Tech Trends Round Table Week 11
Safeguarding Healthcare from Cyber Threats
Speaker: Scott Schober
Protecting sensitive medical and personal data is critical for blood banks and healthcare organizations. According to cybersecurity expert Scott Schober there are three key steps these organizations must take to defend against cyber attacks:
1. Conduct regular security audits and assess IT systems for vulnerabilities, especially in critical infrastructure like patient databases and blood management systems.
2. Implement strong access controls using multi-factor authentication and least privilege access models to restrict who can access sensitive information.
3. Encrypt sensitive data, including medical records, personal information, and blood donation details, both at rest and in transit.
As Scott emphasized on #AskTheCEO, “Healthcare Organizations need to invest in robust security measures and fostering a culture of Cyber Security Awareness. They can then significantly reduce the risk for future cyber attacks.”
What other strategies would you recommend to safeguard the healthcare sector from cyber threats?
Navigating the Risks and Rewards of Emerging Tech
Speaker: Chuck Brooks
In the era of rapid technological advancement, protecting ourselves against the vulnerabilities of emerging technologies is crucial. According to cybersecurity expert Chuck Brooks author of the new book “Inside Cyber,” we must understand the dual-edged nature of these innovations.
As Chuck explains on #AskTheCEO, “We’re living in an era of great vulnerability in our digital lives, and everything is a target. And a lot of these emerging technologies have the ability to protect ourselves, but they also enable adversaries to use them against us.”
Chuck’s book delves into the impact of AI, 5G, IoT, and quantum computing on privacy and security. By gaining insights into the applications, uses, and risks of these transformative technologies, we can better prepare for the challenges and opportunities of the digital future.
What strategies do you employ to safeguard against the vulnerabilities of emerging tech?
Make sure to check out Chuck’s new book, Inside Cyber!
Empowering Clients Through Co-Creation and Hands-On Learning
Speaker: Ajay Kabra
When it comes to training clients in new technologies, Ajay Kabra believes in a collaborative and immersive approach. As he explains on #AskTheCEO, “We like to do some diagnosis with the customer, understand their pain points, goals, objectives, and vision. Once we understand that particular ecosystem, then it becomes simpler for us to suggest to them a roadmap.”
Rather than simply prescribing a solution, Ajay advocates for a co-creation process, where the consultant and the client work together to develop a tailored plan. This ensures the client’s unique needs and insights are incorporated, leading to more effective technology adoption.
He also emphasizes the value of hands-on learning, stating, “Sometimes what I do with a lot of my customers is, I engineer a crisis. There is no actual crisis, but I create a situation where a crisis happens and then I tell them how to solve that problem. Sometimes you really have to learn by doing it and by demonstrating how it can be done.”
By fostering collaboration and providing practical, immersive training, organizations can empower their clients to embrace new technologies and achieve their goals.
What techniques have you found effective when training clients on emerging technologies?
Unlocking the Power of Edge Computing in Manufacturing
Speaker: Kyle Crum
The manufacturing industry is generating an enormous amount of high-frequency, time-sequence data that is transforming the way we approach technology. As Kyle Crum explains on #AskTheCEO, “The manufacturing systems create an enormous amount of time sequence data. We’re talking about gigabytes and gigabytes of data a day.”
This data deluge poses unique challenges, as Kyle notes, “If we’re on human time scales, for example, the number of clicks on a web page, the number of views of a video. Well, that data isn’t high frequency, so I can move that data. I can do analysis on that data. In manufacturing world, it’s completely different.”
This is where edge computing shines. Kyle emphasizes, “Edge compute is the thing that we’re really interested in, and I personally think is going to continue to revolutionize our industry. AI tools that use much less memory and overhead that are appropriate for our industry are still being developed, and so I think you’re going to see waves of innovation as we can leverage more and more of that.”
By harnessing the power of edge computing, manufacturers can unlock the potential of their high-frequency data, leading to new insights and transformative innovations.
Lessons from the Breach: Strengthening Cybersecurity Beyond Compliance
Speaker: Elizabeth Zalman
As data breaches continue to plague organizations, cybersecurity expert Elizabeth Zalman shares crucial lessons companies must heed. According to Elizabeth on #AskTheCEO, “Compliance doesn’t necessarily mean security. Going back to the Target example. They were fully compliant. They got breached because they had a database credential that had previously been issued to a third party vendor, and that vendor got breached.”
Elizabeth emphasizes that companies need to realize they are only as secure as their vendors. “They need to assume they’re going to get breached, not if, but when,” she adds.
She also highlights the importance of accountability, stating, “You blame the C-level people, right? The people who have the title, who are in charge of that whole of that whole regime, but those guys are not the people by getting their hands dirty.”
To truly strengthen cybersecurity, Elizabeth suggests companies need to “find ways to collapse that that organizational structure so that people on top have visibility into what’s going on.”
What other key lessons have you learned from recent data breaches?
Stay tuned for more insights and expert opinions in our next edition!
Next week, we will explore the versatility of cloud computing and how businesses of all sizes can benefit from this transformative technology. We’ll also dive into the challenges of securing the growing number of IoT devices and discuss the most concerning cyber threats that organizations face, often from within their own ranks.
Finally, we’ll examine how emerging technologies like data analytics and AI are reshaping the manufacturing industry, ushering in a new era of data-driven decision-making. Stay tuned for more in-depth coverage of these important trends in our upcoming newsletter!
About the Author
Avrohom Gottheil is the visionary founder of #AskTheCEO Media, a platform dedicated to amplifying the voices of global brands in the crowded social media landscape. He excels at translating complex corporate messages into compelling stories that resonate with audiences worldwide.
With a knack for presenting clients as Thought Leaders, Avrohom inspires his audience to reimagine their mission and vision. His insights are not only actionable but also ignite passion and motivation, equipping industry leaders with the tools they need to drive immediate action.
Avrohom brings over 20 years of experience in IT and Telecom, where he has been instrumental in helping businesses across the globe implement and maintain robust communication systems and contact centers. Recognized as a top global expert in IoT, AI, Cloud, and Cybersecurity, Avrohom’s influence extends to his vast social media following and his frequent engagements as a keynote speaker, where he explores leveraging technology for revenue growth.
Tune into his #AskTheCEO podcast to discover the latest in technology trends, tools, and best practices across IoT, AI, Cloud, Cybersecurity, and more. The podcast has received accolades such as the #1 Channel Friendly Podcast by Forrester in 2019 and #2 Podcast from Thinkers360 Thought Leaders in 2020.
Connect with Avrohom:
Web: https://asktheceo.io
LinkedIn: https://www.linkedin.com/in/avrohom-gottheil/
Facebook: https://facebook.com/AvrohomGottheil
Twitter: @avrohomg
Threads: @avrohomg
Instagram: @avrohomg