InfoTechTarget and Informa Tech's Digital Businesses Combine.

Together, we power an unparalleled network of 220+ online properties covering 10,000+ granular topics, serving an audience of 50+ million professionals with original, objective content from trusted sources. We help you gain critical insights and make more informed decisions across your business priorities.

When Code Breaks: Exploring Billion Dollar Outages

Presented by

Taylor Meadows, Founder and CEO of Change Captain

About this talk

Let’s explore the critical importance of software change management controls in mitigating risks. Beginning with a high-level overview of AI's capabilities, we'll transition into a crucial discussion on why blind reliance on software can lead to vulnerabilities and how software should be built. Through real-world examples, we'll underscore the profound impact of inappropriate software changes, emphasizing the need for robust testing and oversight protocols to safeguard against risk. Key Takeaways: - Understand the fundamentals of AI and its widespread adoption in various industries. - Recognize the risks associated with unquestioning reliance on software outputs, including potential fraud and errors. - Learn about the significance of software change management controls and testing in high volume software development organizations. - Appreciate the real-world implications of inappropriate software changes through breaches and exploits. - Acquire strategies for implementing effective software change management practices to protect against AI and ensure operational integrity.
Encryption Consulting LLC

Encryption Consulting LLC

1692 subscribers64 talks
Global Leaders in Applied Cryptography!
We are the world's leading provider of applied cryptography. Over 100 Fortune 500 corporations have sought our help in protecting their most sensitive data and solving the most complex problems. Through our products and professional services, you can strengthen your ability to protect cryptographic keys, digital certificates, software code signing, Certificate Lifecycle management, and more. We are committed to staying up-to-date with the latest technology trends, compliances, and best practices in data security, and we leverage this expertise to help our clients achieve their security goals.
Related topics