article thumbnail

Product-based IT: 6 key steps for making the switch

CIO Business Intelligence

Product management is crucial for businesses looking to drive innovation and leverage technology as a differentiator, shared Roman Dumiak, executive-in-residence at the DePaul University Innovation Development Lab, at a recent Coffee With Digital Trailblazers event I hosted on the topic.

article thumbnail

Carnegie Mellon Software Engineering Institute CERT Insider Threat Program Manager Certification

CTOvision

They now offer a certificate program leading to an Insider Threat Program Manager (ITPM) certificate. Insider Threat Program Manager (ITPM) Certificate. The ITPM certificate program will assist insider threat program managers developing a formal insider threat program. WHO SHOULD ATTEND?

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

IT resiliency: Running two different hypervisors

CIO Business Intelligence

Rather than wait for a storm to hit, IT professionals map out options and build strategies to ensure business continuity. Following Broadcom’s late 2023 acquisition of VMware, numerous changes prompted customers and partners to reassess their strategies.

Vmware 312
article thumbnail

What is an IT consultant? Roles, types, salaries, and how to become one

CIO Business Intelligence

This increased complexity means more companies will be relying on IT consultants to help navigate the changes and develop short-term and long-term strategies. These include strategy consultants, systems consultants, and security consultants, among others, says Paul Farnsworth, CTO attechnology careers site Dice.

article thumbnail

How to Effectively Equip Your IG Program for the Perilous Journey Into the Future

Speaker: Andrew Ysasi, Vice President of Advocacy for Vital Records Control, President of IG GURU®, MS, FIP, FIIM, CIPM, CIGO, CISM, PMP, CRM, IGP, CIP, CSAP

Countless data breaches, hacks, and the never-ending changes being made to privacy regulations illustrate why it is critical for data-driven organizations to develop information privacy strategies that fill the gaps of their existing data management programs. Information privacy is a critical part of an IG program.

article thumbnail

Generative AI: The CIO’s Apollo moment 

CIO Business Intelligence

CIOs should consider an open talent model a hybrid strategy incorporating the enterprise version of gig work into the traditional employee base. Building scalable systems and adaptable talent strategies ensures readiness for the next wave of transformation. The traditional workforce model will need to evolve to keep up.

article thumbnail

Project management: Tips, tools, best practices

CIO Business Intelligence

Human resource management: Plan and identify human resource needs. Communications management: Plan stakeholder communications. Risk management: Perform qualitative and quantitative risk analysis, plan risk mitigation strategies. Procurement management: Identify and plan required procurements. Budget for surprises.