My guest this week is Scott Berinato, author of Good Charts: The HBR Guide to Making Smarter, More Persuasive Data Visualizations, and Senior Editor at Harvard Business Review.
In this interview we discuss bridging the world of data science and the art of data visualization. Scott and I focus on how we make good use of Data Visualization skills that I believe are critical for CIOs to have.
Listen to the interview to learn more on how to be a better data visualization guy and methods of being a good data storyteller. Continue reading →
• Over the next several years the vision of IT security will morph towards automation and self-orchestration.
• The healing process will become automated. Humans still need to remediate and think.
• This feeds from key vendors and public and private sectors that will share information reliably.
Learn more in this short clip from a past CIO Innovation Insider lunch.
To learn more about innovative defense strategies email firstname.lastname@example.org
My guest this week is David Cross and it is my second discussion with him. I loved talking to David when he was on the Microsoft side of the fence. Two years later, he is on the Google side of the fence as a Cloud Security Engineering Director, and I decided to bring him back on for another fun conversation.
We discuss Google’s on-premises Solutions, Data Custodian Model (SAP), the story behind BeyondCorp, Google’s beta product, called Identity-Aware Proxy and much more. Our conversation is a deep dive into IT Security and highly technical… Regardless of your title within IT Security realm, you will benefit from this conversation. Continue reading →
My guest this week is Jeff Williams, co-founder and Chief Technology Officer at Contrast Security.
The reason that I wanted Jeff on the program is that his technology was massively interesting to me, given that application attacks are the single biggest vector for security breaches. In 2017 There will be 111 billion new lines of code produced resulting in endless complexity.
His product was an Innovation Sandbox Finalist at RSA this year. So I wanted to understand more.
I have tried to integrate application level firewalls and experienced working through real & hard human challenges of coders and network security people trying to defend and deploy at the same time I wanted to understand his technology better AND because iterative application development is going to be even more important for companies for their security to move at the pace of the business innovation and applications development and testing becoming more and more iterative and agile. So how do we do this? Continue reading →