Tag: cio
-
Trump picks private sector veteran for Pentagon CIO
Tags: cioNominee Kirsten Davies was most recently the chief information security officer at Unilever, a role she previously held at Estee Lauder Companies. First seen on therecord.media Jump to article: therecord.media/trump-picks-private-sector-veteran-for-dod-cio-position
-
Defense Industrial Base Strengthens Cybersecurity With CMMC
DOD’s Stacy Bostjanick Shares Cyber Strategies for Enhancing Cyber Resilience. Stacy Bostjanick, deputy CIO and chief of Defense Industrial Base Cybersecurity at the Department of Defense, shared a robust plan to protect the DIB from relentless cyberattacks through stronger standards and proactive cyber strategies. First seen on govinfosecurity.com Jump to article: www.govinfosecurity.com/defense-industrial-base-strengthens-cybersecurity-cmmc-a-28199
-
DOGE divides policymakers on federal IT modernization
A former federal deputy CIO testified that reauthorizing the Technology Modernization Fund will help the government continue IT modernization projects. First seen on techtarget.com Jump to article: www.techtarget.com/searchcio/news/366623328/DOGE-divides-policymakers-on-federal-IT-modernization
-
CIOs Say Security Systems Not Delivering Value For Money, Too Complex To Manage
New research by Logicalis reveals that CIOs are struggling to derive value from security investments amid changing threat landscape. According to its annual CIO Report, which surveyed 1,000 global IT leaders, more than half say their security patch systems have become too complex to manage effectively. The top concerns for CIOs include malware and ransomware…
-
Exposure Management Works When the CIO and CSO Are in Sync
Tags: access, ai, attack, business, cio, ciso, cloud, control, cyber, cybersecurity, data, data-breach, endpoint, finance, infrastructure, jobs, office, risk, strategy, technology, threat, tool, update, vulnerability, vulnerability-management, zero-dayEach Monday, the Tenable Exposure Management Academy provides the practical, real-world guidance you need to shift from vulnerability management to exposure management. In this post, Tenable CIO Patricia Grant looks at how the CIO/CSO relationship is key to a successful exposure management program. You can read the entire Exposure Management Academy series here. When I…
-
Reporting lines: Could separating from IT help CISOs?
Tags: attack, business, cio, ciso, cyber, cybersecurity, exploit, finance, insurance, metric, mitigation, risk, risk-management, skills, technology, vulnerabilityReporting to the CFO can improve discussions about funding: There’s art and science to secure funding. Number matters in getting budget approval, and cybersecurity is at pains to be seen as more than a cost center. However, two-thirds (66%) of CFOs don’t fully understand the CISO role and have difficulty seeing the tangible return on…
-
CISA gets a deputy director as it braces for major layoffs
Madhu Gottumukkala, a state CIO, lacks the homeland security experience of his two predecessors. First seen on cybersecuritydive.com Jump to article: www.cybersecuritydive.com/news/cisa-deputy-director-madhu-gottumukkala/746371/
-
CIO and digi VP to depart UK retail giant Asda as Walmart divorce woes settle
Tags: cioBrit retailer says troubled breakup with tech platform of former US owner nearing conclusion First seen on theregister.com Jump to article: www.theregister.com/2025/04/14/asda_cio_and_digital_veep/
-
Palo Alto CIO: AI Productivity Requires Secure Foundations
Chief Information Officer Meerah Rajavel shares Palo Alto Networks’ strategy for enterprise AI: securing models from the outset, combating adversarial use and leveraging increased productivity and automation to cut manual workloads across engineering, support, sales and HR. First seen on govinfosecurity.com Jump to article: www.govinfosecurity.com/interviews/palo-alto-cio-ai-productivity-requires-secure-foundations-i-5473
-
Tariff Wars: The Technology Impact
How CIOs and CISOs Can Navigate With Balance Tariff wars may hit technology leaders hard in 2025 as the Trump administration’s 10% import tax, plus reciprocal tariffs, spikes costs. CIOs and CISOs face supply chain disruption and heightened cyber risks. But they can adapt with cloud shifts, smart deals and better advocacy. First seen on…
-
The risks of entry-level developers over relying on AI
Tags: ai, attack, awareness, best-practice, cio, ciso, compliance, cybersecurity, exploit, jobs, law, malicious, open-source, programming, resilience, risk, skills, software, technology, threat, tool, training, update, vulnerabilityThe risks of blind spots, compliance and license violation: As generative AI becomes more embedded in software development and security workflows, cybersecurity leaders are raising concerns about the blind spots it can potentially introduce. “AI can produce secure-looking code, but it lacks contextual awareness of the organization’s threat model, compliance needs, and adversarial risk environment,”…
-
10 best practices for vulnerability management according to CISOs
Tags: api, attack, automation, best-practice, business, ceo, cio, ciso, control, cybersecurity, data, detection, framework, group, incident response, metric, mitre, penetration-testing, programming, ransomware, risk, risk-management, service, software, strategy, technology, threat, tool, update, vulnerability, vulnerability-management1. Culture Achieving a successful vulnerability management program starts with establishing a cybersecurity-minded culture across the organization. Many CISOs admitted to facing historical cultural problems, with one summing it up well. “Our cybersecurity culture was pretty laissez-faire until we got hit with Log4J and then a ransomware attack,” he told CSO. “These events were an…
-
CIOs and CISOs need a common strategy around AI copilots
First seen on scworld.com Jump to article: www.scworld.com/perspective/cios-and-cisos-need-a-common-strategy-around-ai-copilots
-
How CISOs can balance business continuity with other responsibilities
Tags: attack, backup, breach, business, cio, ciso, compliance, cyber, cyberattack, cybersecurity, data, data-breach, finance, framework, healthcare, incident, incident response, metric, nist, ransomware, resilience, risk, service, strategy, supply-chain, technology, threat, usa, vulnerabilityCIO-CISO divide: Who owns business continuity?: While CISOs may find that their remit is expanding to cover business continuity, a lack of clear delineation of roles and responsibilities can spell trouble.To effectively handle business continuity, cybersecurity leaders need a framework to collaborate with IT leadership.Responding to events requires a delicate balance between thoroughness of investigation…
-
Wichtig für CIOs: Der Weg zum passenden Incident-Management-Tool
IT-Systeme müssen jederzeit verfügbar sein Ausfälle kosten schnell Millionen und schaden dem Vertrauen. CIOs brauchen ein Incident-Management-Tool, das schnell reagiert und sich nahtlos integrieren lässt. Doch worauf kommt es bei der Auswahl wirklich an? First seen on itsicherheit-online.com Jump to article: www.itsicherheit-online.com/news/security-management/wichtig-fuer-cios-der-weg-zum-passenden-incident-management-tool/
-
Aufgabe des CIO: Mehr nur die Aufrechterhaltung des IT-Betriebs
Tags: cioFirst seen on datensicherheit.de Jump to article: www.datensicherheit.de/cio-rolle-it-betrieb-strategie-ziele
-
Trump shifts cyberattack readiness to state and local governments in wake of info-sharing cuts
Tags: advisory, cio, cisa, ciso, communications, cyber, cyberattack, cybersecurity, election, government, group, infrastructure, intelligence, Internet, metric, office, resilience, risk, russia, strategy, technology, threatCreating a national resilience strategy The EO requires the assistant to the President for national security affairs (APNSA), in coordination with the assistant to the President for economic policy and the heads of relevant executive departments and agencies, to publish within 90 days (by June 17) a National Resilience Strategy that articulates the priorities, means,…
-
CISOs are taking on ever more responsibilities and functional roles has it gone too far?
Tags: ai, business, cio, ciso, cloud, compliance, computing, control, corporate, cyber, cybersecurity, data, defense, framework, fraud, governance, healthcare, infosec, intelligence, international, Internet, jobs, law, mitigation, nist, privacy, regulation, resilience, risk, risk-management, service, skills, software, supply-chain, technology, threatth century alongside technology and internet-enabled threats, morphing to meet the demands of the moment. But the position hasn’t just matured; in many cases it has expanded, taking on additional domains.”The CISO role has expanded significantly over the years as companies realize that information security has a unique picture of what is going on across…
-
White House exempts cyber pros from mass layoffs; Judge reinstates CISA firings
CISA document process raises security concerns: It’s unclear why CISA posted its request for fired employees to send a password-protected attachment containing personally identifiable information to a publicly promoted email address. It’s also unclear how the password-protected document process would work. CISA did not respond to CSO’s request for clarification.Some cybersecurity professionals cast doubt on…
-
CIOs and CISOs take on NIS2: Key challenges, security opportunities
Tags: access, cio, ciso, compliance, cybersecurity, data, GDPR, group, healthcare, ISO-27001, jobs, monitoring, nis-2, office, organized, privacy, regulation, risk, skills, software, strategy, supply-chain, technology, trainingCompliance will be easier for some: There are CIOs and CISOs who have found NIS2 compliance relatively easy: those who have worked toward ISO/IEC 27001:2022 certification, whether they remained in the preparation phase or actually got certified.Those who have the certification report having found themselves with “80% of the work done”: the company is ready…
-
CISOs and CIOs forge vital partnerships for business success
Tags: advisory, ai, attack, breach, business, ceo, cio, ciso, cloud, communications, corporate, cybersecurity, data, data-breach, finance, firewall, framework, ibm, infrastructure, resilience, risk, risk-management, service, strategy, technology, threatVikram Nafde, EVP and CIO, Webster Bank Webster BankAs is the case at many companies, Webster Bank’s CISO Patty Voight reports into the CIO. While there is a direct line between the executive functions, Nafde says the structure is collaborative, not hierarchical, a significant evolution as the intensity of threats escalate, raising the bar for…
-
What is risk management? Quantifying and mitigating uncertainty
Tags: breach, business, cio, ciso, compliance, control, cyber, cyberattack, data, finance, flaw, framework, governance, healthcare, infosec, infrastructure, insurance, international, jobs, mitigation, monitoring, nist, risk, risk-analysis, risk-assessment, risk-management, software, strategy, technology, tool, vulnerabilityHow do organizations structure risk management operations?: Risk management has in some organizations traditionally been multicentric, with different departments or individuals within the org implementing risk management techniques in their work: Risk management is a component of good project management, for instance. IT leaders in particular must be able to integrate risk management philosophies and…
-
CISOs und CIOs auf dem Weg zur Cyber-Resilienz durch Data-Governance-Strategien leiten
Data Governance ebnet den Weg für Data Resilience. Durch die Datenklassifizierung können Unternehmen Lücken in ihren Business-Continuity-Plänen aufdecken und als zusätzlichen Vorteil ihre laufenden Tagesabläufe verbessern First seen on infopoint-security.de Jump to article: www.infopoint-security.de/cisos-und-cios-auf-dem-weg-zur-cyber-resilienz-durch-data-governance-strategien-leiten/a40058/
-
CISO vs. CIO: Where security and IT leadership clash (and how to fix it)
The dynamic between CISOs and CIOs has always been complex. While both roles are essential to an organization’s success, their priorities often put them at odds. The CIO … First seen on helpnetsecurity.com Jump to article: www.helpnetsecurity.com/2025/03/04/ciso-vs-cio/
-
Beyond Compliance: Why CIOs CISOs Must Lead with AI-Driven Strategic Performance Intelligence
Compliance isn’t enough. Learn why CIOs & CISOs must lead with AI-driven Strategic Performance Intelligence to enhance security, governance, and resilience. First seen on securityboulevard.com Jump to article: securityboulevard.com/2025/03/beyond-compliance-why-cios-cisos-must-lead-with-ai-driven-strategic-performance-intelligence/
-
IT 2025: Im Spannungsfeld zwischen Nachhaltigkeit, Sicherheit, KI und Geopolitik
Neben den Themen IT-Security und künstliche Intelligenz (KI) müssen sich Unternehmen in der IT im Jahr 2025 mit den aktuellen geopolitischen Entwicklungen und Nachhaltigkeit auseinandersetzen. Für seinen jährlich erscheinenden Digital Infrastructure Report hat der Netzwerkanbieter Colt Technology Services 1.500 CIOs und IT-Verantwortliche in Europa, Nord- und Südamerika, Asien und dem Nahen Osten befragt. Der… First…
-
CIO des Jahres 2025 Wettbewerb startet
Siegerinnen und Sieger des vergangenen Jahres jubeln über ihre CIO des Jahres Awards. Machen Sie mit und bewerben Sie sich dann stehen Sie vielleicht im Oktober 2025 auf der großen Gala-Bühne und dürfen sich über die renommierteste IT-Auszeichnung Deutschlands freuen. cio.de / Tobias TschepeEs ist wieder so weit: Der renommierteste IT-Award Deutschlands ist startklar. Bis…
-
The Technology Blueprint for CIOs: Expectations and Concerns
Protiviti-CII CIO Insights Reveal AI and Cybersecurity as Top Priorities for CIOs. AI, security and sustainable technology are set to be the defining trends for the digital future. This technological evolution is fueled by rapid advancements in AI-powered automation, the adoption of zero trust security frameworks and a growing focus on ESG integration in digital…
-
CISO success story: How LA County trains (and retrains) workers to fight phishing
Tags: ai, awareness, breach, business, chatgpt, cio, ciso, cloud, compliance, computing, control, corporate, cybersecurity, data, dos, election, email, endpoint, government, hacker, healthcare, incident response, jobs, law, lessons-learned, malicious, marketplace, network, phishing, privacy, regulation, risk, risk-management, service, software, strategy, supply-chain, tactics, technology, threat, tool, training, vulnerability(The following interview has been edited for clarity and length.)At first glance, LA County’s reporting structure who reports to whom seems, well, fairly complex.We have a federated model: I report to the county CIO. Each department acts as an independent business and has its own department CIO and information security officer. Their job is to…

