Marco Casassa Mont
@marcocasassamont.bsky.social
37 followers 23 following 180 posts
BMT Fellow (cyber) | Principal Cyber Security Consultant | Architect | CISM, CISSP, CCSP, IEEE, CIISec, MSc, BSc | Innovation, Strategy, Digital Transformation, Technology, AI | Cloud, Enterprise | Leadership, Management
Posts Media Videos Starter Packs
marcocasassamont.bsky.social
A wake-up call for orgs not only to enforce robust AI Governance policies, processes and procedures (for anything generated by GenAI/LLM, from text to code) but also to persist with traditional QA checks ...
-
www.theregister.com/2025/10/06/d... #Deloitte #GenAI #LLM #hallucinations #QA
Deloitte refunds Australian government over AI in report
: Big Four consultancy billed Canberra top dollar, only for investigators to find bits written by a chatbot
www.theregister.com
marcocasassamont.bsky.social
Insightful and compelling BBC article on the true extent of cyber attacks on UK business and the weak spots that allow them to happen ...
www.bbc.co.uk/news/article... #BBC #cybersecurity #cyberhacking #cyberattacks #costs #supplychain #vulnerabilities
The true cost of cyber hacking on businesses
Are this year's major attacks the
www.bbc.co.uk
marcocasassamont.bsky.social
Yet again another great, free, very informative ISC2 webinar by Steve Piper, this time focusing on the dual role of AI for Cyber Defence and Cyber Offence and tips on how to prepare for AI Threats ...
www.brighttalk.com/webcast/260/... #ISC2 #cybersecurity #AI #CyberDefence #CyberOffence
From Shield to Spear: How AI is Reshaping Cyber Defense and Offense
The rise of artificial intelligence in cybersecurity is both a blessing and a curse. AI is redefining the cybersecurity battlefield, offering unprecedented advantages for security teams and threat act...
www.brighttalk.com
marcocasassamont.bsky.social
Very timely study providing additional evidence about the cyber risks of downloading and using third parties' AI models. On the importance of investing in AI Security Governance
www.helpnetsecurity.com/2025/10/03/r... #AI #AIModels #Risks #cybersecurity #SupplyChainAttacks #AISecurityGovernance
When loading a model means loading an attacker - Help Net Security
Attackers can hide malicious code in shared machine learning models. Learn how to manage machine learning model security and protect systems.
www.helpnetsecurity.com
marcocasassamont.bsky.social
On FICO’s approach to AI risk and their foundation model that scores every output for accuracy and compliance ...
-
venturebeat.com/ai/ficos-ans...
#FICO #AI #RiskModelling #Compliance #Trust
venturebeat.com
marcocasassamont.bsky.social
It has been a pleasure and an honour to attend the first BMT Fellows Conference. A great opportunity to: meet other BMT Fellows, colleagues and Customers; discuss strategic business and R&D topics. Thanks #BMT #BMTFellows #Conference #Business #Customers #cybersecurity
marcocasassamont.bsky.social
Very relevant paper. These findings are of key importance when using these tools for cyber defence purposes ...
-
www.theregister.com/2025/09/17/o... #AI #Hallucination #ModelLimitations #Incentives #LLM #CyberDefence
OpenAI says models trained to make up answers
: Even a wrong answer is right some of the time
www.theregister.com
marcocasassamont.bsky.social
FYI - 'The UK's Home Office is offering £1.3 million ($1.7 million) to developers of age-determining software - a tech it wants to deploy widely across its systems'
-
www.theregister.com/2025/09/09/h... #HomeOffice #AgePrediction #Algorithms #cybersecurity
Home Office to spend £1.3M on age-determining algorithm
: Contract tender follows 'alarming' safeguarding failure at border with undocumented kids
www.theregister.com
marcocasassamont.bsky.social
Relevant and valuable initiative. I am interested in understanding how the cyber scientific community will react to it and the effectiveness of this stakeholder-based ethics analysis
-
www.helpnetsecurity.com/2025/09/08/c... #cybersecurity #Research #EthicsRules #USENIX #IEEE #ACM
Cybersecurity research is getting new ethics rules, here's what you need to know - Help Net Security
Cybersecurity research ethics is required at top conferences. A guide helps researchers balance innovation, risk, stakeholder responsibility.
www.helpnetsecurity.com
marcocasassamont.bsky.social
Yet another example of how IT- based cyber attacks can have a major impact on people, manufacturing and physical processes ...
-
www.bbc.com/news/article... #cybersecurity #cyberattack #ITOT #impact #people #processes #technology
Jaguar Land Rover staff to stay at home after cyber attack
The company continues the complex work of restoring its systems after the cyber attack at the weekend.
www.bbc.com
marcocasassamont.bsky.social
Relevant, though-provoking article about new opportunities introduced by Agentic AI, risks for unprepared organisations and coming challenges for CISOs and their security teams ...
- www.csoonline.com/article/4047...
#AgenticAI #cybersecurity #risks #opportunities #CISO
Agentic AI: A CISO’s security nightmare in the making?
Autonomous, adaptable, and interconnected, agentic AI systems are both a productivity and a cybersecurity risk multiplier. To secure their activity, traditional security models might not be enough.
www.csoonline.com
marcocasassamont.bsky.social
Cloud repatriation is indeed happening, in favour of federated, hybrid, on-prem data architectures. This is particularly true in the security domain #Cloud #CloudRepatriation #cybersecurity #AI #trends insight.scmagazineuk.com/enterprises-...
Enterprises Opt for Secure On-Prem Data as They Count the Cost of Cloud
insight.scmagazineuk.com
marcocasassamont.bsky.social
On GenAI and the potentially widening "trough of disillusionment" ...

'MIT NANDA study finds only 5 percent of organizations using AI tools in production at scale'

www.theregister.com/2025/08/18/g... #GenAI #MIT #NANDA #ROI
Generative AI does nothing for 95 percent of companies
: MIT NANDA study finds only 5 percent of organizations using AI tools in production at scale
www.theregister.com
marcocasassamont.bsky.social
Great, very informative @ISACANews webinar on 'Building and Scaling a Modern Enterprise Risk Program. A reminder of key concepts and processes ...
store.isaca.org/s/community-...
#Cybersecurity #EnterpriseRiskManagement #ISACA
marcocasassamont.bsky.social
That's indeed the direction Enterprise Architecture has taken in many work activities I am involved in and, specifically, in the strategic domain of cyber security ...
-
www.cio.com/article/4043... #Enterprise #Architecture #cybersecurity
Architecting the next decade: Enterprise architecture as a strategic force
If you still think enterprise architecture is paperwork and blueprints, you’re already behind — it’s now the engine of digital survival.
www.cio.com