article thumbnail

Emerging Digital Trailblazers: 15 Ways to Hire and Train for Entry Level High Potentials

Social, Agile and Transformation

That was the topic at a recent Coffee with Digital Trailblazers, where we discussed how to evaluate, hire, and train entry-level employees in product management, DevOps, data science, marketing, information security, and other roles with high

Training 171
article thumbnail

4 ways CISOs can manage AI use in the enterprise

CIO Business Intelligence

Over the summer, I wrote a column about how CIOs are worried about the informal rise of generative AI in the enterprise. Since then, many CIOs I’ve spoken with have grappled with enterprise data security and privacy issues around AI usage in their companies. That column may have been the understatement of the year.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

Trending Sources

article thumbnail

7 common IT training mistakes to avoid

CIO Business Intelligence

It’s widely recognized that introducing IT teams to the latest technology, business, and security advancements is essential for maximum performance and productivity. Is your organization giving its teams the training they need to keep pace with the latest industry developments? Training technology is also rapidly advancing.

Training 103
article thumbnail

TOGAF certification guide: Options, training, cost, exam info

CIO Business Intelligence

TOGAF is a longstanding, popular, open-source enterprise architecture framework that is widely used by large businesses, government agencies, non-government public organizations, and defense agencies. Offered by The Open Group, TOGAF advises enterprises on how best to implement, deploy, manage, and maintain enterprise architecture.

article thumbnail

CIOs are worried about the informal rise of generative AI in the enterprise

CIO Business Intelligence

Now, generative AI use has infiltrated the enterprise with tools and platforms like OpenAI’s ChatGPT / DALL-E, Anthropic’s Claude.ai, Stable Diffusion, and others in ways both expected and unexpected. Not all companies have security systems that can detect, block, or remediate this type of behavior. Privacy leaks?

article thumbnail

Enterprise Meets Consumer Security: Exploring Approaches To Protect Employees At Home

Forrester IT

Something that could include, but really goes to a place that is beyond awareness training? Does your organization have a strategy for protecting employees at home as a part of your overall cybersecurity program? If you answered no, you’re not alone Employee privacy is a big reason why not. And yet, as the connected smart […].

Meeting 327
article thumbnail

Red Owl Analytics: Enabling information security and compliance teams to proactively tackle insider risk

CTOvision

Red Owl Analytics is a highly regarded provider of a software solution that enables security and compliance teams to proactively tackle their most pressing problem-- insider risk. Their enterprises are awash in data, insider-related security breaches have become a constant, and regulators continue to demand better oversight and surveillance.