The Cyber Resilience Think Tank is an independent group of industry experts dedicated to understanding the cyber resilience challenges that organizations across the globe face, and together, providing guidance on possible solutions.
The Cyber Resilience Think Tank members gathered to discuss the impact of artificial intelligence and machine learning on cybersecurity and privacy. In this interactive web experience, get a seat at the CISO table to learn five recommendations for managing the risks of AI alongside key steps for managing AI vendors.
Preventing a Nosedive: Managing AI Risk Against Privacy Fears
Commencing a New Decade: 2020 Predictions
Decluttering Your Security Environment
Threat Intelligence: Far-fetched Idea or Must-have Security Tactic?
Employees Behaving Badly? Why Awareness Training Matters
GDPR: A Day of Reckoning or Transformation?
Strengthen Your Defenses Against Cybercrime: Cyber Resilience Planning for Email
Chief Information Security Officer, Vista Consulting Group
Chief Security Officer, ClickSoftware
Chief Security Officer, Cybereason
Vice President of Product Management, Threat Intelligence, Mimecast
Associate Director, Information Security, Illumina
Chief Security Officer & Vice President, Rapid7
Chief Information Security Officer, Bridgestone Tires
Chief Security and Trust Officer, Cymatic
Head of Resilience Strategy & Engagement, ABSA Group
Director of Information Security, SoftBank Investment Adviors
Vice President, Information Security Officer, Prologis
Board Member, Health-ISAC
Senior Director, Global Security, ADP
Managing Director of Cybersecurity Services, Venable
Software Engineer, Yelp
Chief Security Officer, ZeroFOX
Chief Information Security Officer, Digital Cyber Security, Compliance and Privacy Officer, HARMAN International
Head of Global Enterprise Cyber & Product Security Solutions, InferSight
Head of Forensic Investigations, ABSA Group
Chief Technology Officer, Veracode
Chief Information Security Officer, Home Depot
How Do You Roll Out a Threat Intelligence Program?
For Internal Email Threats, Consider Employee Behavior
Threat Intelligence for You: 5 Ways to Prove Value
Threat Intelligence for You: Challenges and Advantages