Less sophisticated AI models are just OK for regular use, reducing the cost. In many cases, self-hosted open source models could actually be good enough for many use cases. This articles shows research from Epoch AI, a non-profit organization. Two … Continue reading →| Rafeeq Rehman | Cyber Security | Board Advisory
The field of artificial intelligence is rapidly evolving, bringing with it both exciting innovations and new challenges. As AI systems become more complex and integrated into corporate applications, effectively managing their security is more critical than ever. To help navigate … Continue reading →| Rafeeq Rehman | Cyber Security | Board Advisory
Influence isn’t about being in charge—it’s about being the type of leader who inspires and motivates others to do their best work. By focusing on your values, communication skills, and ability to connect with others, you’ll be well-positioned to make … Continue reading →| Rafeeq Rehman | Cyber Security | Board Advisory
Many individuals outside the realm of cybersecurity often underestimate the intricacies involved in a security professional’s role. Since its inception in 2012, the CISO MindMap has served as a valuable educational resource, offering insights into CISO responsibilities and aiding security professionals in crafting and enhancing their security programs. Continuously adapting to reflect the evolving landscape of cybersecurity, the CISO MindMap has been updated to accommodate the latest develo...| Rafeeq Rehman | Cyber Security | Board Advisory
In the realm of information security, the quest to effectively manage risk is paramount. However, amidst the myriad of frameworks available, distinguishing between those explicitly designed for risk management and those that serve as broader guidelines can be a daunting … Continue reading →| Rafeeq Rehman | Cyber Security | Board Advisory
Many individuals outside the realm of cybersecurity often underestimate the intricacies involved in a security professional’s role. Since its inception in 2012, the CISO MindMap has served as a valuable educational resource, offering insights into CISO responsibilities and aiding security … Continue reading →| Rafeeq Rehman | Cyber Security | Board Advisory
While responsibilities of leaders in information security are very extensive as shown in the CISO MindMap, following are seven foundational and “must-have” capabilities that every information security program should have. If any of these capabilities is missing, the first priority … Continue reading →| Rafeeq Rehman | Cyber Security | Board Advisory