The Missing Link: How Chainlink’s Pallet Aims to Deliver Greater Informational Access


Oracle 254

Your Next Move: Chief Information Security Officer

Association of Information Technology Professional

This article details the necessary experience and education needed for a career as a chief information security officer


Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

Using OODA Loop Content To Inform Your Strategy


Here is an overview of some recent content that can help you optimize your competitive strategies: Considerations On What the Capital Storming May Mean For Your Strategy The 6 […].

Information Risk: Balancing the Good and Bad of Data Analytics


Instead of simply conducting due diligence on the immediate vendor, information risk teams should look beyond into as much of the rest of the supply chain as necessary (see chart 1). Managers should start thinking about how to use customer data by asking, “Would my customers feel comfortable knowing I have data that could be combined to produce information about their preferences from, say, from social media or data browsing behaviors purchased from data brokers?”

How ZoomInfo Enhances Your Database Management Strategy

Forward-thinking marketing organizations have continuously invested in a database strategy for enabling marketing processes. Download this ebook to learn how to maintain a strategy that includes refreshed information, database cleanses, and an accurate analysis at the same time.

How and When to Quantify Information Risk


Most people think of risk quantification as the practice of assigning a dollar value to information risk, but even ranking different types of risk into an ordinal scale (first, second, third, etc) involve a degree of quantification. While most situations call for less precision, there are some information risk topics in which a more rigorous and quantified approach is appropriate, not least to justify Information Security’s reasoning for choosing one strategy over another.

Seamless Sharing of Information Amongst Enclaves


An information-sharing enclave is a group of users, organizations, or systems who need to share information, along with the rules and protocols used to make this sharing possible. One example of an information-sharing enclave is a Navy Carrier Strike Group, or CSG. All of these vessels need to share information to ensure smooth communication during naval engagements. It should be fairly obvious that sharing information between all of these enclaves is important.

10 Tips for Maintaining Information Security During Layoffs


Read Joan Goodchild list 10 information security tips for companies during layoffs on Dark Reading: Business disruption and the financial toll brought on by the COVID-19 has forced many companies, […].

The 6 Reasons Employees are Lax about Information Security


Information security teams can spend all the money in their budget on fancy technology but it’s for naught if employees don’t use it. Unsurprisingly then, given the amount of money currently being spent by firms in keeping their data and their systems secure , information security teams have almost doubled their spending on employee awareness in the past three years, from $1,597 per 1000 IT users in 2013 to $3,086 per 1000 IT users in 2016 , according to CEB data.

Information Risk: Bug Bounties Have Gone Mainstream


As the trickle of companies incorporating digitalization into their corporate strategy turns into a flood, information security professionals are warning anyone who’ll listen about the vast array of products and services that may contain critical vulnerabilities in their software. As the market matures, chief information security officers may even turn to private bug bounty programs as a more cost-effective alternative to conventional penetration testing.

Tibco CEO Dan Streetman On Information Builders Acquisition, Opportunities For Partners


Tibco Software and Information Builders announced a deal Oct. 22 under which Tibco, based in Palo Alto, Calif., will acquire the New York-based developer of business analytics and data management […]. News Tibco

Leading Advertising and Analytics Company Outperforms With a Graph Database

Xandr, a division of AT&T, has built an identity graph that connects information on people, households, and more. The company is using this graph to provide advertisers an ability to deliver commercials more successfully than ever before. Learn more.

Putting a value on your company information


In this age of digital transformation, it is obvious that the information assets of an organization are increasing, but putting a value on something so seemingly intangible isn’t easy – especially as information is fluid and doesn’t behave like other assets. The way we view information has changed forever. Many enterprises believe that the data and information they hold on customers and prospects is key to the success of the business. John Mancini.

Information Risk: 3 Principles to Improve Your Board Presentations


As a result, chief information security officers (CISOs) are presenting to their Boards on a more frequent basis, for longer at a time, and for the entire board, rather than just a subcommittee. From dozens of conversations that CEB has had with some of the best information security teams in the world, it’s clear they rely on three principles when preparing their board presentations. Chart 1: CEB’s information security framework Source: CEB analysis.

Information Security: Four Ways to Prepare for Cyber Crises


Preventing confidential information leaking into the wrong hands has become high priority for every big company in the past decade. Information “breaches” have never been more costly to companies, or difficult to prevent. Information security staff play a critical role in resolving all these problems. Centrally documenting Information Security’s tribal knowledge helps everyone access important knowledge quickly.

Information management trends set to define your organization


Data is critical to the success of digital transformation, so it should come as no surprise that information management is an essential element in its advancement to specific change goals along the journey. Digital transformation demands data. Digital management helps to connect up data silos, opening up data across organizations, improving efficiencies and creating a […]. Big Data and Analytics

Trends 241

Information Risk: Third-Party Risk Management Is Failing


Information security teams are busier than they’ve ever been and, although they have been given more funds to cope, there is still a great need to prioritize and focus on the risks that are most likely to harm their business. Traditionally, information security teams have administered risk assessments and made decisions about the risk each third party posed based on predetermined levels, but this is no longer sufficient for the four reasons below.

How ZoomInfo Helps Overcome the Top Pain Points of Inside Sales

Recent digital transformation has shifted the B2B landscape by ushering in the era of buyer empowerment. With more access to user reviews, analyst opinion, and industry research, decision-makers are more informed than ever while navigating what is now known as the “buyer’s journey.”

How to implement mindful information security practices

Tech Republic Security

Mindfulness is all about being aware, so why not incorporate that in your cybersecurity practices

Strengthening Cyber Incident Information Collection and Sharing in the U.S.

SecureWorld News

Cybercrime Support Network 's (CSN) mission is to serve individuals and small businesses impacted by cybercrime, and, to do so, we need to better understand the immensity of the issue through stronger incident information collection, sharing, and trend reporting. Americans reported $4.2

10 New Information Security Roles for the Digitization Era


High demand and a limited pool of people with the right skills and experience make information security staffing a perennial challenge. Further complicating things is the fact that information security teams have not yet adapted to their changing role in digitizing companies. As innovation and security become increasingly linked, senior IT managers must change how they hire and develop information security staff. Chief of staff for information security.

Information Risk: How APIs are Making Security Governance Easier


But now information risk teams are automating security governance by providing security capabilities via micro services and APIs. By reducing the effort required to fulfill security requirements, information security teams are able to help software development teams meet speed-to-market goals and limit the governance burden at the same time. Information security teams like using microservices and APIs because of their simplicity and ease of use.

How ZoomInfo Solves Recruiting Pain Points

For recruiters to build their pipeline and search for the next candidate, they need to ensure they have access to the most accurate data on the market. More specifically, having access to updated information lets you engage faster with ideal candidates searching the job market. To begin getting these candidates in the right positions, it includes utilizing updated contact data and enhancing your outreach strategy for improved effectiveness.

How to Keep Your Company’s Information Organized


The larger that your company grows, the more vital that it is for all the information your company processes to be properly organized at all times. Information organization quality is directly correlated with just how actionable the information is. Accurate information organization puts your company in the best position to develop fully customized white label […].

Inform Your Business Decisions With The OODA Loop Daily Pulse

CTOvision provides actionable intelligence, analysis and insights on global security, technology and business issues designed to inform the modern decision-maker. The free OODA Loop Daily Pulse keeps you up to date on the hot topics of the day and points to the in-depth research members can access for deeper insights. As you can no doubt […]. CTO News

Information Security: What You Should Know About Agile, DevOps, and Continuous Delivery


Information security teams, who themselves are no strangers to a rapidly changing work environment , are under pressure to ensure that all this activity doesn’t result in important confidential data ( itself more valuable than it’s ever been ) leaking out of the company – either from carelessness or criminal intent. 10 Ways Digitalization is Upending Information Security.

Information Risk: Three Lessons for CISOs from Yahoo’s Rough Six Months


But for now, chief information security officers (CISOs) should take three core lessons on board. The CISO’s role in M&A should expand : When it comes to M&A, most CISOs tend to spend their time trying to get a head start on post-deal integration, revise the information security team’s strategic plan, or assess the acquisition target’s information security practices. Update Information Security’s strategy to support digitization efforts.

Best Practices for a Marketing Database Cleanse

As frustrating as contact and account data management can be, this is still your database – a massive asset to your organization, even if it is rife with holes and inaccurate information. Entrusting a vendor to help maintain its accuracy and completeness is no ordinary engagement. Download ZoomInfo’s latest data-driven eBook aimed to help marketing leaders understand the best practices around choosing a B2B contact data provider.

Information Risk: Embrace Diversity if You Want to Solve Your Talent Crisis


Companies’ information security teams are under more demand than ever and, worse, they need to staff a host of new roles to cope with that demand. However, one cause of this staff shortage doesn’t come from a lack of skilled talent available but from the fact that information security managers tend to hire from homogeneous talent pools, typically rewarding narrow sets of highly technical skills. Blog Information Risk Information Technology Manage Your People

Dooly raises $20 million to organize sales information with AI

Venture Beast

Dooly, a startup developing an AI-powered sales enablement plugin for customer relationship management software, raised $20 million. Read More.

3 Ways to Protect Firms’ Information Security as they Digitize


The way companies create, sell, and market products, and run the operations to do so, is increasingly based on the use of technology and digital information (see chart 1), and this trend of digitization will only continue more quickly across the next five years. And digitization, fueled by business-led IT (line managers initiating and funding their own technology projects), places untenable pressure on the way that IT information security teams work.

Information Risk: How to Manage the Company’s Demand for Your Services


Information security teams face an unprecedented level of demand for their services right now. The strain on the time and resources of information security teams is understandable ( as Yahoo can attest ), and even though their companies are stumping up money, information security budget growth is slowing. Automating operations and governance activities offers the best chance to meet information security demands.

The Recruiting Crossword Puzzle

Test your recruiter-brain with this crossword puzzle, which reveals the best ways to move forward in your efforts with every answer!

Information Security: The 8 Types of Risk Assessment You Should Know About


For information security teams who are trying to impose order on a huge and complex new risk category , it’s imperative that their colleagues understand the importance of helping with the “risk assessment” they are trying to conduct, and in complying with the results of that assessment. Blog Corporate Data and Information Security Customer Data and Information Security Information Risk Information Technology

Dashboard of 650+ Informative Articles by Isaac Sacolick

Social, Agile and Transformation

I published over 200 hundred articles over the last couple of years, have over 650 published since I started writing 15 years ago, and in the next month, I will complete my 500th post on this blog.

Agile 166

The Web: Too Much Information?

IT Toolbox

The sales process has undergone a sea change under the influence of the web and the flood of information available on it. In fact given the ease of obtaining information, it is not uncommon for the customer to know more about competing products than the salesman. Potential customers can easily research products and services before contacting a company.

Microsoft launches Viva, an AI-powered information hub for enterprises

Venture Beast

Microsoft today introduced Microsoft Viva, a hub of services designed to address digital workplace challenges. Read More.

How to Evaluate ASR Solution Brief

There is a fundamental difference between 1st generation, 2nd generation, and modern-day ASR solutions that use 100% deep learning technology. Get the information you need to ensure your evaluation experience yields the data you need to make your purchasing decision.

The Dali Lama As A Business Strategist: His words underscore the need for informed action


The Dali Lama just posted some very wise thoughts for our consideration: Time never stands still, it’s always moving on. The past is beyond our control, but the future is still in our hands. To shape it we must use our intelligence and make an effort. We can change our circumstances.

CAMBRIC: The Seven Megatrends Creating The Future Of Information Technology


CTOvision has just released our latest white paper projecting the future of seven major trends in information technology. Download “CAMBRIC: The Seven Megatrends Creating The Future Of Information Technology” 151010a-The-Future-Of-IT.pdf – Downloaded 51 times – 1 MB. You can remember these seven major IT megatrends by the mnemonic acronym Cambric. Cambric stands for: C loud Computing. A rtificial Intelligence. M obility. B ig Data. R obotics.

Information Risk: 3 Threat Management Trends to Keep an Eye On


Although the threat management tools and techniques available to chief information security officers (CISOs) have also improved, this still leaves much to do. Information security teams, however, collect intelligence on their adversaries in a series of “silos,” typically focusing solely on technical threat intelligence. However, by the time information security teams respond, attackers have most likely already caused a lot of damage.

Trends 150

Drowning in Data, Starved for Information

Eric D. Brown

In his 1982 book Megatrends, John Naisbitt wrote “We are drowning in information but starved for knowledge.” Today, we are drowning in data and starved for information. Data is useless unless you can convert it to information and ultimately into knowledge. In recent years, big data has been what organizations use to describe their attempts to converting all of their data into useful information. Big Data Featured information Knowledge

Data 169

Why B2B Contact and Account Data Management Is Critical to Your ROI

64% of successful data-driven marketers say improving data quality is the most challenging obstacle to achieving success. Given data’s direct impact on marketing campaigns, reporting, and sales follow-up, maintaining an accurate and consistent database is a top priority for B2B organizations. This latest eBook aims to help marketing leaders understand the impact of data management on their company’s ROI.