Corporate AI Governance: Best Practices for a Secure and Ethical Future
AI governance cannot be treated as an IT problem alone. It is an enterprise-wide challenge requiring strategic alignment, operational rigor, and cultural …
Jim Nitterauer is the Senior Director of Information Security at Graylog. Jim and his teams are responsible for IT Services, Security, and Compliance across the organization. He holds the CISSP and CISM certifications in addition to a Bachelor of Science degree with a major in biology from Ursinus College and a Master of Science degree with a major in microbiology from the University of Alabama. Jim is well-versed in ethical hacking and penetration testing techniques and has been involved in technology for over 30 years. He stays connected with the InfoSec and ethical hacker community and is well-known by his peers. In addition to his work at Graylog, he devotes his time to advancing IT security awareness and investigating novel ways to implement affordable security.
AI governance cannot be treated as an IT problem alone. It is an enterprise-wide challenge requiring strategic alignment, operational rigor, and cultural …
Follow these best practices for data lake management to ensure your organization can make the most of your investment.
The need for automated data pipelines is clear. What role will data scientists play in bringing them about?
Developing an enterprise-ready application that is based on machine learning requires multiple types of developers.
Cloud optimization could offer the best method for reducing costs according to a new report.