Remove Architecture Remove Culture Remove Energy Remove Security
article thumbnail

Making your enterprise architecture framework work for you

CIO

More organizations than ever have adopted some sort of enterprise architecture framework, which provides important rules and structure that connect technology and the business. For example, one of the largest energy companies in the world has embraced TOGAF — to a point.

article thumbnail

Your biggest barriers to digital transformation aren’t technical…they’re cultural

CIO

As an infrastructure and security practitioner with nearly 30 years of experience, I’ve witnessed periods of rapid change in the technology landscape. For decades, organizations have considered networking and security a cost of doing business. Our networking and security methods have been successful.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

Trending Sources

article thumbnail

Securing Our Nation’s Most Critical Assets: OT – IT Best Practices

Dots and Bridges

It is the cars we drive, the energy we consume, the water we drink, the food we eat. As our world continues to evolve into a connected network of networks, understanding how cyber, physical, and network security can mitigate risk across critical infrastructure is increasingly important. Seeking to Inform, Educate, and Enlighten.

Security 136
article thumbnail

Meet the 50 CISOs to Watch in 2024

Lacework

Lacework is proud to present our second annual group of 50 CISOs to Watch, a compilation of the most visionary and effective cybersecurity leaders in the industry. In a field driven by constant change, what sets a cybersecurity leader apart? With new cybersecurity regulations like the U.S.

Security 132
article thumbnail

Securing Our Nation’s Most Critical Assets: OT – IT Best Practices

Dots and Bridges

It is the cars we drive, the energy we consume, the water we drink, the food we eat. As our world continues to evolve into a connected network of networks, understanding how cyber, physical, and network security can mitigate risk across critical infrastructure is increasingly important. Seeking to Inform, Educate, and Enlighten.

article thumbnail

Securing Our Nation’s Most Critical Assets: OT – IT Best Practices

Dots and Bridges

Securing Our Nation’s Most Critical Assets: OT – IT Best Practices. It is the cars we drive, the energy we consume, the water we drink, the food we eat. Addressing the Technology-Humanity-Culture intersection. Seeking to Inform, Educate, and Enlighten. Cybersecurity Group Leader. Principal Cyber Security Scientist.

article thumbnail

Deep automation: A CIO weapon for turning disruption into opportunity

CIO

Here are some key hurdles and strategies to overcome them: Foster an automation culture by involving employees early and showcasing benefits. Consider adopting microservices architecture to make systems more flexible and easier to automate. Implement robust risk assessment and mitigation strategies encompassing automation initiatives.