InfoTechTarget and Informa Tech's Digital Businesses Combine.

Together, we power an unparalleled network of 220+ online properties covering 10,000+ granular topics, serving an audience of 50+ million professionals with original, objective content from trusted sources. We help you gain critical insights and make more informed decisions across your business priorities.

Secure Collaboration in the Age of GenAI: A CISO's Guide to Risk Mitigation

Presented by

Irwin Lazar, President & Principal Analyst | Metrigy

About this talk

The way employees communicate and collaborate is constantly evolving, and so too are the security threats they face. The rise of generative AI adds a new layer of complexity, requiring CISOs to proactively address the risks of data loss and potential harm to the organization. Traditional security approaches often fall short in addressing the unique challenges posed by modern collaboration tools and the integration of GenAI. Understanding and mitigating these risks is critical for maintaining data privacy, preventing leakage, and ensuring compliance. We'll share Metrigy's latest research data to reveal actionable strategies for a comprehensive, business-aligned security strategy. Join Irwin Lazar (President and Principal Analyst at Metrigy) to discover the key components of a modern security approach, including how to: - Establish alignment between IT, collaboration, and security teams to address evolving threats. - Identify emerging threats stemming from new applications and out-of-band communications. - Understand how generative AI creates new risks for data privacy, leakage, and effective data management. - Develop a comprehensive security strategy tailored for collaborative environments and the GenAI landscape. - Evaluate the benefits of third-party platforms optimized for collaboration and GenAI security to enhance your security posture.
Information Security

Information Security

259139 subscribers732 talks
The latest trends and best practice advice from the leading experts
This channel features presentations by leading experts in the field of information security. From application, computer, network and Internet security to access control management, data privacy and other hot topics, you will walk away with practical advice for your strategic and tactical information security initiatives.
Related topics