Theia Institute的封面图片
Theia Institute

Theia Institute

智库

Washington,DC 121 位关注者

Cutting-edge thought leadership reframing cybersecurity & technology leadership for the 21st century.

关于我们

MISSION STATEMENT The growing intersection of data, privacy, and technology requires new ways of thinking about security and how it impacts both business and society. The institute's mission is to provide cutting-edge thought leadership, education, and training that reframes traditional security leadership for the 21st century by addressing traditional cybersecurity, risk management, and other related topics within a global social context. ACTIONABLE SOLUTIONS The institute provides practical, consensus-based recommendations and action items. Each consensus is reached through discussion and debate among the panel's cross-functional members.

网站
https://www.theiathinktank.com/
所属行业
智库
规模
11-50 人
总部
Washington,DC
类型
非营利机构
创立
2023
领域
Artificial Intelligence、Business Continuity、Cybersecurity、Data Privacy、Enterprise Risk Management、Information Security、IT Automation、Regulatory Compliance、Technology Leadership、Thought Leadership、Governance、AI Ethics、AI Governance和Information Security

地点

Theia Institute员工

动态

  • 查看Theia Institute的组织主页

    121 位关注者

    Founding board member Dr. Lisa Palmer has a free course on #AIstrategy and #AIgovernance for #ThoughtLeaders at the board level. h/t Ashley Kennedy

    查看Ashley Kennedy的档案

    Passionate educator and speaker | Creative thinker | Program & team leader | Video professional | Actor

    ?? New course alert! ?? Free/unlocked for all. What’s the biggest challenge boards face in the age of AI??Spoiler alert: It’s not just implementing the tech; it’s rethinking how we lead—with strategic foresight, ethical leadership, and the courage to innovate. In my latest course, I had the privilege of interviewing AI Startup CEO Dr. Lisa Palmer to tackle some of the most pressing questions facing boards today: ?? How can leaders stay ahead of AI’s impact and guide their organizations through the journey? ?? Why is business value creation the key to AI success? ?? How do you foster innovation and push for AI investment when ROI isn’t immediate? ?? What are the often-overlooked ethical and legal risks of AI adoption? Check out this course today! #AI #BusinessStrategy #AILeadership #BoardLeadership #FutureOfWork

    此处无法显示此内容

    在领英 APP 中访问此内容等

  • 查看Theia Institute的组织主页

    121 位关注者

    Founding board member Doug Shannon ?? has an insightful post about reframing thought leadership that's definitely worth your time. Fractional, cross-functional leadership is not just about repackaging last century's advisory services. It's a new way of thinkng that has the potential to solve a lot of today's fundamental business challenges.

    查看Doug Shannon的档案

    全球智能自动化领袖 | 战略、创新与运营 | 数字化转型 | RPA,人工智能,创业公司和导师 | 公共演讲者 | Gartner 同行社区大使

    ?????? ?????????? ?????? ???????? ???????? ???? ?????? ?????????????????? ???????? ?????? ?????? ???????????????? ?? ???????? ???? ??????????????? ?? ?????? ???? ???????? ???? ?????? ?????????? ???? ??????! In today’s fast-paced business environment, especially in areas like AI, Generative AI, and Enterprise Automation, relying on a single C-suite hire might seem like a traditional move, yet it could do more harm than good. ?? ?????? ?????????????????? ?????????? ???????????? ?????????? ?????? ????????????, ?????????? ?????? ?????????????? ???????? ?????????????? ???? ???????? ?????? ????????’?? ????????????????????, and not always for the better. ?? ?????????? ???? ?????????????????? ???????? ????????????????? Instead, consider fractional leadership. ?????????????? ???????????? ?? ?????????? ???? ??????????????, ???????? ???????? ???????? ?????????????????? ???? ???????????????? ??????????, ?????????????? ???????????????????????? ???? ?????????? ???????????????????? ?????? ???????????? ???????? ?????????????? ?????????? ?????????? ???? ?????? ??????????. This collective intelligence not only reduces risk, yet also fosters a more dynamic, adaptable approach to tackling complex challenges. ?? ?????? ???????????? ???????? ?????? ???????? ?????? ?????? ???????? ?????? ?????????????? ???? ????????? In today’s world, it’s about agility, speed, and informed decision-making. Let’s talk about how fractional yet ‘Leading Bravely’ with #Bravespace leadership can elevate your business. #AI #CAIO #GenAI #MindsetChange PEX Network Gartner Peer Experiences Theia Institute? VOCAL Council InsightJam.com GBI Impact Bot Nirvana ????????????: The views within any of my posts, or newsletters are not those of my employer or the employers of any contributing experts. ???????? ?? this? feel free to reshare, repost, and join the conversation.

    • 该图片无替代文字
  • 查看Theia Institute的组织主页

    121 位关注者

    Founding member Dr. Lisa Palmer has been offered a book deal with Wiley. Speaking for the entire team, we're thrilled by this amazing news!

    查看Dr. Lisa Palmer的档案

    I help Boards, C-Suites, and Innovators use Al to create business value | AI Startup Founder & CEO | Doctorate in AI 2023 | Gartner & Microsoft Alum

    Wiley just offered me a book deal - so fun! ?? Every day as an entrepreneur brings new adventures ???? For those in my network who’ve been through the process, what’s your best #advice for a first-time author? #Entrepreneurship #BookDeal #LearningJourney #AppliedAI

    • 该图片无替代文字
  • 查看Theia Institute的组织主页

    121 位关注者

    Founding member Doug Shannon ?? was recently featured in CIO Online. His continued success in sharing insights with the technology leadership community exemplifies the educational values of the institute and its members.

    查看Pat Brans的档案

    Science and Technology Journalist

    Data management, when done poorly, results in both diminished returns and extra costs. Hallucinations, for example, which are caused by bad data, take a lot of extra time and money to fix — and they turn users off from the tools. But some IT leaders are getting it right because they focus on three key aspects. Kari Ann Briski, Doug Shannon ??, Klara Jelinkova, Harvard University, NVIDIA #genai #bigdata

  • 查看Theia Institute的组织主页

    121 位关注者

    This is an #AIethics and #AIgovernance issue that the institute has already taken a firm stand against. We hope you'll join with the institute and many of its members in sharing how to opt out of this new #datamining practice here on #LinkedIn. Thanks to Dr. Lisa Palmer for the post below, and to Dr. Todd A. Jacobs, CISM CISSP MBA PhD for his recent posts raising awareness of the related privacy, legal, and copyright issues we must all grapple with as #AI embeds itself deeper into our daily lives. Share your own opinions with us in the comments.

    查看Dr. Lisa Palmer的档案

    I help Boards, C-Suites, and Innovators use Al to create business value | AI Startup Founder & CEO | Doctorate in AI 2023 | Gartner & Microsoft Alum

    LinkedIn started harvesting your posts this week - to train their models. With no notice. This means that any content that you write, pictures or videos, celebration announcements - anything you add here - will be used by LinkedIn and their affiliates for commercial purposes. At a minimum, this means that your expertise is being used - at scale - without your intentional consent. I’ve changed my privacy settings to stop this from happening. Here’s the one-click opt-out link if you’d like to do the same: https://lnkd.in/epXegviz Please ?? reshare as I suspect the algorithm will not be our friend on spreading this message.

    • 该图片无替代文字
  • 查看Theia Institute的组织主页

    121 位关注者

    The original post is highly technical, but we'd say the key insight is that #cybersecurity isn't just about buying cool new enterprise software or designing new processes and #technicalcontrols. It's most cost-effective when leaders understand how to leverage the many tools they may already have to provide their teams essential information for #loganalysis, enrichment of data for #analytics, and other core security functions. Our thanks to Dr. Todd A. Jacobs, CISM CISSP MBA PhD for writing the original post, and to CodeGnome Consulting, LTD for bringing additional context to the piece regarding #SIEM and #logaggregation.

    查看Todd A. Jacobs的档案

    Strategic Business Technology Executive ? Cybersecurity, M&A Integration, Regulatory Compliance & Remediation ? Mission-Driven US Army Veteran ? Board Governance & Leadership

    #Shellprogramming skills are pretty portable between #Linux, #BSD, and #macOS, but some of the underpinnings of macOS are non-standard. It helps to remind yourself that macOS is *not* a standard #BSD #Unix variant; Apple's #Darwin based systems do a lot of embrace-and-extend under the hood. Here's a practical example that comes up often in the enterprise. Most #Linux systems export the current user's login name to the *LOGNAME* environment variable (often via sourcing /etc/profile) and may also export the user's default shell from the user's #GECOS record in /etc/passwd to the preferred shell (set by an application or the user) as the *SHELL* environment variable. The canonical way to get access to the user's default shell on most Unix-like systems is by parsing /etc/password or another NSS database with the *getent* utility, e.g. `getent passwd "$LOGNAME" | cut -d: -f7`. There are other means to do this on Linux too, but macOS doesn't provide this common #POSIX compatible userspace utility. Instead, Darwin relies on opendirectory(8) for storing and accessing GECOS records, requiring other tools to retrieve the information. You can query a user's GECOS record on Darwin like so: ```sh # directly from the Open Directory service, local or remote dscl . -read "/Users/$(id -un)" shell | awk '/^shell:/ {print $2}' # from the directory service's cache on the local system dscacheutil -q user -a uid "$(id -u)" | awk '/^shell:/ {print $2}' ``` Be aware that there are other ways to do this, too, but old school utilities like *whoami* have been deprecated in favor of `id -un`, and *finger* as implemented on most systems (e.g. via [x]inetd, or reading various #dotfiles from users' directories locally or over the network) is considered a security risk. In containers, especially with non-standard shells, or with centralized #IAM using #LDAP or #ActiveDirectory, you may have to match the local #userID to a remote #LDIF record to before grepping for the data you need. In addition, nsswitch.conf, PAM modules, NIS+, or other less-common data sources may need to be consulted and each will generally have specific utilities for looking up the stored or cached information that is equivalent to what's normally provided in the 7th GECOS field for each user on standard Linux and Unix systems. As always, your mileage may vary based on use case or implementation details. On the plus side, problems are rarely insoluble when you know where to dig for a solution!

    • An inset square representing a screen with  symbols representing a generic Unix or Linux shell prompt.
    • Tux, the Linux penguin mascot. Represents the Linux kernel and a typical Linux distribution bundled with common user space utilities.
    • The back of an iMac with the Apple logo clearly visible. Represents the macOS Darwin kernel.
  • 查看Theia Institute的组织主页

    121 位关注者

    Founding member Doug Shannon ?? was recently featured in an interview with Ignite Technology entitled "Gartner Peer Community Ambassador talks Managing Data for Enterprise Automation." Read more about it in his feed, or follow this direct link to the article: https://lnkd.in/d2_CJdxj

    查看Ignite Technology的组织主页

    7,447 位关注者

    In our exclusive interview with Doug Shannon ??, #Gartner Peer Community Ambassador, we take a deep dive into how #Automation enables enterprises to manage the data they need for #AI initiatives and the importance of investing in key platforms. We cover key areas including: ?? The importance of efficiently importing the most essential data. ? Being mindful of regulations across the world. ?? Minimise hallucinations through "grounding” the data. ?? The value of a service orchestration platform needed to train AI. Read the interview with Pat Brans now: https://hubs.la/Q02PFkKD0 #Automation #AI #Broadcom #Automic #AAI #DigitalTransformation #GartnerPeerCommunity #GartnerPeer Broadcom Broadcom Software Automation by Broadcom

  • 查看Theia Institute的组织主页

    121 位关注者

    #Cybersecurity and #encryption are complex. The institute's educational mission aims to bridge the practical business and personal impact of technology with the hidden complexities that make secure, trustworthy systems seem unattainable.

    查看Todd A. Jacobs的档案

    Strategic Business Technology Executive ? Cybersecurity, M&A Integration, Regulatory Compliance & Remediation ? Mission-Driven US Army Veteran ? Board Governance & Leadership

    Topics like #cybersecurity and #encryption are difficult to talk about plainly because they *are* complex. While it's usefully reductionist to tell users that HTTPS is more secure than unencrypted HTTP, it can also lead to oversimplification (and thus a lack of adequate #infosec funding) when designing and implementing #securitycontrols. Consider the following excerpted information I recently shared in one of the LinkedIn communities when trying to explain why a URL or TCP/IP socket *by itself* doesn't create a secure connection. --- The "HTTPS" in a URL is a URI *scheme* that is interpreted by the browser as an instruction to establish a TLS connection over which the HTTP protocol can be be negotiated. The actual TCP/IP transport layer handshake, TLS and HTTP protocol negotiations, and encrypted payload communications between client and server are handled in other layers. ## Useful References Hypertext, URIs, and Schemes : https://lnkd.in/eAxXE3wY : https://lnkd.in/ea6QBYM9 : https://lnkd.in/e7rWS3Q7 TLS (sometimes still referred to as "SSL" for historical reasons) : https://lnkd.in/ebqjX_Q4

    • URL text box (i.e. "navigation bar") showing a web address with a lock icon and the letters "https" in green. Highlights the scheme portion of a URI.
  • 查看Theia Institute的组织主页

    121 位关注者

    Dr. Palmer's post makes an extremely insightful comment: "AI isn’t a magic bullet—you must invest your HUMAN capital to drive real value." This is a key point that the entire Institute has made repeatedly over the past year, and continues to be echoed by many of our key members. We collectively believe this basic principle is required for ALL successful #AI and #AIgovernance adoptions. The institute welcomes everyone's thoughts and feedback on this topic. Our members routinely engage with respectful, thought-provoking questions and comments, so please reply below! ??

    查看Sohrab Rahimi的档案

    Partner at McKinsey & Company | Head of Data Science Guild in North America

    ?? Is Generative AI Just Cool, or Does It Really Have an Impact? That's the big debate in tech circles these days. A study led by researchers from Stanford University, MIT, and the National Bureau of Economic Research (NBER) sheds light on this question by examining the real-world impact of deploying generative AI in a customer support environment. Their analysis offers empirical evidence on how AI tools, specifically those based on OpenAI's GPT models, are transforming customer service operations at a Fortune 500 software company. The researchers employed a mix of methodologies: a randomized control trial (RCT) and a staggered rollout, encompassing around 5,000 agents over several months. By analyzing 3 million customer-agent interactions, the study assessed metrics such as resolutions per hour, handle time, resolution rates, and customer satisfaction (Net Promoter Score). To understand the AI's impact over time, dynamic difference-in-differences regression models were used. Here is what they found: 1. ?????????????????????? ?????????? ???? ????????????????????????: The AI tool led to a 13.8% increase in the number of customer queries resolved per hour, particularly benefiting less experienced agents. 2. ?????????????????? ?????? ?????????????????????? ??????: AI tools accelerated the learning curve for newer agents, allowing them to reach the performance levels of seasoned employees more quickly. 3. ???????????????? ???????????????? ????????????????????????: The AI deployment resulted in higher customer satisfaction scores (as shown by improved Net Promoter Scores) while maintaining stable employee sentiment. 4. ?????????? ?????????????????? ??????????: Interestingly, the AI support led to reduced attrition rates, especially among new hires with less than six months of experience. 5. ?????????????????? ??????????????????: The AI system reduced the need for escalations to managers, improving vertical efficiency. However, its impact on horizontal workflows, like transfers between agents, showed mixed results, suggesting more refinement is needed in AI integration. 6. ???????????????????? ???? ??????????????: The software wasn’t off-the-shelf; it was a custom-built solution tailored to the company’s needs using the GPT family of language models. This emphasizes the importance of context-specific AI applications for effective outcomes. For leaders, managers, and AI practitioners, these insights are invaluable—highlighting not just the potential of AI, but also the nuanced ways it reshapes workflows, impacts employee dynamics, and transforms customer experiences.So, does generative AI really make a difference? According to this study, the answer is a resounding yes—but it depends on how thoughtfully it is deployed. Link ?? to the paper: https://lnkd.in/ejhUfufz

    • 该图片无替代文字
  • 查看Theia Institute的组织主页

    121 位关注者

    Our think tank focuses on reframing #cybersecurity issues to identify practical solutions that are not yet mainstream. Although speaking in his private capacity, we applaud Dr. Jacobs' attempt to reframe this all-too-common type of security question when he says, "As an industry, we have *got* to stop treating cybersecurity as a purely technical problem with a fire-and-forget COTS solution."

    查看Todd A. Jacobs的档案

    Strategic Business Technology Executive ? Cybersecurity, M&A Integration, Regulatory Compliance & Remediation ? Mission-Driven US Army Veteran ? Board Governance & Leadership

    Disclaimer: My post is *commentary* on the attached image. It is NOT itself a clickable poll, and I am not responsible for the original poll's question or options. All other opinions expressed are mine, although I hope you will read and agree with them! Without intent to name-and-shame, I present to you an exemplary case of why the #CISO and other experienced #cybersecurity professionals are generally presumed to be "just technologists" rather than strategic-level business enablers. See the attached screenshot of a poll that has already attracted more than 468 votes, but only five comments besides mine. Original author and group information have been redacted to protect the well-intentioned. My response to the poll is immediately below. I welcome all thoughtful and constructive responses! --- None of the poll options have any utility value in isolation, and as presented the only one that is even potentially related to authentication or authorization is a proxy server. Even so, a proxy server by itself can't prevent all forms of remote attacks. As an industry, we have *got* to stop treating cybersecurity as a purely technical problem with a fire-and-forget COTS solution. The belief in a technology-based silver bullet that exists independently of business strategy is the main reason #infosec is rarely treated as a first-class member of a company's senior leadership team.

    • Poll asking "Which technology is essential for protecting your network from unauthorized remote access?" The four options presented are VLAN, Proxy Server, Intrusion Detection System, and Firewall.

相似主页

查看职位