CIO Symmetry

Dec 19 2014   7:42PM GMT

How to build an innovation team; 2015 IT predictions

Brian Holak Brian Holak Profile: Brian Holak

Tags:
CIO
Data
Data breach
Hack
innovation
IT
IT trends
Security
Sony

Innovation is on every CIO’s mind, but it doesn’t happen overnight, 7-Eleven’s Senior Vice President of Innovation Rob Chumley explains. Read Chumley’s eight tips on successfully jumpstarting your innovation team in the latest installment of SearchCIO’s Trailblazers series.

The fallout from the Sony hack saga continues: Is this the beginning of a new era of global, full-scale cyberthreats? Following the FBI’s announcement that North Korea was, indeed, behind the attack that exposed and destroyed millions of corporate files last month, Associate Editor Fran Sales details the events surrounding the hack and evaluates the current state of cybersecurity in this week’s Searchlight.

What IT will be hot in 2015? As the pace of innovation accelerates, it becomes harder to forecast the next big IT trends — but that doesn’t stop IT professionals from making their best educated guesses. CTO and SearchCIO expert Niel Nickolaisen lays out the CIO trends he’s taking seriously in 2015 and how he plans to respond.

Speaking of predictions, the International Institute for Analytics (IIA) recently released some of its own 2015 predictions — and storytelling, ensemble modeling and the “Analytics of Things” were ranked at the top. Read the rest of the IIA’s data and analytics top 10 predictions for 2015 in Senior News Writer Nicole Laskowski’s latest Data Mill. Then check out Laskowski’s take of the IIA’s prediction that analytics, machine learning and cognitive computing will increasingly supplant IT jobs.

Is your business looking to make the shift to digital? The cloud is essential in that process, according to Ray Wang, principal analyst and founder of Constellation Research. Read Wang’s tips on the transformative power of going digital with the cloud in SearchCIO’s Conference Notebook. In other Notebook installments, Executive Editor Linda Tucci talks about future cloud trends and decision-making advice with Microsoft, VMware and Cisco experts; and Oracle’s Christina McKeon gives four tips to help determine if you really are a digital disruptor.

Take your digital engagement strategy to the next level with advice from the participants in our #CIOChat, who provide examples of innovative customer engagement approaches that can help your business connect to the right people at the right time. Another #CIOChat recap highlights SearchCIO’s followers’ predictions and advice for keeping up with multichannel engagement trends.

According to MIT Medical Information Security Officer Roy Wattanasin, user empowerment is vital to cybersecurity in the digital age. In this video interview with SearchCompliance Site Editor Ben Cole, Wattanasin discusses why user empowerment should be a big part of businesses’ information security programs.

Have you jumped on the wearable technology bandwagon yet? As wearables continue their upward trend, more companies must start considering the impact of these devices on their IT strategies. In this Ask the Expert, Scott Christensen, director of technology at Edwards Wildman Palmer, LLP, discusses the information governance challenges created by wearable technology.

The more digital threats that arise, the more companies are considering initiating an active cyberdefense strategy. Hacking back still hasn’t gone mainstream, but what does the future hold for this legally ambiguous method of active defense? In this #GRCChat recap, participants forecast the future of hacking back and how companies can navigate the unclear waters of active cyberdefense.

Follow @SearchCIO, @SearchCIOSMB and @ITCompliance for our new stories throughout the week

 Comment on this Post

 
There was an error processing your information. Please try again later.
Thanks. We'll let you know when a new response is added.
Send me notifications when other members comment.

Forgot Password

No problem! Submit your e-mail address below. We'll send you an e-mail containing your password.

Your password has been sent to:

Share this item with your network: