CIO Symmetry

October 21, 2016  6:10 PM

The CIO takeaway from Gartner Symposium

Mekhala Roy Mekhala Roy Profile: Mekhala Roy

This week, SearchCIO was at the Gartner Symposium/ITxpo in Orlando. In Searchlight, Features Writer Jason Sparapani provides a bird’s eye view of some of the predictions from Gartner analysts, the themes that surfaced at the sessions and what CIOs had so say.

At the Symposium, Gartner analyst Mark Raskino said that CEOs need CIOs’ help when it comes to leveraging digital products and services. Raskino also talked about how the chief executives want CIOs to focus on digital business innovation, as reported by Sparapani.

In these CIOMinute videos, O.C. Tanner Co. CTO Niel Nickolaisen discusses various aspects of mobile security. The best approach to minimizing mobile security risks is to begin with weighing in the associated risks and identifying the risk sources, he said. If your organization has an upcoming ERP update or is thinking about a replacement, then you may want to divide business activities into two broad categories, Nickolaisen said, speaking from experience. He also talks about the differences between mobile-only apps and enterprise apps and how development approaches vary for the two.

At the recent Predictive Applications and APIs conference in Cambridge, Mass., a panel discussion titled “Will predictive IoTs save us or kill us,” examined the various aspects associated with organizations trying to analyze their IoT data. Senior News Writer Nicole Laskowski highlights what experts had to say on the subject.

On our SearchCompliance site, Etay Maor, executive security advisor at IBM, discusses the steps an organization should take to combat the growing threat of ransomware. He also talks about how connected devices can be the next victim of ransomware attacks.

In this GRC news round-up, read about how security agencies in the U.K. unlawfully collected citizens’ data for years; the buzzword: regtech and Facebook’s decision to sign up for the EU-US Privacy Shield framework.

October 7, 2016  5:28 PM

Cambridge Cyber Summit: Security and privacy on the balancing scale

Mekhala Roy Mekhala Roy Profile: Mekhala Roy

This week, government officials, cybersecurity experts, IT executives and academicians met at the Cambridge Cyber Summit to discuss burgeoning cyber threats and attacks. In Searchlight, Senior News Writer Nicole Laskowski writes about the security and privacy debate that ensued. Also in Searchlight: Google Pixel unveiled; did Yahoo scan user emails?

We have three new essential guides for you! Have questions on blockchain? Our essential guide on the technology delves into its various aspects including implementation, trends, use cases, benefits and concerns, to help CIOs and IT executives better understand the key concepts of blockchain. This essential guide rounds up SearchCIO’s coverage of the 2016 MIT Sloan CIO Symposium and will help you learn the strategies and best practices that industry veterans recommend you should adopt to thrive in the digital economy. As CIOs, you should keep yourself up-to-date with new and emerging technologies. This essential guide delves into technologies like augmented reality, virtual reality, robotic process automation, 3D printing and blockchain that are talk of the town.

The October issue of our CIO Decisions e-zine is out! Executive Editor Linda Tucci explores robotic process automation, the hot new technology. Contributor Mary Pratt writes about Lucas Metropolitan Housing Authority’s transition to the cloud and Laskowski talks to Nationwide Mutual Insurance’s Guru Vasudeva to find out about his IT department’s lean management system.

“Where we’re heading is, as the volume grows and as the consumption grows, cloud is not really the place you want to be,” said New Balance vice president of IT Ravi Shankavaram, at the recent SIM Summit in Boston. Read why Features Writer Jason Sparapani says this comment spurred a “different sort of cloud buzz.”

Lyft envisions a future where private car ownership is non-existent and where it will operate a fleet of driverless cars. On TotalCIO, editorial assistant Christian Stafford writes about Lyft CTO Chris Lambert’s gameplan to achieve this vision. Lambert was speaking at a recent event at Northeastern University.

Over at our SearchCompliance site, this round-up of GRC news highlights the arrest of a former NSA contractor who was charged with the “theft of government property and unauthorized removal and retention of classified materials;” Snap’s photo and video-capturing glasses raises questions about privacy issues; MasterCard’s new facial-recognition payment-authentication app and presidential hopefuls talk about their cybersecurity plans.

Please follow @SearchCIO, @SearchCIOSMB and @ITCompliance to get updates on new stories throughout the week.

September 30, 2016  6:29 PM

Get ready to become a CIO business technologist

Brian Holak Brian Holak Profile: Brian Holak

CIOs are becoming business technologists — and that’s a good thing, according to speakers at this year’s SIM Boston Technology Summit. This week’s Searchlight delves into the act of becoming a business technologist — what it takes and how it can benefit CIOs.

Improving customer experience comes in many shapes and sizes, but more and more organizations — everything from football organizations to small municipalities — are tapping mobility to achieve new heights. In this feature, Site Editor John Moore explores how mobile, social and AR are a part of the New England Patriot’s — and other organizations’ — digital transformation strategy.

The consensus from the recent Gartner Catalyst Conference in San Diego: encryption isn’t foolproof. In this installment of Conference Notebook, Features Writer Jason Sparapani explains how making the data unreadable to unauthorized users doesn’t protect it from everything. In another Conference Notebook, Editorial Director Sue Troy catches up with HP Inc. CTO Shane Wall at the company’s recent Global Partner Conference in Boston to discuss three big macro trends that are shaping the company’s long-horizon strategy.

Procrastinate much? Stop! Now is the time for action, according to organizational agility expert Joseph Flahiff. In this tip he talks about stepping up to the plate and becoming a change agent at your organization.

What’s the best IT spending strategy for fast-growing startups? In this feature, Brian Morgan, CTO at platform startup Catalant, offers his advice for optimally shaping IT investments.

In this two-part tip, Dan McMahon, director at the management consulting and IT sourcing firm Pace Harmon, explores today’s IT vendor governance. Part one dives into the changing vendor governance responsibilities at leading companies; part two lays out the challenges and best practices in regards to adapting to a rapidly changing business environment.

Over on SearchCompliance, contributor Jeffrey Ritter discussed aligning governance and compliance processes in a recent four-part webcast:

Part 1: How compliance functions and information governance processes have evolved in the digital age

Part 2: Records management and compliance business processes can be a revenue-driver

Part 3: Three case studies exploring the intersection of information governance and compliance

Part 4: Strategies for generating revenue with smart compliance records management

Also on SearchCompliance, ICIT Fellow Robert Lord answers questions about the exploitation of protected health information on the deep web and gives advice on protecting these valuable records.

Please follow @SearchCIO, @SearchCIOSMB and @ITCompliance for our new stories throughout the week.

September 26, 2016  9:23 AM

Cybersecurity advice to live and work by

Jason Sparapani Jason Sparapani Profile: Jason Sparapani
Cybercrime, cybersecurity, hacks

The news that internet company Yahoo had information stolen on a half billion accounts in 2014 is further proof of this simple truth: Hacks are widespread and increasingly spectacular.

To counter the escalating and ominous threat of costly data breaches, companies need strong defenses in place, said former CISO and independent consultant Candy Alexander. She picked the brains of four cybersecurity experts at a panel discussion in Boston this month.

The talk, sponsored by Women in Technology International, focused on steps companies need to take to protect against hackers. The panelists left the small audience with these nuggets of cybersecurity advice:

Look at people, process and technology. Patty Patria, CIO at Becker College, in Worcester, Mass., stressed this trio of focus areas. Employees need to be trained on cybersecurity practices, processes need to be in place to determine what the most sensitive data is and a variety of tools need to assessed and acquired. And someone needs to orchestrate it all.

Patty Patria

Patty Patria (left), CIO at Becker College, speaks on a recent cybersecurity panel in Boston. Fellow panelist Janet Levesque, CISO at RSA, looks on.

“If you don’t have somebody on your staff who has the expertise in understanding how to do those assessments and look at people, process and technology, go hire somebody to do that.”

Make cybersecurity everyone’s business. Janet Levesque, CISO at security company RSA, said organizations need to help their employees understand that cybercriminals pose a threat not only to the company but also to them and to their families, too. As part of an awareness campaign this year, RSA plans to ask all its employees to talk to one family member about safely navigating the internet, Levesque said.

“If they understand security awareness at that level, then they translate those personal actions into their professional behavior.”

Gary Miliefsky, Janet Levesque

SnoopWall CEO Gary Miliefsky (left) speaks at a discussion on cybersecurity best practices in Boston while Janet Levesque, CISO at RSA, listens.

Assume you’ve been hacked. That’s because you might have, said Gary Miliefsky. The CEO at SnoopWall, which sells data breach technology, said many companies don’t find out that their computer systems have been infiltrated for months. The cure, he said, is looking beyond prescribed technology like antivirus software and shop for tools that go after those who want in. One example is a honeypot, a decoy system that tricks hackers into thinking they’ve found the real thing.

“Antivirus can’t solve all your problems because it’s reactive technology,” Miliefsky said.

Michelle Drolet

Michelle Drolet, CEO at Towerwall, gave cybersecurity advice at a recent discussion in Boston. On the left is SnoopWall CEO Gary Miliefsky.

Be strategic. Michelle Drolet, CEO at data security company Towerwall, said companies need “an overarching security policy” that covers components such as user awareness and responsibilities, vulnerability management — which identifies and addresses flaws in hardware or software — and cybersecurity tools.

“Building a solid information security program strategically for your organization is like building a house,” Drolet said. “You need that foundation.”

To get more cybersecurity advice, read the SearchCIO report on Women in Technology International’s recent panel discussion.

September 23, 2016  5:44 PM

Privacy concerns come rolling in with Google’s new AI-powered messaging app

Mekhala Roy Mekhala Roy Profile: Mekhala Roy

This week, Google rolled out its new messaging app Allo, which is drawing a lot of attention because of its use of artificial intelligence. In Searchlight, Associate Site Editor Brian Holak talks to analysts to find out the security and privacy issues associated with this chat alternative. Also in Searchlight: Yahoo confirms 2014 data breach had affected half a billion users.

Should Robotic process automation (RPA) be on the CIO’s radar? Senior Executive Editor Linda Tucci talks to IT veteran Allan Surtees to find out how he implemented RPA to speed up ‘swivel chair’ work that was previously being done by the staff at Gazprom Energy. Tucci also talks to analysts to get their take on RPA — the technology that can function as a catalyst for digital transformation, according to analyst Cathy Tornbohm.

Want to know how blockchain works? We’ve got you covered. In this infographic, Content Development Strategist Emily McLaughlin delineates how the technology, which is the foundation for the bitcoin digital currency, works; how to implement blockchain; it’s societal impact; what experts have to say and also provides a quick overview of terms associated with blockchain.

Data breaches are increasingly becoming more sophisticated and more common and the average cost of such a breach has increased by 29% from 2013, according to a 2016 Ponemon Institute study. Features Writer Jason Sparapani writes about a panel discussion on the steps that organizations should take to protect their data from such attacks. The event was sponsored by the Boston chapter of Women in Technology International.

In this SearchCIO handbook, we look into the role that the CIOs can play when it comes to enterprise mobile development application and the strategies and skills required to build such applications.

Over on our SearchCompliance site, I outline the main points from a report by the Institute for Critical Infrastructure Technology that highlights how such records are sold on the deep Web by the hackers and the impact medical identity theft has on victims.

In this roundup of recent GRC news, read about why Wells Fargo was fined $185 million; Compuware survey finds U.S. businesses with European clients are not ready for the European Union General Data Protection Regulation; hacker group called ‘Fancy Bear’ hacked into Olympians’ medical records and former secretary of state Colin Powell is the latest target of political hacking.

September 16, 2016  5:25 PM

Where are self-driving cars headed?

Mekhala Roy Mekhala Roy Profile: Mekhala Roy

This week, Uber rolled out self-driving vehicles in Pittsburgh. In Searchlight, Senior Executive Editor Linda Tucci talks with industry experts to find out what implications it will have on the auto industry and the trends that CIOs should watch out for. Also in Searchlight: the Galaxy Note 7 recall, changes at HP, hybrid cloud rules.

Contributor Mary K. Pratt writes about how Craig Patterson helped Lucas Metropolitan Housing Authority (LMHA) to achieve its mission of serving its community effectively, by convincing them to move to the cloud.  Patterson is the acting CIO at LMHA and also the president and CEO of his Texas-based management consulting firm Patterson & Associates.

On our TotalCIO blog, Features Writer Jason Sparapani writes about how the Sept. 7 Apple event got him thinking about the future of mobile devices in businesses. “When Apple introduced the iPhone 7 last week, with no headphone jack, and its wireless earbuds, it was sketching out a future in which devices connect – to other devices, to the internet, to people — without cords,” he writes.

This week on our SearchCompliance blog, I highlight the main points from a panel discussion on Preparing your Employees to be the Compliance Front Line at the recent Thomson Reuters Compliance and Risk Forum in Boston. During the session, panelists spoke about how organizations can prevent employees from engaging in ethical misconducts by providing them with training about the company culture from day one and how it is important to show employees that the company values proper ethics.

Please follow @SearchCIO, @SearchCIOSMB and @ITCompliance to get updates on new stories throughout the week.

September 9, 2016  4:57 PM

iPhone 7 is coming. CIOs, are you paying attention?

Brian Holak Brian Holak Profile: Brian Holak

Why should CIOs care about the new iPhone 7? Because employees and users care. In this week’s Searchlight, Features Writer Jason Sparapani details the key announcements from Apple’s recent event and explains the new iPhone’s significance for the enterprise and CIOs. Also in Searchlight: Hewlett Packard Enterprise has offloaded its non-core software assets onto British software company Micro Focus and Google has plans to acquire Apigee in order to improve APIs.

Smart cities are on the horizon. How are we going to get there? Reach out to everyone, according to experts at Perkins Solutions. Sparapani explains in this TotalCIO blog post.

Over on SearchCompliance, contributor Jeffrey Ritter details the value of well-designed compliance records management — specifically how it can generate new business revenue for businesses by feeding big data analytics engines valuable data. Plus, on the IT Compliance Advisor blog, Editorial Assistant Christian Stafford rounds up this week’s top GRC-related news, starting with Apple’s EU tax troubles.

Please follow @SearchCIO, @SearchCIOSMB and @ITCompliance for our new stories throughout the week.

September 2, 2016  5:24 PM

Time to bid adieu to traditional authentication methods

Mekhala Roy Mekhala Roy Profile: Mekhala Roy

This week, the news of the four-year-old Dropbox hack resurfaced. We now know that over 68 million users’ data were compromised. “What’s interesting about this hack is that it highlights how long stolen credentials can lie dormant on the dark web and then rear their ugly heads far into the future, often still valid,” Stephen Cox, chief security architect at SecureAuth, told associate site editor Brian Holak. In Searchlight, Holak talks with security experts to find out how multifactor authentication can help thwart such security breaches.

The Perkins School for the Blind in Watertown, Mass. is launching a mobile app designed to help the blind and visually impaired with locating bus stops. Features writer Jason Sparapani talks to officials at Perkins Solutions and one of the app developers at Raizlabs to find out how the app can help improve GPS accuracy. Also, read about how the mobile bus stop app came into being.

“The economics of process robotics promises to shake up the outsourcing sector, creating a new dialog among vendors, business executives and CIOs,” writes senior site editor John Moore.  In this feature, Moore talks to industry experts to find out how robotic process automation can affect the outsourcing sector.

SearchCIO contributor Stan Gibson writes about the growing popularity of augmented reality technology and the benefits of AR applications, which are set to become an essential part of the IT leaders’ mobile strategy.

The September issue of our CIO Decisions e-zine is out! Sparapani delves into the Google Apps for Work vs. Microsoft Office 365 debate; editorial director Sue Troy talks to Carl Lehmann to understand the hype surrounding the blockchain market; CEB’s Andrew Horne discusses the role that CIOs can play in their organization’s digital transformation and Moore writes about Arby’s use of the internet of things platform.

How can companies achieve success in a platform enterprise and what role does a CIO play? Holak interviewed Sam Palmisano, former CEO at IBM and current chairman at The Center for Global Enterprise, to find the answer. In another video interview, Palmisano discusses why traditional businesses need to shift to the platform business model and the challenges they will face during the transition process.

Sangeet Paul Choudary, founder of Platformation Labs, spoke with SearchCIO staff at the recent MIT Platform Strategy Summit about the main goal of a platform business model and highlighted the three main elements needed to achieve this goal.

On Total CIO, SearchCIO senior news writer Nicole Laskowski writes about the fate of the chief digital officer position.

This week on our SearchCompliance site, information governance expert Jeffrey Ritter discusses how connecting compliance and information governance programs can help generate new revenue for businesses.

Please follow @SearchCIO, @SearchCIOSMB and @ITCompliance to get updates on new stories throughout the week.

August 29, 2016  10:52 AM

What does the WhatsApp privacy policy update signify?

Mekhala Roy Mekhala Roy Profile: Mekhala Roy

Last week, the news of WhatsApp updating its privacy policy hit the stands. In Searchlight, executive editor Linda Tucci spoke with industry experts to find out how businesses can use mobile messaging platforms to communicate with customers to drive the customer-brand relationship and why the growing popularity of mobile messaging services should interest CIOs.

As more organizations embrace agile practices, a lack of agile project status reports is becoming the norm. In this tip, Joseph Flahiff, president and CEO of Whitewater Projects, delves into the factors that contribute to this trend and suggests ways to reverse it.

In this tip, Bob Egan, founder and CEO at The Sepharim Group, discusses the reasons behind the rise in mobile security issues and explains how the Johari Window technique can be applied to tackling these concerns.

In TechTarget’s annual IT priorities survey, 41% of respondents said they planned to increase their cloud spending in 2016. To help IT leaders and executives look closer at the state of cloud, we put together this infographic that showcases information on businesses’ cloud use collected from surveys conducted by Gartner, Clutch and Softchoice.

What is a platform enterprise? Associate site editor Brian Holak interviewed Sam Palmisano, former CEO at IBM and current chairman at The Center for Global Enterprise, to find the answer.

SearchCIO staff spoke with Sangeet Paul Choudary, founder of Platformation Labs, at the recent MIT Platform Strategy Summit in Cambridge, Mass. to discuss the platform business model. In these videos, learn the differences between a platform business model and the traditional pipe model; who needs to be involved when launching a platform business model; the key challenges that IT leaders in traditional businesses will have to face when setting up a platform model and why C-suite collaboration is key to digital business success.

In part one of this four-part webcast series on mobile cloud, analyst Kurt Marko identifies the business advantages of using mobile apps, and in part two he talks about why the cloud can alleviate some mobile app development challenges. In part three Marko lists the top MBaaS vendors and how organizations can benefit from their services, and in the final part of the webcast he provides recommendations to CIOs about implementing mobile cloud architecture.

Senior news writer Nicole Laskowski writes that if CIOs want to be technically forward, “they should start talking artificial intelligence, machine learning and software-defined security.” On TotalCIO, Laskowski highlights how these emerging technologies were featured in Gartner’s latest Hype Cycle report.

This week on our SearchCompliance website, Daniel Allen, president of N2 Cyber Security Consultants and N2 Connected Vehicle Technology, discusses a two-pronged approach to dealing with ransomware, a malware that is becoming increasingly common.

In this GRC news roundup, read about how U.S. voting machines could become a target for hackers in November, Mega Financial Holdings being fined $180 million for violating compliance regulations and how a data leak released by a group called “Shadow Brokers” unveiled a possible NSA hack.

Please follow @SearchCIO, @SearchCIOSMB and @ITCompliance to get updates on new stories throughout the week.

August 12, 2016  4:06 PM

Delta outage sparks disaster recovery concerns

Mekhala Roy Mekhala Roy Profile: Mekhala Roy

This week, the news of Delta Air Lines’ computer outage soared high, while Delta flights remained grounded. Over 2000 flights were cancelled and delays still continue. In Searchlight, associate site editor Brian Holak talks with industry experts to find out what IT executives can learn from the outage and why organizations need to step up their disaster recovery plans.

For CIOs, innovation often takes a back seat to “keeping the lights on” IT functions. We recently asked IT leaders, “What have you done in the past 12 months to reduce time spent on ‘keeping-the-lights-on’ IT functions?” Check out our photo story to find out what they have to say about implementing innovation strategies and the steps they have taken to spur innovation within their organizations.

Niel Nickolaisen, the chief technology officer at O.C. Tanner Co. and frequent contributor at our SearchCIO website, shares his thoughts on who should be in charge of a company’s mobile application development. He also discusses how his organization has benefited from its enterprise mobile application development process.

This week on our SearchCompliance website, information governance expert Jeffery Ritter shares his take on the business benefits of big data mining and understanding data provenance. In part one of this four-part webcast, Ritter explains how businesses can use well governed information to generate new revenue. In part two of the webcast, Ritter highlights six steps to support this mission. In part three of the webcast, he talks about how organizations can benefit from increasing data transparency and details his “velocity principle”. Stay tuned for the final part of the webcast.

Is your organization investing enough time and money in its GRC program? Did you know such investments can help boost an organization’s risk management strategies? SearchCIO contributor Mary K. Pratt explores how Airlines Reporting CISO Rich Licato improved the company’s IT GRC program. Pratt also talked with industry experts to find out the benefits of such investments.

The EU-U.S. Privacy Shield is here. Is your company considering self-certifying under the new framework? In part one of this two-part Q&A with BakerHostetler privacy lawyer Melinda McLellan, find out what factors your organization should be considering before joining the transatlantic data transfer framework. Stay tuned for part two of the Q&A.

Please follow @SearchCIO, @SearchCIOSMB and @ITCompliance to get updates on new stories throughout the week.

Forgot Password

No problem! Submit your e-mail address below. We'll send you an e-mail containing your password.

Your password has been sent to: