Remove Information Security Remove Security Remove Vendor Management
article thumbnail

Spooky, Scary Tales of Vendor Management

SecureWorld News

Five little vendors access your data. The first one said, "For this company, vendor management doesn't seem to matta." The fourth one said, "Regulation requires vendor control." And the five little vendors knew their customer hadn't discovered their gaps (in security).

article thumbnail

20 IT management certifications for IT leaders

CIO Business Intelligence

IT managers are often responsible for not just overseeing an organization’s IT infrastructure but its IT teams as well. To succeed, you need to understand the fundamentals of security, data storage, hardware, software, networking, and IT management frameworks — and how they all work together to deliver business value.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Key considerations to cancer institute’s gen AI deployment

CIO Business Intelligence

The governance group developed a training program for employees who wanted to use gen AI, and created privacy and security policies. While GPT4DFCI isn’t allowed to be used for clinical purposes, as the governance committee has stipulated, it’s been reviewed by the privacy and information security teams for safety and efficacy.

article thumbnail

3 key roles for driving digital success

CIO Business Intelligence

Product leaders are most responsible for a digital transformation initiative’s scope, priorities, and change management. They partner with agile delivery leaders responsible for delivering releases on time and meeting quality standards, including non-functional security, performance, and reliability acceptance criteria.

Agile 98
article thumbnail

New York Takes Bold Stance Against Hospital Cyber Attacks

SecureWorld News

Hospitals will be required to implement comprehensive cybersecurity programs, including vulnerability assessments, access controls, and security awareness training for their employees. I view it as a welcomed step in helping security teams secure the funding and support they need to keep our heads above water.

article thumbnail

Cognitio’s Roger Hockenberry Cited in BizTechReports

CTOvision

In the aftermath of high-profile data breaches at Sony, Target and Home Depot, chief information officers (CIOs), chief information security officers (CISOs) and other IT security professionals both in government and the private sector are playing from behind. . Our goal is always to help a company understand that risk.

article thumbnail

How to succeed as a fractional CIO

CIO Business Intelligence

Other responsibilities may include addressing digital transformation initiatives, guiding application development, and identifying security issues. The role can be particularly appealing for semi-retired and financially secure CIOs who wish to remain active in IT without the angst and drama that often surrounds C-level politics.

How To 121