What Happens When CISOs Don’t Have Final Purchasing Authority? Taking IT to the Next Normal with Future IT Why Financial Institutions Should Treat Cryptocurrencies as an Opportunity Breach Attack and Simulation: A Critical Tool to Test the Efficacy of Security Controls New Missions at the Government Edge: Channeling Citizen Services with Local Precision The Importance of Being Able to Read the (Board)Room Confidential Computing in the Public Cloud: Why Should You Protect Data-in-Use for Privacy & Trust? Will Economic Growth & Consumer Confidence Threaten Consumer Tech Spend? Every Path Has Its Puddles: Improving Enterprise Intelligence with a Data Control Plane