Next-Generation Technologies & Secure Development , Threat Intelligence

Winning Strategies for SLED #1: Resource Constraints

Fadi Fadhil of Palo Alto Networks on Being AI-Ready to Address Challenges
Fadi Fadhil, chief information officer, director of field strategy, Palo Alto Networks

No doubt, limited budgets affect the ability of public sector organizations to invest in robust cybersecurity measures. But Fadi Fadhil, CIO at Palo Alto Networks, said AI is one emerging technology these agencies can put to use to help mitigate resource constraints and the dearth of security skills.

In this video interview with Information Security Media Group, Fadhil discussed:

  • Budgetary and staffing challenges unique to public sector entities;
  • How the evolution of cyberthreats affects resource allocation;
  • The importance of being AI-ready to tackle resource constraints.

Fadhil has over 20 years of experience with digital transformation, business strategy and partnership building in government and education. He served as the CIO of the city of Minneapolis and of Minneapolis Public Schools. He was also director of technology in Saint Paul Schools, Minnesota, and lead technology architect and liaison between the U.S. Army and the new Iraqi government in Baghdad, Iraq during Operation Iraqi Freedom II, 2003-2005.

This is one of four Winning Strategies for SLED videos. The other three topics are Increased Complexity, Advanced Attacks, and Too Much Information, Too Many Silos, Not Enough Insight.


About the Author

Tom Field

Tom Field

Senior Vice President, Editorial, ISMG

Field is responsible for all of ISMG's 28 global media properties and its team of journalists. He also helped to develop and lead ISMG's award-winning summit series that has brought together security practitioners and industry influencers from around the world, as well as ISMG's series of exclusive executive roundtables.




Around the Network

Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing govinfosecurity.com, you agree to our use of cookies.