CIO Symmetry

April 9, 2016  5:46 PM

Microsoft jumps on blockchain bandwagon; Instagram roundup of Fusion symposium

Brian Holak Brian Holak Profile: Brian Holak
Blockchain, cybersecurity, Digital business

Blockchain, the distributed-ledger technology the cryptocurrency bitcoin is based on, is garnering a lot of attention. Although it isn’t mainstream yet, that could change after this week’s announcement that Microsoft is partnering with big banks to develop the technology. In this Searchlight, features writer Jason Sparapani details the partnership and looks at the future implications of blockchain adoption. Also in Searchlight: IT spending expected to dip and Trump hotels get hacked — again.

If you missed any of the action from Fusion CEO-CIO Symposium, we’ve got you covered. In this Instagram roundup, Senior News Writer Nicole Laskowski chronicles sessions on disruptive business models and digital investments via SearchCIO’s new Instagram account.

As SearchCompliance expert David Loshin explains, healthcare fraud is not a new problem; it’s been happening for over twenty years. Luckily, new proactive strategies that utilize data analytics are proving useful to organizations in helping combat multiple forms of healthcare fraud. Loshin details the techniques in this tip.

Speaking of healthcare, malware intrusions at hospitals is a growing problem, as exemplified in recent ransomeware attacks at hospitals across the U.S. In this TotalCIO blog post, Features Writer Jason Sparapani explores the reason there’s so many of these cyberattacks on healthcare organizations.

No organization is safe from cyberthreats in the digital age. In this SearchCompliance webcast, Diane Carlisle, IGP, CRM, executive director of content at ARMA International, explains how a strong information governance program goes a long way in alleviating cybersecurity challenges.

Please follow @SearchCIO, @SearchCIOSMB and @ITCompliance for our new stories throughout the week.

April 1, 2016  5:13 PM

The ‘cognitive enterprise’ at Fusion 2016; what happens after Apple-FBI case

Fran Sales Fran Sales Profile: Fran Sales
CIO, Compliance

This week, our reporters flew to Madison, Wis. to get the latest scoop at this year’s Fusion CEO-CIO Symposium, which this year focused on delivering customer experience through disruptive business models. Check out these videos to get business and IT experts’ take on various topics:

One day, Niel Nickolaisen had an epiphany. In the midst of a meeting about the state of his company’s products, it occurred to the CTO and SearchCIO columnist that perhaps it was time to start thinking of his company as a platform, laying its vertical products on their side so that the company can interoperate better. In his column, Nickolaisen lists four lessons he learned on his company’s journey to a platform-based business model.

If you’ve been keeping up with the Apple-FBI case, you’ll know that the FBI finally dropped its legal action against the Silicon Valley giant this past Monday, saying that it has found a “third party” to access the encrypted data on the San Bernardino shooter’s iPhone. But that hasn’t stopped technology and security experts from thinking of similar scenarios in the future, nor has it solved existing data privacy issues. It could give customers more sway in the privacy debate, however. Read more on these issues that Features Writer Jason Sparapani delves into in three blog posts.

Most companies don’t understand what it costs to get work done, but that’s set to change soon, thanks to a new economic arrangement called the on-demand economy. Thanks to performance analytics combined with certain technology platforms, a new era of strategic work management will result in improved cost control, increased revenue and a greater agility to adapt to market fluctuations, say labor experts.

Here’s what else was on SearchCIO this week:

Over on SearchCompliance..

This week, 1,500 cybersecurity professionals gathered at the SecureWorld Boston Conference to get the latest on security best practices in cloud, IoT, mobility and the supply chain. Associate Site Editor Brian Holak delves into what was covered, from incident response, data inventorying and more.

Speaking of customer privacy, various data privacy experts and researchers gathered last week at a public forum, hosted by Massachusetts Attorney General’s Office, to discuss how exactly to draw the line between protecting consumer privacy and helping the government keep the public safe. One panelist, Carol Rose, the executive director of ACLU of Massachusetts, called for greater transparency and accountability, and suggested an open, democratic public debate as a start.

Digitization can bring many benefits to a company’s regulatory compliance processes, such as automated big data management tools. But digitization and the storage of unstructured data that goes along with it can complicate these processes. In this webcast, Steve Weissman, founder of Holly Group, lays out some of these modern information governance challenges, the “big-box” theory of data governance and more.

Please follow @SearchCIO, @SearchCIOSMB and @ITCompliance for our new stories throughout the week.

March 25, 2016  4:43 PM

Assessing biometric surveillance in Brussels’ wake; data lake implementation tips

Brian Holak Brian Holak Profile: Brian Holak
Big Data, CISO, cybersecurity, Data lake, Data privacy

With Big Brother watching, what could go wrong? Biometric surveillance is drawing attention — and trepidation — in the wake of the tragic terrorist attacks in Brussels. In this week’s Searchlight, analysts discuss the present and future use of biometrics technology in national security efforts and share their logistic and privacy concerns.

Before starting your data lake implementation there are some things you need to know. In this Conference Notebook installment, learn three key ingredients that can make or break your company’s data lake system. Also, experts discuss why data lake governance is a critical component in modern data architecture.

Building a customer base is a dilemma every fledgling platform company faces. In this article, read about the experiences of Thumbtack, an online marketplace for home and other professional services, and get best practices for attaining critical mass.

CISOs have the important job of discerning the right technology to use and laying down the right policy, so just what skillset is required for the job? In this article, Features Writer Jason Sparapani and senior IT executives explore the balance of technical skills and business polish that are necessary for the CISO role.

3D printing is making its way into the enterprise. What should CIOs know? In this Essential Guide, catch up on SearchCIO’s recent 3D technology coverage including expert advice and columns.

The Internet of Things seems to be making its way into nearly every industry. The food industry is no exception. In this blog post, Site Editor John Moore talks about food grown locally with assistance from IoT in the form of sensors and mobile applications. Also on the blogs, Sparapani discusses the importance of communication and cooperation among public and private sectors following an attack on the power grid.

On SearchCompliance…

This year marked a change in the way finance industry regulators regulate. In this feature, find out how the Financial Industry Regulatory Authority is moving away from checkbox-style regulations and focusing instead on companies’ compliance culture.

Security is no longer just an IT issue — it’s a boardroom issue. In this blog post, Site Editor Fran Sales highlights cybersecurity issues the board should focus on when scoping potential risks.

Please follow @SearchCIO, @SearchCIOSMB and @ITCompliance for our new stories throughout the week.

March 18, 2016  4:38 PM

CISO reporting structure debate heats up; Congress assesses blockchain security

Brian Holak Brian Holak Profile: Brian Holak
Cyber security, Information security, IT leadership

Who should CISOs report to? That has been a longstanding question in the IT field, but, as cybersecurity rises to the tops of the business and IT priority ladders, it has taken a on new sense of urgency. Features Writer Jason Sparapani explores the CISO reporting structure in today’s threat-laden digital business environment.

Speaking of cyberthreats, the U.S. government is starting to assess the digital currencies that are associated with the growing number of cybercrimes such as the recent ransomware attacks on big-name news organizations, as well as blockchain, the technology that underpins these currencies. In this week’s Searchlight, Site Editor Fran Sales explains the ransomware attacks in relation to blockchain and discusses the urgent blockchain security questions that are on Congress’ and IT executives’ minds. Also in Searchlight, Apple is considering boosting iCloud encryption, and Amazon wants your face to be the new password.

Cybersecurity is no longer just an IT concern; it’s a business one. But communicating the value of GRC analysis to the board and determining accountability is easier said than done. In this feature, Sales explores the board’s role in managing cybersecurity and supply chain risks.

The Internet of Things (IoT) has arrived, and the enterprise will never be the same again. In this Essential Guide, get strategic best practices for getting your enterprise IoT initiative off the ground, and find out how IoT is impacting several IT disciplines and how IT executives should respond.

But that’s not all we have on IoT. In this SearchCompliance webcast, learn how a lack of focus on IoT security challenges during the design stage could create a number of data protection vulnerabilities.

Please follow @SearchCIO, @SearchCIOSMB and @ITCompliance for our new stories throughout the week.

March 11, 2016  6:02 PM

Soundsgood publishes playlists across streaming services; blockchain’s impact on Congress

Fran Sales Fran Sales Profile: Fran Sales

How is Soundsgood, a Paris-based startup, different from the plethora of other music streaming platforms available today? The company offers a so-called aggregation platform, a cloud-based service on which music influencers such as DJs and music critics can devise playlists that can be shared across other streaming services with which Soundsgood is partners (these include Spotify and Soundcloud). Senior Site Editor John Moore delves into how aggregation platforms work and the challenges ahead.

Blockchain, the technology underlying cryptocurrencies such as Bitcoin, is the biggest topic of conversation in the financial sector – many banks and financial services companies fear being disintermediated. But it’s only recently gaining the attention of U.S. Congress. More education is needed, said U.S. Rep. David Schweikert (R.-Arizona) at the DC Blockchain Summit last week. In her blog post, Editorial Director Sue Troy, delves into how Schweikert proposes to combat this knowledge gap.

After Safe Harbor was struck down late last year, the introduction of the EU’s General Data Protection Regulation (GDPR) seemed like good news to multinational companies. But with text’s 50 components (each of which the local EU authorities have claimed interpretive authority over), it seems less an overarching standard and more something companies will need extensive guidance to decipher. At this year’s RSA Conference, data privacy experts from Adobe, Google and Microsoft talk about how they think GDPR will impact their compliance processes once the regulation goes into effect in 2018.

There’s a lot of hype around 3D printing, with some calling it the next Industrial Revolution. Does the technology live up to it all? Columnist and former CIO Harvey Koeppel says yes – and more. In our March handbook, he lays out 3D printing use cases across various industries, and offers 12 CIO tips for how to take advantage of the technology.

Onto compliance matters…

While increasing cybersecurity threats have become the bane of today’s enterprises, they’ve brought one good thing: intelligence data that can be analyzed to mitigate future threats. But with companies increasingly moving data management to the cloud and third parties, it’s become harder for their security teams to keep up with the analytics data. Demetrios “Laz” Lazarikos, vArmour’s CISO, details the benefits of a proactive, risk-based approach to InfoSec monitoring in this SearchCompliance webcast.

As the Internet of Things gains popularity, companies are trying to catch up – and also to figure out the best strategies to protect the data stores and transmitted by these devices. This task is made more challenging for companies that have to integrate IoT with their legacy environments. In this video, Lazarikos talks about how IoT is impacting companies’ InfoSec strategies.

“A digital revolution need a trust revolution,” said Marc Benioff at the World Economic Forum last year. In Achieving Digital Trust: The New Rules for Business at the Speed of Light, a new book on the topic written by lawyer and frequent contributor Jeffrey Ritter, outlines how to approach this digital trust, as well as information governance, data security and commerce. Read an excerpt here.

Please follow @SearchCIO, @SearchCIOSMB and @ITCompliance for our new stories throughout the week.

March 4, 2016  4:22 PM

IoT can’t go on without proper security; innovation tips from Dow Jones

Brian Holak Brian Holak Profile: Brian Holak
Enterprise Security, Internet of Things

It seems like there’s no stopping the proliferation of connected devices, but there’s one thing that just might. If companies aren’t putting security first in the creation of these interconnected devices, IoT will crash and burn, according to a panel of experts at the recent RSA Conference 2016. In this week’s Searchlight, Site Editor Fran Sales explores IoT security best practices from the panel, including why it’s so important to incorporate security features early in the IoT development process. The Apple-FBI case was also a hot topic at RSA. In this blog post, Sales details why experts at the conference think Apple ‘goofed’ in its encryption fight with the FBI.

How does your team handle innovation projects? In part two of this Q&A (read part one here), Dow Jones’ chief innovation officer, Edward Roussel, discusses his team’s idea solicitation process and how they work closely with IT to further innovation at the company.

University IT departments have to do more today than ever before. In this feature, Features Writer Jason Sparapani details their challenge of maintaining a culture of accessibility while protecting their schools from ever-increasing data threats. In two blog posts, Sparapani also discusses why it’s a great time to be a university CIO and how students’ increasing tech savvy prove a challenge for college IT teams.

The next big thing in tech graphene sheetmight come in a small package. In this two-part story, learn about graphene sheets, atom-thick lattices of carbon that could allow solar power, computing and IoT to reach their full potential. In part one, learn about the origins and capabilities of this breakthrough energy-storing material. In part two, go deeper into the material’s IoT and computing applications and find out why it could be woven into all future computing.

Is your company considering investing in 3D printing? There could be many potential benefits to doing so, but there are also a lot of concerns that would need to be addressed. Senior News Writer Nicole Laskowski discusses the challenges CIOs and IT organizations will face with 3D printing technology, including counterfeits, massive data sets and continuous delivery.

Mobile apps are changing the way consumers and the enterprise get things done. In the latest issue of CIO Decisions, discover why a close IT-business relationship on mobile app development will soon become more commonplace as the need for apps increases.

Over on the blogs, Laskowski explores how the project management office could benefit from Agile and goes into the four facets of an Agile PMO. Plus, Executive Editor Linda Tucci talks about how consumer privacy rights have incited a new age of web content management. Tucci also breaks down the ITO/BPO 2016 outlook from global law firm Mayer Brown. Finally, Associate Site Editor Brian Holak finds out what our readers think about the lack of tech diversity and how we can address it.

Please follow @SearchCIO, @SearchCIOSMB and @ITCompliance for our new stories throughout the week.

March 3, 2016  9:59 AM

A great time to be a university CIO

Jason Sparapani Jason Sparapani Profile: Jason Sparapani
CIO, College, IT department

In higher education today, it’s good to be CIO — if you’re willing to change the way you work.

That’s according to Eric Hawley, who holds the top IT position at Utah State University. The digital age — with its cloud computing and ubiquitous mobile devices — has brought with it a makeover for the role of chief information officer. For Hawley, a university CIO serving a school of nearly 30,000 students, it has changed what the I stands for — to integration.

“We buy components, end users buy cloud components, and we build those together like snapping Lego blocks together,” he said. “And that’s different from the old legacy IT where our job was install software X and keep it running for 10 years.”

Eric Hawley

Eric Hawley

Today, Hawley’s central IT department provides and maintains cloud computing platforms and then hands them over to what he calls “the edge” — which includes IT units that work more closely with business or academic departments — “to get their hands dirty in that data to see what they can do.”

For example, his department has given IT staffers in USU’s college of education access to enterprise systems and data, which they’re using to improve ways to track and measure student progress.

Also on the edge are students. Hawley’s team caters to them by giving them file-sharing platforms they want to work with, like Google Drive and He also gives them “flipped classrooms,” or video-recorded lectures they can view on their smart devices whenever they want to. In the traditional model of learning, with students taking notes during lectures, Hawley said, “there’s no good way to make sure your notes were correct until the exam shows up.”

Robert Juckiewicz

Robert Juckiewicz

Robert Juckiewicz, vice president for IT at Hofstra University, agrees that it’s an exciting time to be in a university CIO role. His team is constantly looking for ways to use technology to improve how faculty teaches and how students learn — whether that’s offering computing courses or holding Hofstra’s version of the traveling science and innovation event Maker Faire.

“You don’t need to come to IT for a server. You can go anyplace. You don’t have to come here for expertise. It’s all over the place,” Juckiewicz said. “So what value can we add so that everybody just sees that and comes to us? I think that’s our challenge, and that means that we’ve got to think slightly differently.”

February 29, 2016  7:50 PM

Readers talk tech diversity in wake of Intel report

Brian Holak Brian Holak Profile: Brian Holak

A recent diversity report by Intel shows the chip maker is making strides towards a more inclusive workplace, but there’s still a lot of work to be done — and both Intel and the rest of the world know it. The real question is: what happens now?

After a Searchlight column exploring what Intel’s report says about tech diversity, SearchCIO readers were quick to give their own thoughts on why diversity numbers are so low in tech companies and what can be done to change it.

They start with the sad truth.

“Except for a few specific jobs, most applicants we see are white males,” Norman C. Berns, CEO and creative director at ReelGrok writes. “When beginning a project there’s usually time to search for more diversity, but in the throes of production, we need to act immediately. Our choices are overwhelmingly white males because they’ve been given greater opportunities, have amassed more experience and odds are good their supervisor will be a white male too. Sad to say, there are very few people of color and even fewer people who are physically challenged.”

Mike Corum, a test manager in the technology field, is similarly tired of the overwhelming presence of white males in IT positions and counts both time crunches and pressure from the human resource department as contributing factors.

“[Lack of women and minority candidates] has been a problem I’ve faced for years – nearly all of the resumes that I received would be from white males,” Corum writes. “Combine that with pressure from HR to fill an opening as quickly as possible, and you don’t have much opportunity to improve diversity.”

Safia Boot, HR and employee relations specialist, also points to HR as a reason for the lack of diverse hires.

“The lack of diversity in HR departments makes them poor role models,” Boot writes. “As a result they miss some very low-cost opportunities to make everyday changes to systems, processes and culture that would have a huge impact on the working lives of underrepresented groups to both attract and retain.”

Until the HR department changes their candidate profiling and hiring practices, then the rest of the organization will continue to move slowly on the issue, Boot notes.

Identifying the problems with the current tech environment is one thing, properly addressing them is another. Corum gives three suggestions for tackling the tech diversity issue.

“I think it needs to be addressed at the educational level,” he writes. “First, we need to educate non-IT people so they know that IT is more than servers and the help desk. Second, we need to start training children at an early age, and forget the ‘males do this’ and ‘females do that’ dichotomy. Third — and this one can really make a difference — recruit more women and minorities. Some of the best IT people I’ve worked with were women that were recruited from other areas of the company.”

What steps do you think need to be taken in order to fix the issue of tech diversity? Sound off below!

February 26, 2016  6:06 PM

Execs prepare for Apple-FBI privacy aftermath; the hype and payoff of 3D printing

Fran Sales Fran Sales Profile: Fran Sales

The Apple-FBI debate on data privacy versus national security rages on. It has spurred enterprises to look at their own consumer privacy policies. In his Searchlight column, Associate Site Editor Brian Holak talks to the experts about what CIOs should prepare for. And on Total CIO, features writer Jason Sparapani talks about the lack of a law that requires Apple to help disable encryption, ponders whether the Feds need Apple’s help to circumvent device encryption; and what life would look like under a new encryption law.

There’s been a lot of hype lately about the new technology of 3D printing, but it’s actually not new at all, says SearchCIO columnist and former CIO Harvey Koeppel — it’s in fact 30 years old. What’s more, we’re likely underestimating its potential impact on enterprises. In his column, Koeppel lays out various use cases for the technology and shares a 12-step program for CIOs looking to take advantage of the opportunities it offers. In Niel Nickolaisen’s tip, the CTO and SearchCIO columnist explains how CIOs can use 3D printing and other emerging technology to test their organization’s capacity to innovate.

Senior News Writer Nicole Laskowski elaborated more on the CIO role, outlining the ways IT executives can leverage 3D printing to become innovation partners to the business. Then, she turns to experts to get their take on whether businesses should adopt 3D printing technology or turn to third parties.

Also check out her two-part Total CIO blog post, in which Laskowski details what exactly preparing for 3D printing means according Shawn DuBravac, chief economist and director of research at Consumer Technology Association, and talks about how the technology is poised to expand beyond rapid prototyping.

Aligning IT with business objectives is no easy feat, especially when we’re talking about the United Nations. Luckily, Atefeh Riazi, CITO of the UN, likes a challenge. In this Q&A with Executive Editor Linda Tucci, she discusses how she’s making IT more efficient, agile and innovative.

IoT is becoming increasingly embedded in food safety programs, and as they do so, CIOs and CTOs may find themselves being more involved in these initiatives. In his blog post, Senior Site Editor John Moore talks with Bob Whitaker, chief science and technology officer at the Produce Marketing Association, to discuss what this would look like.

Taking advantage of analytics data can help companies prevent breaches and strengthen cybersecurity, but despite the wealth of this data, executives don’t take enough advantage of it, said Reg Harnish, CEO at GreyCastle Security. In a SearchCompliance Q&A with Senior Site Editor Ben Cole, he talks about why business leaders can’t afford to ignore analytics information.

Here’s what else was on SearchCIO and SearchCompliance this week:

Please follow @SearchCIO, @SearchCIOSMB and @ITCompliance for our new stories throughout the week.

February 26, 2016  2:59 PM

Millennial-led midmarket firms report greater SaaS adoption

Fran Sales Fran Sales Profile: Fran Sales
CIO, cloud, IDC, SaaS, SaaS applications, SMB

Midmarket firms are leading the way within the small and medium-sized business space when it comes to software as a service adoption, with 28% of these firms reporting that they have deployed SaaS apps, according to market researcher IDC’s latest SMB IT Decision Maker Survey, published February 2016. Furthermore, Microsoft Office 365 has been successful in the midmarket space, with 50% of these firms reporting adoption.

Midmarket businesses with Millennial-aged IT leadership were also 25% more likely to adopt SaaS than their peers, according to the survey’s findings. Millennial-led midmarket firms, or those whose leadership is composed of a majority of executives aged 35 years or younger, deploy an average of 10 SaaS apps, versus the average midmarket segment’s eight apps. This led IDC to conclude that the age of IT leadership is a good indicator of a midmarket firm’s inclination to purchase SaaS apps. Moreover, desktop as a service, travel booking and human capital management SaaS apps are more likely to be deployed among this subset.

The likely reason for Millennial-led midmarket firms’ greater propensity for SaaS adoption is that “Millennials have grown up with a higher level of trust in having a flexible mindset,” said Chris Chute, research vice president of the global SMB cloud and mobility practice at IDC.

In addition to Microsoft Office 365, the top-growing SaaS apps among midmarket firms (which IDC defines as those with 100 to 999 employees) include ERP, accounting/finance, business intelligence and platform as a service. This growth in apps indicates that midmarket firms are using SaaS to move toward a cloud-first IT environment, according to Chute.

He advises SMBs that don’t have a mostly Millennial-aged IT leadership but want to deploy more SaaS apps to test out a variety of cloud services.

“If one set from a particular vendor doesn’t work out, don’t be afraid to just move on and test-drive another one,” he said, citing no-hassle trials as a way to do so. “Customers don’t have to feel like they are committed to a given IT solution the way they used to,” Chute added.

Small-business SaaS adoption

In the meantime, SaaS adoption among small businesses is less mature, with only 10.8% deploying SaaS. These firms are mainly using SaaS to modernize their email and back-office functions, the top ones being storage, e-commerce capabilities, accounting and payroll.

However, the survey also found that IT-enabled small firms, or those with a formalized IT staff or function, are adopting SaaS in a similar manner as their midmarket counterparts. These businesses’ SaaS adoption rate is 25% — similar to the midmarket’s 28% — but Office 365 is also their second-most-adopted SaaS app.

For small businesses that are not yet IT-enabled but are looking to adopt more SaaS apps, Chute suggests identifying regular business processes that weigh down employee productivity, such as counting inventory monthly or visiting remote sites to audit projects. Then, these small firms can put a particular app to the test among a few employees to see if it fits.

“Oftentimes there’s an app, usually mobile, that has already been solving a regular pain point for other firms,” he said. “Internet searches, forums and word of mouth from other local businesses all can assist here.”

Forgot Password

No problem! Submit your e-mail address below. We'll send you an e-mail containing your password.

Your password has been sent to: