Digital transformation through effective cybersecurity
  • Digital Transformation
  • Corporate Cybersecurity
  • Security / IT Primer
  • Advisory Services
  • Contact

Issues

Business hand working with Business hand pressing on see through screen working with cryptocurrency and Ai computer interface with facial recognition and wireframe of human head

AI and IoT will create a flood of new data 

  • Increased data = Trust crisis
  • Need to identify, deduplicate, centralize and protect sensitive data:
    • Personally Identifiable Information (PII)
    • Protected Health Information (PHI)
    • Payment Card Information (PCI)

Data veracity - Importance of trust

  • Greater potential for inaccurate, manipulated and biased data
  • Leads to corrupted business insights and skewed decisions

Increasing need for: 

  • Anonymized data that retains value
  • Explainable AI – Algorithms that are understandable, explainable and transparent
  • Monitoring and managing for AI bias

Challenges

Technologies and themes that are "in vogue"... 

  • Cloud - big data, data lakes
  • Artificial Intelligence and Machine Learning (AI/ML)
  • Immersive Extended Reality
    • Artificial Reality (AR) 
    • Virtual Reality (VR)
  • Empowered Edge
    • Internet of Things (IoT)
    • AI@Edge
  • Communications
    • 5G
    • Sensors

... don't go well due to various challenges:

  • Lack of talent
  • Scalability limitation
  • Security not designed
  • Privacy issues not considered
  • Regulatory challenges
  • Change management issues

Let us help you navigate digital transformation

Go Global

  • Digital Transformation - Definition
  • The Reality
  • The New Global "M's"
  • Global Trends
  • COVID-19
  • Issues & Challenges
  • Strategy
  • What Stage is Your Organization?
Tweets by intecur
About | Privacy Policy | Cookie Policy | Sitemap
Intecur, Inc. Copyright © 2020 All Rights Reserved.
Log in Log out | Edit
  • Digital Transformation
    • Digital Transformation - Definition
    • The Reality
    • The New Global "M's"
    • Global Trends
    • COVID-19
    • Issues & Challenges
    • Strategy
    • What Stage is Your Organization?
  • Corporate Cybersecurity
    • Cybersecurity Today
    • Corporations
    • Executives
    • Compliance
    • Benefits
    • Strategy
    • Security by Design
  • Security / IT Primer
    • General Security Concepts
    • Aspects of Cybersecurity
    • People and Cybersecurity
    • Defender vs. Attacker
    • Complexity vs. Security
    • Resilience vs. Reliability
    • Cyber Hygiene
    • Testing
    • Threats Modeling
    • Traditional vs. IT Domains
    • Traditional vs. IT / Security Engineering
    • What is PCI DSS?
      • PCI Levels
      • PCI Compliance
    • Cyber Insurance
      • Coverage
      • Qualities
    • 5G
    • Aviation
      • Aviation Systems
      • Aviation Networks
  • Advisory Services
    • CISO-as-a-Service
    • Experience
    • Acronym Glossary
  • Contact
    • About Us
    • Partner Login
  • Scroll to top
Close