Remove Examples Remove Fractional CTO Remove Information Security
article thumbnail

InfoSec Policies and Standards: Some strategic context for those just diving into this world

CTOvision

Organizations are giving more priority to development of information security policies, as protecting their assets is one of the prominent things that needs to be considered. So an organization makes different strategies in implementing a security policy successfully. Get Management Support. Write Policies. Implement policies.

Policies 268
article thumbnail

Changing Government Requirement For Market Research to Continuous Market Assessment

CTOvision

During interview today with GovMatters.tv I'll be discussing an observation many of us in the enterprise technology community have been discussing lately. There is a growing consensus in the enterprise tech community (CIO, CTO, CISO) regarding the Cambrian Explosion of great capabilities in the tech sector.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

The state of CIO salaries: Rising to meet the prominence of the role

CIO Business Intelligence

“If you bring the right portfolio of experience,” including data knowledge, business acumen, and information security, “I think any industry will pay relative to their market for their selection of a CIO,” Stephenson says. CIO and CTO positions have become much more important as leadership is starting to look at AI, Janulaitis says.

Meeting 124
article thumbnail

Aligning security and business strategies

CIO Business Intelligence

In times of economic downturn, for example, cybercrime may increase as people turn to illegal activities to make money. For example, suppose an organization has multiple teams or departments responsible for different parts of its cybersecurity strategy. Data and Information Security, IT Leadership

Strategy 105
article thumbnail

The Sony Hack in Context

CTOvision

In sum, Sony’s losses are neither surprising nor unprecedented, merely a salient example of corporate vulnerability and the fact we are continuing to erect our massive information economy on sand. National Security Risks. The US military, by design, is more dependent on information technology than any potential adversary.

article thumbnail

National Cyber Security Hall of Fame Announces 2015 Inductees

CTOvision

We are proud to recognize their contributions and honor the influence they have had on the industry at large," said Jacobs, the first Information Assurance Director for the National Security Agency (NSA) and a respected cyber security consultant to government and industry.

Security 150
article thumbnail

Rethinking enterprise architects’ roles for agile transformation

CIO Business Intelligence

Enterprise architects can act as program sponsors, especially around infrastructure and risk-mediating investments required by IT operations, information security, and data governance functions. Architects are uniquely positioned to connect problems with solutions and provide objective input on where to prioritize investments. “The

Agile 145