Information Risk: Balancing the Good and Bad of Data Analytics

CEB IT

Instead of simply conducting due diligence on the immediate vendor, information risk teams should look beyond into as much of the rest of the supply chain as necessary (see chart 1).

How and When to Quantify Information Risk

CEB IT

Most people think of risk quantification as the practice of assigning a dollar value to information risk, but even ranking different types of risk into an ordinal scale (first, second, third, etc) involve a degree of quantification.

The 6 Reasons Employees are Lax about Information Security

CEB IT

Information security teams can spend all the money in their budget on fancy technology but it’s for naught if employees don’t use it. Blog Collaborate Across the Organization Information and Data Risk Management Information Risk Information Technology

Retrieve MSU Information

Mick's IT Blog

While working on the Windows 10 upgrade project, I ran into a situation which I needed the information from an MSU file for the task sequence. Specifically, I needed the KB number.

Information Risk: 3 Principles to Improve Your Board Presentations

CEB IT

As a result, chief information security officers (CISOs) are presenting to their Boards on a more frequent basis, for longer at a time, and for the entire board, rather than just a subcommittee. Chart 1: CEB’s information security framework Source: CEB analysis.

Information Security: What You Should Know About Agile, DevOps, and Continuous Delivery

CEB IT

10 Ways Digitalization is Upending Information Security. A recent survey of around two dozen heads of information security produced a useful overview of the nature of this problem and how some of the world’s most forward-thinking teams are responding.

Information Security: Four Ways to Prepare for Cyber Crises

CEB IT

Preventing confidential information leaking into the wrong hands has become high priority for every big company in the past decade. Information “breaches” have never been more costly to companies, or difficult to prevent.

Information Risk: How APIs are Making Security Governance Easier

CEB IT

But now information risk teams are automating security governance by providing security capabilities via micro services and APIs. Information security teams like using microservices and APIs because of their simplicity and ease of use. Blog Information Risk Information Technology

Information Risk: Embrace Diversity if You Want to Solve Your Talent Crisis

CEB IT

Companies’ information security teams are under more demand than ever and, worse, they need to staff a host of new roles to cope with that demand. Information security teams will benefit greatly from seeking out a more a more versatile range of backgrounds, experiences, and perspectives.

Customer Experience Q&A: Etsy’s Abby Covert, Information Architect

Forrester IT

customer experience customer experience index (CX Index) customer experience measurement digital customer experience Information architecture retailIf you care about CX, you have to admire Etsy. It was the top digital retailer in Forrester’s Customer Experience Index™ in 2017. It excels at differentiating itself with a unique set of products and a distinctive online store, where buyers routinely upload pictures of their purchases alongside gushing reviews.

Information Management Pitfalls

Future of CIO

Information Management makes information available and useful. The problems most organizations have are silo data or outdated information management approach. How to avoid the following pitfalls in order to improve the overall information management effectiveness.

Information Risk: Three Lessons for CISOs from Yahoo’s Rough Six Months

CEB IT

But for now, chief information security officers (CISOs) should take three core lessons on board. CISOs also play a critical role in helping the senior M&A team understand how information risks associated with M&A can manifest as business risks with poor financial outcomes.

The Deer Hunters: An Information Technology Lesson

Cloud Musings

The network is the enabling capability for “Always-on” and serves as a foundational element to the convergence between information technology (IT) world and telecommunications (telecom).

IBM 141

IT Infrastructure: 3 Steps to Respond to Today’s Information Security Concerns

CEB IT

Don’t (just) focus on new technology : Infrastructure organizations continue to increase their spending on information security solutions as their primary strategy for improving security.

Seamless Sharing of Information Amongst Enclaves

CTOvision

An information-sharing enclave is a group of users, organizations, or systems who need to share information, along with the rules and protocols used to make this sharing possible. One example of an information-sharing enclave is a Navy Carrier Strike Group, or CSG.

Putting a value on your company information

CTOvision

In this age of digital transformation, it is obvious that the information assets of an organization are increasing, but putting a value on something so seemingly intangible isn’t easy – especially as information is fluid and doesn’t behave like other assets. The way we view information has changed forever. Many enterprises believe that the data and information they hold on customers and prospects is key to the success of the business. John Mancini.

Information Security: The 8 Types of Risk Assessment You Should Know About

CEB IT

Chart 1 below can help with understanding the different types of risk assessment that information security teams need to conduct, and may also help explain the process, and the importance of it, to colleagues.

Information Risk: 3 Threat Management Trends to Keep an Eye On

CEB IT

Although the threat management tools and techniques available to chief information security officers (CISOs) have also improved, this still leaves much to do. However, by the time information security teams respond, attackers have most likely already caused a lot of damage.

Trends 130

3 Ways to Protect Firms’ Information Security as they Digitize

CEB IT

The way companies create, sell, and market products, and run the operations to do so, is increasingly based on the use of technology and digital information (see chart 1), and this trend of digitization will only continue more quickly across the next five years.

How information security professionals can help business understand cyber risk

Computer Weekly

Information security is continually moving up business and board agendas, but information security professionals find it challenging to help business leaders to understand fully the cyber risks across increasingly digital businesses

How to Keep Your Company’s Information Organized

CTOvision

The larger that your company grows, the more vital that it is for all the information your company processes to be properly organized at all times. Information organization quality is directly correlated with just how actionable the information is. Accurate information organization puts your company in the best position to develop fully customized white label […].

The Universe of The Chief Information Officer

A CIO's Voice

Filed under: C-Level Executives , CIO , CIO/CTO , IT Process , Management Tagged: Alignment , CEO , CFO , Chief Information Officer , CIO , CIO Leader , CMO , COO , corporate innovation , culture , executive , leader , Management.

164

20 Influential Chief Information Officers

A CIO's Voice

20 Influential Chief Information Officers from Michael Krigsman. As the Chief Information Officer role become increasingly prominent, it is important to recognize CIOs who actively stake a claim as innovators and communicators.

Information Risk: Help the Business Rethink How it Exploits its Secrets

CEB IT

Whether it’s product designs, business practices, manufacturing processes, pricing models, or proprietary data, the company assumes that its information security team, processes, and policies will keep the information secret. Implications for the Chief Information Security Officer.

Drowning in Data, Starved for Information

Eric D. Brown

In his 1982 book Megatrends, John Naisbitt wrote “We are drowning in information but starved for knowledge.” Today, we are drowning in data and starved for information. Data is useless unless you can convert it to information and ultimately into knowledge.

Manchester to host international freedom of information event

Computer Weekly

Manchester is to host an international conference exploring the future of transparency and access to information in the UK and worldwide

US Treasury tells banks to provide more cyber attack information

Computer Weekly

The US government is calling on financial institutions to share more cyber attack information as concerns grow about the sector's vulnerability

Information Risk: How to Manage the Company’s Demand for Your Services

CEB IT

Information security teams face an unprecedented level of demand for their services right now. The strain on the time and resources of information security teams is understandable ( as Yahoo can attest ), and even though their companies are stumping up money, information security budget growth is slowing. Automating operations and governance activities offers the best chance to meet information security demands.

Information Risk: Growing Budgets Aren’t Enough to Help with Exploding Demand

CEB IT

Over the past few years, as the importance of information security has crept on to the agenda of board meetings at all of the world’s big companies, information security teams have been showered with cash.

Budget 149

Information security set for steep trajectory, says (ISC)2

Computer Weekly

By helping to create a thriving, diverse and open information security community, (ISC)2 hopes to ensure a steep rise for the profession

Congressional Artificial Intelligence Caucus: Helping inform policymakers on impact of AI

CTOvision

The goal of the caucus is to inform policymakers of the technological, economic and social impacts of advances in AI and to ensure that rapid innovation in AI and related […].

The Web: Too Much Information?

IT Toolbox

The sales process has undergone a sea change under the influence of the web and the flood of information available on it. In fact given the ease of obtaining information, it is not uncommon for the customer to know more about competing products than the salesman. Potential customers can easily research products and services before contacting a company.

Brexit has thrown ICO plans into flux, admits information commissioner

Computer Weekly

The ICO is working to ensure that the UK's post-Brexit data protection law is progressive, stands up to scrutiny and provides stability, says information commissioner Elizabeth Denham

Data 196