Information management trends set to define your organization

CTOvision

Data is critical to the success of digital transformation, so it should come as no surprise that information management is an essential element in its advancement to specific change goals along the journey.

Trends 189

Information Risk: Balancing the Good and Bad of Data Analytics

CEB IT

Instead of simply conducting due diligence on the immediate vendor, information risk teams should look beyond into as much of the rest of the supply chain as necessary (see chart 1).

How and When to Quantify Information Risk

CEB IT

Most people think of risk quantification as the practice of assigning a dollar value to information risk, but even ranking different types of risk into an ordinal scale (first, second, third, etc) involve a degree of quantification.

When Cyberattacked, Should CIOs Share Information About The Experience?

The Accidental Successful CIO

When you are in the CIO position, you are responsible for knowing everything that is going on in your company’s IT department because of the importance of information technology. The Power Of Sharing Information.

Report 160

Seamless Sharing of Information Amongst Enclaves

CTOvision

An information-sharing enclave is a group of users, organizations, or systems who need to share information, along with the rules and protocols used to make this sharing possible. One example of an information-sharing enclave is a Navy Carrier Strike Group, or CSG.

Information Risk: Bug Bounties Have Gone Mainstream

CEB IT

As the trickle of companies incorporating digitalization into their corporate strategy turns into a flood, information security professionals are warning anyone who’ll listen about the vast array of products and services that may contain critical vulnerabilities in their software.

Information Risk: 3 Principles to Improve Your Board Presentations

CEB IT

As a result, chief information security officers (CISOs) are presenting to their Boards on a more frequent basis, for longer at a time, and for the entire board, rather than just a subcommittee. Chart 1: CEB’s information security framework Source: CEB analysis.

Information Security: Four Ways to Prepare for Cyber Crises

CEB IT

Preventing confidential information leaking into the wrong hands has become high priority for every big company in the past decade. Information “breaches” have never been more costly to companies, or difficult to prevent.

Three Perspectives of Information Management

Future of CIO

Information is growing exponentially, and become one of the most invaluable business assets of the business. Here are three perspectives of information management. Data is raw, information is contextual: Data' is raw content: Data is 'a collection of zeroes and ones,' without context.

Information Risk: Third-Party Risk Management Is Failing

CEB IT

Information security teams are busier than they’ve ever been and, although they have been given more funds to cope, there is still a great need to prioritize and focus on the risks that are most likely to harm their business.

How to Get Started With Information Asset Management

CEB IT

The post How to Get Started With Information Asset Management appeared first on Smarter With Gartner. As external cloud services , IT/OT convergence, the Internet of Things and digital business continue to increase, IT leaders have less purview over the technology assets that determine business outcomes. This continuously changing environment introduces an increasing variety of technologies and proliferation of assets to be managed.

The Universe of The Chief Information Officer

A CIO's Voice

Filed under: C-Level Executives , CIO , CIO/CTO , IT Process , Management Tagged: Alignment , CEO , CFO , Chief Information Officer , CIO , CIO Leader , CMO , COO , corporate innovation , culture , executive , leader , Management.

211
211

Information Risk: How APIs are Making Security Governance Easier

CEB IT

But now information risk teams are automating security governance by providing security capabilities via micro services and APIs. Information security teams like using microservices and APIs because of their simplicity and ease of use. Blog Information Risk Information Technology

The Monthly Insight of Information Management: Information Synchronization Apr. 2019

Future of CIO

The aim of modern Information Management has often been described as getting the right information to the right person, in the right format and medium, at the right time, in order to make the right decisions. Information and its life cycle is complex.

10 New Information Security Roles for the Digitization Era

CEB IT

High demand and a limited pool of people with the right skills and experience make information security staffing a perennial challenge. Further complicating things is the fact that information security teams have not yet adapted to their changing role in digitizing companies.

Running IT as Information Synchronizer

Future of CIO

With the exponential growth of information and continuous disruptions, Information Management becomes making and breaking point of digital transformation. Information and its life cycle is complex. IT organization has to shift from technology oriented to I-information driven.

Inform Your Business Decisions With The OODA Loop Daily Pulse

CTOvision

OODALoop.com provides actionable intelligence, analysis and insights on global security, technology and business issues designed to inform the modern decision-maker. The free OODA Loop Daily Pulse keeps you up to date on the hot topics of the day and points to the in-depth research members can access for deeper insights. As you can no doubt […]. CTO News

The Web: Too Much Information?

IT Toolbox

The sales process has undergone a sea change under the influence of the web and the flood of information available on it. In fact given the ease of obtaining information, it is not uncommon for the customer to know more about competing products than the salesman. Potential customers can easily research products and services before contacting a company.

Information Security: What You Should Know About Agile, DevOps, and Continuous Delivery

CEB IT

10 Ways Digitalization is Upending Information Security. A recent survey of around two dozen heads of information security produced a useful overview of the nature of this problem and how some of the world’s most forward-thinking teams are responding.

Information Risk: Embrace Diversity if You Want to Solve Your Talent Crisis

CEB IT

Companies’ information security teams are under more demand than ever and, worse, they need to staff a host of new roles to cope with that demand. Information security teams will benefit greatly from seeking out a more a more versatile range of backgrounds, experiences, and perspectives.

Putting a value on your company information

CTOvision

In this age of digital transformation, it is obvious that the information assets of an organization are increasing, but putting a value on something so seemingly intangible isn’t easy – especially as information is fluid and doesn’t behave like other assets. The way we view information has changed forever. Many enterprises believe that the data and information they hold on customers and prospects is key to the success of the business. John Mancini.

Cloud Computing + Things = ‘Information Excellence,’ Not IoT

Cloud Musings

The Internet of Things (IoT) has quickly become the next “be all to end all” in information technology. Despite these current challenges, the blending of Things and cloud computing can deliver real value today in the creation of “Information Excellence”.

Dell 232

Information Risk: Three Lessons for CISOs from Yahoo’s Rough Six Months

CEB IT

But for now, chief information security officers (CISOs) should take three core lessons on board. CISOs also play a critical role in helping the senior M&A team understand how information risks associated with M&A can manifest as business risks with poor financial outcomes.

3 Ways to Protect Firms’ Information Security as they Digitize

CEB IT

The way companies create, sell, and market products, and run the operations to do so, is increasingly based on the use of technology and digital information (see chart 1), and this trend of digitization will only continue more quickly across the next five years.

How information security professionals can help business understand cyber risk

Computer Weekly

Information security is continually moving up business and board agendas, but information security professionals find it challenging to help business leaders to understand fully the cyber risks across increasingly digital businesses

The Forrester Wave: Information Archiving Cloud Providers, Q1 2019

Forrester IT

(Caleb Ewald contributed to this blog.) The archiving market may be mature, but it is far from stagnant. In recent years, there has been active consolidation among cloud archiving providers.

Cloud 137

Information Security: The 8 Types of Risk Assessment You Should Know About

CEB IT

Chart 1 below can help with understanding the different types of risk assessment that information security teams need to conduct, and may also help explain the process, and the importance of it, to colleagues.

The Deer Hunters: An Information Technology Lesson

Cloud Musings

The network is the enabling capability for “Always-on” and serves as a foundational element to the convergence between information technology (IT) world and telecommunications (telecom).

IBM 141

Protecting Your Personal and Business Information

IT Toolbox

If you own a business, you know all too well the importance of securing not only your personal information but also the information obtained from your clients. Technology lets you create huge files and store an unbelievable amount�of information that you can easily access with a simple push of a button. Unfortunately, there are those out there who prey on businesses, especially small businesses that

The Monthly Insight of Information Management: Leverage Information to Solve Business Problems May 2019

Future of CIO

The aim of modern Information Management has often been described as getting the right information to the right person, in the right format and medium, at the right time, in order to make the right decisions and solve right problems. Thus, the value of information is not isolated.

Information Risk: 3 Threat Management Trends to Keep an Eye On

CEB IT

Although the threat management tools and techniques available to chief information security officers (CISOs) have also improved, this still leaves much to do. However, by the time information security teams respond, attackers have most likely already caused a lot of damage.

Trends 130

20 Influential Chief Information Officers

A CIO's Voice

20 Influential Chief Information Officers from Michael Krigsman. As the Chief Information Officer role become increasingly prominent, it is important to recognize CIOs who actively stake a claim as innovators and communicators.

UAE banks share information to combat cyber threats

Computer Weekly

Banks in the United Arab Emirates will share information on cyber attacks through a platform instigated by the country’s banking federation

Information Management Pitfalls

Future of CIO

Information Management makes information available and useful. The problems most organizations have are silo data or outdated information management approach. How to avoid the following pitfalls in order to improve the overall information management effectiveness.

Drowning in Data, Starved for Information

Eric D. Brown

In his 1982 book Megatrends, John Naisbitt wrote “We are drowning in information but starved for knowledge.” Today, we are drowning in data and starved for information. Data is useless unless you can convert it to information and ultimately into knowledge.

Data 219