{"id":4820,"date":"2025-09-12T14:56:12","date_gmt":"2025-09-12T14:56:12","guid":{"rendered":"https:\/\/cybersecurityinfocus.com\/?p=4820"},"modified":"2025-09-12T14:56:12","modified_gmt":"2025-09-12T14:56:12","slug":"enabling-agentic-ai-why-data-strategy-is-now-business-strategy","status":"publish","type":"post","link":"https:\/\/cybersecurityinfocus.com\/?p=4820","title":{"rendered":"Enabling Agentic AI: Why Data Strategy Is Now Business Strategy"},"content":{"rendered":"<p>In this episode of eSpeaks, host Corey Noles explores \u201cEnabling Agentic AI: Why Data Strategy Is Now Business Strategy\u201d with Abhi Visuvasam, Field CTO of Enterprise Architecture and Solutions at Reltio. The conversation unpacks what agentic AI means, why strong data foundations are essential, and how leaders can mitigate business risks while unlocking new opportunities. From governance and architecture pitfalls to near-term investment priorities and a pragmatic 90-day roadmap, the discussion offers executives a clear view of how data readiness directly shapes AI success.<\/p>\n<div class=\"wp-block-embed__wrapper\">\n<div class=\"youtube-embed\"><\/div>\n<\/div>\n<p>The post <a href=\"https:\/\/www.eweek.com\/artificial-intelligence\/agentic-ai-data-business-strategy\/\">Enabling Agentic AI: Why Data Strategy Is Now Business Strategy<\/a> appeared first on <a href=\"https:\/\/www.eweek.com\/\">eWEEK<\/a>.<\/p>","protected":false},"excerpt":{"rendered":"<p>In this episode of eSpeaks, host Corey Noles explores \u201cEnabling Agentic AI: Why Data Strategy Is Now Business Strategy\u201d with Abhi Visuvasam, Field CTO of Enterprise Architecture and Solutions at Reltio. The conversation unpacks what agentic AI means, why strong data foundations are essential, and how leaders can mitigate business risks while unlocking new opportunities. [&hellip;]<\/p>\n","protected":false},"author":0,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[2],"tags":[],"class_list":["post-4820","post","type-post","status-publish","format-standard","hentry","category-news"],"_links":{"self":[{"href":"https:\/\/cybersecurityinfocus.com\/index.php?rest_route=\/wp\/v2\/posts\/4820"}],"collection":[{"href":"https:\/\/cybersecurityinfocus.com\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/cybersecurityinfocus.com\/index.php?rest_route=\/wp\/v2\/types\/post"}],"replies":[{"embeddable":true,"href":"https:\/\/cybersecurityinfocus.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=4820"}],"version-history":[{"count":0,"href":"https:\/\/cybersecurityinfocus.com\/index.php?rest_route=\/wp\/v2\/posts\/4820\/revisions"}],"wp:attachment":[{"href":"https:\/\/cybersecurityinfocus.com\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=4820"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/cybersecurityinfocus.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=4820"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/cybersecurityinfocus.com\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=4820"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}