article thumbnail

Selling the C-suite on preemptive IT investments

CIO Business Intelligence

It’s common knowledge among CIOs that disaster recovery investments are always de-prioritized by company boards — until disaster strikes. But disaster recovery is just one example of projects that are of an important and preemptive nature that CIOs want to fund but find de-prioritized when it comes to budget approval.

article thumbnail

Is your security program based on hard evidence or compliance voodoo?

IT Toolbox

What do you think of when you hear information security ? If you’ve been working in and around IT for a while, I’m guessing that things like documented security policies, network and endpoint controls, user training, disaster recovery plans and the like come to mind.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

Trending Sources

article thumbnail

Spotlight on Cybersecurity Leaders: Donna Ross

SecureWorld News

Donna Ross is a senior security and compliance executive with over 20 years of diverse risk, compliance, cybersecurity, technology, and operations experience within the manufacturing, insurance, banking, financial services, healthcare, and retail sectors. A : Information Security. A : Making a difference and challenging work!

article thumbnail

Symantec Government Symposium 11 March 2014 at the Renaissance Hotel Washington DC

CTOvision

By Bob Gourley DC seems to have a cyber security related event every week. Here are details from the invite: Don’t miss this exciting opportunity to join 1500 IT leaders and innovators on March 11 to collaborate and discuss the top issues in IT security and management. Learn how agencies are turning to BYOD to ensure security and ROI.

Symantec 261
article thumbnail

Cybersecurity Culture: How Princeton University's Security Team Created It

SecureWorld News

When David Sherry became Chief Information Security Officer at Princeton University, he says cybersecurity was done well. "I I don't want you to think security at Princeton was some sort of vast wasteland. I wanted to make security both cultural and programmatic.". Developing a culture of security: the mission statement.

article thumbnail

Cybersecurity e NIS2: come si muovono i CIO per dormire sonni (un po’) più tranquilli

CIO Business Intelligence

Quest’anno, a rafforzare la spinta verso la sicurezza informatica c’è anche la Direttiva NIS2 (“Network and information system security”) dell’UE, che andrà a sostituire la precedente NIS, aggiornando le misure per un elevato livello di cybersicurezza in tutta l’Unione Europea. CIO, Cybercrime, Data and Information Security

Dell 93
article thumbnail

8 data strategy mistakes to avoid

CIO Business Intelligence

How enterprises gather, store, cleanse, access, and secure their data can be a major factor in their ability to meet corporate goals. Many industries and regions have strict regulations governing data privacy and security,” Miller says. They also need to establish clear privacy, regulatory compliance, and data governance policies.

Strategy 133