
Noah Haimov
Data Governance LeadAt the 2024 E-Scrap Conference in Orlando, Bob Johnson brought attention to a pressing but often overlooked issue in the IT asset disposition (ITAD) sector: the risks associated with clients' non-compliance in IT hardware asset management. Despite ITAD providers generally being more secure and compliant than their clients, Johnson expressed
In the ever-evolving landscape of the financial sector, the concept of tail-risk management has gained significant attention. Tail risks, though rare, can have catastrophic impacts on financial institutions and the global economy. The recent global pandemic, financial crises, and climate change events have underscored the importance of being
Generative AI is fundamentally transforming how organizations defend against cyber threats, creating both new vulnerabilities and unprecedented opportunities for protection. Ensuring robust cybersecurity measures is more crucial than ever to protect organizations, governments, and nations from digital threats. As our dependence on digital
iGA Istanbul Airport, a pivotal global aviation hub strategically located at the crossroads of Europe and Asia, has demonstrated a dynamic commitment to sustainability, both environmentally and socially, as highlighted in its 2023 Sustainability Report. The report not only underscores the airport's remarkable achievements but also outlines future
In today's rapidly evolving socio-political and economic landscape, board members face unprecedented reputational risks. These risks are magnified by the dynamic nature of Environmental, Social, and Governance (ESG) issues. With historical parallels to the Directors & Officers (D&O) liability crisis of the 1980s, the current climate necessitates
Port forwarding is a widely used networking technique that allows incoming traffic on a specific port number to be redirected to a particular device or application within a local network. While it offers convenience by enabling external access to internal devices, it also introduces significant cybersecurity risks. Unauthorized access, data