Your IT solution has compromised user information. How will you handle the breach of data privacy?
-
Michael Shost, PMI PMP, ACP, RMP, CEH, SPOC, SA, PMO-FOð Visionary PMO Leader & AI/ML/DL Innovator | ð Certified Cybersecurity Expert & Strategic Engineer | ð ï¸â¦
-
Siddhant O.89X LinkedIn Top Voice | Top PM Voice | Top AI & ML Voice | SDE | MIT | IIT Delhi | Entrepreneurship | Full Stack |â¦
-
Sabhareeshwaran SSenior Officer IT - Security & Governance@DvaraKGFS Information Security & Cyber Securityâ¦