This site uses cookies to improve your experience. To help us insure we adhere to various privacy regulations, please select your country/region of residence. If you do not select a country, we will assume you are from the United States. Select your Cookie Settings or view our Privacy Policy and Terms of Use.
Cookie Settings
Cookies and similar technologies are used on this website for proper function of the website, for tracking performance analytics and for marketing purposes. We and some of our third-party providers may use cookie data for various purposes. Please review the cookie settings below and choose your preference.
Used for the proper function of the website
Used for monitoring website traffic and interactions
Cookie Settings
Cookies and similar technologies are used on this website for proper function of the website, for tracking performance analytics and for marketing purposes. We and some of our third-party providers may use cookie data for various purposes. Please review the cookie settings below and choose your preference.
Strictly Necessary: Used for the proper function of the website
Performance/Analytics: Used for monitoring website traffic and interactions
The IT function within organizations has become far more complex in recent years. This increased complexity means more companies will be relying on IT consultants to help navigate the changes and develop short-term and long-term strategies. What is an IT consultant? As an outsider, the consultant can see things clients cant.
Step 2: Understanding competitors Competitive analysis IT leaders must understand the competitive landscape to position their organization for success. With this information, IT can craft an IT strategy that gives the company an edge over its competitors.
Dun and Bradstreet has been using AI and ML for years, and that includes gen AI, says Michael Manos, the companys CTO. But 76% of respondents say theres a severe shortage of personnel skilled in AI at their organization, according to the August report. How do you build privacy, safety, security, and interoperability into the AI world?
Traditionally, cybersecurity has always focused on what can be hacked and not so much on who might be most at risk. Sunday Security , which is launching today and announcing a $4 million seed funding round, is trying to switch this up by offering cyber-risk protection for senior executives and other key personnel.
When addressed properly , application and platform modernization drives immense value and positions organizations ahead of their competition, says Anindeep Kar, a consultant with technology research and advisory firm ISG. Is your organization overdue for an IT systems update?
Under pressure to deploy AI within their organizations, most CIOs fear they don’t have the knowledge they need about the fast-changing technology. If organizations charge ahead without the necessary AI expertise, they can encounter many problems, including costly AI mistakes and reputational damage, Tkhir adds.
To help mitigate these risks, it’s necessary for IT leaders to increase their profile and visibility across the organization, and make sure they educate all potential users. “As As technologies evolve, CIOs still need to build mutual commitment and support for IT initiatives,” says tech consultant and author Gerald Leonard.
Data architecture definition Data architecture describes the structure of an organizations logical and physical data assets, and data management resources, according to The Open Group Architecture Framework (TOGAF). An organizations data architecture is the purview of data architects. Ensure security and access controls.
Organizations and vendors are already rolling out AI coding agents that enable developers to fully automate or offload many tasks, with more pilot programs and proofs-of-concept likely to be launched in 2025, says Philip Walsh, senior principal analyst in Gartner’s software engineering practice. This technology already exists.”
But the challenge many executives face is that they tend to focus on how their particular area aligns with overall goals, to the exclusion of other facets of the organization. Is your IT organization doing all it can to build strong alignment with business leaders and colleagues?
What is a CTO? The chieftechnologyofficer (CTO) is the senior executive who focuses on the technological requirements, opportunities, and challenges within an organization. What does a CTO do? What does a CTO do? Years ago, the CTO most often led the infrastructure function.
Could the secret to building Internet-connected devices that balance utility, safety, security, and privacy reside in the offices of Forcite, an upstart motorcycle helmet maker in Australia? READ MORE ON SECURING THE INTERNET OF THINGS. ”—Stephen Ridley, founder and chieftechnologyofficer, Senrio.
Vendors and consultants are always eager to share insights into innovations and trends, but exchanging ideas and opinions with colleagues and fellow IT leaders can often be invaluable. Here, the challenge is finding the organization or organizations that meet your specific needs and goals.
Effective IT strategy requires not just technical expertise but a focus on adaptability and customer-centricity, enabling organizations to stay ahead in a fast-changing marketplace. Agile practices allow organizations to remain flexible, adjusting projects and initiatives in response to evolving market conditions and customer feedback.
By Sean Duca, vice president and regional chiefsecurityofficer for Asia Pacific and Japan at Palo Alto Networks Some economists predict that we could soon face a global recession. This can be a challenge to cyber budgets in organizations where security is viewed primarily as a cost center.
Talk may be cheap, but when it comes to IT security, strategic conversations with colleagues, business partners, and other relevant parties can be priceless. Such discussions ensure the integration of cybersecurity initiatives and resource requirements in the enterprise’s business goals and objectives,” he adds.
And for some organizations, annual cloud spend has increased dramatically. As VP of cloud capabilities at software company Endava, Radu Vunvulea consults with many CIOs in large enterprises. For example, organizations that build an AI solution using Open AI need to consider more than the AI service.
However, as ecommerce has proliferated, security threats have increased, elevating cybersecurity to a board-level concern. Early cybersecurity threats were limited in their scope and damage, but current threats can ruin a business. Worldwide responses show that attackers are increasingly able to extract more sensitive data.”
Jim Chilton is an award-winning CIO who serves as the chieftechnologyofficer of Cengage Group, an innovative disruptor in the edtech space. As a business and technology executive, Chilton leverages his unique experiences to drive innovation and optimize technology throughout the company.
Security operations teams face a daunting task these days, fending off malicious hackers and their increasingly sophisticated approaches to cracking into networks. That also represents a gap in the market: building tools to help those security teams do their jobs. It’s time for security teams to embrace security data lakes.
The engineering ecosystem has undergone a massive paradigm shift – more languages, more frameworks, and minimal technical or procedural barriers to adopt new technologies or implement third-party tools and frameworks. Speed is great, but not when it comes at the expense of security.
According to a new IDC report , 98% of business leaders view AI as a priority for their organization and the research firm expects AI to add $20 trillion to the global economy through 2030. AI has moved out of the IT function and is being pushed out more widely in the organization,” says Ian Beston, director at Coleman Parkes Research.
2025 will be the “year of disruption” as organizations experience an increase in cyberattacks that halt business operations and impact end users. In 2023, the MTTE data from an organization was two days (and in some cases hours), down from nine days in 2021. This marks a significant change in how businesses approach ransomware.
SnapAttack , a threat hunting startup that was this week spun out from IT consulting firm Booz Allen Hamilton , has secured $8 million in Series A funding. This, in turn, helps organizations proactively identify potential security flaws, risks and gaps in their infrastructure before an incident occurs, the company says.
Chieftechnologyofficers are key players in the enterprise C-suite, oftentimes working in collaboration with CIOs at the forefront of new and innovative technologies. They are among the most important hires organizations are making today due to the business value that successful technology deployments can bring.
Although AI, machine learning, and generative AI — the more recent entrant in the space — are not new, they are becoming more mature, mainstream technologies. This has CIOs moving from experimenting and testing intelligence in pockets to scaling up deployments and rolling out intelligence throughout their organizations.
As SVP and CTO for the Boston Red Sox, Brian Shield is responsible for the strategic direction of technology, fan engagement, day-to-day IT operations, and cybersecurity in support of the team, their fans, and Fenway Sports Management. They have a pipeline into colleges and universities, like baseball scouting organizations.
Cybersecurity is one of the most high-profile topics for organizations today and one of their biggest sources of risk. This is an important step and these organizations must do forensic analysis in order to assess damage, scope of the attack and opportunities for immediate remediation. By Matt Southmayd.
The most pressing responsibilities for CIOs in 2024 will include security, cost containment, and cultivating a data-first mindset.” But in 2024, CIOs will shift their focus toward responsible deployment, says Barry Shurkey, CIO at NTT Data, a digital business and IT consulting and services firm.
Next, it looks at time management and tracking the lawyer’s time in an automated way and finally it includes a security component to help keep all of that informationsecure. “So basically, we bring machine learning and data processing to where the data is, not the other way around.
Yet unlike his peers, Wiedenbeck’s dual roles — the top technology executive as well as the transformation lead at Ameritas — are often at odds. As chieftechnologyofficer, Wiedenbeck is driving automation and IT modernization to reduce complexity and technical debt.
“The goal isn’t to restructure with nothing remaining from what was valuable and meaningful,” says Andrew Sinclair, a managing director in consulting firm Accenture’s technology strategy and advisory practice. He notes that IT organizations can usually work through almost any problem as long as the parties grow together.
If you are a technologist you no doubt have thoughts about security and how to improve your approach to enterprise-wide defense. In this educational presentation, CTOvision’s Bob Gourley will provide actionable information that will help you review your security architecture and enhance your level of automation.
While the average person might be awed by how AI can create new images or re-imagine voices, healthcare is focused on how large language models can be used in their organizations. However, the effort to build, train, and evaluate this modeling is only a small fraction of what is needed to reap the vast benefits of generative AI technology.
Another organization using Microsoft Copilot for productivity is Oral Roberts University in Tulsa, Oklahoma. Its accelerating the learning process, improving research, and helping students with assessments, says Mike Matthews, the universitys VP for innovation and technology. Youve got that down to a science, he says.
The following is an excerpt: When it comes to cybersecurity, what you don’t know about the nature and sophistication of threats can hurt your organization badly. In this Q&A, Mr. There’s basically four partners: the first one is Bob Gourley, who was the former CTO of the Defense Intelligence Agency.
I’ve been having discussions with several people recently about the role of the CTO (ChiefTechnologyOfficer) in very early stage companies. In December 2007, I described how I commonly take on an Acting CTO Role in a Start-up. That’s why Roger Smith puts the focus of the CTO on programming for the earliest stage.
Chief Cyberinfrastructure SecurityOfficer. Internet2® is a member-owned, advanced technology community founded by the nation’s leading higher education institutions in 1996. The CCSO reports to the Vice President for Network Services and will have responsibility for security across all Internet2 infrastructure programs.
The company wanted to leverage all the benefits the cloud could bring, get out of the business of managing hardware and software, and not have to deal with all the complexities around security, he says. We wanted to get the solution in and the data across, and ensure acceptance within the organization.
Now that organizations have returned to a new (somewhat) normal, CIOs appear to be focused on getting back to basics — and untangling tech debt incurred in making it through the past few years. One thing that is clear is we will need to partner and work across industries to solve truly big problems that all organizations are facing.”
The technology challenges in the national security community frequently require exceptional solutions, and many of those solutions can be leveraged in other sectors of the economy, including the finance world. They reported on a wave of companies with ties to the intelligence community "winning over" the world of finance.
Despite this recognition, CIOs ranked AI and cybersecurity far ahead of eliminating tech debt on their lists of priorities, according to the survey. Tech debt is boring Company boards and CEOs are putting pressure on CIOs to find innovative uses for AI, and the need for better cybersecurity never goes way.
Echoing the issues identified by the Educating the Analyst Panel, the disconnect between strategic and tactical concerns vis-à-vis cybersecurity quickly emerged as an important theme. Elkus and Moran also recognized the continuously changing nature of the cybersecurity landscape. See our overall event recap here.
To guide an organization through uncertainty, IT leaders must help ensure everyone in the company is on the same page, Srivastava says. It starts with establishing a clear set of agreed upon initiatives and outcomes for the organization,” he says. Miller says his organization is making the choice to invest in growth. “We
We organize all of the trending information in your field so you don't have to. Join 49,000+ users and stay up to date on the latest articles your peers are reading.
You know about us, now we want to get to know you!
Let's personalize your content
Let's get even more personalized
We recognize your account from another site in our network, please click 'Send Email' below to continue with verifying your account and setting a password.
Let's personalize your content