Page 4 - Cyber Defense eMagazine April 2023
P. 4

Strengths  and  Vulnerabilities  of  AI  Applications  to  Health  Care  and  the  Protection  of  PHI,
            including Implications for the Confidentiality of the Doctor-Patient Relationship ................. 60

            By Edward Maule, Chief Information Officer and Chief Information Security Officer at Advocare, LLC

            2023 Predictions.................................................................................................................... 64

            By Anurag Gurtu, Chief Product Officer at Strike Ready

            A CEO’s Guide to Not Becoming the Next Cyberattack Headline ........................................... 66

            By Sheetal Pansare, President & Global CEO of Futurism Technologies

            Advancements in AI Cybersecurity: Leveraging ChatGPT to Stay Ahead of Cyber Criminals  72

            By Brian Sathianathan, Co-Founder and CTO of Iterate.ai

            Blockchain Startups Are Drawing Substantial Venture Capital Funding ................................ 75

            By Mohit Shrivastava, ICT Chief Analyst at Future Market Insights

            Collaboration is Key to Building Industrial Cyber Resilience.................................................. 81

            By Filipe Beato, Cyber Resilience Lead at the World Economic Forum`s Centre for Cybersecurity and Natasa
            Perucica, Research and Analysis Specialist at the World Economic Forum`s Centre for Cybersecurity

            SAP Debugger’s Power and Danger ....................................................................................... 87

            By Christoph Nagy, CEO of SecurityBridge

            SIEM for SAP - Log Evaluation to Attack Detection ............................................................... 90

            By Christoph Nagy, CEO of SecurityBridge

            The Cybercrime Blame Game: It’s Time to Unite the Industry Against a Common Enemy. .... 93

            By Brendan Kotze, Chief Executive Officer at Encore

            Cyber Attack as an Asymmetric Threat ................................................................................. 96

            By Milica D. Djekic, Independent Researcher

            Understanding The Concept of Privacy By Design ............................................................... 104
            By Danijela Obradovic, Lawyer at Roberts & Obradovic


            The Data Challenge: How to Map Data in A Distributed World ............................................. 108

            By Dotan Nahum, Head of Developer-First Security at Check Point Software Technologies



                                                                                                               4
   1   2   3   4   5   6   7   8   9