Jerome Wendt, President and Founder of DCIG discusses the practical applications of artificial intelligence in data protection and optimization. Uncover how AI can be utilized in ransomware detection, data placement, and increase your understanding...
Omar Masri, founder and CEO of Mamori explores the challenges and trends in the ever-evolving world of cybersecurity. Omar reveals the perfect storm created by increased demand for theft, increased vulnerability, and outdated software security, and...
André Kearthland, Solutions Architect at Netsurit explores the importance of implementing cloud services securely and migrating data to public clouds like Microsoft Azure. Emphasizing the significance of a Zero Trust architecture, he sheds light on...
Zac Cohen, COO and Co-Founder at Filebase dives deep into the benefits of decentralized storage, discussing the crucial role of APIs in the storage industry, data management, and analytics space. We also explore a world without major cloud providers...
Jason Lohrey, Founder and CEO of Arcitecta dives into the world of data management and explore the challenges of managing vast amounts of data. We also discuss the differences between structured and unstructured data, the importance of metadata, and...
Paul Valente, co-founder and CEO of VISO Trust discussed the growing importance of knowing your third parties, their control posture, and the data shared with them, as well as the challenges faced by security teams in assessing third parties at...
William McKnight, President at McKnight Consulting Group discusses the importance of data maturity in achieving digital transformation and the crucial role of data architects in helping organizations become data-driven.
Kanika Tolver, CEO and Author of Career Rehab discusses how to take charge of your career and learn valuable tips on diversifying your education and navigating tech layoffs.
Josh Stephens, Chief Technology and Strategy Officer at BackBox discusses how network automation can help mitigate cybersecurity vulnerabilities.
Renita Rhodes, CyberSecurity Specialist discusses why compliance alone is not enough for effective security.