State and local CISOs find themselves holding multiple truths. On the one hand, they must guard against sophisticated cyber threats — think AI-powered deepfakes and metamorphic malware. On the other hand, most attacks still occur because of gaps in basic cyber practices. CISOs must ensure agencies aren't using unsanctioned AI applications, but they also must be seen as AI enablers, not blockers. Join WWT experts and former state CISOs John Evans, Chief Technology Advisor, and Steve Meyer, Sen...
All content for WWT Experts is the property of World Wide Technology and is served directly from their servers
with no modification, redirects, or rehosting. The podcast is not affiliated with or endorsed by Podjoint in any way.
State and local CISOs find themselves holding multiple truths. On the one hand, they must guard against sophisticated cyber threats — think AI-powered deepfakes and metamorphic malware. On the other hand, most attacks still occur because of gaps in basic cyber practices. CISOs must ensure agencies aren't using unsanctioned AI applications, but they also must be seen as AI enablers, not blockers. Join WWT experts and former state CISOs John Evans, Chief Technology Advisor, and Steve Meyer, Sen...
Using AI to Elevate the Student Experience in Higher Education | Experts
WWT Experts
33 minutes
1 year ago
Using AI to Elevate the Student Experience in Higher Education | Experts
The student experience has become a top priority for colleges and universities as they strive to attract, engage and retain the next generation of learners. AI holds tremendous promise to simplify administrative processes for students and provide personalized assistance, but how can higher education institutions turn AI aspirations into real student outcomes? In this episode of WWT Experts, principal advisor Janet McIllece, and former WWT Intern, Thornton White III, explore the many facets of...
WWT Experts
State and local CISOs find themselves holding multiple truths. On the one hand, they must guard against sophisticated cyber threats — think AI-powered deepfakes and metamorphic malware. On the other hand, most attacks still occur because of gaps in basic cyber practices. CISOs must ensure agencies aren't using unsanctioned AI applications, but they also must be seen as AI enablers, not blockers. Join WWT experts and former state CISOs John Evans, Chief Technology Advisor, and Steve Meyer, Sen...