State and local CISOs find themselves holding multiple truths. On the one hand, they must guard against sophisticated cyber threats — think AI-powered deepfakes and metamorphic malware. On the other hand, most attacks still occur because of gaps in basic cyber practices. CISOs must ensure agencies aren't using unsanctioned AI applications, but they also must be seen as AI enablers, not blockers. Join WWT experts and former state CISOs John Evans, Chief Technology Advisor, and Steve Meyer, Sen...
All content for WWT Experts is the property of World Wide Technology and is served directly from their servers
with no modification, redirects, or rehosting. The podcast is not affiliated with or endorsed by Podjoint in any way.
State and local CISOs find themselves holding multiple truths. On the one hand, they must guard against sophisticated cyber threats — think AI-powered deepfakes and metamorphic malware. On the other hand, most attacks still occur because of gaps in basic cyber practices. CISOs must ensure agencies aren't using unsanctioned AI applications, but they also must be seen as AI enablers, not blockers. Join WWT experts and former state CISOs John Evans, Chief Technology Advisor, and Steve Meyer, Sen...
Pioneering AI in Higher Education: Lessons from Early Adopters
WWT Experts
32 minutes
12 months ago
Pioneering AI in Higher Education: Lessons from Early Adopters
Colleges and universities are excited to use AI to enhance experiences for students and faculty, drive staff efficiencies and accelerate research. However, AI implementation can be tricky given the complex and decentralized nature of higher education environments. In this episode of WWT Experts, principal advisor Janet McIllece and chief technology advisor Michael Sink shine a spotlight on some of our higher education clients who are pioneering AI as early adopters.
WWT Experts
State and local CISOs find themselves holding multiple truths. On the one hand, they must guard against sophisticated cyber threats — think AI-powered deepfakes and metamorphic malware. On the other hand, most attacks still occur because of gaps in basic cyber practices. CISOs must ensure agencies aren't using unsanctioned AI applications, but they also must be seen as AI enablers, not blockers. Join WWT experts and former state CISOs John Evans, Chief Technology Advisor, and Steve Meyer, Sen...