article thumbnail

Protecting your digital transformation from value erosion

CIO Business Intelligence

It’s important to clearly identify what value you’re expecting to get from your partners against the price you’re paying, as well as the risk you’re taking on as a client. It’s reasonable to assume that with decades of experience in large business and IT transformations, the overall related risks would diminish.

article thumbnail

Modernizing applications: the importance of reducing technical debt

CIO Business Intelligence

The government and Congress are taking notice of unfair consumer experiences, and it is crucial for businesses to address their technical debt and minimize the risk of negative press, government fines, and damaged reputations. What is technical debt?

Risk 98
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Why you should care about debugging machine learning models

O'Reilly on Data

1] This includes C-suite executives, front-line data scientists, and risk, legal, and compliance personnel. These recommendations are based on our experience, both as a data scientist and as a lawyer, focused on managing the risks of deploying ML. 4] Fairwashing: The Risk of Rationalization , How Can We Fool LIME and SHAP?

article thumbnail

5 best practices to successfully implement gen AI

CIO Business Intelligence

Even if you’re well into implementation on several use cases, an innovation workshop can be a great way to get end users to brainstorm and prioritize use cases. For AI and other areas, a corporate use policy can help educate users to potential risk areas, and hence manage risk, while still encouraging innovation.

ROI 124
article thumbnail

Elevate Your Protection Strategy at CSO’s Future of Cybersecurity Summit

CIO Business Intelligence

Pick up strategies for a creating a world-class cybersecurity center during an interactive workshop with Kathryn Knerler, MITRE Labs department manager and senior principal cybersecurity architect, and Ingrid Parker, manager of intelligence at Red Canary. One risk mitigation strategy is to move away from passwords to more secure protocols.

Strategy 124
article thumbnail

Upskilling ramps up as gen AI forces enterprises to transform

CIO Business Intelligence

Generative AI systems carry a lot of risk for enterprises,” he says. There are risks around hallucinations, and the fact they’re black boxes in nature. And then there are the legal risks.” After the training workshop was over, we still put them on retainer so we can reach out to them with real-world projects,” he says.

article thumbnail

Dashboards for 10-Year-Olds: Connecting Data to Students’ Lived Experience

Depict Data Studio

Graphs showing means (or even means of means) risks becoming too abstract without the right supports. While participating in a workshop he led, a couple of techniques we were using came together. The work so far has been an enjoyable way to explore data and apply the many things I’ve learned in Ann’s workshops and elsewhere.