May 2023

Building cyber resilience and leveraging cyber governance

May 15, 2023
Thank you for joining us on “The cloud hub: From cloud chaos to clarity.” This paper covers the discussion organized by InnovationAus.com between a senior group of chief information security executives from the industry and the government around building cyber resilience strategies and leveraging cyber governance frameworks to bolster board-level program support. Click here to…

Business resilience in the evolving cloud economy

May 15, 2023
Thank you for joining us on “The cloud hub: From cloud chaos to clarity.” Watch this webcast on how enterprises can build a resilient approach with accelerated cloud adoption. Ray Wang, founder, chairman, and principal analyst of Constellation Research, and Vibhuti Dubey, senior vice president and SAP offering head at Infosys, talk about why decision…

Chief Twit Elon Musk loses appeal to be able to tweet about Tesla unchecked

May 15, 2023

Elon Musk lost another bid to end a 2018 settlement with the U.S. Securities and Exchange Commission that requires oversight of some of his Tesla-related tweets. The 2nd U.S. Circuit Court of Appeals in Manhattan rejected Musk’s argument that the consent decree reached in 2018 is a “prior restraint” on his speech. Musk, who is […]

Chief Twit Elon Musk loses appeal to be able to tweet about Tesla unchecked by Kirsten Korosec originally published on TechCrunch

The rise of digitization in schools and the dangers of cybercrime

May 15, 2023
Thank you for joining us on “The cloud hub: From cloud chaos to clarity.” Vishal Salvi, senior vice president, CISO, and head of the cyber security practice at Infosys, and Shahryar Khazei, ex-chief information officer of the Los Angeles Unified School District, discuss the challenges that schools and educational institutions face with the increase in…

Cybersecurity for the education sector

May 15, 2023
Thank you for joining us on “The cloud hub: From cloud chaos to clarity.” Seventy percent of educational institutions have only a basic cybersecurity governance, and more than 50% face security incidents. With data being shared at speed and available from anywhere, at any point, and from any device, a holistic approach to cybersecurity is…