Jo Peterson (@cleartechtoday) 's Twitter Profile
Jo Peterson

@cleartechtoday

Engineer who helps clients scope, source and vet solutions in #Cloud, #CloudSecurity, #AIsecurity #Cybersecurity |Tech Analyst| USAF Vet|

ID: 3497268500

linkhttps://www.linkedin.com/in/jopeterson1 calendar_today08-09-2015 21:45:16

75,75K Tweet

63,63K Followers

39,39K Following

Kirk Borne (@kirkdborne) 's Twitter Profile Photo

Your personal financial assistant is here! No more spreadsheets! Announcing Taka — dynamic canvas and intuitive visuals that make complex financial insights effortless. You can speak or chat with Taka, the #AI Personal #CFO, to ask personalized #finance questions to

Jo Peterson (@cleartechtoday) 's Twitter Profile Photo

📌Headed to #ExtremeConnect2025 in Paris May 19-22nd? Expect a mix of educational sessions, hands-on demos, and networking opportunities, with a focus on cloud networking, AI, security, and enterprise connectivity.  Key aspects of Extreme Connect 2025 in Paris: 🇫🇷 Learning

📌Headed to #ExtremeConnect2025 in Paris May 19-22nd? 

Expect a mix of educational sessions, hands-on demos, and networking opportunities, with a focus on cloud networking, AI, security, and enterprise connectivity. 

Key aspects of Extreme Connect 2025 in Paris: 

🇫🇷 Learning
Jo Peterson (@cleartechtoday) 's Twitter Profile Photo

📌 Day 1 #AISecurity—Data Privacy and Protection AI security involves protecting AI data, maintaining system integrity, and ensuring the availability of AI services. It addresses both the security of AI systems themselves and the use of AI to enhance cybersecurity. Key

Jo Peterson (@cleartechtoday) 's Twitter Profile Photo

The Move to a Centralized, Organizational Approach to Public Cloud Did you know that as of August 2024, nearly 96% of companies use at least one public cloud to run their business, with half of their workload maintained on public clouds. In fact, Gartner reports that 51% of IT

Jo Peterson (@cleartechtoday) 's Twitter Profile Photo

📌 Day 2–#AISecurity—System Integrity and Reliability AI security involves protecting AI data, maintaining system integrity, and ensuring the availability of AI services. It addresses both the security of AI systems themselves and the use of AI to enhance cybersecurity.

Jo Peterson (@cleartechtoday) 's Twitter Profile Photo

📌 Headed to Paris for #ExtremeConnect May 19th-22nd Weather will be mostly sunny 😎 and 70 degrees Fahrenheit I may need the following; 🇫🇷 Des lunettes de soleil 🇫🇷 Le parapluie 🇫🇷 Le cardigan What am I bringing along? Cc: Extreme Networks #network #networksecurity

📌 Headed to Paris for #ExtremeConnect May 19th-22nd

Weather will be mostly sunny 😎 and 70 degrees Fahrenheit 

I may need the following;

🇫🇷 Des lunettes de soleil
🇫🇷 Le parapluie 
🇫🇷 Le cardigan

What am I bringing along?

Cc: <a href="/ExtremeNetworks/">Extreme Networks</a> 

#network #networksecurity
Jo Peterson (@cleartechtoday) 's Twitter Profile Photo

📌 Day 3–#AISecurity—Threat Detection and Prevention AI security involves protecting AI data, maintaining system integrity, and ensuring the availability of AI services. It addresses both the security of AI systems themselves and the use of AI to enhance cybersecurity. AI can

Jo Peterson (@cleartechtoday) 's Twitter Profile Photo

📌 Q: What’s the difference between #AISecurity and #AICompliance? A: AI security and AI compliance are distinct but related aspects of ensuring responsible and trustworthy AI systems. AI security focuses on protecting AI models, data, and infrastructure from cyber threats,

Jo Peterson (@cleartechtoday) 's Twitter Profile Photo

📌 Q: Why is compliance an important component of #AISecurity? A: AI compliance ensures that AI systems adhere to relevant laws and regulations. Here are 4 components of compliance as it relates to AISecurity 🤖Adhering to Regulations: AI compliance ensures that AI systems

Jo Peterson (@cleartechtoday) 's Twitter Profile Photo

📌 Q: Why are ethical AI practices an important component of #AISecurity? A: Ethical AI practices are crucial to AI security because they help prevent biases, ensure transparency, and protect privacy, all of which can create vulnerabilities in AI systems. By prioritizing

Jo Peterson (@cleartechtoday) 's Twitter Profile Photo

📌 Q: Why are transparency and accountability an important part of #AISecurity? A: Transparency and accountability are crucial components of AI security for several interconnected reasons 🤖Building Trust and Understanding 🤖Identifying and Mitigating Risks 🤖Ensuring

Jo Peterson (@cleartechtoday) 's Twitter Profile Photo

📌 Q: What is one of the ways you secure #AgenticAI resources and infrastructure? A: One of the ways you secure #AgenticAI resources and infrastructure is to inventory and govern AI assets. Establish a centralized inventory of all AI models, services, and infrastructure to

Jo Peterson (@cleartechtoday) 's Twitter Profile Photo

📌 Headed to Las Vegas for Zenith Live? I'll be there 6/2-6/5 Zscaler embraces a Zero Trust ethos in its approach to cybersecurity protection. "Keep Calm and Zero Trust" is a reminder to stay calm and focused on implementing a strong security strategy that continuously

📌 Headed to Las Vegas for Zenith Live?  I'll be there 6/2-6/5

<a href="/zscaler/">Zscaler</a>  embraces a Zero Trust ethos in its approach to cybersecurity protection.

"Keep Calm and Zero Trust" is a reminder to stay calm and focused on implementing a strong security strategy that continuously
Jo Peterson (@cleartechtoday) 's Twitter Profile Photo

📌 Q: What’s the best way to secure #AIPlatforms in #AgenticAI use cases? A: To best secure AI platforms in agentic AI use cases, a multi-layered approach focusing on both build-time and runtime security is crucial. This includes implementing guardrails through code, not just

Jo Peterson (@cleartechtoday) 's Twitter Profile Photo

📌 Join me for the June edition of BrightTALK's Cloud Cover Topic: The Data Fabric Bridge When: June 11th Time: 12 PM EST Register here: 👉 brighttalk.com/webcast/19985/… What do we mean when we say “data fabric?” Data fabric is an architecture that can bridge cloud and edge

📌 Join me for the June edition of BrightTALK's Cloud Cover

Topic:  The Data Fabric Bridge

When:  June 11th

Time:  12 PM EST

Register here: 👉  brighttalk.com/webcast/19985/…

What do we mean when we say “data fabric?” 

Data fabric is an architecture that can bridge cloud and edge
Jo Peterson (@cleartechtoday) 's Twitter Profile Photo

📌 Q: What workload specific controls are needed to secure #AgenticAI? A: Securing agentic AI with workload-specific controls involves tailoring security measures to the unique characteristics and risks associated with each AI agent and its specific tasks. In essence,

Jo Peterson (@cleartechtoday) 's Twitter Profile Photo

📌 Q: How do you ensure that data used by AI workloads is appropriately segmented and matched to sensitivity and access requirements? A: To ensure data used by AI workloads is appropriately segmented and matched to the sensitivity and access requirements consider: 🐈 Data

Jo Peterson (@cleartechtoday) 's Twitter Profile Photo

📌 Q: From a threat detection and prevention perspective, what types of threats can AI detect and mitigate? A: AI excels at detecting and mitigating a wide range of cyber threats, including malware, phishing, and insider threats, as well as more complex attacks like advanced

Jo Peterson (@cleartechtoday) 's Twitter Profile Photo

📌 Q: What’s the most effective way to control data access within AI workloads? A: The most effective way to control data access for AI workloads is through a combination of access controls, data boundaries, and security best practices, particularly least privilege access and