article thumbnail

Spooky, Scary Tales of Vendor Management

SecureWorld News

Five little vendors access your data. The first one said, "For this company, vendor management doesn't seem to matta." The fourth one said, "Regulation requires vendor control." In honor of Halloween, it seems appropriate to address one of the scariest issues facing organizations today: vendor or supplier management.

article thumbnail

Key considerations to cancer institute’s gen AI deployment

CIO Business Intelligence

While GPT4DFCI isn’t allowed to be used for clinical purposes, as the governance committee has stipulated, it’s been reviewed by the privacy and information security teams for safety and efficacy. Vendor management Gen AI is more than just choosing between a free, insecure, public chatbot and a private, controlled one.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

20 IT management certifications for IT leaders

CIO Business Intelligence

IT security is a growing priority for businesses and the CISM certification is often required by government agencies hiring IT workers. This includes developing and maintaining cyber security programs, business analysis, strategic planning, and management tools.

article thumbnail

3 key roles for driving digital success

CIO Business Intelligence

To address these gaps, product and delivery leaders must rely on domain experts, including solutions architects , user experience (UX) specialists, Six Sigma analysts, information security leaders, and data architects. Information security specialists guide agile teams on shift-left security practices.

Agile 98
article thumbnail

New York Takes Bold Stance Against Hospital Cyber Attacks

SecureWorld News

Maryland: The Maryland Department of Health (MDH) has established cybersecurity requirements for hospitals under the Maryland Health Information Security Act. The act mandates comprehensive cybersecurity programs, including risk assessments, incident response plans, and vendor management practices.

article thumbnail

Cognitio’s Roger Hockenberry Cited in BizTechReports

CTOvision

In the aftermath of high-profile data breaches at Sony, Target and Home Depot, chief information officers (CIOs), chief information security officers (CISOs) and other IT security professionals both in government and the private sector are playing from behind. . Are you trying to forge those relationships?

article thumbnail

How to succeed as a fractional CIO

CIO Business Intelligence

Fractional CIOs are frequently tapped by small to midsize organizations that may not be able to afford the expense of a full-time CIO, says Randy Trzeciak, director of the masters of science information security policy and management program at Carnegie Mellon University’s Heinz College. What services do fractional CIOs provide?

How To 121