State and local CISOs find themselves holding multiple truths. On the one hand, they must guard against sophisticated cyber threats — think AI-powered deepfakes and metamorphic malware. On the other hand, most attacks still occur because of gaps in basic cyber practices. CISOs must ensure agencies aren't using unsanctioned AI applications, but they also must be seen as AI enablers, not blockers. Join WWT experts and former state CISOs John Evans, Chief Technology Advisor, and Steve Meyer, Sen...
All content for WWT Experts is the property of World Wide Technology and is served directly from their servers
with no modification, redirects, or rehosting. The podcast is not affiliated with or endorsed by Podjoint in any way.
State and local CISOs find themselves holding multiple truths. On the one hand, they must guard against sophisticated cyber threats — think AI-powered deepfakes and metamorphic malware. On the other hand, most attacks still occur because of gaps in basic cyber practices. CISOs must ensure agencies aren't using unsanctioned AI applications, but they also must be seen as AI enablers, not blockers. Join WWT experts and former state CISOs John Evans, Chief Technology Advisor, and Steve Meyer, Sen...
Optimizing Cloud Strategies for High-Performance Computing in Life Sciences
WWT Experts
36 minutes
8 months ago
Optimizing Cloud Strategies for High-Performance Computing in Life Sciences
The life sciences industry is undergoing a significant shift, with 33 percent of investment dollars expected to go toward AI by 2025. This surge in AI adoption is driving an increased need for high-performance computing (HPC) to power genomics, proteomics and other data-intensive research. In this episode of WWT Experts, Chief Healthcare and Global Life Sciences Advisor Dr. Sanaz Cordes and Technical Solutions Architect Derrick Monahan discuss how organizations can leverage cloud for HPC base...
WWT Experts
State and local CISOs find themselves holding multiple truths. On the one hand, they must guard against sophisticated cyber threats — think AI-powered deepfakes and metamorphic malware. On the other hand, most attacks still occur because of gaps in basic cyber practices. CISOs must ensure agencies aren't using unsanctioned AI applications, but they also must be seen as AI enablers, not blockers. Join WWT experts and former state CISOs John Evans, Chief Technology Advisor, and Steve Meyer, Sen...