IT Leadership

IT Leadership | News, how-tos, features, reviews, and videos

ship wheel captain leadership

sequence 01.00 01 38 43.still002
video

CEC Power Hour: Organizing for Digital with Martha Heller

Host Martha Heller discusses the challenges and opportunities in organizing the enterprise for digital transformation with her guests Dave Castellani, SVP, Business Information Officer at New York Life Insurance, and Kim Snipes, CIO...

Artificial intelligence and digital identity

What is IAM? Identity and access management explained

IAM products provide IT managers with tools and technologies for controlling user access to critical information within an organization.

hand gestures / gesturing / talking / communicating / conversation

Communicate or die: Tech leaders who bring information security to life

3 engaging technology leaders, what makes them effective communicators and their tips for effective AI/cyber communication.

screengrab
video

Mingis on Tech: All about the world of collaboration software

Given the changes in how work gets done these days – in remote offices, by workers on the go, at global companies with employees scattered around the world – collaboration is more important than ever. Here's a look at where things...

sequence 01.00 00 22 08.still001
video

CIO Leadership Live with Dick Daniels, CIO of Kaiser Permanente | Ep 14

In this episode, host Maryfran Johnson talks with Dick Daniels, CIO of Kaiser Permanente, about the forces shaping the healthcare industry, and how the healthcare consortium is taking on the tasks of improving IT productivity and...

template c100.00 01 22 23.still001
video

6 do’s and don’ts for crafting more effective SLAs

SLA adherence is no guarantee of outsourcing success. Here’s how to avoid seeing red when all the lights on the service delivery dashboard are green.

template c100.00 00 16 08.still001
video

New CIO? Your transition playbook in 10 (not-so-easy) steps

What you accomplish in the first six months of taking over an IT leadership role is critical. The following 10 steps will help you navigate the rocky transition, get your IT house in order and set a clear path toward a strong...

sequence 01.00 01 56 13.still001
video

CIO Leadership Live with Cathie Kozik, CIO at PSAV | Ep 13

In this episode, host Maryfran Johnson talks with Cathie Kozik, senior vice president and CIO at PSAV, an events space provider, about aligning tech projects to business goals, tapping into employees for innovative ideas and using...

template c100.00 00 06 05.still001
video

What is RPA? A revolution in business process automation

More CIOS are turning to robotic process automation to eliminate tedious tasks, freeing corporate workers to focus on higher value work. But RPA requires proper design, planning and governance if it's to bolster the business, experts...

template c100.00 01 50 13.still001
video

7 steps to becoming a thought leader

Learn how to help your career, your organization and the IT community by sharing your expert knowledge with others.

Dinosaurs / Tyrannosaurus Rex / Jurassic / Prehistoric / Ancient / Old / Outdated / Binary

3 characters from Jurassic Park that could’ve benefited from an IT disaster recovery plan

Jurassic Park and IT disaster recovery — how do they connect? In fact, we can learn some pretty valuable IT-DR lessons from the characters of the movie franchise.

businessman bridges gap

Do you know your gap?

Understanding risk exposure and security control inconsistencies is one of the most important aspects of a business’s security program. While this process may seem complicated at first glance, by following these steps, CISOs can more...

open door with sunlight shining through

New strategic vision needed to thrive as a digital enterprise

Is digital transformation really a revival of classic laissez-faire economics?

frustrated computer user

Why burnout happens in Information Security

Burnout happens a lot in the information security field because we put the professionals responsible for it in positions where they are set up to fail. To fix this, we need to stop treating security as an option or hindrance, and let...

red padlock cybersecurity threat ransomeware

How to make cybersecurity incidents hurt less

Cybersecurity incidents can be severe, and could potentially cripple your company or land them in hot water with government and regulatory officials. It is crucial that your company be prepared for possible cybersecurity breaches.

man walking garage

Baby steps: building a cybersecurity strategy

Building a cyber strategy can be overwhelming unless you start with large goals broken down into smaller milestones.

niall browne domo
Q&A

CSO Spotlight: Niall Browne, Domo

For Browne, the most important aspect of the CISO's job is understanding that the two most important people in information security are the customer and the hacker.

locked door with key

How pervasive is the insider threat in your company?

The Dtex 2018 Threat Report finds that 100 percent of companies have blind spots when it comes to the insider threat.

Load More