Latest from todayfeatureAmerican CISOs should prepare now for the coming connected-vehicle tech bansA new US Commerce Department rule banning Chinese and Russian hardware and software in internet-connected vehicles takes effect in 2027.By Cynthia Brumfield30 Jan 20258 minsAutomotive IndustrySecurity PracticesTransportation and Logistics Industry how-to Tabletop exercise scenarios: 10 tips, 6 examplesBy Josh Fruhlinger and Sarah D. Scalet04 Jul 202416 minsBusiness ContinuityPhishingRansomwarefeature The BISO: bringing security to business and business to securityBy Deb Radcliff05 Jan 20237 minsBusiness IT AlignmentC-SuiteData and Information Security featureHow acceptable is your acceptable use policy?By Vawn Himmelsbach 14 Dec 20228 minsAccess ControlBusiness IT AlignmentCSO and CISO feature8 things to consider amid cybersecurity vendor layoffsBy Michael Hill 01 Dec 202212 minsBusiness OperationsVendors and Providers opinionCISOs: Do you know what's in your company’s products?By Christopher Burgess 05 Aug 20214 minsBusiness OperationsCSO and CISOSecurity Articles View all Resources whitepaper Unlock Data Value: A Proven Framework To Implement Data Products This webinar explains critical data product concepts and guides your organization to effectively implement a data-products strategy and data-streaming platform that unifies your operational and analytical data for any use case. The post Unlock Data Value: A Proven Framework To Implement Data Products appeared first on Whitepaper Repository –. By CONFLUENT 24 Feb 2025Business OperationsData ArchitectureDigital Transformation View all Explore a topic Application Security Business Continuity Careers Cloud Security Compliance Critical Infrastructure Cybercrime Identity and Access Management Industry IT Leadership Network Security Physical Security Privacy Risk Management View all topics Show me morePopularArticlesPodcastsVideos news Linux, macOS users infected with malware posing as legitimate Go packages By Shweta Sharma 07 Mar 20253 mins MalwareSecurity feature 8 obstacles women still face when seeking a leadership role in IT By Christina Wood 07 Mar 20258 mins CareersIT Leadership feature What is risk management? Quantifying and mitigating uncertainty By Josh Fruhlinger 07 Mar 202510 mins IT Governance FrameworksIT LeadershipRisk Management podcast CSO Executive Sessions: How cybersecurity impacts company ratings – A fey factor for investors and consumers 12 Feb 202527 mins Security podcast CSO Executive Sessions: Guardians of the Games – How to keep the Olympics and other major events cyber safe 07 Aug 202417 mins CSO and CISO podcast CSO Executive Session India with Dr Susil Kumar Meher, Head Health IT, AIIMS (New Delhi) 17 Jul 202417 mins CSO and CISO video CSO Executive Sessions: How cybersecurity impacts company ratings – A fey factor for investors and consumers 12 Feb 202527 mins Security video CSO Executive Sessions: How should software solution providers keep themselves and their enterprise clients safe? 26 Jan 202518 mins Security video CSO Executive Sessions: Open Source Institute’s Eric Nguyen on supply chain risks to critical infrastructure (Part 2) 14 Nov 202415 mins Critical InfrastructureIT GovernanceSupply Chain