This week, the news of Delta Air Lines’ computer outage soared high, while Delta flights remained grounded. Over 2000 flights were cancelled and delays still continue. In Searchlight, associate site editor Brian Holak talks with industry experts to find out what IT executives can learn from the outage and why organizations need to step up their disaster recovery plans.
For CIOs, innovation often takes a back seat to “keeping the lights on” IT functions. We recently asked IT leaders, “What have you done in the past 12 months to reduce time spent on ‘keeping-the-lights-on’ IT functions?” Check out our photo story to find out what they have to say about implementing innovation strategies and the steps they have taken to spur innovation within their organizations.
Niel Nickolaisen, the chief technology officer at O.C. Tanner Co. and frequent contributor at our SearchCIO website, shares his thoughts on who should be in charge of a company’s mobile application development. He also discusses how his organization has benefited from its enterprise mobile application development process.
This week on our SearchCompliance website, information governance expert Jeffery Ritter shares his take on the business benefits of big data mining and understanding data provenance. In part one of this four-part webcast, Ritter explains how businesses can use well governed information to generate new revenue. In part two of the webcast, Ritter highlights six steps to support this mission. In part three of the webcast, he talks about how organizations can benefit from increasing data transparency and details his “velocity principle”. Stay tuned for the final part of the webcast.
Is your organization investing enough time and money in its GRC program? Did you know such investments can help boost an organization’s risk management strategies? SearchCIO contributor Mary K. Pratt explores how Airlines Reporting CISO Rich Licato improved the company’s IT GRC program. Pratt also talked with industry experts to find out the benefits of such investments.
The EU-U.S. Privacy Shield is here. Is your company considering self-certifying under the new framework? In part one of this two-part Q&A with BakerHostetler privacy lawyer Melinda McLellan, find out what factors your organization should be considering before joining the transatlantic data transfer framework. Stay tuned for part two of the Q&A.
This week, Intel’s executive IT ranks saw a shift from one woman CIO to another. But that doesn’t mean the gender gap has closed — far from it, in fact. In this week’s Searchlight, Executive Editor Linda Tucci discusses the appointment of Paula Tolliver as Intel’s CIO and what it says about gender politics in the tech industry.
Do you want unlimited vacation time? Your best bet is a startup, but the flextime perk may be coming to a big company near you soon. In this article, SearchCIO Contributor Mary K. Pratt explores how some companies are turning to unlimited vacation time to attract and hold onto talent. Will it work?
Companies’ regulatory management isn’t just an IT concern; it has also become a business concern. For that reason, it’s no longer in the best interest of the company for tech teams to operate independently, according to SearchCompliance Expert Kevin McDonald. Here, he explains why IT and compliance process alignment is increasingly becoming a business priority — and what that means for IT teams.
Are you familiar with SLO and SLA? The two terms are often confused, but in this expert tip you’ll learn the key differences.
This week, Verizon bought Yahoo for $4.83 billion, ready to stake its claim in the online content and marketing industry. But experts are hesitant to applaud the deal, saying that the telecom giant will likely face hurdles as it integrates the struggling internet business. In Searchlight, associate site editor Brian Holak talks with industry professionals to find out whether Verizon can successfully compete in the digital content industry.
Privacy Shield, the new EU-U.S. data transfer pact that finally got the green light from regulators this week, took up a lot of the spotlight. First, on SearchCIO, features writer Jason Sparapani explores European dissent around the “robust” framework that replaces Safe Harbor and how enforcement will work. And over on the Total CIO blog, Sparapani details how businesses can use Privacy Shield to boost their reputations as customer-centric organizations. Lastly, on the IT Compliance Advisor blog, we summarize why companies should sign up to the framework fast, and what benefits there are from doing so.
“Technology is the backbone of our customer service,” said JetBlue CIO Eash Sundaram at this year’s MIT CIO symposium – a statement that shouldn’t come as a surprise to companies that pride themselves in providing good customer service. But Sundaram’s career has a twist – he is also chair of a venture investment firm. On Total CIO, executive editor Linda Tucci talks about this latest development in the transformation of the CIO role.
Mobile security is now the No. 1 technology priority among the IT decision makers 451 Research polled this year. Why? Because as companies increase their mobile capabilities, they have also introduced new vulnerabilities into their risk profiles. In response, IT leaders are incorporating more layers of security into their mobile environment, as opposed to securing just one aspect of it.
Scaling your startup business doesn’t just involve scaling your product or service — that’s akin to continuously plugging more lights into an outlet until you blow a fuse. Leadership and agility expert Joseph Flahiff lays out the three key areas of scaling a business that organizations often miss: culture, leadership and organization.
So-called third platform technologies — social, mobile, big data analytics and cloud – are crucial to driving business innovation, and CIOs have a key role to play when it comes to enabling those innovative technologies. In a Total CIO blog post, assistant site editor Mekhala Roy speaks with Fred Magee, adjunct research advisor at IDC, about how to employ multi-tiered strategies to help with implementing innovation.
This week, the U.S. and the European Union approved Privacy Shield. If you haven’t already heard, it’s the set of laws that replaces Safe Harbor, the overturned laws that governed the transfer of Europeans’ data across the Atlantic. Privacy Shield has a similar aim to Safe Harbor, but it also has more specific rules, harsher penalties, and highlights data governance as a critical tool for organizations that seek to comply. In this week’s Searchlight column, features writer Jason Sparapani lays out the rules’ framework, how and why CIOs should take action, and the importance of collaboration.
If I asked you of one big think you think is reshaping how companies are securing their employees’ mobile devices, I bet the word “promiscuity” doesn’t come to mind. But this trend of “promiscuous” employees, or those who indiscriminately use their mobile devices for business and personal use along with their enablement and the convergence of mobile devices and PCs, are changing the game for mobile security. Sparapani sat down with security expert Dionisio Zumerle to get his take on exactly how. Zumerle also talks about why traditional management and security tools won’t work to secure mobile devices.
How are your fellow IT peers handling every new technology innovation and market shift? With its Information Technology Priorities Survey, TechTarget has been polling them every year since 2010 to find out. In our latest Essential Guide, we break down 385 IT professionals’ project priority lists and their IT budget and spending expectations for 2016.
Who doesn’t like free templates? We’ve updated two installments of our popular series, in which we compile a list of free, downloadable IT templates for CIOs gathered from around the web. First, take a look at a sampling of free project scope templates to help you clearly document project goals, deliverables, tasks, costs and deadlines and keep your projects on track. Then, head over to this collection of free cost-benefit analysis templates for a systematic approach to determining the risks and benefits of a project or business decision.
A group of global financial organizations have put their heads together and drafted a set of broad principles to combat infrastructure-related cyber risks. Called the “International CyberSecurity, Data and Technology Principles,” the paper urges policymakers, businesses and other stakeholders to find common ground when creating new cybersecurity standards and regulations. Find out more about the standards in this SearchCompliance FAQ.
What exactly is OPSEC? If you need a refresher on the term, we’re here to help. It stands for “operational security” and refers to the analytical process for classifying data assets and setting up the controls that are needed to protect these assets. Read the rest of the SearchCompliance definition to learn about the OPSEC five-step process.
Pokemon Go is officially a phenomenon, with millions of users around the world linked in to its augmented reality interface. What does it mean for the future of augmented reality in the enterprise? In this week’s Searchlight, Site Editor Fran Sales talks to industry observers to get their take. Also in Searchlight: Microsoft wins in a warrant case and Google is hit with new antitrust charges by the European Commission.
Blockchain is being heralded as a transformative business technology, but how much of that is hype? In this feature, Editorial Director Sue Troy talks to Carl Lehmann, research manager at 451 Research, to get his opinion on the value of blockchain and its role in the enterprise.
In our most recent Essential Guide, delve into cloud strategy, security and deployment, and learn how to maximize the business benefits of your cloud computing investments.
Over on the IT Compliance Advisor blog, Sales rounds up the top GRC news, starting with the New Jersey CTO’s plan to ramp up compliance monitoring. Plus, a recent Gartner report finds cybersecurity control a concern for digital businesses.
Search engine behemoth Google has already put in effort to build up its image and item recognition efforts, but this week the company made a big move: It acquired Moodstocks, a French startup that specializes image recognition based on machine learning. In this week’s Searchlight, associate site editor Brian Holak speaks with AI experts to get their take on the future of so-called computer vision, as well as what it means for companies that aren’t big data giants.
The defining moment in CTO Niel Nickolaisen’s IT career was a large, complex ERP implementation — one that made him vow never to customize or focus innovation toward anything that is part of a company’s digital core — such ERP and CRM, which are mission-critical but do not create competitive differentiation. Read his CIO Innovators column to find out how another ERP experience — a large re-implementation — prompted him to add the notion of “Agile ERP” to this philosophy.
Digital transformation is a necessity — and a team effort of the entire executive leadership team. But that doesn’t mean CIOs don’t play a key role. In the latest Digital Insights tip, Andrew Horne of CEB talks about the three principles CIOs should follow to help their companies create digital frameworks and to prepare their IT teams to provide support.
In the wake of the Brexit decision, the UK could lose its status as Europe’s technology hub to Amsterdam, Barcelona or Berlin. On our Total CIO blog, features writer Jason Sparapani writes about how London-based CIOs can help retain the IT talent the city already has.
The July issue of our CIO Decisions e-zine is out! It features a deep-dive into the required steps companies must take to implement blockchain and achieve the technology’s potential. It also includes a one-on-one with MIT cybersecurity guru Stuart Madnick, in which he discusses how dark web hackers keep getting the upper hand, and a CIO careers column on new ways to approach the tech skills gap.
This week on SearchCompliance, we’re continuing our two-part Q&A on blockchain technology. Part two has blockchain experts shedding light on blockchain privacy and how that can be balanced with digital identity.
The news of the “Brexit” vote rocked the world. What does the United Kingdom’s impending separation from the European Union mean for IT teams? One thing is certain — we’re in uncharted territory. In this week’s Searchlight, Features Writer Jason Sparapani explores the implications of Brexit and IT experts give advice for CIOs’ response to the news.
Creative Solutions in Healthcare Inc. is the first healthcare company in the U.S. to be 100% in the cloud. In this installment of CIO Innovators, Site Editor John Moore talked to Shawn Wiora, CIO at Creative Solutions, and other IT experts about end-to-end cloud strategies and how they could lead to better security, better performance and a cultural transformation.
The way today’s business applications are run is flawed, according to IT consultant Judith Hurwitz. Cognitive computing could change all of that, leading to a much needed data-led enterprise revolution, Hurwitz says. In part one of this two part Conference Notebook, Horwitz explains how the business applications of the future will be based on fast-moving, constantly-changing data. In part two she discusses how we can expect to see cognitive systems in the IT services marketplace.
Having CIOs on the board isn’t such a stretch anymore. In this article, SearchCIO Contributor Mary K. Pratt explores how interest in enlisting CIOs to corporate boards is rising, but actual board presence is still rare, partly due to a low CIO talent pool for these seats.
Over on the TotalCIO blog, read about how one health insurer is using crowdsourcing and innovation software to create a new business model. Also, find out how a long-term care provider turned to cloud computing to bolster security and application performance and get IT consultant Judith Hurwitz’s take on the tech revolution.
In this webcast presentation, Kurt Marko, analyst at MarkoInsights, discusses the priorities and strategies for each mode of bimodal IT and the role of cloud services.
On SearchCompliance, Joe Rodriguez, a lawyer from the Washington, D.C. office of Morrison & Foerster, discusses a new proposed rule that is designed to protect consumers from unfair payday lending practices. Lastly, in this feature a panel of blockchain experts address important questions around blockchain security.
Dropbox is looking to brighten its enterprise allure with its new collaboration tools and partnerships. Can they help the file-sharing company solidify themselves as a force in enterprise collaboration? In this week’s Searchlight, Site Editor Fran Sales gets analysts’ takes on Dropbox’s strategy and what it means for the future of enterprise collaboration.
The recent Cloud Expo conference in New York brought consultants, workers and job seekers together to discuss all things cloud. In this Conference Notebook installment, Features Writer Jason Sparapani recaps the top cloud questions raised at the conference and key discussions on topics ranging from container storage to the internet of things.
“What kind of leader are you?” asks Joseph Flahiff, agility expert at Whitewater Projects Inc. In this tip Flahiff gives advice on how to become a successful delegator rather than a dreaded micromanager.
In our new CIO Minute series, SearchCIO gets CIOs’ and IT executives’ take on important topics. Check out our recent installments from the MIT Sloan CIO Symposium:
• CIO Minute with Craig Stephenson, managing director at executive search firm Korn Ferry, on how the CIO job description has changed over the past five years
• Three CIO Minutes with David Neitz, CIO at CDM Smith Inc., on why thinking like a financial adviser is critical for attaining IT-business alignment, the three types of innovation his organization pursues and how cost transparency is critical IT portfolio management
Also from the MIT CIO event: How Neitz drives business value using advances in computing power and HoloLens technology. Plus, Allison Mnookin, CEO at QuickBase Inc., talks about the power of digital empowerment and the value of a decentralized IT department.
Did someone say e-handbooks? We’ve got your fix right here. In these comprehensive, hot-off-the-presses e-handbooks, explore hyper-converged infrastructures, IoT data ownership questions and blockchain GRC.
According to Verizon’s 2016 Data Breach Investigations Report, human errors continue to be a top data security threat. In this Q&A with Bryan Sartin, managing director of the Verizon RISK Team and co-author of the report, Sartin details today’s biggest data security threats and why basic information protection processes can go a long way.
How should enterprises handle security and data governance amid the coming barrage of regulations aimed at IoT and big data? That’s what panelists at the MIT CIO event sought to address. This TotalCIO blog post explores the best bits from the “Big Data 2.0: Next-Gen Privacy, Security and Analytics” panel discussion. In another blog post from the MIT CIO event, Sparapani recaps CIO advice from expert panelists.
Now is the time to get familiar with blockchain technology and what it can do for your company. In this two-part feature story, Editorial Director Sue Troy talks to leading experts to form a step-by-step guide to launching a blockchain implementation at your organization. Part one gives a primer on blockchain’s potential impact and runs through the beginning stage of implementation while part two dives into the next stages of implementation, which involve proof of concept and a field test. In this Total CIO blog post, Troy also details the consumer use case for blockchain technology.
The recent Cloud Expo in New York drew a mix of industry newbies and veterans, all there to participate in a discussion on the current and future cloud computing environment. In this week’s Searchlight, Features Writer Jason Sparapani details the panel on “extreme computing” in the cloud and outlines the biggest action points and challenges for CIOs.
The TechOps team at online and mobile platform startup TaskRabbit is happy to collaborate on innovation. In this story, learn why the TechOps team is as jazzed about the next new thing as anyone else, how the team gets in the innovation mindset and why Bimodal IT isn’t part of the equation.
Out of the MIT Sloan CIO Symposium: discusses how Avnet and its customers are using the cloud to adapt IT processes to today’s digital marketplace.
On SearchCompliance, Data protection rules are for more than just keeping companies compliance — they can also improve security and maybe even the bottom line. IT expert David Loshin explains in this tip
Lastly, this Total CIO blog post talks about Millennials’ mindset and how companies should be making room for them in the workplace.
There’s no doubt that cyberthreats are getting smarter and more effective, but the same can’t always be said about companies’ security measures. This week’s discovery of the Tumblr, Myspace and Fling megabreaches — in which more than 642 million passwords were compromised — highlights the security knowledge gap present at many of today’s organizations. In this week’s Searchlight column, Site Editor Fran Sales explores the overall security skills gap and the dangers of relying on the old checkbox approach to security. Also in Searchlight, Google will now help users find their phone and remotely wipe its contents.
As the blockchain movement gains momentum, more questions are being raised about the technology’s potential. At the recent MIT Sloan CIO Symposium, a panel of experts attempted to address some of those questions, discussing the quest for blockchain use cases, the efficacy of private blockchains and whether regulators would embrace the technology.
Our coverage of the MIT Sloan CIO Symposium doesn’t end there. In these video interviews, SearchCIO staffers talk to several CIOs and IT executives to get their opinions on digitization, leadership, security strategies, governance and more.
Also from the MIT CIO event, an expert panel gives advice on novel ways to close the IT skills gap. Also, this Total CIO blog post recaps an MIT panel that explored the CISO role and reporting structure in an increasingly connected world. Lastly, this IT Compliance Advisor blog post recounts modern day security challenges and the future of cybersecurity, as discussed at the conference.
In this Conference Notebook, Executive Editor Linda Tucci talks with R. Lee Coulter, an organizer of the 2016 World BPO/ITO Forum, about the state of AI applications in IT and business process outsourcing.
Security should be a top priority for CIOs — now more than ever. To make sure that an IT department doesn’t misplace its security efforts, CIOs and IT executives need to develop a comprehensive IT security strategy that actually works. In this Essential Guide, explore the cybersecurity landscape and absorb the latest information around next-generation security architectures that can help you build an effective IT security strategy.
Plus: a not-so-ringing endorsement for robots in the workplace and what IT execs need to know for the future.