Remove Measurement Remove Risk Remove Workshop
article thumbnail

Protecting your digital transformation from value erosion

CIO Business Intelligence

Digital transformation programs promise a wealth of advantages, but unforeseen challenges can cancel out measurable value. It’s important to clearly identify what value you’re expecting to get from your partners against the price you’re paying, as well as the risk you’re taking on as a client. What primary risks lead to value erosion?

article thumbnail

Why you should care about debugging machine learning models

O'Reilly on Data

1] This includes C-suite executives, front-line data scientists, and risk, legal, and compliance personnel. These recommendations are based on our experience, both as a data scientist and as a lawyer, focused on managing the risks of deploying ML. That’s where model debugging comes in. Sensitivity analysis. Residual analysis.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

4 tips to improve employee experiences while maintaining security and governance

CIO Business Intelligence

As more individuals use browser-based apps to get their work done, IT leaders need to provide seamless access to corporate apps and tools while minimizing security risks. A security-by-design culture incorporates security measures deeply into the design and development of systems, rather than treating them as an afterthought.

article thumbnail

Building cyber resiliency for your data with IBM FlashSystem

IBM Big Data Hub

To combat these ever-growing risks, the concept of cyber resiliency has gained significant importance. Cyber resiliency goes beyond mere cybersecurity measures. Their expertise in developing secure systems ensures that proactive defense measures are in place. Interested in receiving a free cyber preparedness evaluation?

Risk 78
article thumbnail

Pace of Tech Demands a Smarter Learning Approach. Bring On Community-Driven Learning

CIO Business Intelligence

Other companies try to jump-start knowledge by bringing in consultants, but this risks only temporarily plugging the gaps. They recognize the wealth of knowledge held by individuals in their teams, and create an agile, natural process to share this knowledge via hands-on workshops.

article thumbnail

What IT leaders from BlackBerry, CN and Microsoft Canada and more predict for the future of InfoSec

CIO Business Intelligence

Gathering security executives from a variety of industries across Canada, the summit will focus on mitigating risk and building market trust. Joining McClurg on the opening day are seasoned information security leaders including Michael Castro, risk executive advisor and founder of RiskAware Inc.,

IT 98
article thumbnail

Proposals for model vulnerability and security

O'Reilly on Data

Like many others, I’ve known for some time that machine learning models themselves could pose security risks. An attacker could use an adversarial example attack to grant themselves a large loan or a low insurance premium or to avoid denial of parole based on a high criminal risk score. Newer types of fair and private models (e.g.,

Modeling 241