Tag: cio
-
Building trust with the board through evidence-based proof
Tags: backup, business, cio, ciso, compliance, control, cyber, cybersecurity, data, finance, governance, incident, insurance, mitigation, regulation, resilience, risk, strategy, tool, updateBuilding a common language to get to “Here’s the proof of cyber resilience”: CISOs can reframe the discussion using data and evidence. Modern cybersecurity tools produce a large volume of data and information on how they operate at any point in time, the status of controls deployed, the validation of configuration and more. There’s an…
-
1.5 million AI agents are at risk of going rogue
The real issue is invisible AI, not rogue AI: Manish Jain, principal research director at Info-Tech Research Group, said that as the “exponential” speed of AI development continues, his firm, based on experiences with CIOs and CDOs, predicts that there will be more AI agents globally by the year 2028 than the number of human…
-
How SCSU Is Rebuilding Campus Technology for the AI Era
Southern Connecticut State University CIO Tom Armstrong on Modernization Priorities. Like other schools, Southern Connecticut State University is under pressure to modernize legacy systems, strengthen security and adopt AI. CIO Tom Armstrong must balance expanding research ambitions, student expectations and operational efficiency in an increasingly complex risk environment. First seen on govinfosecurity.com Jump to article:…
-
Should I stay or should I go?
Tags: access, breach, business, ceo, cio, ciso, communications, compliance, cybersecurity, finance, fraud, insurance, jobs, network, risk, strategy, supply-chain, update, vulnerabilityRed flag: Cognitive disconnect: Lack of access to executives and the board comes up repeatedly in Cybersecurity Ventures reports as a top reason CISO’s decide to leave their jobs, according to Steve Morgan, founder of Cybersecurity Ventures. He cites lack of support as another top reason CISO’s leave.Splunk’s 2025 CISO report found 29% of respondents…
-
Think agentic AI is hard to secure today? Just wait a few months
Cost effective fix: Do nothing: Kodezi’s Khan offers an interesting fix for that foundational problem: Don’t even try. He argues it’s a money pit that will never be fully resolved. Instead, he suggests pouring resources into creating a strict identity strategy for every NHI going forward. “Aim for containment rather than for perfection. You can’t really govern…
-
Was tun, wenn die Erpresser kommen?
Tags: access, ai, backup, bsi, cio, cyberattack, cybercrime, data, encryption, hacker, infrastructure, Internet, mail, password, phishing, ransomware, service, supply-chain, update, vulnerabilityRuhe bewahren und keine übereilten Sachen machen, empfiehlt Podcast-Gast Joanna Lang-Recht. intersoft consulting services AGMontagmorgen, 8:00 Uhr. Die Mitarbeitenden können sich nicht einloggen. Die Produktionsbänder stehen still, und auf den Bildschirmen prangen digitale Erpresserschreiben. Der Albtraum eines jeden CIOs ist wahr geworden: Ein Ransomware-Angriff hat den Betrieb lahmgelegt. Jetzt endet der Regelbetrieb, und der Ausnahmezustand…
-
Is Data Center Colocation Secure? What CIOs and CISOs Need to Know
Learn how secure data center colocation really is. A practical guide for CIOs and CISOs covering physical security, compliance, risk, and governance. First seen on securityboulevard.com Jump to article: securityboulevard.com/2026/02/is-data-center-colocation-secure-what-cios-and-cisos-need-to-know/
-
What boards need to hear about cyber risk, and what they don’t
In this Help Net Security video, Rishi Kaushal, CIO at Entrust, explains how security leaders should talk to the board about cyber risk. He focuses on what matters to board … First seen on helpnetsecurity.com Jump to article: www.helpnetsecurity.com/2026/02/02/cyber-risk-for-boards-video/
-
State CIO Group Seeks Federal Support for AI, Cybersecurity
NASCIO Agenda Focuses on AI Policy, Cyber Investment and Critical Infrastructure. State CIOs have lots on their plates, juggling multiple priorities from AI to cybersecurity. But the state IT programs don’t have to go it alone. The National Association of State CIOs’ 2026 agenda focuses on federal legislation – and federal funds – that could…
-
AI, Deepfakes Are Top Risks for Financial Crime Specialists
ACAMS Says Investigators Need Better Data, Architecture and AI-Based Detection. The financial system has a trust problem driven by artificial intelligence, and CIOs looking to prevent fraud and other financial crimes will only face more challenges as criminals find new ways to use AI to swindle, according to an Association of Certified Anti-Money Laundering Specialists…
-
Inside Arizona’s Push to Modernize and Secure Campus IT
CIO Elliott Cheu on Identity Upgrades, Unified Support and Research-Ready Systems. The University of Arizona is advancing a campus-wide modernization and security agenda by centralizing a previously fragmented IT environment and unifying core platforms that support teaching, research and operations, said Elliott Cheu, CIO at the university. First seen on govinfosecurity.com Jump to article: www.govinfosecurity.com/inside-arizonas-push-to-modernize-secure-campus-it-a-30619
-
Privacy Is Fueling the CIO’s AI Agenda
Cisco Research Shows How AI Is Reshaping Data Privacy and Governance. Enterprise data privacy and governance are undergoing fundamental shifts as the promised speed and efficiency of artificial intelligence come crashing into the realities of data risk and regulatory uncertainty. First seen on govinfosecurity.com Jump to article: www.govinfosecurity.com/privacy-fueling-cios-ai-agenda-a-30610
-
4 Sicherheitsrisiken, die CIOs bei der Nutzung von Krypto-Technologien oft unterschätzen
Krypto-Technologien haben sich vom Nischenexperiment zu einem strategischen Thema entwickelt. Für viele Unternehmen geht es dabei weniger um Spekulation, sondern um Infrastrukturfragen: digitale Identitäten, tokenisierte Prozesse oder neue Zahlungswege. Genau hier entstehen Risiken, die im Managementalltag leicht untergehen. 2026 stehen CIOs und CISOs vor einer paradoxen Situation. Einerseits wächst der Druck, sich mit Krypto-Technologien auseinanderzusetzen….…
-
Rethinking Cybersecurity in a Platform World
How Consolidation Is Forcing CISOs and CIOs to Rethink Security Architecture For more than a decade, enterprise security has relied on point solutions. Companies invested in separate tools – endpoint detection, firewalls, cloud security and IAM – each designed to address a specific threat or compliance requirement. But that approach is starting to break down.…
-
Wie künstliche Intelligenz Unternehmen, Infrastrukturen und Arbeitsweisen verändern wird
Im vergangenen Jahr habe ich viel Zeit mit CIOs, CISOs und Führungskräften aus den Bereichen Netzwerk und Sicherheit verbracht. Dabei kam ein Thema immer wieder auf: Die Komplexität nimmt zu, während die künstliche Intelligenz alles beschleunigt. 2026 wird aus meiner Sicht die KI von drei Umwälzungen geprägt sein: der Neuordnung der Datenströme durch KI-gesteuertes Edge-Computing,…
-
The Smarter Enterprise: A CIO’s Blueprint for 2030
IBM Survey Finds AI Strategy Now Hinges on Integration and Differentiation. The thriving enterprise of 2030 will be AI-first, not just AI-enabled, said IBM’s latest Institute for Business Value. The company surveyed more than 2,000 C-suite executives in the second half of 2025. The results paint a picture of the future of digital transformation dominated…
-
Acting CISA Director Pushed to Remove Agency CIO
The drama at the Cybersecurity and Infrastructure Security Agency is not helpful when it needs to focus on defending networks and infrastructure. The post Acting CISA Director Pushed to Remove Agency CIO appeared first on TechRepublic. First seen on techrepublic.com Jump to article: www.techrepublic.com/article/news-cisa-leadership-crisis/
-
CIO Playbook for Post-Quantum Security
Forrester’s Sandy Carielli on Quantum Readiness, Key Steps for Successful Migration. Quantum security migrations are multi-year, cross-functional projects that touch product, infrastructure and supply chains. While the scope of migration can be daunting, CIOs can follow several practical steps to make the project more manageable, said Forrester’s Sandy Carielli. First seen on govinfosecurity.com Jump to…
-
Zoho opens its first UAE datacentres to boost cloud adoption
New Dubai and Abu Dhabi facilities support data sovereignty, providing CIOs with local access to more than 100 Zoho and ManageEngine cloud services First seen on computerweekly.com Jump to article: www.computerweekly.com/news/366637278/Zoho-opens-its-first-UAE-datacentres-to-boost-cloud-adoption
-
Incorporating Geopolitical Risk Into Your IT Strategy
Scenario Planning Must Model Disruption, Strengthen Cyber Basics, Build Redundancy. IT organizations know how to plan for outages, but even the most rigorously designed strategy is vulnerable to the shifting winds of geopolitics. CIOs and technology leaders need to know how their organizations will respond to geopolitical disruptions, and scenario planning needs to be a…
-
Building a Solid IT Strategy in an Unstable World
Experts on How CIOs Can Avoid ‘Geopolitical Lock-In’ in AI, Cloud and Supply Chains. Geopolitical instability is a part of reality in 2026, and the stakes are high for CIOs who must rely on global supply chains to develop IT, artificial intelligence, cloud and cybersecurity strategies. First seen on govinfosecurity.com Jump to article: www.govinfosecurity.com/building-solid-strategy-in-unstable-world-a-30512
-
AI Supply Chain Risk: Will CIOs Be Held Accountable?
Growing Third-Party Breach Trend Is Spreading to AI Suppliers IT organizations have built processes for reducing vendor risk, but in the AI era, that operating model is being dismantled. Modern AI environments are built on dynamic external foundational models, countless APIs, open-source components and continuous data pipelines that pose risks. First seen on govinfosecurity.com Jump…
-
How CIOs can brace for AI-fueled cyberthreats
Executives are carefully tracking the rise in AI use for cyberthreats, bolstering basic preparedness tactics and increasing cyber spend in response. First seen on cybersecuritydive.com Jump to article: www.cybersecuritydive.com/news/how-cios-can-brace-for-ai-fueled-cyberthreats/809093/
-
How to eliminate IT blind spots in the modern, AI-driven enterprise
Tags: access, ai, api, attack, automation, awareness, cio, cloud, control, data, detection, endpoint, governance, group, identity, injection, intelligence, metric, monitoring, network, radius, risk, service, technology, tool, training, vulnerabilityThe more organizations lean on artificial intelligence (AI), spread workloads across different environments, and tie systems together, the harder it becomes for traditional security practices to present a complete picture of what’s going on. The result is a growing number of blind spots hidden misconfigurations, inconsistent controls, and unpredictable behaviors across systems and AI agents…
-
How to eliminate IT blind spots in the modern, AI-driven enterprise
Tags: access, ai, api, attack, automation, awareness, cio, cloud, control, data, detection, endpoint, governance, group, identity, injection, intelligence, metric, monitoring, network, radius, risk, service, technology, tool, training, vulnerabilityThe more organizations lean on artificial intelligence (AI), spread workloads across different environments, and tie systems together, the harder it becomes for traditional security practices to present a complete picture of what’s going on. The result is a growing number of blind spots hidden misconfigurations, inconsistent controls, and unpredictable behaviors across systems and AI agents…
-
10 Tough AI Questions for the 2026 Public-Sector CIO
With AI taking the top spot for 2026 government CIO priorities, what are the next-level questions that leaders must focus on regarding AI projects and trends in the new year? First seen on securityboulevard.com Jump to article: securityboulevard.com/2026/01/10-tough-ai-questions-for-the-2026-public-sector-cio/

