Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Why Compliance Costs Less Than Non-Compliance #cisoconversations #eudataregulations #nis2 #shorts

NIS2 non-compliance carries hefty penalties. The stakes are high. Fines can be at least 10 million euros or 2% of worldwide annual turnover. But here's the thing: the cost of compliance is generally much lower than these penalties. More on the topic you can learn in the latest episode of CISO Conversations: EU Data Regulations with Madeline Bennett and Richard Cassidy.

Mastering Problem Solving in Engineering: Mindsets for Success

In today's rapidly evolving technological landscape, problem-solving skills are the cornerstone of success in the field of engineering. From debugging complex code to enhancing system performance and robustness, the ability to efficiently identify, analyze, and resolve issues is a hallmark of a proficient tech engineer. One company that exemplifies this ethos is Rubrik, known for its innovative cyber resilience solutions.

Addressing Cyber Risk and the Rise of AI

In this episode of CISO Conversations: EU Data Regulations, Pierre-François Guglielmi, EMEA Field CISO at Rubrik, is joined by Trish McGill, an Executive Subject Matter Expert for Cyber Security IT/OT at De Heus Voeders and Nobian, Brian Wagner, Chief Technology Officer at Revenir, and Tim Clements, Owner of Purpose and Means. Together, they explore the impact of cyber-attacks and data regulations on business resilience, particularly concerning critical infrastructure, and how these factors ultimately affect profits.

How to Execute a Secure M365 Copilot Deployment

Microsoft Copilot is a powerful AI assistant that can leverage Microsoft 365 (M365) data from across an organization to generate accurate and relevant insights. But some of that data should be under special lock: you do not want sensitive enterprise information to be used as part of a large language model (LLM). And the reality is that common misconfigurations—such as mislabeled files and overly broad user permissions—can lead to sensitive data exposure to unauthorized users.