IT Leadership

IT leadership and management news, analysis, research, how-to, opinion, and video.

Stack of legal documents with compliance and regulatory stamp

What’s on CISOs Minds in 2018?

Business risk, the cyber supply chain, attackers, data security and awareness training top the list


European Union, EU

General Data Protection Regulation (GDPR) requirements, deadlines and facts

GDPR is a regulation that requires businesses to protect the personal data and privacy of EU citizens for transactions that occur within EU member states. And non-compliance could cost companies dearly. Here’s what every company that...

vulnerable breach hacked indecision

How to approach business leaders about cybersecurity when they don’t follow the breach headlines

Hint: hit them where it hurts the most – their own personal reputation and livelihood.

umbrella businessman protection stormy dark insurance

Is compliance the best insurance for managing cybersecurity risk in 2018?

Cybersecurity challenges and risks continue to emerge as top threats to business as usual for large and small organizations alike. The ability to meet these threats requires understanding emerging standards. Compliance with these new...

sequence 01.01 03 38 06.still001
video

CIO Leadership Live with John Hill, CIO at Carhartt | Ep 5

In this lively one-hour discussion, show host Maryfran Johnson talks with Carhartt's CIO John Hill about the evolving role of the IT leader, the quest for innovation game changers and how Carhartt tackled digital transformation by...

cybersecurity boards

Hacking security awareness: the program-changing magic of the advisory board

Most successful company programs have a few common traits, one of them being an advisory board. Advisory boards can propel security awareness programs into uncharted levels of success, yet most programs today don't utilize this simple...

drowning in red tape bureaucracy ai machine learning

What does the GDPR and the "right to explanation" mean for AI?

Security teams increasingly rely on machine learning and artificial intelligence to protect assets. Will a requirement to explain how they make decisions make them less effective?

overwhelmed man stressed analytics information overload

The Importance of Discerning Between Job Burnout and PTSD

It is important to discuss the key differences between PTSD and burnout in order for us to avoid making light of a serious psychological disorder

template c100.00 00 09 19.still002
video

7 IT salary and hiring trends for 2018

Demand for tech talent will continue to outpace supply in the year ahead, while the mix of skills necessary to remain relevant in IT will undergo a significant shift.

overwhelmed man stressed analytics information overload

Cybersecurity job fatigue affects many security professionals

Infosec professionals face occupational hazards such as long hours, high stress levels, and career frustration that can lead to mental health issues.

CIO Leadership Live with MITRE Corp.
video

CIO Leadership Live with Joel Jacobs, CIO at MITRE Corp. | Ep 4

Show host Maryfran Johnson talks with CIO Joel Jacobs of MITRE Corp., a private non-profit research organization that provides consulting, engineering, and technical services for numerous federal government agencies. A big part of its...

hipaa compliance 1

Is your cloud service provider ready for HIPAA?

Is your industry’s compliance with the Health Insurance Portability and Accountability Act of 1996 covered in the cloud?

Stack of legal documents with compliance and regulatory stamp

2018 cybersecurity resolutions: check the health of your cyber compliance

Regardless of cybersecurity budgets, we can always optimize what we currently have, to better secure our organizations. The “basics” apply to every organization, of any size – if you don’t have all the boxes for compliance checked,...

recruiting thinkstock

Security Recruiter Directory

To find the right security job or hire the right candidate, you first need to find the right recruiter. CSO's security recruiter directory is your one-stop shop.

cio leadership live promo 004 maryfran Johnson
video

CIO Leadership Live: Watch live on Thursday, Feb. 1 at 2 pm ET

Join host Maryfran Johnson on Twitter (@CIOonline) for an in-depth interview with CIO Joel Jacobs of MITRE Corp., a private non-profit research organization that provides consulting, engineering, and technical services for numerous...

face off boxing battle man in the middle

Anatomy of a well-run red-team exercise

Red team exercises – and particularly “assume compromise” or “assume breach” exercises – generally provide the most insight into your blue-team’s readiness to face an attack.

businessmen with umbrellas risk protected storm

How to engage with the C-Suite on cyber risk management, part 4

Creating metrics to indicate risk.

Artificial intelligence and digital identity

What is identity management? IAM definition, uses, and solutions

Identity and access management products provide IT managers with tools and technologies for controlling user access to critical information within an organization.

Bank vault

Security myth: my admins would quit if I implement a password vault!

The issue of secure password vaulting and the concern that something like that could never work at your company.

Load More