Remove Business Continuity Remove Disaster Recovery Remove Government Remove Information Security
article thumbnail

Strong Business Continuity Management Brings Resilience

CIO Business Intelligence

Business disruptions happen every day and can cause companies to lose millions of dollars and suffer reputational damage. When astute executives, including CIOs, cheat disruption by focusing on business continuity management (BCM) programs that build resilience, the enterprise transformation can prosper. Dugan Krwawicz.

article thumbnail

Federal Government Signals Interest In Several Key Leading Edge Technologies

CTOvision

One of the federal government’s key procurement arms, the General Services Administration (GSA), has released a survey to the tech community in the form of a request for information asking a few simple questions regarding the experience of their vendor base. Big Data Cyber Security DHS DOD DoD and IC Government News'

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

8 data strategy mistakes to avoid

CIO Business Intelligence

Similar to disaster recovery, business continuity, and information security, data strategy needs to be well thought out and defined to inform the rest, while providing a foundation from which to build a strong business.” Data Governance, Data Management

Strategy 135
article thumbnail

Cybersecurity e NIS2: come si muovono i CIO per dormire sonni (un po’) più tranquilli

CIO Business Intelligence

Questi requisiti sono suddivisi in tre macroaree: governance, risk management e controllo della catena di fornitura. Il CIO sta disegnando i processi e la governance dell’IT, strutturando tutta la parte OT e collegandola in modo sicuro con quella dell’Information Technology (sistemi, automazione e dati).

Dell 99
article thumbnail

Disruption Doesn’t Make an Appointment. A Guide for Handling the Unwelcome Knock.

CIO Business Intelligence

The one huge lesson is there’s no bad side to planning to avert pushing the limits of technology capacity, workforce resiliency, and existing business continuity strategies and disaster recovery planning. Follow these steps to both safeguard it and ensure continuity of its process: Activate and engage.

article thumbnail

InfoSec Leaders Weigh in on New SEC Rules Making CISO Hotseat Hotter

SecureWorld News

For sanity, manage to a written information security policy. Dd Budiharto , CISO, Advisory Board Member; Founder of Cyber Point Advisory, a vCISO firm: Here's the Good, the Bad, and the Other from the SEC's latest ruling.

article thumbnail

Cybersecurity Culture: How Princeton University's Security Team Created It

SecureWorld News

When David Sherry became Chief Information Security Officer at Princeton University, he says cybersecurity was done well. "I I don't want you to think security at Princeton was some sort of vast wasteland. If you are in security, you are in risk management. I don't take that for granted, and I know it's a rare occurrence.