IT Leadership

IT Leadership | News, how-tos, features, reviews, and videos

template c100.00 00 16 08.still001
video

New CIO? Your transition playbook in 10 (not-so-easy) steps

What you accomplish in the first six months of taking over an IT leadership role is critical. The following 10 steps will help you navigate the rocky transition, get your IT house in order and set a clear path toward a strong...

sequence 01.00 01 56 13.still001
video

CIO Leadership Live with Cathie Kozik, CIO at PSAV | Ep 13

In this episode, host Maryfran Johnson talks with Cathie Kozik, senior vice president and CIO at PSAV, an events space provider, about aligning tech projects to business goals, tapping into employees for innovative ideas and using...

template c100.00 00 06 05.still001
video

What is RPA? A revolution in business process automation

More CIOS are turning to robotic process automation to eliminate tedious tasks, freeing corporate workers to focus on higher value work. But RPA requires proper design, planning and governance if it's to bolster the business, experts...

template c100.00 01 50 13.still001
video

7 steps to becoming a thought leader

Learn how to help your career, your organization and the IT community by sharing your expert knowledge with others.

frustrated computer user

Why burnout happens in Information Security

Burnout happens a lot in the information security field because we put the professionals responsible for it in positions where they are set up to fail. To fix this, we need to stop treating security as an option or hindrance, and let...

red padlock cybersecurity threat ransomeware

How to make cybersecurity incidents hurt less

Cybersecurity incidents can be severe, and could potentially cripple your company or land them in hot water with government and regulatory officials. It is crucial that your company be prepared for possible cybersecurity breaches.

man walking garage

Baby steps: building a cybersecurity strategy

Building a cyber strategy can be overwhelming unless you start with large goals broken down into smaller milestones.

niall browne domo

CSO Spotlight: Niall Browne, Domo

For Browne, the most important aspect of the CISO's job is understanding that the two most important people in information security are the customer and the hacker.

locked door with key

How pervasive is the insider threat in your company?

The Dtex 2018 Threat Report finds that 100 percent of companies have blind spots when it comes to the insider threat.

nasrin rezai general electric

CSO Spotlight: Nasrin Rexai, General Electric

The first female CISO at GE, Nasrin Rexai, stresses how important it is to know who you are, to lead according to your value system, and to think before your respond.

template c100.00 00 08 04.still001
video

How to pick the best project management methodology for success

Choosing the right project management methodology for the job is essential. Our guide to evaluating project management methodologies will ensure you pick the perfect fit for your next project.

CSO Spotlight Q&A > Tracy Reinhold, Everbridge

CSO Spotlight: Tracy Reinhold, Everbridge

How a successful career in the FBI along with the events of 9/11 put Tracy Reinhold on the path to a career in cybersecurity.

executive superimposed on buildings leadership

What makes CISOs successful?

Leadership and communication skills top the list of what's needed to succeed as a chief information security officer (CISO), while technical skills aren’t nearly as important.

multi tasking running executive race speed internet mobile laptop

Hack like a CISO

Developing the security officers' processes, strategies and techniques for managing their time, resources and teams.

eye binary IDS Intrusion Detection System

Cybersecurity operations: Don't wait for the alert

An SOC is a useful part of our cybersecurity arsenal, but its main benefit will be in helping to minimize damage from an issue that has already happened. A strong investigative team, on the other hand, can help to identify and resolve...

justin berman zenefits

CSO Spotlight: Justin Berman, Zenefits

Being wrong is good, embrace it, learn from it and grow from it, advises Berman. Being an effective security leader is about recognizing that "your job is to get the best answer, not to have it."

service management

IT service management: security’s best friend

Your IT service management (ITSM) teams can serve up good security practices with your help.

david smith nuix

CSO Spotlight: David Smith, Nuix

Winning the war against cybercrime is getting closer to reality as law enforcement dedicates more resources to cybersecurity investigations and improves cyber-related laws.

5 fumbling dumb mistake

The ostrich security strategy is now very risky

Ignorance of a serious security event is unreasonable, and just like ignorance of the law, it is no defense.

annalea llg flexential

CSO Spotlight: Annalea Ilg, Flexential

The cybersecurity threat is ever growing and its clear companies are still not following basic security practices. If they were, we wouldn’t be seeing so many breach notifications, says Ilg.

Load More
You Might Also Like