Goodreads helps you follow your favorite authors. Be the first to learn about new releases!
Start by following Stephane Nappo.
Showing 1-30 of 32
“Technology trust is a good thing, but control is a better one.”
―
―
“It takes 20 years to build a reputation and few minutes of cyber-incident to ruin it.”
―
―
“The five most efficient cyber defenders are: Anticipation, Education, Detection, Reaction and Resilience. Do remember: "Cybersecurity is much more than an IT topic.”
―
―
“One of the main cyber-risks is to think they don’t exist. The other is to try to treat all potential risks.
Fix the basics, protect first what matters for your business and be ready to react properly to pertinent threats. Think data, but also business services integrity, awareness, customer experience, compliance, and reputation.”
―
Fix the basics, protect first what matters for your business and be ready to react properly to pertinent threats. Think data, but also business services integrity, awareness, customer experience, compliance, and reputation.”
―
“Cyber resilience is much more than a matter of technology. Agility, balance and high level view are indispensable...”
―
―
“If you think you know-it-all about cybersecurity, this discipline was probably ill-explained to you.”
―
―
“Threat is a mirror of security gaps. Cyber-threat is mainly a reflection of our weaknesses. An accurate vision of digital and behavioral gaps is crucial for a consistent cyber-resilience.”
―
―
“Digital freedom stops where that of users begins... Nowadays, digital evolution must no longer be offered to a customer in trade-off between privacy and security. Privacy is not for sale, it's a valuable asset to protect.”
―
―
“The Internet of Things (IoT) devoid of comprehensive security management is tantamount to the Internet of Threats.
Apply open collaborative innovation, systems thinking & zero-trust security models to design IoT ecosystems that generate and capture value in value chains of the Internet of Things.”
―
Apply open collaborative innovation, systems thinking & zero-trust security models to design IoT ecosystems that generate and capture value in value chains of the Internet of Things.”
―
“The status-quo habits for 'grandfathered' vulnerabilities do not legitimize them.”
―
―
“Like a lighthouse in a restless sea, cybersecurity shines not by predicting storms, but by facing the unexpected.”
―
―
“Even one unhandled misconfiguration can dwindle the whole organization's security level.”
―
―
“Ideas are easy, implementation is hard. Startups cope with failure to pave the way of future. We must commend this entrepreneurial courage...”
―
―
“Rather than fearing or ignoring cyber attacks, do ensure your cyber resilience to them.”
―
―
“At a boardroom or at a 'nuke proof' datacenter, a Chief Information Security Officer 2.0 participates in creating and protecting the digital value. The role of a CISO evolves from a ´policeman of computers´ to a ´dietician of risk appetite´. For success in digital transformation, turn the comprehensive risk management and cybersecurity into key business differentiators.”
―
―
“Education has always been a profit-enabler for individuals and the corporation. Education, both conception and delivery, must evolve quickly and radically to keep pace with digital transition. Education is a part of the digital equation.”
―
―
“The main element you cannot delegate to your cloud service provider is your responsibility for security, compliance and customer trust.”
―
―
“Even the bravest cyber defense will experience defeat when weaknesses are neglected.”
―
―
“Considering artificial intelligence can checkmate human intelligence, make AI an ally, not an enemy.”
―
―
“The equilibrium between freedom and security must never sacrifice one for the other.”
―
―
“Human vs AI competition is delusion. It is like a farmer rivalling a combine-harvester. The question is: who drives, and what we reap.”
―
―
“Test and iteration are the two wings of innovation. When it comes to AI practical implementation, they turn ideas into reality and failures into lessons learned. Testing and iterating helps to find a way forward in Artificial Intelligence adoption.”
―
―
“One of the main AI challenges lies in conjugating safety and efficiency. Equilibrium between AI ethics and performance will forge our future.”
―
―
“Spend time with your AI candidate/s before using it/them in real mode. "Your future AI tools have to pass an interview for the job". This important step must be based on clear use cases, with the involvement of relevant business representatives.
'Technology trust is a good thing, however control is a better one...”
―
'Technology trust is a good thing, however control is a better one...”
―
“Communication is key to success in relationship and knowledge sharing. When it comes to AI, communication is key to demystify fears, address risks, and create positive value.”
―
―
“The true danger lies less in AI thinking like human, than human adopting an AI way of thinking.”
―
―
“In cybersecurity, luck is forged by preparation. Only the inevitable should rest in the hands of chance.”
―
―
“Cybersecurity is a condition of existence, not a feature. It is not something you 'add' once value is created. Without Cybersecurity there is no trust, no continuity, no sovereignty of decision.”
―
―
“AI reliability and accuracy depend on goal, truth and context.
Benjamin Franklin said "Remember not only to say the right thing in the right place, but far more difficult still, to leave unsaid the wrong thing at the tempting moment."
This emphasizes the importance of both accuracy in AI answers and reliability in our human actions.”
―
Benjamin Franklin said "Remember not only to say the right thing in the right place, but far more difficult still, to leave unsaid the wrong thing at the tempting moment."
This emphasizes the importance of both accuracy in AI answers and reliability in our human actions.”
―
“Any organization that treats cybersecurity as a cost is structurally fragile.”
―
―
