Cloud Security , Security Operations , Video

ISMG Editors: Emerging AI Tech for Cloud Security in 2024

Payments Expert Troy Leach Joins the Panel to Cover AI, Zero Trust and IoT Security
Clockwise, from top left: Anna Delaney, Mathew Schwartz, Troy Leach and Tom Field

In the latest weekly update, Troy Leach, CSO at Cloud Security Alliance, joined three editors at Information Security Media Group to discuss important cybersecurity issues, including how generative AI is enhancing multi-cloud security, AI's influence on authentication processes, and the state of zero trust and IoT security.

See Also: Securing the Cloud, One Identity at a Time

The panelists - Anna Delaney, director, productions; Mathew Schwartz, executive editor, DataBreachToday and Europe; Troy Leach, chief strategy officer, Cloud Security Alliance; and Tom Field, senior vice president, editorial - discussed:

  • Real-life use cases of organizations that applied AI to their cloud security practices;
  • How AI could influence established authorization and authentication processes and what potential changes organizations should anticipate;
  • The current landscape of zero trust adoption and IoT security vulnerabilities.

The ISMG Editors' Panel runs weekly. Don't miss our previous installments, including the Jan. 12 edition on whether we will ever get a handle on API security and the Jan. 19 edition on why crypto phishing attacks are surging.


About the Author

Anna Delaney

Anna Delaney

Director, Productions, ISMG

An experienced broadcast journalist, Delaney conducts interviews with senior cybersecurity leaders around the world. Previously, she was editor-in-chief of the website for The European Information Security Summit, or TEISS. Earlier, she worked at Levant TV and Resonance FM and served as a researcher at the BBC and ITV in their documentary and factual TV departments.




Around the Network

Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing govinfosecurity.com, you agree to our use of cookies.