Tech Talks: Insight & Execution #2
Tim Tang, CFE
Business Technologist | Applying cross-industry, multi-technology insights to unlock business value. Focused on #cybersecurity, #digitalmedia, and #privatewireless
In this issue:
Let's learn together at the CIO CISO Virtual Summit on Oct 1 @ 1pm ET.
Private 5G
Private 5G Manufacturing Use-Cases
To address manufacturing’s need for reduced operations costs, agile retooling, predictive maintenance, and support for Autonomous Guided Vehicles (AGVs),?Celona ?Pradhyum Ramkumar ?describes how private 5G provides seamless roaming, large-scale coverage, and guaranteed quality of service.
Incorporating #ZeroTrust principles in Native 5G Cybersecurity Defense
Palo Alto Networks Mitch Rappard? describes the need to protect the core and the opportunity to leverage mobile identifiers to implement device-level #ZeroTrust. With increased granular control, enterprises can remove implicit trust.
Cybersecurity
Netskope Michael Ferguson discusses the need for increasing cybersecurity agility to protect against threats from trusted apps (e.g. personal instances of authorized apps such as OneDrive). Consider the impact of the cybersecurity posture on the employee experience! A poor cyber experience encourages employees to pursue workarounds (which undermines the enterprise's cyber posture) and drives turnover.
AIOps
Fundamentals of API Design and Integration
Hughes Karthik Ganesuni describes principles of API design:
Digital Media
As digital signage directly engages with customers, there's an indirect impact on employees who, through routine exposure to branded messaging, master product positioning and are constantly informed about new promotions. ?
领英推荐
Risk Management & Compliance
The EU AI Act is now in effect, and US AI developers must consider how they will comply.?There are phased requirements: High Risk (24 months), #GenAI (12 months), and prohibited (6 months). Fines range up to $8M - $38M. Defined stakeholders roles include Providers, Deployers, Distributors, Importers, Product Manufacturers, and Operators. There are compliance requirements for Data Quality, Documentation & Traceability, Transparency, Human Oversight, Accuracy, Cybersecurity, Conformity Assessments, and Registration.
Key issues to also consider include:
- Role of Privacy
- Identification of Compliance Best Practices
Alan Thiemann, principal at Conley Rose, will present at the Virtual CIO CISO Summit on October 3, 2024. He has prepared a detailed summary.?Please let me know if you are interested in this document or the Virtual CIO CISO Summit.
Industry Trends
For insights from FSTEC 2024, visit https://www.dhirubhai.net/posts/tangtim_restauranttech-digitalmenuboards-cstores-activity-7243262358192537600-gpMf
For insights from Landmark Ventures CIO Summit 2024, visit https://www.dhirubhai.net/posts/tangtim_riskmanagement-ciso-ai-activity-7244775710555271169-FQz5
Other news
Upcoming conference that I will be attending:
FSTEC - 9/16-18 Grapevine, TX - https://www.fstec.com/
CIO CISO Virtual Summit - 10/3 - https://www.hughes.com/CIO-CISO-Summit
NACS Show - 10/7-10, Las Vegas, NV - https://www.nacsshow.com/
MURTEC - 10/21-23 San Diego, CA - https://www.murtecsummit.com/2024
For more insights, please visit my website at https://www.hughes.com/timtang