By 2025, Industrial robots will become a target of “bad actors” seeking to disrupt manufacturing and production.
Cybersecurity legislation in the U.S. will continue to accelerate, especially at the state level, where hundreds of new cybersecurity bills will be introduced in 2020.
Ransomware attacks on small cities, towns and school districts will accelerate through 2020.
Cloud Predictions 2020 The concentration risks of public cloud services infrastructure will become a public policy issue, leading to increased regulatory oversight of large cloud services providers.
By 2025, the CEO, CIO, and CXO partnership team must exploit the digital power of enterprise innovation with disruptive technologies, especially AI and ML technology. Here are 10 key disruptive technology predictions for 2020 CIO strategic planning!
In the 2020 U.S. presidential election, successful cybersecurity attacks on voting machines and election management systems are less likely than successful hacks of voter databases.
Answer these questions? Has your site been infected with formjacking? How did you find out? How hard was it to repair? How much damage did you or your users sustain? Symantec Internet Security Threat Report describes formjacking as malicious code inserted into websites. To capture personally identifiable information (PII) and debit/credit card information. Compromised sites…
Key takeaway: Connecting financial close and compliance can help to relieve congestion in the last mile of finance, saving days or even weeks in producing financial disclosures. Workiva Amplify was a hands-on summit. The majority of sessions in this 17-parallel-tracks summit were hands-on sessions with Workiva, and they were packed. And the attendees were younger…
President Obama issued Executive Order (E.O.) C.F.R. 13691 to promote private sector cybersecurity information sharing. See Executive Order No. 13691 For over 1 million faith-based and nonprofit organizations exist in the Unite States alone. See NonprofitDirectory In 2018 Faith-based Information Sharing and Analysis Organizations, ISAO emerged to help these organizations improve their cyber security posture.…
Key takeaway — for each risk plan, risk managers should also have a crisis plan.