The journey to digital transformation isn’t easy, but it won’t even get off the ground without collaboration between IT and the business. In the latest Data Mill, Senior News Writer Nicole Laskowski reports from the CDO Summit on how to become a “digital master” by closing the IT/business gap and employing the right practices.
By submitting your personal information, you agree that TechTarget and its partners may contact you regarding relevant content, products and special offers.
Integrating hybrid systems is now a core IT service. Is your company equipped to handle it? In the most recent issue of CIO Decisions, learn how integration work is evolving and how new tools are emerging to enable that shift. Plus, read Executive Editor Linda Tucci’s Editor’s note on unlocking business value in a hybrid environment.
Chuck Robbins was chosen to succeed Cisco CEO John Chambers this week. How will this affect customers and the IT environment? In this Searchlight, Site Editor Fran Sales discusses Cisco’s transition with Timothy Zimmerman, vice president at Gartner.
TechTarget, SearchCIO.com’s parent media company, introduced Charles Alvarez as its first chief data officer, at a time when CDOs continue to proliferate across enterprises. In this TotalCIO blog post, Laskowski catches up with Alvarez to ask him questions about the CDO role and the integrity of corporate data.
Modern critical infrastructures present several security challenges. They key to industrial control system security, according to SearchCompliance expert Daniel Allen, is utilizing a combination of situational awareness and compliance strategies.
Over on the IT Compliance Advisor blog, Site Editor Fran Sales runs down the latest GRC-related news, starting with SEC’s call for more executive pay transparency and the proposed law that could allow firms to keep breaches under wraps.
Finally, catch up on a recent SearchCompliance webcast series titled “Pragmatic Cloud Encryption” to learn which SaaS and app encryption option is best for your business and key management and distribution practices in an encryption system.