Beyond Compliance: Proactive risk management to protect your infrastructure

July 12, 2005 - July 12, 2005
Guest Speaker: Paul Reymann, Reymann Group CEO and co-author of GLBA will host this discussion of key trends, challenges, regulatory mandates, and practices that are defining the framework of prudent and acceptable information security and technology risk management practices for today's corporation.

Arkadiusz Warguła / iStock / Getty Images Plus via Getty Images
Maliciously crafted inputs can exploit machine learning models at the algorithmic level, bypassing traditional cybersecurity defenses.
Pakhnyushchyy / iStock / Getty Images Plus via Getty Images
Advocates highlight that with proper oversight and adherence to the Five Cs — Community Engagement, Civil Liberties Protection, Common Procedures, Clear Oversight, and Cybersecurity — drones can enhance public safety without compromising civil rights.