Connect with us
https://tickernews.co/wp-content/uploads/2023/10/AmEx-Thought-Leaders.jpg

Shows

The essential 8 cyber risk management strategies

Published

on

The ACSC has made updates to the Essential 8 – so what does this say about the current state of cybersecurity in Australia?

Cyber security threats are all around us, at a time when we use IT-based systems the most.

Ending Cyber Risk is a program that unpacks the cybersecurity industry.

Mark Thomas, Director of Security Services for ANZ at Arctic Wolf joins the show to discuss the essential 8.

In association with Arctic Wolf. #ending cyber risk

Continue Reading

Shows

Copilot redefines the modern workday

Published

on

Unlocking efficiency and customer success with AI-powered tools

The Tech Edge is a captivating business IT talk show delving into the latest industry trends and their significance in today’s landscape.

In this episode, Mike delves into the transformative power of Microsoft 365 Co-Pilot with Laura Morales, Customer Success Manager at AvePoint.

Continue Reading

Shows

Organisations overcome challenges in AI implementation

Published

on

Key lessons and tips for seamless Copilot adoption

In this episode, Kate Faarland, the Senior Vice President of Data and AI Programs at AvePoint, discusses the importance of AvePoint’s data and AI program, internal challenges with implementing CoPilot, and the organisation’s learnings from rolling out CoPilot for their workforce.

Continue Reading

Shows

Building trust in AI proves essential for the future of work

Published

on

Governance and security at the heart of copilot adoption

The Tech Edge is a captivating business IT talk show delving into the latest industry trends and their significance in today’s landscape.

In this episode, Dana Simberkoff, Chief Risk, Privacy and Information Security Officer at AvePoint discusses creating a secure environment for AI adoption in the workplace. She emphasises the importance of implementing good data governance practices, proper labelling and classification of sensitive data, and access control to prevent security risks.

Continue Reading

Trending Now