George Njuguna (@j0rgetiller) 's Twitter Profile
George Njuguna

@j0rgetiller

InfoSec || Governance Risk & Compliance || Business Continuity || Data Privacy & Protection || DPO || Cloud Security || Project Management || Mentor || Trainer

ID: 1393558130097901571

calendar_today15-05-2021 13:25:48

188 Tweet

360 Takipçi

1,1K Takip Edilen

George Njuguna (@j0rgetiller) 's Twitter Profile Photo

Have budget left in Q4 that you’re looking to put to great use? Learn about ISACA enterprise training in this Q&A interview with Thomas Phelps and how it can make your team more cohesive and effective heading into the new year. sprou.tt/1wqIkHmO1Ku

George Njuguna (@j0rgetiller) 's Twitter Profile Photo

#WorldQualityMonth: CMMI helps you build and benchmark the processes that drive perpetual innovation and improvement. Find out how it’s done: sprou.tt/16HMNpnrERg.

George Njuguna (@j0rgetiller) 's Twitter Profile Photo

Fighting cyber threats with limited budgets is a continual problem, ISACA's 2024 State of Cybersecurity research found - and one that wont be solved soon. Read the insights in the free report: sprou.tt/1R9DB65BG6H

George Njuguna (@j0rgetiller) 's Twitter Profile Photo

Would a better understanding of #machinelearning and #deeplearning technologies help advance your career? Find out about ISACA’s new training courses in this ISACA Now blog post: sprou.tt/1cQdNMS9pVv

George Njuguna (@j0rgetiller) 's Twitter Profile Photo

While many expect a cyberattack in the coming year, less are confident that their team will detect and respond well. Learn more from ISACA's 2024 State of Cybersecurity report: sprou.tt/1NSByBDCdZp

George Njuguna (@j0rgetiller) 's Twitter Profile Photo

If you missed the #AMA featuring cybersecurity expert and AI ethics researcher Pablo Ballarin, check out a valuable event recap on ISACA's blog:  sprou.tt/1MnGHMz2R0R.

George Njuguna (@j0rgetiller) 's Twitter Profile Photo

Zero Trust makes sense as an approach to cybersecurity, but the term itself is unhelpful and needs a reboot, writes Julie Chatman. Agree? Share your thoughts below! sprou.tt/1XHuiEwevbY

George Njuguna (@j0rgetiller) 's Twitter Profile Photo

🆕 New! Tackle your AI systems governance with the comprehensive, flexible #COBIT framework. ISACA's white paper - free for members - tells you how: sprou.tt/1jf0nMSM9wl

George Njuguna (@j0rgetiller) 's Twitter Profile Photo

Risk professionals now have more on their plates than ever. With that in mind, ISACA blog author Mary Carmichael has five suggestions for how risk pros can be more efficient on the job. Read now: sprou.tt/1prQwO9tFQv

George Njuguna (@j0rgetiller) 's Twitter Profile Photo

Just dropped: The She Said Privacy/He Said Security Podcast featuring ISACA Board Vice Chair Niel Harper and ISACA Privacy Professional Practices Principal Safia Kazi. Check it out on YouTube or it where you get your podcasts: sprou.tt/1dlTvpCEOeb

CIO Africa by dx5ve (@dx5ve) 's Twitter Profile Photo

Next on stage we have this Panel Discussion on– Cybersecurity for Digital Government: Risk, Trust & Resilience As governments digitize, the stakes grow higher. Cyber resilience isn’t optional — it’s the foundation of trust, safety, and national security. #SmartGovSummit2025

Next on stage we have this Panel Discussion on– Cybersecurity for Digital Government: Risk, Trust & Resilience
As governments digitize, the stakes grow higher. Cyber resilience isn’t optional — it’s the foundation of trust, safety, and national security.
#SmartGovSummit2025
CIO Africa by dx5ve (@dx5ve) 's Twitter Profile Photo

Last week we hade the great pleasure of Hosting tech visionaries and industry professionals at the #SmartGovSummit 2025 edition and What an incredible day it was! 🙌 This year’s summit truly reflected the momentum behind digital transformation in government. A huge thank you to

Last week we hade the great pleasure of Hosting tech visionaries and industry professionals at the #SmartGovSummit 2025 edition and What an incredible day it was! 🙌 This year’s summit truly reflected the momentum behind digital transformation in government. A huge thank you to
George Njuguna (@j0rgetiller) 's Twitter Profile Photo

With increasing cyberattack complexity, automation is essential for effective incident response. Blog author Eugene Leow shares six steps for integrating automation: sprou.tt/1D2lENgAYoA #ISACA