Internet Industry Search Engine

3 basic things to know about your data, according to Xerox's CISO


Oct 19, 2018 12:42 PM 2+ mon ago

Dan Patterson interviews Xerox CISO Alissa Abdullah about protecting sensitive data from adversaries. They also discuss the recent Marriott hack, privacy, ransomware, machine learning, and IoT....Read more.

Search Builder

(Click to add to search box)
Search Suggestions Level 1
Alissa Abdullah  Dan Patterson  Marriott hack  data security conversation  threat profile  email accounts people  Producer Dan Patterson  nation states  nation states target  business problem  printer environment  security number  tech people  privacy data  cybersecurity news  security defenses  impacting people  consumer shouldn  people problem  data lake  Things company  business technology  business data  data repositories  work people  business email  email accounts  people care  CISO perspective  WIIFM effect  computer system  nation state  Intellectual Property  threat surface  ways companies  CBS News  Email CNET  market products  vendor population  IoT company  right answer  term but  
Search Suggestions Level 2
medicine Everything  VPS Dispelling  Election Simulation  Parlor Game  Rebekah Mercer  Data Thriver  
Search Suggestions Level 3
data breach  payment card numbers  hotel group  optimized business decisions  prioritise risk reduction  guest reservation database  customised server solution  Ensuring threat monitoring  disposal vulnerability scanning  feedback loop  demand management application  handling traffic spikes  monitoring forecasting accuracy  demand planning applications  data protection regulations  transportation management systems  Autonomous Supply Chain  application security tools  meeting order SLAs  moniker SSD VPS  industry solutions marketing  OSIsoft PI System  Black box solutions  competitor pricing data  Marriott data breach  demand planning process  data science methods  fact thatdata breaches  cyber security strategy  Demand planning applications  organisations detection capabilities  web security company  breach disclosure scheme  sale data stream  application security strategy  weather data  Free device use  hotel group claims  security failings  attack point  agent accesses  box solution  forecasting engine  encryption keys  Bimal Gandhi  Blue Yonder  leverage machine  verification factor  data authentication  behavioural technologies  NCSC website  data breaches  credit cards  data resources  security solutions  security implications  Le Mridien  CEO atUniken  W Hotels  penetration testing  product manager  Simon Roe  attack surface  security methods  Ilia Kolochenko  cyber security  reservation system  security monitoring  web applications  data protection  Gordon Benzie  hardware solutions  warehouse floor  ecommerce fulfillment  venture capital  logistics professionals  language processing  paper roll  problems need  ROI issue  feedback loops  right tool  magic wand  AI technology  IAM Robotics  SCP systems  Data Thriver  paper Master  MOREPrint Master  industry analyst  Vice President  Cities show  driver today  suction cups  Embark Trucks  Mike Reid  SLAM technologies  Autonomous trucking  vacuum suction  gathering data  Big Data  industry perspective  algorithm works  warehouse level  store level  time frames  product family  life products  shipment data  

**Content contained on this site is provided on an “as is” basis. 4Internet, LLC makes no commitments regarding the content and does not review it, so don't assume that it's been reviewed. What you see here may not be accurate and should not be relied upon. The content does not necessarily represent the views and opinions of 4Internet, LLC. You use this service and everything you see here at your own risk. Content displayed may be subject to copyright. Content is removed on a case by case basis. To request that content be removed, contact us using the following form: Contact Us.