Remove Fractional CTO Remove Information Security Remove Training
article thumbnail

Internet Two Seeks Chief Cyberinfrastructure Security Officer

CTOvision

Ensures that the organization’s IT infrastructure is secured based on the assessed risk to the organization and the community it serves. Consults with service owners regarding their security risks and responsibility in minimizing those risks. MBA or other graduate level degree. Click here to apply online.

Security 293
article thumbnail

7 common IT training mistakes to avoid

CIO Business Intelligence

It’s widely recognized that introducing IT teams to the latest technology, business, and security advancements is essential for maximum performance and productivity. Is your organization giving its teams the training they need to keep pace with the latest industry developments? Training technology is also rapidly advancing.

Training 105
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Prepare for The Cyber Threat : What Executives Need to Know to Manage Risk

CTOvision

This post provides the views of the leadership team of Cognitio Corp , a consultancy with experience defending both government and commercial enterprises. Consider the human element: In most cases firms need to develop or refresh employee awareness, education and training program to focus on data security policies and procedures.

Insurance 150
article thumbnail

Tech Moves: Startup Haven grows team to lead new fund; PSL promotions; F5 Networks adds execs

GeekWire

NEU co-founder and CTO Claudius Mbemba is an investment director. F5 Networks hired Microsoft CVP Yvette Smith as SVP of customer success and business transformation and promoted Gail Coury to SVP and chief information security officer. They will both report to Chief Strategy Officer Tom Fountain.

Network 109
article thumbnail

Aligning security and business strategies

CIO Business Intelligence

Moreover, it may involve implementing processes and technologies to help reduce complexity and streamline cybersecurity management, and train employees to understand and follow best practices. Before this, Sean was involved in software development, technical support, and consulting services for a range of Internet security solutions.

Strategy 105
article thumbnail

Rethinking enterprise architects’ roles for agile transformation

CIO Business Intelligence

Enterprise architects can act as program sponsors, especially around infrastructure and risk-mediating investments required by IT operations, information security, and data governance functions. Architects are uniquely positioned to connect problems with solutions and provide objective input on where to prioritize investments. “The

Agile 145
article thumbnail

Regulatory uncertainty overshadows gen AI despite pace of adoption

CIO Business Intelligence

These complaints, filed by a variety of different copyright holders, allege the companies of training their AIs on copyrighted data—images, code, and text. You need to know where the data’s coming from, how it’s transformed, and what the outputs are,” says Nick Amabile, CEO at DAS42, a data consulting firm. AI is a black box.