Content Vault : Security | Recommended Content
CIO Leadership, Cloud, IT Performance, Security

Top five priorities for the CIO in 2015

Here's mine: Tell me yours here or in the #CIOchat Thursday, 2-3 p.m. ET.

Blog-post by,
Community Manager
,

What are the top five priorities for the CIO in the new year? That's our #CIOchat question for Thursday, 2-3 p.m. ET. 

I'll a stab at them and would love to hear back from CIOs. You can also respond at length in our new CIO Question. My five purposely avoided technologies except security because at this high level, they are obvious: cloud, Big Data, mobile, data centers etc.

(7)
   
(2) (2)

Business Issues, Security

Banks could make retailers pay for poor data and security governance

Federal judge rules in favor of banks.

Blog-post by,

A couple months ago, I reached out to a set of CIOs on the importance of good governance and security. All of them agreed that both were incredible important. However, one CIO retorted a very pointed remark by saying that “the IT leadership at these breached companies wasn’t stupid”. He continued by saying that when selling the rest of the C-Suite, the discussion needs to be about business outcomes and business benefits.  For this reason, he said that CIOs have struggled at selling the value of investments in governance and security investment.

(6)
   
(1) (1)

Business Issues, CIO Leadership, Technology, Applications, Big Data, Cloud, IT Performance, Mobility, Security, Services

Security in 2015: The Enterprise Begins to Favor Integrated Cloud Services vs. On-Premise Point Solutions

Blog-post by,
PaulLipman

Today’s Chief Information Security Officer (CISO) is faced with an over-load of point products (NAC, IDS, IPS, Endpoint Security, Web Gateway, Next Generation Firewall and APT to name just a few) provided by a plethora of vendors. These products are typically deployed in some on-premise configuration and tend to be difficult, if not impossible, to integrate together – resulting in severe visibility limitations across the organization’s security posture.

(1)
   
(1) (1)

Business Issues, Security

5 Information Security Trends That Will Dominate 2015

Cyber criminals "often use 21st century tools to take on 20th century systems."

Blog-post by,
Community Manager
,

This five trends this CIO.com article looks at are cybercrime, privacy and increasing regulation, vulnerabilities created by third party suppliers and partners, BYOx or bring your own anything or device (hellooooo, mobility); and how to educate people about the importance of good security practices.

(5)
   
(1) (1)

Business Issues, CIO Leadership, Technology, Applications, Security

Critical Application Resiliency

Building cyber security into apps from the start.

Blog-post by,

by Stan Wisseman

 

As threat actors grow in sophistication and effectiveness (as we’ve seen with Sony Pictures this week), organizations must enhance their understanding of failure states and their potential impacts. While infrastructure and systems also need to be resilient, applications are taking the brunt of successful attacks. We need to take more proactive steps to ensure that applications can resist attack.

(4)
   
(1) (1)

Business Issues, CIO Leadership, Technology, Security

Cyber security: Attacking from the Inside

Blog-post by,

Blog post by HP security strategist Dan Schulte

Attacking from the Inside

(8)
   
(4) (4)

Business Issues, Technology, Cloud, Security

16 Tips for Moving Your Workloads to the Cloud

Blog-post by,

By David Spark

Got a plan for your move to the cloud? If you do, you’re in the minority. According to a recent study, a mere 31 percent of those planning a move to the cloud actually have a strategy for migrating data and applications. The rest don’t.

To avoid the complexity and cost, we recommend heeding the following advice. It’s but a fraction of the endless recommendations we received from cloud experts who offered well-seasoned tips on what to do and not do when you begin planning to move workloads to the cloud.

(8)
   
(5) (5)

Business Issues, CIO Leadership, Technology, Security

Insider Threat - Who Cares?

Blog-post by,

Written by Neil Bryden and Dan Schulte, Security Strategists Hewlett Packard

Insider Threat – Who Cares?

(2)
   
(2) (2)

Business Issues, Security

What’s the deal with Shadow IT?

Blog-post by,

Shadow IT is a term that describes IT systems and solutions built and used inside organizations without IT approval. A group of people choosing to use a spreadsheet that they email back and forth instead of a company-approved means of storing and sharing crucial information, employees using DropBox to share notes and files, a developer who builds an unsanctioned custom piece of software to simplify or automate a repetitive task — all these are examples of shadow IT.

(2)
   
(2) (2)