IT Strategy

IT Strategy | News, how-tos, features, reviews, and videos

service management
5 fumbling dumb mistake

question marks pavement

What does GDPR mean for an organization's hybrid IT strategy?

Effective May 25th, GDPR set off a wave of privacy updates that forced organizations to reevaluate their IT strategies. Without the right approach, your business will be impacted.

template c100.00 01 36 08.still001
video

Top 10 IT predictions: Competing in the digitized economy

Frank Gens, IDC’s senior vice president and chief analyst, presents the analyst firm's annual outlook for the next several years in IT, including the top 10 worldwide IT industry predictions and how they will impact every enterprise’s...

trophy gold silver

Getting security ‘right’

We love to talk about doing things right, there is no such things as doing it right. Perfect is the enemy of good and also of modern infrastructure.

template c100.00 00 18 11.still001
video

6 trends shaping IT cloud strategies today

From multi-cloud strategies to cost containment and container orchestration, CIOs are getting more pragmatic and prudent when taking advantage of the cloud’s economies of scale.

ransomware breach hackers dark web

Another night at the information security museum

Firms need to put fundamental information security processes in place to ensure they don’t become ransomware victims. It’s not that difficult, people.

8 small business security

Doing security policies right

To maximize the effectiveness of your business’ security policy, consider these five essential areas during the creation and deployment stages.

security incident responders life preservers

Two incident response phases most organizations get wrong

It's important to remember: Incident response isn't a thing, it's a process.

balance - measure - comparison - risk assessment

Want IT resiliency? Stop the see-saw of imbalanced attention

As cyber threats continue to grow among companies with sensitive data, IT must take a holistic approach to managing and mitigating these threats. Here’s how to bridge preventative and restorative measures for IT resiliency.

teamwork - collaboration

4 steps to creating a winning cybersecurity strategy in 2018

For mid-sized organizations and enterprises looking to focus on cybersecurity issues in 2018, here is a proven playbook to help creating a winning strategy.

cils 011 technologysthat will disrupt 2
video

Technologies that will disrupt business in 2018

From artificial intelligence to augmented reality, these dozen disruptive technologies and trends will begin driving how business gets done at forward-thinking organizations this year.

fact fiction debunk myths truth

6 myths CEOs believe about security

Want a more effective IT security strategy? Dispel your CEO and senior management of these common cybersecurity misconceptions.

blue padlock in circle pixels digital security padlock

9 policies and procedures you need to know about if you’re starting a new security program

Any mature security program requires each of these infosec policies, documents and procedures.

business people conference room collaboration boardroom

Having a boardroom conversation about cybersecurity and material risk

Those who embrace a material risk approach to addressing cyber threats will command the attention of senior leaders and steadily drive improvements into their organization’s security posture.

multiple-exposure image showing virtual connections and software inside and outside a human profile

What is a virtual CISO? When and how to hire one

A virtual CISO (vCISO) can bring both strategic and operational leadership on security to companies that can't afford a full-time person in the role.

risk assessment - safety analysis - security audit

The time is now for a comprehensive, risk-based approach to build cyber resilience

Most C-suite stakeholders are unsure of where their organization stands in its cyber security capabilities and resilience.

strategic planning notes and ideas

Building a cybersecurity strategic plan

These types of plans are cybersecurity road maps that establish pathways an organization can follow to improve its overall risk management approach.

equations on chalkboard 87173350

Rewriting the security equation in 2018

Understanding the future impact of changes to the security landscape.

overwhelmed man stressed analytics information overload

The Importance of Discerning Between Job Burnout and PTSD

It is important to discuss the key differences between PTSD and burnout in order for us to avoid making light of a serious psychological disorder

Load More