article thumbnail

3 key roles for driving digital success

CIO Business Intelligence

To address these gaps, product and delivery leaders must rely on domain experts, including solutions architects , user experience (UX) specialists, Six Sigma analysts, information security leaders, and data architects. Information security specialists guide agile teams on shift-left security practices.

Agile 98
article thumbnail

New York Takes Bold Stance Against Hospital Cyber Attacks

SecureWorld News

The act mandates risk assessments, incident reporting, and data breach notification procedures. Maryland: The Maryland Department of Health (MDH) has established cybersecurity requirements for hospitals under the Maryland Health Information Security Act.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Cognitio’s Roger Hockenberry Cited in BizTechReports

CTOvision

In the aftermath of high-profile data breaches at Sony, Target and Home Depot, chief information officers (CIOs), chief information security officers (CISOs) and other IT security professionals both in government and the private sector are playing from behind. . Are you trying to forge those relationships?

article thumbnail

How to succeed as a fractional CIO

CIO Business Intelligence

Fractional CIOs are frequently tapped by small to midsize organizations that may not be able to afford the expense of a full-time CIO, says Randy Trzeciak, director of the masters of science information security policy and management program at Carnegie Mellon University’s Heinz College. What services do fractional CIOs provide?

How To 121
article thumbnail

New CIO appointments in India, 2022

CIO Business Intelligence

Prior to joining Fractal, Tiwari was senior vice-president and global CISO at Airtel, where he set up the managed security services initiative Airtel Secure for Business. Before that, he was the chief information security advisor at Microsoft India. . Based in Mumbai, he will report to Yotta CEO Sunil Gupta.

article thumbnail

Roadmap to Avoiding Data Breach Litigation

SecureWorld News

In order to better understand these types of lawsuits, let's first examine these lawsuits through the lens of a third-party vendor causing a data breach. Back in 2013, it had been reported that hackers gained access to Target's payment card system through a third-party HVAC vendor.

Data 58
article thumbnail

Cloud Shines Brightly as Future of Disaster Response IT

Cloud Musings

geospatial data of differing quality multiple applications and a lack of information sharing, which can impact mission success. A 2009 report by the Red Cross listed “leadership and coordination”. works from the same high-quality information,” Jackson said. brokerage with (vendor management and integration included) marks the.

Cloud 182