Security in the Digital DNA Image Shadow AI and the Governance Gap: What Leaders Must Do Now Image Security By Design - Part 2 Business Risk is the possibility that an event will eventually lead to a reduction in a company’s Image The CISO Exchange for a Safer Digital World Program Management: Planning for Success Image Unleashing Business Potential: The Power of Adaptive Enterprise Architecture In the digital age, businesses must adopt an adaptive Enterprise Architecture to succeed. AI Value Realization Image What Does AI Offer Users of Mainstream Enterprise Systems? Leaders and managers of businesses, non-profit organizations, government agencies and others have Image What Does AI Offer Humankind? Information technology in general and AI in particular serve as assistants to humankind in proble Image AI In Mainstream Enterprise Applications This article is one of a series on the subject of Artificial Intelligence in mainstream enterpris Image Artificial Intelligence For All, Responsibly As we look towards the turn of another year, it is a time of introspection for many organizations Image The Legacy Of ELIZA Recent dramatic advancements in Machine Learning (ML) and Natural Language Processing (NLP) have Salesforce: Well Architected Solutions Image 15 Best Practices In Salesforce Development Many businesses have decided to use Salesforce's customer relationship management solution. Image The Benefits Of Salesforce Communities The technologies that we use transform into a better alternative continuously. Search Category - Any -AI Value RecognitionProgram Management: Planning for SuccessSalesforce: Well Architected SolutionsSecurity in the Digital DNA Content Type - Any -ArticleBlogWebinarPodcasts Sort by - Any -LatestTrendingFeatured Image Blog Security By Design- Part 12 The U.S. Joseph F. Norton Joseph F. Norton, Risk, Security, and Crisis Management professional Image Blog Security By Design- Part 11 The U.S. Joseph F. Norton Joseph F. Norton, Risk, Security, and Crisis Management professional Image Blog Security By Design- Part 10 From a security perspective, the public internet is the weakest cybersecurity component of your business operations. Joseph F. Norton Joseph F. Norton, Risk, Security, and Crisis Management professional Image Blog Security By Design - Part 9 Last month I closed my post by saying that in my next series of posts, I will endeavor to explore with you the exploding Global Risk Ecosystem which threatens our businesses today and into the futu Joseph F. Norton Joseph F. Norton, Risk, Security, and Crisis Management professional Image Blog Security By Design - Part 8 I shared the view that Systemic Risk is the threat that component failure in a complex system will cascade and jeopardize the much larger system, and identified five elements of systemic risk that Joseph F. Norton Joseph F. Norton, Risk, Security, and Crisis Management professional Image Blog Security By Design- Part 7 I shared the view that Systemic Risk is the threat that component failure in a complex system will cascade and jeopardize the much larger system, and identified five elements of systemic risk that Joseph F. Norton Joseph F. Norton, Risk, Security, and Crisis Management professional Image Blog Security By Design - Part 6 In business, we have audit departments and others who assess risks, and we engage in supporting risk assessments. Joseph F. Norton Joseph F. Norton, Risk, Security, and Crisis Management professional Image Featured Article Unleashing Business Potential: The Power of Adaptive Enterprise Architecture In the digital age, businesses must adopt an adaptive Enterprise Architecture to succeed. Doug Picirillo Image Featured Article 15 Best Practices In Salesforce Development Many businesses have decided to use Salesforce's customer relationship management solution. Kannan Venkataraman Load More