IT Leadership

IT Leadership | News, how-tos, features, reviews, and videos

resume template job application recruit stack of paper by zhazhin sergey getty
questions to ask a vendor curious hand with question mark tablet ipad by stevanovicigor getty

A man and woman sit on opposite sides of an office desk, in discussion.

Security Recruiter Directory

To find the right security job or hire the right candidate, you first need to find the right recruiter. CSO's security recruiter directory is your one-stop shop.

CSO50 Winners 2021 [LOGO]

CSO50 2021 awards showcase world-class security strategies

Winners will be recognized at the annual CSO50 Conference + Awards taking place November 16-18, 2021.

Joanna Burkey, CISO, HP

HP CISO seeks to transform cybersecurity

HP CISO Joanna Burkey sees a pivot to business partnership as vital for cybersecurity’s success. Inspiring women to join the sector is essential to this shift.

vcmar think tank update
video

Creating a multicloud security architecture: IDG's CIO Think Tank

IDG convened 30 senior IT executives as part of our CIO Think Tank Program to explore key opportunities and challenges with multicloud – including security issues IT leaders face in building a true multicloud architecture. Join us as...

dashboard / report / metrics / results / analysis / management

How to write a cyberthreat report executives can really use

As savvy CISOs know, a well-crafted and well-timed cyberthreat report can help executives grasp what’s happening in the world of cybersecurity—and it just might replace those late-night phonecalls.

vcmar shira james copy
video

Strategies for elevating security to an evergreen business priority

PwC Chief Information and Technology Officer James Shira is an expert on managing security's big picture. With the growing focus on risk management from boards and senior leadership, James shares advice on keeping security and risk...

Artificial intelligence and digital identity

What is IAM? Identity and access management explained

IAM products provide IT managers with tools and technologies for controlling user access to critical information within an organization.

data scientist face in profile with binary numbers analystics

Top 5 skills a SOC analyst needs

Whether building a new security operations center or revamping an existing one, staffing it with analysts that are equipped with these skills should be priority number one.

businessman on a rock in a stormy ocean

Attracted to disaster: Secrets of crisis CISOs

In the aftermath of a security incident, new CISOs are often appointed to take over and lead through the chaos. Here are the skills and traits experts say these crisis CISOs need—and how to prepare yourself to rise to the occasion.

cio ciso avidxchange execs angelic gibson and christina quaine

Women IT leaders reset the CIO-CISO relationship

AvidXchange CIO Angelic Gibson and CISO Christina Quaine are bridging the gap between IT and security by drawing on their experiences as women rising the ranks in IT.

Audrey Gonzalez, senior information security analyst, General Dynamics Information Technology

How the Lift mentoring program gives women in cybersecurity a leg up

The Executive Women's Forum's Lift program connects mentees working in information security, risk management, and privacy with mentors who can help them blaze their own trails. For individuals in the program, the career impact can be...

boardroom job opening executive in silhouette empty chair new job

Does it matter who the CISO reports to?

Reporting relationships are more than lines on an org chart, they're lines of authority. Ultimately, who the CISO reports to may say more about an organization's maturity than it does about an individual's effectiveness.

CSO  >  secure mergers + acquisitions / floating puzzles pieces / abstract security mechanisms

7 critical IT policies you should have in place

Putting a framework of IT policies that should be the foundation of every company's security plan.

layered image of male executive holding thumbs up in CMYK

16 technology winners and losers, post-COVID

The coronavirus crisis has shaken up business as usual, with some IT strategies and tools rising to the occasion and others in line for a rethink or tough recovery post-pandemic.

sing yell announce microphone boy shout communicate perform by jason rosewell unsplash

3 ways to speak the board's language around cyber risk

Framing the cyber risk conversation in ways that resonate with the board will help close the chasm between cyber risk and enterprise objectives.

hand holding paper cloud for amazon web services logo

AWS chief Andy Jassy gets top job at Amazon as CEO Bezos steps down

The surprise announcement that Jeff Bezos will leave later this year and hand over the reins to AWS leader Andy Jassy marks a remarkable rise for Jassy. He began as a marketing manager in 1997 and started AWS in 2003.

resume handshake cv career job search interview

10 ways to prep for (and ace) a security job interview

You've landed an interview for that security job you've had your eye on. Now prepare to land the job with these 10 techniques to get noticed and make an impression

Tech Spotlight   >   IT Leadership [intro]   >   One glowing arrow leads a pack of other arrows.

What IT leadership looks like in 2021

As IT leaders meet the challenges of the COVID era, only one thing is assured – more change is coming sooner than you think.

Load More