Categories
Compliance and AI

Compliance and AI: Understanding AI and Cyber Risk Management with Yakir Golan

What is the intersection of AI and compliance? What about Machine Learning? Are you using ChatGPT? These questions are just three of the many we will explore in this cutting-edge podcast series, Compliance and AI, hosted by Tom Fox, the award-winning Voice of Compliance. Today, Tom visits with Yakir Golan, CEO & Co-Founder at Kovrr, who shares his professional journey from the Israeli intelligence community to his current role at Kovrr.

They discuss Kovrr’s business, focusing on Cyber Risk Quantification (CRQ) and recent developments in AI risk governance. Yakir explains the evolution of AI’s impact on business workflows and the risks posed by generative AI, including ‘insider AI scenarios.’ He emphasizes the importance of a proactive approach to managing AI risks and of using financial models to report them to executives. The conversation also touches on balancing innovation with global regulatory requirements and the need for robust governance frameworks. Yakir underscores the importance of ongoing risk assessments, sound analytics, and communication strategies to enable compliance officers and corporate leaders to manage AI and cyber risks effectively.

Key highlights:

  • Impact of AI on Cyber Risk
  • Insider AI Scenarios and Risks
  • Proactive AI Risk Management
  • Compliance Beyond Regulations
  • Future of AI and Compliance

Resources:

Yakir Golan on LinkedIn

Kovrr

Tom Fox

Instagram

Facebook

YouTube

Twitter

LinkedIn

Categories
TechLaw10

TechLaw10: Predictions for 2026

In this film, Punter Southall Law’s Jonathan Armstrong & Prof. Eric Sinrod discuss their predictions for 2026. This is episode 296 in the popular TechLaw10 series. You can listen to earlier podcasts here. Eric & Jonathan also talk about:

  • AI laws & regulation + the patchwork nature of AI law in the US
  • AI vacuums & AI-assisted search (see the article here)
  • Political responses to AI, including the Grok nudification scandal, TikTok separation & DeepSeek
  • Changes to US rules on patents
  • The issues with Shadow AI
  • The rise in vendor compromises & cybersecurity challenges
  • The chances of the EU Digital Omnibus passing
  • Changes to data privacy enforcement, including in Indiana, Kentucky & Rhode Island
  • How sanctions can affect the tech landscape
  • The dangers of hallucinations, aka AI lying

Resources:

There are FAQs on the EU AI Act here

A glossary of AI terms is also available here.

There’s also a summary of Italy’s new AI law here.

Our previous podcast on AI literacy is here. Jonathan talks briefly about his work on the NYSBA AI Task Force. Details can be found here.

Eric Sinrod’s details can be found here, and Jonathan Armstrong’s details are available here.

The TechLaw10 LinkedIn group is here.

Categories
Great Women in Compliance

Great Women in Compliance – Building Trust at the Speed of Technology

In this episode of Great Women in Compliance, co-host Dr. Hemma Lomax welcomes Shannon Ralich, Vice President of Compliance and Chief Privacy Officer at Machinify, to discuss the evolving landscape of data privacy, cybersecurity, and responsible AI.

Shannon shares her remarkable journey from a curious child taking apart electronics to a seasoned leader blending technology, law, and strategy. She offers insight into how curiosity and creativity can fuel governance excellence and explains what it means to design systems that anticipate risk and enable responsible innovation.

Together, Hemma and Shannon explore:

  • How privacy and cybersecurity intersect in today’s fast-evolving AI environment
  • The most pressing compliance challenges around data governance and global regulation
  • Lessons from the SolarWinds and Uber cases and the growing conversation around individual accountability for CISOs and compliance leaders
  • Practical steps for staying agile—through reliable news sources, cross-functional camaraderie, and professional networks
  • How to translate corporate compliance skills into meaningful community impact through nonprofit leadership and animal rescue advocacy

Shannon’s message is a powerful reminder that the best leaders bring their full selves to the work: technical precision, ethical clarity, and human compassion.

Biography:

Shannon Ralich is the Vice President of Compliance and Chief Privacy Officer at Machinify, a healthcare intelligence company applying AI to improve the efficiency and integrity of healthcare payments. With more than 20 years of experience across legal, compliance, privacy, and cybersecurity roles, Shannon specializes in aligning governance frameworks with business innovation.

She also serves on the Advisory Board of the Privacy Bar Section of the IAPP (International Association of Privacy Professionals). She is widely respected for her strategic, forward-thinking approach to data protection and responsible AI governance.

Beyond her professional expertise, Shannon is a passionate advocate for animal welfare. She sits on the Board of Directors for the Neuse River Golden Retriever Rescue, where she leverages her operational and technological skills to strengthen fundraising, improve systems, and support global rescue missions.

A lifelong learner and self-described “builder,” Shannon finds creativity and grounding through woodworking, outdoor adventures with her family, and contributing to causes that make both workplaces and communities more humane.

Note: The views expressed in this podcast are our own and do not represent the views of our employers, nor should they be taken as legal advice in any circumstances. 

Categories
Blog

Cybersecurity Oversight at the Boards

Cybersecurity risk is no longer a back-office IT issue. It is a board-level governance priority, a regulatory compliance challenge, and a reputational minefield. From ransomware attacks to regulatory enforcement actions, the stakes have never been higher. In an article in the Harvard Law School Forum on Corporate Governance, titled “Risk Management and the Board of Directors,” the review focused on the NACD’s 2025 survey. It showed that over three-quarters of boards now discuss the material and financial implications of cyber incidents. While that is progress, awareness alone is not enough.

For compliance professionals, the message is unmistakable: cybersecurity oversight is now a central pillar of governance. In this post, I will explore the evolving regulatory landscape, lessons from enforcement actions, and practical steps compliance teams can take to help boards discharge their responsibilities effectively.

A National Priority with Global Reach

Cybersecurity has moved to the top of national agendas. The Biden Administration’s 2023 National Cybersecurity Strategy set the tone, and the Trump Administration’s 2025 Executive Order reinforced it, emphasizing protections against foreign cyber threats and secure technology practices. But this is not just a U.S. issue. The EU’s GDPR, California’s CCPA, Virginia’s CDPA, and Illinois’s biometric data laws all impose sweeping obligations with high-stakes enforcement. Settlements under Illinois’s biometric privacy law alone have reached into the hundreds of millions.

For compliance professionals, this expanding patchwork of regulation means that cyber oversight cannot be siloed by geography or business unit. Boards must ensure management understands and complies with both domestic and international requirements.

The SEC Steps into the Spotlight

If boards needed any reminder of their cyber responsibilities, the SEC has provided it. In 2023, the SEC finalized disclosure rules requiring companies to report material cyber incidents on Form 8-K within four business days (subject to limited delays approved by the Attorney General). Companies must also disclose in their 10-Ks their processes for identifying and managing cyber risks, the material impacts of prior incidents, and, critically, the board’s role in oversight.

The SEC has coupled disclosure mandates with enforcement actions. From Robinhood in 2025 (failure to implement identity theft protections) to SolarWinds in 2023 (alleged fraud and internal control failures), to Blackbaud’s ransomware misrepresentations and Morgan Stanley’s vendor monitoring failures, the Commission is signaling that cyber lapses are securities law violations. The key takeaway for compliance is that disclosures must be accurate, controls must be effective, and boards must demonstrate active oversight. Anything less may well invite regulatory scrutiny.

DOJ, FTC, and State Regulators Join In

The SEC is not alone. The DOJ has used the False Claims Act to address software vulnerabilities sold to government agencies. The FTC has pursued cases against GoDaddy and other providers for failing to implement adequate protections. The New York Department of Financial Services (NYDFS) has enforced its prescriptive cybersecurity rules since 2019, with actions as recent as August 2025. And globally, regulators like Ireland’s Data Protection Commission have issued blockbuster fines, such as the €530 million penalty against TikTok for unlawful data transfers.

The compliance implication is clear: multi-layered enforcement is now the norm. Cybersecurity and data privacy risks span agencies, jurisdictions, and statutes. Boards must assume that regulators will coordinate, cross-reference, and pursue failures aggressively.

Frameworks That Matter

With enforcement risk high, companies need a structured approach. The National Institute of Standards and Technology (NIST) framework has become the de facto benchmark, with its five core functions: identify, protect, detect, respond, and recover. Both the SEC and FTC endorse it, and boards should expect management to benchmark their programs against it.

At the governance level, the NACD’s Director’s Handbook on Cyber-Risk Oversight and guidance from the Cybersecurity & Infrastructure Security Agency (CISA) provide clear expectations: boards should not manage cyber risk, but they must oversee management’s handling of it.

Lessons from Enforcement Actions

Every enforcement case tells a story, and compliance professionals should use these as teaching tools:

  • Vendor Oversight Matters – Morgan Stanley’s Failure to Monitor Vendors Exposed Data from 15 Million Customers.. Boards must ensure that vendor cyber risk is integrated into their oversight.
  • Accurate Disclosures Are Non-Negotiable – SolarWinds and Blackbaud faced allegations of misrepresentation around breaches. Boards must verify that management’s cyber disclosures are truthful and complete.
  • Controls Must Be Tested – Robinhood’s identity theft control failures remind us that having policies on paper is not enough. Boards should require evidence that controls work in practice.

Practical Steps for Compliance Professionals

So how can compliance officers help boards meet their obligations in this complex cyber landscape? Four steps stand out:

1. Educate and Engage the Board

Boards need ongoing, tailored education on cyber risks. Compliance should arrange regular briefings from CISOs, external experts, and regulators. This ensures directors can ask informed questions and challenge management effectively.

2. Strengthen Incident Response Preparedness

An incident response plan is only as strong as its execution. Compliance must test plans through tabletop exercises, ensure disclosure obligations are understood, and coordinate with law enforcement and advisors. Boards should be briefed on lessons learned after every drill or real incident.

3. Integrate Cyber Risk into Enterprise Risk Management

Cyber risk cannot be isolated from strategy, finance, and operations. Compliance should help boards see cyber threats as part of enterprise risk management, aligned with business goals and resilience planning.

4. Monitor Third-Party and Supply Chain Risk

Vendors, cloud providers, and contractors are often the weak link. Compliance should implement due diligence, ongoing monitoring, and contract requirements that address cyber obligations. Boards should receive visibility into these risks and the company’s mitigation strategies.

Why This Matters for Boards and Compliance

Cybersecurity is not just an IT challenge; it is a governance imperative. Regulators, courts, and investors expect boards to demonstrate active, documented oversight. For compliance professionals, the mandate is to help boards meet that expectation with clarity, structure, and evidence.

The reality is stark that a single breach can devastate a company’s reputation, stock price, and stakeholder trust. But boards that embrace active oversight, guided by compliance professionals, can transform cybersecurity from a vulnerability into a competitive advantage.

Final Thoughts

The cyber landscape is evolving faster than most organizations can keep pace. But boards do not have the luxury of waiting. As recent regulations and enforcement actions demonstrate, oversight failures will be punished, sometimes harshly.

For compliance professionals, this is both a challenge and an opportunity. By educating boards, strengthening incident response, integrating cyber into enterprise risk, and addressing third-party exposures, compliance can elevate its role from policy enforcer to strategic partner.

The bottom line: Cybersecurity oversight is no longer optional. It is the frontline of governance, and compliance professionals are the essential guides helping boards navigate it.

Categories
Blog

Agentic AI, Data Discipline, and Cross-Functional Governance: Compliance Insights for the Modern Era

As compliance professionals, we often inherit the boundaries that IT, Legal, and Security established long before we arrived. But what happens when those lines are out of date? I recently had a far-ranging conversation with cybersecurity author and educator Robert Meyers, who has spent more than three decades transitioning from “plain IT” to a world where cybersecurity and privacy have become distinct, high-impact disciplines. He explains why the old map no longer matches the terrain. Meyers’ vantage point spans early dial-up remote access fiascos, modern breach response, philosophical differences between U.S. and EU privacy regimes, and the tidal shift that agentic AI is bringing to accountability and data governance.

This blog post distills that conversation for a corporate compliance audience, focusing on practical, board-relevant governance and the day-to-day tactics that make privacy and security work together before, during, and after incidents.

From “IT Does Everything” to “Risk, Roles, and Accountability”

Meyers started in an era when “cybersecurity” did not exist. There was just “IT,” and everyone did everything. That lack of specialization produced preventable harm;  misconfigured remote access where a “guest” credential quietly had admin rights, cavalier attitudes toward email and user surveillance (Remember when “I read your email” bumper stickers were a thing.), and a culture that treated privacy as a corporate secrecy issue rather than a people-protection mandate. The lesson for compliance? Risk thrives in ambiguity. When roles and ownership are unclear and authority is not defined, controls are merely a facade.

Meyer contrasts the U.S. and EU not as a legal vs. legal comparison, but as a philosophical split. In Europe, privacy is government-centric and procedurally channeled through regulators; in the U.S., it is more individual-centric and notification-driven. California’s rules can even exceed the practical strictness of the GDPR in certain respects. For compliance leaders, that means your privacy posture must be designed around intent (IE., who is protected), governance (IE., who decides), and operational execution (IE., who does the work) and not just a citation list.

Data Has a Life Cycle—Treat It That Way

One of Meyers’ most pointed critiques is that organizations hoard data without a purpose or end-of-life discipline. If you keep 30 years of email, do not be surprised when eDiscovery asks for all 30. The habit of “keep it all, we might need it” is the enemy of proportional risk. Compliance should drive a business-backed data minimization program with explicit retention schedules tied to legal, operational, and risk rationales and then audit for enforcement. If the business cannot articulate why it needs a dataset today and in the future, that data is a liability, not an asset.

Fix the Operating Model: Privacy Is Not a Side Gig for Security

Meyers has observed the exact misalignment play out repeatedly: privacy responsibility is often assigned to Legal or Compliance, but Cybersecurity typically handles the work and associated expectations. CISOs are asked to “own” controls for which they lack budgetary authority or policy ownership. Legal “owns” privacy on paper, but it is not integrated into cyber operations. Meyer is clear that the cure is governance, not heroics: establish a cross-functional steering committee (including Legal, Security, Compliance, IT Ops, and the business) with clear charters, shared KPIs, and defined decision rights. Diversity matters here; mix senior leaders with younger employees and varied backgrounds to avoid blind spots. The first agenda item of that committee should be ruthless purpose-alignment: “Why do we have this data? Do we still need it?”

Put Risks on One Page—and Make It Everyone’s Page

While cybersecurity tooling is often automated and technical, Meyers recommends one deceptively simple instrument to unite the disciplines: a shared risk register. GRC teams already live in this world. You should bring Security into it and treat security events, control weaknesses, and privacy exposures as entries that share owners, mitigations, and review cadences. If the CISO, Chief Compliance Officer, and General Counsel are not reading, updating, and arguing over the same risk register, you do not have a single source of truth or a shared sense of urgency.

Breach Reality: Precision Beats Blanket Notification

“Assume breach” is not fatalism; it is a sign of professional maturity. Meyers highlights the emergence of data security posture management (DSPM) solutions that not only identify exposures but also determine who actually owns the data that was accessed. That allows for targeted notifications — “these 15 people, not 500,000 customers” — and saves both real money and reputation. For the compliance function, the key point is proportionality; your incident playbook should pair legal thresholds with data lineage and ownership maps, ensuring a fast, accurate, and respectful response to individuals.

Agentic AI: Accountability Without a Face

Agentic AI changes the rules. Agents act without asking, talk to other agents, and traverse systems and data at machine speed. They also obscure accountability because the human “operator” may interact with one agent while three others are making consequential decisions out of view. This breaks the legacy consent and audit paradigms, demanding new guardrails: identity and authorization that can follow agents, granular logging of agent-to-agent interactions, and data lineage that respects privacy scopes. From a compliance lens, agentic AI requires you to rewrite playbooks on consent, purpose limitation, and lawful processing, before deployment, not after the first mishap.

Storytelling: The Culture Carrier for Security and Privacy

Meyers’ long connection to San Diego Comic-Con may seem far removed from cybersecurity. Yet when you see a cybersecurity team finally “get it” when you swap a nameless attacker for “Lex Luthor” in a tabletop. That is not playing to pop culture; rather, it is cultural engineering. Humans adopt guardrails that they emotionally understand. If your privacy training or AI oversight policy can be told as a story, with villains, flawed heroes, and a clear “why,”  you improve retention, reduce resistance, and create connective tissue across silos. Compliance is, at its core, applied storytelling backed by controls.

Robert Meyers traces the evolution from undifferentiated IT to today’s specialized privacy and cybersecurity disciplines, emphasizing how poor role clarity and indiscriminate data retention have caused preventable harm for decades. He frames the U.S.–EU divide as a philosophical one, between individual-centric versus regulator-centric approaches, while urging companies to stop treating privacy as a side project for Security when Legal nominally “owns” it. The solution involves a cross-functional steering committee, a shared risk register, and purpose-driven data lifecycle governance.

Meyers underscores “assume breach” realism and highlights new DSPM tooling that enables precise, owner-level breach notification instead of blanket, costly responses. Looking ahead, agentic AI creates accountability gaps as autonomous agents act and collaborate out of human view, demanding fresh guardrails for identity, consent, lineage, and logging. Finally, Meyers champions storytelling (yes, even Comic-Con-style narratives) to make security and privacy relatable, and advocates for cross-training, with privacy professionals learning security and vice versa, so organizations can speak a single operational language from the boardroom to the SOC.

Categories
Innovation in Compliance

Innovation in Compliance – Cybersecurity Challenges and Solutions: An In-Depth Interview with Robert Meyers

Innovation comes in many areas, and compliance professionals need to be ready for it and embrace it. Join Tom Fox, the Voice of Compliance, as he visits with top innovative minds, thinkers, and creators in the award-winning Innovation in Compliance podcast. In this episode, Tom Fox interviews Robert Meyers, a cybersecurity and privacy expert with over 30 years of experience.

Meyers shares his journey from starting in IT to becoming a prominent figure in cybersecurity, privacy, and M&A security. He recounts the evolution of cybersecurity from the 1980s to the present day, highlighting key lessons learned along the way. He discusses the philosophical divide between U.S. and European attitudes toward data privacy, the importance of a cross-functional approach to cybersecurity and privacy within companies, and how emerging technologies like agentic AI are reshaping the industry. He also shares insights from his new book, ‘Privacy Snippets for the Cybersecurity Professional,’ aimed at helping professionals bridge the gap between cybersecurity and privacy. Additionally, Meyers’s passion for Comic-Con offers a unique perspective on how creativity and community engagement can inform and enrich professional practices.

Key highlights:

  • Robert Meyers’ Professional Background
  • Early Cybersecurity Challenges
  • Evolution of Privacy and Security
  • Roles and Responsibilities in Cybersecurity
  • Agentic AI and Future Challenges
  • Comic-Con and Personal Interests
  • Advice for Aspiring Professionals

Resources:

Privacy Snippets for the Cybersecurity Professional on Amazon

Robert Meyers’ Profile on Amazon

Robert Meyers ‘on LinkedIn

Tom Fox

Instagram

Facebook

YouTube

Twitter

LinkedIn

Categories
12 O’Clock High-a podcast on business leadership

12 O’Clock High, A Podcast on Business Leadership – Leadership in Cybersecurity and Privacy with Robert Meyers

12 O’Clock High, an award-winning podcast on business leadership, brings together stories from history, the arts, sports, movies, research, and current events to consider leadership lessons. In this episode, Tom Fox welcomes Robert Meyers, a veteran with over 30 years in cybersecurity, privacy, M&A security, and education.

The discussion spans Meyers’s vast professional journey from the early days of IT to the modern challenges and practices of data protection. They also explore the differences in cybersecurity and privacy perspectives between the US and Europe, the importance of cross-functional collaboration in organizations, and how new technologies like autonomous AI systems are reshaping security models. Meyers also shares his passion for Comic-Con and offers advice for students and new professionals considering a career in cybersecurity and privacy. The episode wraps up with insights into Meyers’s books and practical advice for integrating privacy principles and cybersecurity tools in today’s business environment.

Key highlights:

  • Robert Meyers’ Professional Background
  • Early Cybersecurity Challenges and Lessons
  • Evolution of Cybersecurity and Privacy
  • Privacy Perspectives: US vs Europe
  • Role of Executives in Cybersecurity and Privacy
  • Cross-Functional Collaboration in Privacy and Security
  • Innovative Cybersecurity Tools
  • Agentic AI and Its Implications
  • Comic-Con and Professional Insights
  • Career Advice for Aspiring Professionals

Resources:

Privacy Snippets for the Cybersecurity Professional on Amazon

Robert Meyers’ Profile on Amazon

Robert Meyers ‘on LinkedIn

Tom Fox

Instagram

Facebook

YouTube

Twitter

LinkedIn

Categories
Compliance and AI

Compliance and AI – Cybersecurity Insights with Robert Meyers – Privacy, Data, and AI Challenges

What is the role of Artificial Intelligence in compliance? What about Machine Learning? Are you using ChatGPT? These questions are just three of the many we will explore in this cutting-edge podcast series, Compliance and AI, hosted by Tom Fox, the award-winning Voice of Compliance. In this episode, Tom Fox interviews Robert Meyers, a cybersecurity and privacy expert with over 30 years of experience.

Meyers shares his professional journey, emphasizing the evolution of IT and cybersecurity practices. He discusses significant privacy challenges, including data breaches and the philosophical divide between US and European privacy laws. The conversation also covers the integration of privacy principles and cybersecurity tools, the importance of cross-functional collaboration, and the role of agentic AI in reshaping security models. Additionally, Meyers highlights his ongoing work, including his book ‘Privacy Snippets for the Cybersecurity Professional,’ and his dedication to volunteer work at San Diego Comic-Con.

Key highlights:

  • Robert Meyers’ Professional Background
  • Early Cybersecurity Challenges
  • Evolution of Privacy and Security
  • Privacy Perspectives: US vs Europe
  • Role of Executives in Cybersecurity
  • Cross-Functional Collaboration
  • Innovative Cybersecurity Tools
  • Agentic AI and Privacy
  • Comic-Con and Professional Insights
  • Career Advice for Aspiring Professionals

Resources:

Privacy Snippets for the Cybersecurity Professional on Amazon

Robert Meyers’ Profile on Amazon

Robert Meyers’ on LinkedIn

Tom Fox

Instagram

Facebook

YouTube

Twitter

LinkedIn

Categories
Innovation in Compliance

Innovations in Compliance – Data Collection & Cybersecurity with ModeOne’s Matt Rasmussen and Ryan Frye

Innovation comes in many areas, and compliance professionals need to be ready for it and embrace it. Join Tom Fox, the Voice of Compliance, as he visits with top innovative minds, thinkers, and creators in the award-winning Innovation in Compliance podcast. In this episode, host Tom Fox visits Matt Rasmussen and Ryan Frye from ModeOne and their innovative approach to compliance data collection and cybersecurity.

They discuss their professional backgrounds, the founding of ModeOne, and their solutions to common challenges in data collection for compliance purposes. The conversation covers the shift from full data extraction to targeted data collection, navigating the complexities of encrypted communications, and the evolution of cloud compliance and AI integration. Key takeaways include the importance of targeted data collection, the use of AI in compliance monitoring, and strategies for balancing data privacy and protection.

Key highlights:

  • Founding ModeOne: The Journey
  • Innovation in Compliance and Cybersecurity
  • Role of the Chief Innovation Officer
  • Risk Management Frameworks
  • Future of Cloud Compliance and AI
  • Top Action Items for Compliance Officers
  • Preparing for the Future: 2030 and Beyond

Resources:

Matt Rasmussen on LinkedIn

Ryan Frye on LinkedIn

ModeOne Technologies in LinkedIn

ModeOne Website

Mobile Device Data Collection: What You Need to Know in 2025

ModeOne News

Tom Fox

Instagram

Facebook

YouTube

Twitter

LinkedIn

Categories
Innovation in Compliance

Innovation in Compliance: Travis Howerton on Revolutionizing Compliance – Integrating Automation for Digital Transformation

Innovation comes in many areas and compliance professionals need to not only be ready for it but embrace it. Join Tom Fox, the Voice of Compliance, as he visits with top innovative minds, thinkers, and creators in the award-winning Innovation in Compliance podcast.

In this episode, Tom welcomes back, Travis Howerton, a co-founder of RegScale, the sponsor for this episode, to take a deep dive into automating compliance solutions for the digital transformation of compliance.

Howerton advocates for the integration of automation in compliance to keep pace with rapid technological advancements, thereby maintaining competitiveness and efficiency. Through digitizing regulations by using the latest standards and forming strategic partnerships, Howerton and RegScale are transforming traditional compliance from a manual, burdensome task into an automated, streamlined process, thereby redefining the role of compliance professionals as key contributors to secure and innovative operations.

We discuss the three pillars of cybersecurity: confidentiality, integrity, and availability. While much focus is placed on safeguarding confidentiality to protect sensitive information, the speaker highlights that integrity issues pose a significant threat, particularly in sensitive industries like healthcare and critical infrastructure. Compromised integrity can lead to dire physical consequences, making it the most concerning aspect of cybersecurity.

Key Highlights:

  • Introduction to Cybersecurity’s Three-Legged Stool
  • Focus on Confidentiality in Cybersecurity
  • The Critical Importance of Data Integrity
  • Real-World Implications of Integrity Issues
  • The Sleepless Nights of a Cybersecurity Analyst

Resources:

Travis Howerton on LinkedIn

RegScale

Tom Fox

Instagram

Facebook

YouTube

Twitter

LinkedIn