article thumbnail

3 key roles for driving digital success

CIO Business Intelligence

These digital trailblazers , as I call them, are vital for digital transformation success, as they can be delegated leadership responsibilities such as the planning, execution, and change management of your digital initiatives. Information security specialists guide agile teams on shift-left security practices.

Agile 96
article thumbnail

Learn from IT Thought Leaders at FutureIT D.C.

CIO Business Intelligence

Change Management, Cloud Computing, Data and Information Security, Data Breach, IT Leadership, IT Strategy Attendees will also have the chance to participate in a guided networking session as more casual networking breaks. The day will wrap with a networking reception. Don’t miss out – register now!

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

4 methods to help CIOs manage cyber stress

CIO Business Intelligence

Seeing that hackers don’t work 9 to 5, IT and information security professionals generally don’t get enough rest, says Itumeleng Makgati, group information security executive at Standard Bank. Change Management, Identity Management Solutions The experts share their four top tips below. .

article thumbnail

NLP helps Eli Lilly work at a global scale

CIO Business Intelligence

Although public web translation services are available, confidentiality requirements meant those services did not meet Lilly’s standards for information security. Once improved, we had to work diligently to ramp up our [organizational change management] efforts to gain confidence in the tool.”.

article thumbnail

Steps to Improve Your Security Posture during Technology Modernization

CIO Business Intelligence

CIOs who collaborate with their executive counterparts recognize that while CIOs drive many cybersecurity decisions, joining forces with the rest of the organization’s leadership team helps solidify technology implementation and change management while boosting ROI. Chief Information Security Officer (CISO) ?– Employees

article thumbnail

How OPM Could Have Avoided the Data Breach

CTOvision

Good security hygiene, going forward, can assist in preventing further attacks. Change management will be key, and can reduce the risk of existing holes, while ensuring changes don’t introduce new ones.

Data 150
article thumbnail

Disruption Doesn’t Make an Appointment. A Guide for Handling the Unwelcome Knock.

CIO Business Intelligence

She aligns her business strategy and focus areas to complement HPE, HPE GreenLake, and other practices to bring cohesive and relevant offerings to HPE’s customers. Lois is a Certified Chief Security Officer and a Certified Information Security Manager.