This week, SearchCIO was at the MIT CFO Summit. In Searchlight, Associate Site Editor Brian Holak writes about General Electric Company SVP and CFO Jeff Bornstein’s advice on how embracing change helps build successful business leaders. Also in Searchlight: Facebook and Google ban fake news; Samsung to acquire Harman International Industries.
MIT Media Lab’s Scalable Cooperation Group is working on a project titled Moral Machine, a crowdsourcing platform that aims to get people talking about machine ethics. Senior News Write Nicole Laskowski talked with Edmond Awad and Sohan Dsouza, research assistants who developed the site in June, to find out more about the project.
In this Q&A, academic, author and analytics expert Tom Davenport briefs CIOs on how to get started on artificial intelligence, the technology that topped Gartner’s list of top 10 technology trends for 2017.
Contributor Mary K. Pratt talked to Brad Hardin, global CTO of construction and engineering company Black & Veatch, to find out how the company deployed Microsoft HoloLens to bridge the geographical gap between its employees and job sites spread across the world.
Todd Kimbriel, State of Texas CIO, knows that legacy IT systems can be a barrier to innovation, but 58% of the State’s 4,130 business applications are legacy systems. Pratt talked to Kimbriel to learn about his game plan for remedying the situation.
In our updated Essential Guide on IT metrics, learn about the need for a “metrics-driven pipeline” for developers, ways to measure cloud ROI and tips to overcome cloud performance issues.
In this GRC news roundup on our SearchCompliance site, read about the future of Dodd-Frank compliance regulations and how tech companies like Twitter, Facebook and Google are urging President-elect Trump to back encryption and cut down on online government surveillance.
This week, the news of Donald Trump winning the U.S. presidential election made headlines. In Searchlight, Features Writer Jason Sparapani talks to experts to find out whether Trump’s unexpected win signals the defeat of big data and analytics. Also in Searchlight: Yahoo hack could kill deal with Verizon and WhatsApp launches two-step verification for beta users.
At the recent Gartner Symposium in Orlando, Fla., SearchCIO staff wasn’t just taking notes about Gartner’s technology predictions for 2017. In this Symposium roundup, we highlight snapshots from our Instagram posts during the event and brief about the major themes, predictions and sessions.
At the Cambridge Cyber Summit last month, experts talked about the evolving nature of cyber threats and highlighted insider threats as a growing cyber concern for organizations. Over on our SearchCompliance site, read about the steps that an organization should adopt to thwart such threats.
Here’s what you missed last week on SearchCIO and SearchCompliance:
Microsoft Teams is poised to take on Slack. What does that say about the nature of work and the future of messaging in enterprise terms? In this week’s Searchlight column, Executive Editor Linda Tucci explores those questions and digs into the topic of enterprise collaboration. Also in Searchlight: CenturyLink’s $34 billion deal; Google’s official rejection of EU antitrust charges.
This year’s SIMposium conference in Connecticut was loaded with strategic advice and case studies for CIOs and IT executives to soak in — and Executive Editor Linda Tucci was there to report it all. First, Pfizer CIO Jeffrey Keisling disclosed a leadership trait that would help up-and-coming IT leaders get ahead. Then, in a two-part story, executive coach Susan Cramm urges CIOs to train the business to become technology proficient and details a step-by-step process for how IT can empower the business.
In this installment of Conference Notebook, Editorial Director Sue Troy reports from the recent Gartner Symposium on how Gartner is redefining how we think of Mode 1 and Mode 2 by emphasizing the symbiotic nature of the relationship between the two modes. Also from Gartner Symposium, Features Writer Jason Sparapani explains how non-IT higher-ed workers are becoming more technology-proficient — due to the ease of use — and are often a step ahead of IT on new apps and tools. Plus, Sparapani describes the important difference between two similar words: digitizing and digitalizing.
In our latest issue of our CIO Decisions ezine, we explore Facebook’s venture into the enterprise collaboration market with Workplace and why cooperation between business and IT remains vital to enterprise success.
Over on SearchCompliance, Editorial Assistant Christian Stafford runs down the latest GRC-related news, starting with how new privacy rules passed by the FCC could influence AT&T’s plans for its acquisition of Time Warner.
This week, Microsoft announced a Windows 10 “Creators Update,” among other immersive computing features. “Windows 10 is the most ambitious upgrade to an operating system that Microsoft has ever developed,” the company said. In Searchlight, Associate Site Editor Brian Holak asks analysts what this update — and the company’s renewed focus on AR and VR — signify and what it means for CIOs.
Site Editor John Moore interviews IT leaders and organizational experts to find out how CIOs are working toward keeping pace with the changing work culture and how they are collaborating with the business side of their organization.
Best practice insight and technology company CEB recently collected IT budget data from about 150 companies worldwide. Here, CEB’s Andrew Horne highlights the five different trends in IT spending that the company unearthed from analyzing the data.
At the recent EmTech conference in Cambridge, Mass., AI was the talk of the town. Senior News Writer Nicole Laskowski reports on the “AI at work” session, where Tom Davenport of Babson College and Vikram Mahidhar, senior vice president of AI solutions at RAGE Frameworks, shared their thoughts on artificial intelligence and how the enterprise should prepare for getting “serious about the application of AI.”
“We are in a war for talent, we want to get the best people we can and we can’t wait forever,” Joel Jacobs CIO at The MITRE Corp. said at the recent SIM Boston Technology Leadership Summit in Newton, Mass. Jacobs was on a panel discussing “The Fight for Talent: How to Mentor, Groom and Grow your Team”. Over on TotalCIO, Executive Editor Linda Tucci gives an overview of what panelists had to say about IT talent management systems.
Tech-talk was not all that was happening at the Gartner Symposium last week. Features Writer Jason Sparapani writes about all the exciting things happening in-between session. Read to find out what “special event” attendees got to enjoy during the conference this year and look at the photos that Sparapani took at the event.
The EU-US Privacy Shield framework, which replaced the Safe Harbor law, went into effect on July 12 this year. Over on our SearchCompliance site, Contributor Caron Carlson details how it differs from the Safe Harbor law, how companies can self-certify, penalties for companies that do not comply by the framework principles and how the Privacy Shield principles strive toward raising consumer privacy standards.
This week, SearchCIO was at the Gartner Symposium/ITxpo in Orlando. In Searchlight, Features Writer Jason Sparapani provides a bird’s eye view of some of the predictions from Gartner analysts, the themes that surfaced at the sessions and what CIOs had so say.
At the Symposium, Gartner analyst Mark Raskino said that CEOs need CIOs’ help when it comes to leveraging digital products and services. Raskino also talked about how the chief executives want CIOs to focus on digital business innovation, as reported by Sparapani.
In these CIOMinute videos, O.C. Tanner Co. CTO Niel Nickolaisen discusses various aspects of mobile security. The best approach to minimizing mobile security risks is to begin with weighing in the associated risks and identifying the risk sources, he said. If your organization has an upcoming ERP update or is thinking about a replacement, then you may want to divide business activities into two broad categories, Nickolaisen said, speaking from experience. He also talks about the differences between mobile-only apps and enterprise apps and how development approaches vary for the two.
At the recent Predictive Applications and APIs conference in Cambridge, Mass., a panel discussion titled “Will predictive IoTs save us or kill us,” examined the various aspects associated with organizations trying to analyze their IoT data. Senior News Writer Nicole Laskowski highlights what experts had to say on the subject.
On our SearchCompliance site, Etay Maor, executive security advisor at IBM, discusses the steps an organization should take to combat the growing threat of ransomware. He also talks about how connected devices can be the next victim of ransomware attacks.
In this GRC news round-up, read about how security agencies in the U.K. unlawfully collected citizens’ data for years; the buzzword: regtech and Facebook’s decision to sign up for the EU-US Privacy Shield framework.
This week, government officials, cybersecurity experts, IT executives and academicians met at the Cambridge Cyber Summit to discuss burgeoning cyber threats and attacks. In Searchlight, Senior News Writer Nicole Laskowski writes about the security and privacy debate that ensued. Also in Searchlight: Google Pixel unveiled; did Yahoo scan user emails?
We have three new essential guides for you! Have questions on blockchain? Our essential guide on the technology delves into its various aspects including implementation, trends, use cases, benefits and concerns, to help CIOs and IT executives better understand the key concepts of blockchain. This essential guide rounds up SearchCIO’s coverage of the 2016 MIT Sloan CIO Symposium and will help you learn the strategies and best practices that industry veterans recommend you should adopt to thrive in the digital economy. As CIOs, you should keep yourself up-to-date with new and emerging technologies. This essential guide delves into technologies like augmented reality, virtual reality, robotic process automation, 3D printing and blockchain that are talk of the town.
The October issue of our CIO Decisions e-zine is out! Executive Editor Linda Tucci explores robotic process automation, the hot new technology. Contributor Mary Pratt writes about Lucas Metropolitan Housing Authority’s transition to the cloud and Laskowski talks to Nationwide Mutual Insurance’s Guru Vasudeva to find out about his IT department’s lean management system.
“Where we’re heading is, as the volume grows and as the consumption grows, cloud is not really the place you want to be,” said New Balance vice president of IT Ravi Shankavaram, at the recent SIM Summit in Boston. Read why Features Writer Jason Sparapani says this comment spurred a “different sort of cloud buzz.”
Lyft envisions a future where private car ownership is non-existent and where it will operate a fleet of driverless cars. On TotalCIO, editorial assistant Christian Stafford writes about Lyft CTO Chris Lambert’s gameplan to achieve this vision. Lambert was speaking at a recent event at Northeastern University.
Over at our SearchCompliance site, this round-up of GRC news highlights the arrest of a former NSA contractor who was charged with the “theft of government property and unauthorized removal and retention of classified materials;” Snap’s photo and video-capturing glasses raises questions about privacy issues; MasterCard’s new facial-recognition payment-authentication app and presidential hopefuls talk about their cybersecurity plans.
CIOs are becoming business technologists — and that’s a good thing, according to speakers at this year’s SIM Boston Technology Summit. This week’s Searchlight delves into the act of becoming a business technologist — what it takes and how it can benefit CIOs.
Improving customer experience comes in many shapes and sizes, but more and more organizations — everything from football organizations to small municipalities — are tapping mobility to achieve new heights. In this feature, Site Editor John Moore explores how mobile, social and AR are a part of the New England Patriot’s — and other organizations’ — digital transformation strategy.
The consensus from the recent Gartner Catalyst Conference in San Diego: encryption isn’t foolproof. In this installment of Conference Notebook, Features Writer Jason Sparapani explains how making the data unreadable to unauthorized users doesn’t protect it from everything. In another Conference Notebook, Editorial Director Sue Troy catches up with HP Inc. CTO Shane Wall at the company’s recent Global Partner Conference in Boston to discuss three big macro trends that are shaping the company’s long-horizon strategy.
Procrastinate much? Stop! Now is the time for action, according to organizational agility expert Joseph Flahiff. In this tip he talks about stepping up to the plate and becoming a change agent at your organization.
What’s the best IT spending strategy for fast-growing startups? In this feature, Brian Morgan, CTO at platform startup Catalant, offers his advice for optimally shaping IT investments.
In this two-part tip, Dan McMahon, director at the management consulting and IT sourcing firm Pace Harmon, explores today’s IT vendor governance. Part one dives into the changing vendor governance responsibilities at leading companies; part two lays out the challenges and best practices in regards to adapting to a rapidly changing business environment.
Over on SearchCompliance, contributor Jeffrey Ritter discussed aligning governance and compliance processes in a recent four-part webcast:
Part 1: How compliance functions and information governance processes have evolved in the digital age
Part 2: Records management and compliance business processes can be a revenue-driver
Part 3: Three case studies exploring the intersection of information governance and compliance
Part 4: Strategies for generating revenue with smart compliance records management
Also on SearchCompliance, ICIT Fellow Robert Lord answers questions about the exploitation of protected health information on the deep web and gives advice on protecting these valuable records.
The news that internet company Yahoo had information stolen on a half billion accounts in 2014 is further proof of this simple truth: Hacks are widespread and increasingly spectacular.
To counter the escalating and ominous threat of costly data breaches, companies need strong defenses in place, said former CISO and independent consultant Candy Alexander. She picked the brains of four cybersecurity experts at a panel discussion in Boston this month.
The talk, sponsored by Women in Technology International, focused on steps companies need to take to protect against hackers. The panelists left the small audience with these nuggets of cybersecurity advice:
Look at people, process and technology. Patty Patria, CIO at Becker College, in Worcester, Mass., stressed this trio of focus areas. Employees need to be trained on cybersecurity practices, processes need to be in place to determine what the most sensitive data is and a variety of tools need to assessed and acquired. And someone needs to orchestrate it all.
“If you don’t have somebody on your staff who has the expertise in understanding how to do those assessments and look at people, process and technology, go hire somebody to do that.”
Make cybersecurity everyone’s business. Janet Levesque, CISO at security company RSA, said organizations need to help their employees understand that cybercriminals pose a threat not only to the company but also to them and to their families, too. As part of an awareness campaign this year, RSA plans to ask all its employees to talk to one family member about safely navigating the internet, Levesque said.
“If they understand security awareness at that level, then they translate those personal actions into their professional behavior.”
Assume you’ve been hacked. That’s because you might have, said Gary Miliefsky. The CEO at SnoopWall, which sells data breach technology, said many companies don’t find out that their computer systems have been infiltrated for months. The cure, he said, is looking beyond prescribed technology like antivirus software and shop for tools that go after those who want in. One example is a honeypot, a decoy system that tricks hackers into thinking they’ve found the real thing.
“Antivirus can’t solve all your problems because it’s reactive technology,” Miliefsky said.
Be strategic. Michelle Drolet, CEO at data security company Towerwall, said companies need “an overarching security policy” that covers components such as user awareness and responsibilities, vulnerability management — which identifies and addresses flaws in hardware or software — and cybersecurity tools.
“Building a solid information security program strategically for your organization is like building a house,” Drolet said. “You need that foundation.”
To get more cybersecurity advice, read the SearchCIO report on Women in Technology International’s recent panel discussion.
This week, Google rolled out its new messaging app Allo, which is drawing a lot of attention because of its use of artificial intelligence. In Searchlight, Associate Site Editor Brian Holak talks to analysts to find out the security and privacy issues associated with this chat alternative. Also in Searchlight: Yahoo confirms 2014 data breach had affected half a billion users.
Should Robotic process automation (RPA) be on the CIO’s radar? Senior Executive Editor Linda Tucci talks to IT veteran Allan Surtees to find out how he implemented RPA to speed up ‘swivel chair’ work that was previously being done by the staff at Gazprom Energy. Tucci also talks to analysts to get their take on RPA — the technology that can function as a catalyst for digital transformation, according to analyst Cathy Tornbohm.
Want to know how blockchain works? We’ve got you covered. In this infographic, Content Development Strategist Emily McLaughlin delineates how the technology, which is the foundation for the bitcoin digital currency, works; how to implement blockchain; it’s societal impact; what experts have to say and also provides a quick overview of terms associated with blockchain.
Data breaches are increasingly becoming more sophisticated and more common and the average cost of such a breach has increased by 29% from 2013, according to a 2016 Ponemon Institute study. Features Writer Jason Sparapani writes about a panel discussion on the steps that organizations should take to protect their data from such attacks. The event was sponsored by the Boston chapter of Women in Technology International.
In this SearchCIO handbook, we look into the role that the CIOs can play when it comes to enterprise mobile development application and the strategies and skills required to build such applications.
Over on our SearchCompliance site, I outline the main points from a report by the Institute for Critical Infrastructure Technology that highlights how such records are sold on the deep Web by the hackers and the impact medical identity theft has on victims.
In this roundup of recent GRC news, read about why Wells Fargo was fined $185 million; Compuware survey finds U.S. businesses with European clients are not ready for the European Union General Data Protection Regulation; hacker group called ‘Fancy Bear’ hacked into Olympians’ medical records and former secretary of state Colin Powell is the latest target of political hacking.
This week, Uber rolled out self-driving vehicles in Pittsburgh. In Searchlight, Senior Executive Editor Linda Tucci talks with industry experts to find out what implications it will have on the auto industry and the trends that CIOs should watch out for. Also in Searchlight: the Galaxy Note 7 recall, changes at HP, hybrid cloud rules.
Contributor Mary K. Pratt writes about how Craig Patterson helped Lucas Metropolitan Housing Authority (LMHA) to achieve its mission of serving its community effectively, by convincing them to move to the cloud. Patterson is the acting CIO at LMHA and also the president and CEO of his Texas-based management consulting firm Patterson & Associates.
On our TotalCIO blog, Features Writer Jason Sparapani writes about how the Sept. 7 Apple event got him thinking about the future of mobile devices in businesses. “When Apple introduced the iPhone 7 last week, with no headphone jack, and its wireless earbuds, it was sketching out a future in which devices connect – to other devices, to the internet, to people — without cords,” he writes.
This week on our SearchCompliance blog, I highlight the main points from a panel discussion on Preparing your Employees to be the Compliance Front Line at the recent Thomson Reuters Compliance and Risk Forum in Boston. During the session, panelists spoke about how organizations can prevent employees from engaging in ethical misconducts by providing them with training about the company culture from day one and how it is important to show employees that the company values proper ethics.