SearchCIO this week continued its video coverage of notable CIOs from the recent MIT Sloan CIO Symposium. Senior news writer Nicole Laskowski caught up with Dieter Haban, CIO at Daimler Trucks North America and a CIO Leadership Award finalist, to talk about how his postdoctoral work influenced his current leadership style, and how he’s learned not to look for particular IT skills when building a team. Watch these video excerpts to see why Haban has made the decision to invest in “Einsteins” and “Edisons.”
In other event news, features writer Kristen Lee swung by the Boston TechJam meetup last week, which teemed with local entrepreneurs, startups, leading tech companies, academics, venture capitalists and many others. The event is an effort by Boston’s tech groups and companies to promote Boston’s “innovation economy,” and comprised a startup pitch competition — and food trucks and beer! Lee’s blog post on TotalCIO shares some must-read advice for startup success.
In other SearchCIO matters…
Save the #CIOChat date: Is your organization ready for when inevitable disaster strikes? With information security a paramount concern for businesses, it’s time for CIOs to push disaster recovery (DR) and business continuity (BC) planning higher up the priority list. On June 25 at 3 p.m. EDT, join us and DR authority Paul Kirvan to discuss how to craft an effective DR/BC plan.
SearchCIO’s e-handbook on IT service management (ITSM) is out! If you’re struggling to manage IT services while keeping up with cloud, mobile and self-service IT, never fear: We’ve got recent stories and advice on innovative service management, how to make ITSM fun and the benefits of revamping your ITSM processes.
As high-profile data breach victims Target and Neiman Marcus move to add CISOs, it’s clear that CIOs and their C-level brethren should think beyond the financial hit of cybercrime. In this week’s Searchlight, associate site editor Emily McLaughlin details how the ever-burgeoning field of data theft is also costing these execs their job, and why they can’t afford to take a wait-and-see approach to security.
Michael Alton, one of Intel’s applied data scientists, says that the problem with big data is “relationships”: The more data businesses collect, the more data points they have to analyze, challenging CIOs to figure out how it all fits together. In Data Mill, Laskowski reports how Intel is using application programming interfaces to connect distributed computing systems to data science tools to make updating newer technologies more seamless.
As employees increasingly use their own devices to store enterprise data, the pressure is on for IT departments to prevent spyware from infiltrating them. In this Ask The Expert, application security expert Michael Cobb offers advice on choosing the best mobile device management product, creating an enterprise store, selecting mobile devices that offer container or workspace capabilities, and more.
It’s not only important to craft mission statements that clearly describe your organization’s purpose — it’s also necessary to continuously update them to reflect its current and long-term goals. Check out our collection of free IT mission statement examples from around the Web to ensure that you and your senior staff are communicating clear goals throughout your company.
Onto SearchCompliance happenings…
The U.S. Securities and Exchange Commission (SEC) recently published a risk alert that reveals its plans to assess the cybersecurity preparedness of more than 50 registered broker-dealers and investment advisers. Expert Jeffrey Ritter’s tip explains how the SEC’s initiative shows its strengthening stance toward regulating the private sector’s information systems and ensuring that their security strategies are adequate — and why your business should take heed.
Organizations that deal with financial data know the importance of making sure they comply with Payment Card Industry Data Security Standard (PCI DSS) requirements. But is passing the yearly PCI DSS audits all it takes? Nope, says Airlines Reporting Corporation’s security exec Rich Licato. While meeting compliance obligations is necessary, organizations must shift their corporate culture to one that targets overall operational risk reduction. Licato details how CISOs are in the prime spot to drive that conversation.
As bring your own device (BYOD) and mobility integrate into companies’ environments, information governance and compliance officers must employ a strong mobility management strategy to tackle the complex risks they pose. From sidestepping mobile security traps to developing a tough encryption policy, check out our top five tips to help bolster your mobile information governance strategy.