and become more efficient through the intelligent use of IoT connectivity. You can solve any problem given enough budget. Edge Computing.

IoT 81
article thumbnail

Sharing Responsibility for Data Security in the Cloud

CIO Business Intelligence

As organizations shape the contours of a secure edge-to-cloud strategy, it’s important to align with partners that prioritize both cybersecurity and risk management, with clear boundaries of shared responsibility. Include the enterprise risk management team. HPE GreenLake: Security by Design.

article thumbnail

Understanding the security shared responsibility model in an as-a-service world

CIO Business Intelligence

As organizations shape the contours of a secure edge-to-cloud strategy, it’s important to align with partners that prioritize both cybersecurity and risk management, with clear boundaries of shared responsibility. Include the enterprise risk management team.