Collaborating Authors

Council Post: Five Steps To Build The New Cybersecurity Perimeter: Identity


President and Chief Executive Officer at Insight Enterprises, helping clients manage their business today and transform for the future. If 2020 taught us anything about cybersecurity, it's that strengthening corporate defenses against cyberattacks is increasingly dependent on managing user identities of those who access your network. We've gradually moved in that direction since the birth of the bring-your-own-device movement, which created the need to control access to business data from outside the four walls of the office. The rise of the cloud, edge computing and the Internet of Things (IoT) have led us further along the path, requiring new strategies for managing access to resources across increasingly heterogeneous technology environments. Then Covid-19 triggered a work-from-home stampede.

Putting AI and Machine Learning to Work in Cloud-Based BI and Analytics


Artificial intelligence (AI) and machine learning (ML) are powering a whole new generation of business intelligence (BI) solutions. And these mission-critical software packages are in turn one of the primary drivers behind the migration of enterprise big data to the cloud. BI tools are designed to collect and analyze current and actionable data – delivering insights into processes and workflows that can impact business operations in the near term. But what if you need those insights immediately, and you need them in the hands of employees and experts who are working simultaneously across the globe? IT stakeholders are turning to the cloud for faster, more accurate and timelier BI insights – especially in the face of Covid-19 where companies are looking to operate as economically possible and millions are forced into remote working locations.

AIOps and the New IT Skill Sets – BMC Blogs


This post is about how AIOps will change the way IT Operations personnel (IT Ops) work and the new skill sets they have to adopt in an AIOps world. For a definition of AIOps, refer to the blog post: "What is AIOps?" Gartner explains that an AIOps platform (figure 1) uses machine learning and big data to aggregate observational data (from monitoring systems output, job logs, syslogs, etc.) and engagement data (from ticketing, incident, and event recording system data) to produce a virtuous circle of continuous insights yielding continuous improvements and fixes. Automation is both an input and output of AIOps. The results or statuses of automated workloads and jobs can be used like operational data and engagement data for analytic purposes.

6 Steps Companies Can Take to Strengthen Their Cyber Strategy - InformationWeek


While these technical skills are certainly important, we're also now looking more holistically at candidates to test their abilities to think critically and creatively as well as uncover new solutions. As we face new and unprecedented challenges in cyber protection, it's critical that cyber leaders hire team members who think outside-the-box, have intellectual curiosity, employ bold thinking, and are natural problem solvers. Protecting an organization against advanced cyber threats requires innovative thinking and techniques; people, process and technology capabilities are needed to properly defend ourselves against sophisticated attackers, such as nation states. Cyber threats will continue to evolve, as will the new techniques described above to enable cyber resiliency. Ariel Weintraub is currently the Head of Enterprise Cyber Security at MassMutual. Ariel first joined MassMutual in the fall of 2019 as the Head of Security Operations & Engineering, responsible for the Global Security Operations Center, Security Engineering, Security Intelligence, and Identity & Access Management. Prior to joining MassMutual, Ariel served as Senior Director of Data & Access Security within Cybersecurity Operations at TIAA where she led a three-year business transformation program to position IAM as a digital business enabler. Prior to TIAA, Ariel held the position of Global Head of Vulnerability Management at BNY Mellon and was part of the Threat & Vulnerability Management practice at PricewaterhouseCoopers (PwC).

Cybersecurity trends: Looking over the horizon


Cybersecurity has always been a never-ending race, but the rate of change is accelerating. Companies are continuing to invest in technology to run their businesses. Now, they are layering more systems into their IT networks to support remote work, enhance the customer experience, and generate value, all of which creates potential new vulnerabilities. This article is a collaborative effort by Jim Boehm, Dennis Dias, Charlie Lewis, Kathleen Li, and Daniel Wallance, representing views from McKinsey's Risk & Resilience Practice. At the same time, adversaries--no longer limited to individual actors--include highly sophisticated organizations that leverage integrated tools and capabilities with artificial intelligence and machine learning. The scope of the threat is growing, and no organization is immune.