Cloud consultant and certified educator Kevin Tuei joins Dr. Joseph to discuss AI regulatory leadership in the U.S. and what that should look like.
Connect with our guest, Kevin TueiKevin Tuei
========================================
HAVE A CUP OF COFFEE WITH US AND SUBSCRIBE!
========================================
YouTube: https://buff.ly/3ui9ezK
Spotify:https://buff.ly/3Sw5HG8
Apple Podcast: https://buff.ly/3SsfoFI
Google Podcast: https://buff.ly/3UuCxtx
=========================================
CONNECT WITH THE GUYS!
=========================================
Dr. Joseph https://www.linkedin.com/in/drjjbmj/
Alfredzo https://www.linkedin.com/in/alfredzonash/
Cyber Coffee Hour on LinkedIn https://www.linkedin.com/company/cyber-coffee-hour-podcast/
==========================================
Question: What are some gaps you currently see with AI regulations?
==========================================
Disclaimer: The views, opinions, and thoughts are of the Cyber Coffee Hour and not those of our employers, personal or professional relationships.
Timecodes
00:00 - Intro
00:48 - Kevin Tuei Bio and welcome to the show
04:30 - Discussion of the AI Regulatory Leadership article
32:35 - Learning about Kevin
43:40 - Kevin shares the impact cybersecurity made on his life
50:27 - Apologies! Loss of Audio
58:22 - Outro
The Cyber Coffee Hour comprises Dr. Joseph J. Burt-Miller Jr. and Alfredzo B. Nash Jr. They are two cyber experts from Mount Vernon, NY, who love a good cup of coffee and conversation. They have surveyed the cyber podcast landscape and wanted to see a change. For shows featuring the CIOs, CISOs, and CTOs of the world, the perspective of those getting started in their journey must be emphasized.
The mission of the Cyber Coffee Hour intentionally features guests of all stages of the cyber journey. Still, it prioritizes the voices undergoing gatekeeping, racism, and other biases while trying to make their way into the cybersecurity practicum. The Cyber Coffee Hour uniquely spreads the cybersecurity gospel by featuring guests with and without a cybersecurity background, with cybersecurity as the common denominator.