Three Perspectives of Information Management

Future of CIO

Information is growing exponentially, and become one of the most invaluable business assets of the business. Here are three perspectives of information management. Data is raw, information is contextual: Data' is raw content: Data is 'a collection of zeroes and ones,' without context.

Information Risk: Balancing the Good and Bad of Data Analytics

CEB IT

Instead of simply conducting due diligence on the immediate vendor, information risk teams should look beyond into as much of the rest of the supply chain as necessary (see chart 1).

When Cyberattacked, Should CIOs Share Information About The Experience?

The Accidental Successful CIO

When you are in the CIO position, you are responsible for knowing everything that is going on in your company’s IT department because of the importance of information technology. The Power Of Sharing Information.

Report 163

How and When to Quantify Information Risk

CEB IT

Most people think of risk quantification as the practice of assigning a dollar value to information risk, but even ranking different types of risk into an ordinal scale (first, second, third, etc) involve a degree of quantification.

Information Risk: Bug Bounties Have Gone Mainstream

CEB IT

As the trickle of companies incorporating digitalization into their corporate strategy turns into a flood, information security professionals are warning anyone who’ll listen about the vast array of products and services that may contain critical vulnerabilities in their software.

Seamless Sharing of Information Amongst Enclaves

CTOvision

An information-sharing enclave is a group of users, organizations, or systems who need to share information, along with the rules and protocols used to make this sharing possible. One example of an information-sharing enclave is a Navy Carrier Strike Group, or CSG.

Information Risk: 3 Principles to Improve Your Board Presentations

CEB IT

As a result, chief information security officers (CISOs) are presenting to their Boards on a more frequent basis, for longer at a time, and for the entire board, rather than just a subcommittee. Chart 1: CEB’s information security framework Source: CEB analysis.

Information Security: Four Ways to Prepare for Cyber Crises

CEB IT

Preventing confidential information leaking into the wrong hands has become high priority for every big company in the past decade. Information “breaches” have never been more costly to companies, or difficult to prevent.

Information Risk: Third-Party Risk Management Is Failing

CEB IT

Information security teams are busier than they’ve ever been and, although they have been given more funds to cope, there is still a great need to prioritize and focus on the risks that are most likely to harm their business.

The Universe of The Chief Information Officer

A CIO's Voice

Filed under: C-Level Executives , CIO , CIO/CTO , IT Process , Management Tagged: Alignment , CEO , CFO , Chief Information Officer , CIO , CIO Leader , CMO , COO , corporate innovation , culture , executive , leader , Management.

211
211

Information Risk: How APIs are Making Security Governance Easier

CEB IT

But now information risk teams are automating security governance by providing security capabilities via micro services and APIs. Information security teams like using microservices and APIs because of their simplicity and ease of use. Blog Information Risk Information Technology

Cybersecurity Is Providing Information And Solutions Not Selling Fear

CTOvision

Read Kalev Leetaru’s article about how many companies are making profits selling fear of hacking rather than providing solutions on Forbes : The vulnerabilities of the digital era have become increasingly mainstream. What was once exclusively the domain of specialized security professionals is now on the mind of the everyday website owner worried about hacking, […]. Cyber Security News

10 New Information Security Roles for the Digitization Era

CEB IT

High demand and a limited pool of people with the right skills and experience make information security staffing a perennial challenge. Further complicating things is the fact that information security teams have not yet adapted to their changing role in digitizing companies.

Information Security: What You Should Know About Agile, DevOps, and Continuous Delivery

CEB IT

10 Ways Digitalization is Upending Information Security. A recent survey of around two dozen heads of information security produced a useful overview of the nature of this problem and how some of the world’s most forward-thinking teams are responding.

Information Risk: Embrace Diversity if You Want to Solve Your Talent Crisis

CEB IT

Companies’ information security teams are under more demand than ever and, worse, they need to staff a host of new roles to cope with that demand. Information security teams will benefit greatly from seeking out a more a more versatile range of backgrounds, experiences, and perspectives.

Putting a value on your company information

CTOvision

In this age of digital transformation, it is obvious that the information assets of an organization are increasing, but putting a value on something so seemingly intangible isn’t easy – especially as information is fluid and doesn’t behave like other assets. The way we view information has changed forever. Many enterprises believe that the data and information they hold on customers and prospects is key to the success of the business. John Mancini.

Information Risk: Three Lessons for CISOs from Yahoo’s Rough Six Months

CEB IT

But for now, chief information security officers (CISOs) should take three core lessons on board. CISOs also play a critical role in helping the senior M&A team understand how information risks associated with M&A can manifest as business risks with poor financial outcomes.

Cloud Computing + Things = ‘Information Excellence,’ Not IoT

Cloud Musings

The Internet of Things (IoT) has quickly become the next “be all to end all” in information technology. Despite these current challenges, the blending of Things and cloud computing can deliver real value today in the creation of “Information Excellence”.

Dell 233

3 Ways to Protect Firms’ Information Security as they Digitize

CEB IT

The way companies create, sell, and market products, and run the operations to do so, is increasingly based on the use of technology and digital information (see chart 1), and this trend of digitization will only continue more quickly across the next five years.

The Deer Hunters: An Information Technology Lesson

Cloud Musings

The network is the enabling capability for “Always-on” and serves as a foundational element to the convergence between information technology (IT) world and telecommunications (telecom).

IBM 141

Information Security: The 8 Types of Risk Assessment You Should Know About

CEB IT

Chart 1 below can help with understanding the different types of risk assessment that information security teams need to conduct, and may also help explain the process, and the importance of it, to colleagues.

How information security professionals can help business understand cyber risk

Computer Weekly

Information security is continually moving up business and board agendas, but information security professionals find it challenging to help business leaders to understand fully the cyber risks across increasingly digital businesses

Information Risk: 3 Threat Management Trends to Keep an Eye On

CEB IT

Although the threat management tools and techniques available to chief information security officers (CISOs) have also improved, this still leaves much to do. However, by the time information security teams respond, attackers have most likely already caused a lot of damage.

Trends 130

Information Management Pitfalls

Future of CIO

Information Management makes information available and useful. The problems most organizations have are silo data or outdated information management approach. How to avoid the following pitfalls in order to improve the overall information management effectiveness.

UAE banks share information to combat cyber threats

Computer Weekly

Banks in the United Arab Emirates will share information on cyber attacks through a platform instigated by the country’s banking federation

20 Influential Chief Information Officers

A CIO's Voice

20 Influential Chief Information Officers from Michael Krigsman. As the Chief Information Officer role become increasingly prominent, it is important to recognize CIOs who actively stake a claim as innovators and communicators.

How to Keep Your Company’s Information Organized

CTOvision

The larger that your company grows, the more vital that it is for all the information your company processes to be properly organized at all times. Information organization quality is directly correlated with just how actionable the information is. Accurate information organization puts your company in the best position to develop fully customized white label […].

Information Risk: Help the Business Rethink How it Exploits its Secrets

CEB IT

Whether it’s product designs, business practices, manufacturing processes, pricing models, or proprietary data, the company assumes that its information security team, processes, and policies will keep the information secret. Implications for the Chief Information Security Officer.

Drowning in Data, Starved for Information

Eric D. Brown

In his 1982 book Megatrends, John Naisbitt wrote “We are drowning in information but starved for knowledge.” Today, we are drowning in data and starved for information. Data is useless unless you can convert it to information and ultimately into knowledge.

IT Infrastructure: 3 Steps to Respond to Today’s Information Security Concerns

CEB IT

Don’t (just) focus on new technology : Infrastructure organizations continue to increase their spending on information security solutions as their primary strategy for improving security.

Information Logistics -- Revisited

Chuck's Blog - EMC

A long while back, I wrote a speculative post around what I dubbed " information logistics " -- the disciplines associated with getting the right information in the right place at the right time -- and at the right cost. For starters, we''re starting to use information differently. 

2015 National Chief Information Security Officer Survey

Cloud Musings

Recent cases have highlighted identity theft, the loss of personal financial data, and the disclosure of sensitive national security information. The executive in the hot seat for preventing these failures is the Chief Information Security Officer (CISO).

US Treasury tells banks to provide more cyber attack information

Computer Weekly

The US government is calling on financial institutions to share more cyber attack information as concerns grow about the sector's vulnerability

Inform Your Cybersecurity Strategy With Lessons From July 1861

CTOvision

When I was the Director of Intelligence for DoD's first joint cyber defense organization (JTF-CND) our Commander (At the time, Army Major General Dave Bryan) and our J5 (Marine LTC Mike Davis) organized a visit for the senior staff to the Manassas Battlefield Park of Virginia. The purpose was not just team building, but to [.]. CTO Cyber Security Cyber War Internet of Things News smart city

Customer Experience Q&A: Etsy’s Abby Covert, Information Architect

Forrester IT

customer experience customer experience index (CX Index) customer experience measurement digital customer experience Information architecture retailIf you care about CX, you have to admire Etsy. It was the top digital retailer in Forrester’s Customer Experience Index™ in 2017. It excels at differentiating itself with a unique set of products and a distinctive online store, where buyers routinely upload pictures of their purchases alongside gushing reviews.