State and local CISOs find themselves holding multiple truths. On the one hand, they must guard against sophisticated cyber threats — think AI-powered deepfakes and metamorphic malware. On the other hand, most attacks still occur because of gaps in basic cyber practices. CISOs must ensure agencies aren't using unsanctioned AI applications, but they also must be seen as AI enablers, not blockers. Join WWT experts and former state CISOs John Evans, Chief Technology Advisor, and Steve Meyer, Sen...
All content for WWT Experts is the property of World Wide Technology and is served directly from their servers
with no modification, redirects, or rehosting. The podcast is not affiliated with or endorsed by Podjoint in any way.
State and local CISOs find themselves holding multiple truths. On the one hand, they must guard against sophisticated cyber threats — think AI-powered deepfakes and metamorphic malware. On the other hand, most attacks still occur because of gaps in basic cyber practices. CISOs must ensure agencies aren't using unsanctioned AI applications, but they also must be seen as AI enablers, not blockers. Join WWT experts and former state CISOs John Evans, Chief Technology Advisor, and Steve Meyer, Sen...
Migrating to the Cloud for a Competitive Edge in Retail | Experts
WWT Experts
27 minutes
1 year ago
Migrating to the Cloud for a Competitive Edge in Retail | Experts
Staying ahead in retail means embracing cutting-edge technology. Join our experts as they unveil how cloud technology is revolutionizing retail by enhancing customer experience (CX), boosting employee productivity and providing a competitive edge. Discover the secrets behind real-time inventory management, seamless omnichannel strategies and personalized customer experience. You'll learn how to navigate the challenges of cloud migration with practical strategies to ensure smooth transitions a...
WWT Experts
State and local CISOs find themselves holding multiple truths. On the one hand, they must guard against sophisticated cyber threats — think AI-powered deepfakes and metamorphic malware. On the other hand, most attacks still occur because of gaps in basic cyber practices. CISOs must ensure agencies aren't using unsanctioned AI applications, but they also must be seen as AI enablers, not blockers. Join WWT experts and former state CISOs John Evans, Chief Technology Advisor, and Steve Meyer, Sen...