Videos
-
Cancer Treatment Centers of America CIO: Passion for IT began at home
Her family's lighting business sparked Kristin Darby's passion for IT, but for the CIO at Cancer Treatment Centers of America, it's the patient connection that keeps her going.
-
Dell CIO's stint on business side was her 'best IT training'
Math and computer science geek Andi Karaboutis got her 'best IT training' during her stint in the business working on supply chain systems.
-
AT&T CIO built IT career by taking on 'least comfortable' roles
AT&T CIO and 2014 MIT Sloan CIO Leadership Award winner Thaddeus Arroyo built a CIO career by taking on roles where he felt 'least comfortable.'
-
The four cornerstones of a successful BYOD program
A BYOD security policy is one cornerstone of a successful BYOD program. Learn why flexibility is also crucial to BYOD success, in this webcast series.
-
BYOD acceptable use policy requires answering the five W's
A BYOD framework is built by asking the five W's on many acceptable use policy levels, explains mobility expert Craig Mathias in this webcast series.
-
The mobile device features core to a mobility management program
In establishing a mobility management program, organizations should insist upon a series of mobile device features, says expert Craig Mathias.
-
Develop a device-agnostic mobile device strategy
How can organizations develop a mobile device strategy with a device-agnostic bent? Mobility and BYOD expert Craig Mathias explains.
-
Mapping enterprise infrastructure is needed to improve cybersecurity
In this SearchCIO video, security expert Pauline Neville-Jones discusses why mapping IT infrastructure is needed to improve cybersecurity.
-
Private and public sectors must combine forces against cyberattacks
Pauline Neville-Jones outlines steps underway in the U.K. to combine government and private sector resources in the fight against cyberattacks.
-
Cybersecurity awareness could thrive if state government stepped in
Pauline Neville-Jones offers U.S. corporations a page out of her cybersecurity awareness campaign.
-
AIIM President John Mancini: How to get big data off the hype curve
AIIM President John Mancini talks about the right way to experiment with big data and why the most valuable CIOs are also the most vulnerable.
-
AIIM: Fish or cut bait on IT legacy systems? The answer's not so simple
In this SearchCIO video, AIIM President John Mancini talks with Linda Tucci about the CIO imperative to deal with IT legacy systems now.
-
Active cyberdefense: What are the legal limitations?
In this Ask the Expert video, attorney Randy Sabett discusses the complications and legal limitations of an active cyberdefense strategy.
-
HoneyBaked Ham IT and marketing veeps find secret sauce in big data
At HoneyBaked Ham, IT and marketing VPs Bill Bolton and Mark O'Brien constantly refresh the IT agenda with offerings that improve customer service.
-
At HoneyBaked Ham, IT and marketing follow the same menu
Rogue IT is off the menu at HoneyBaked Ham. The VPs of IT and marketing share how their teams work together to ensure customers get served right.
-
What is endpoint security, and how do you shore up the weakest links?
Why is endpoint security so important to today's CIO? In this webcast, consultant Jack Gold discusses shoring up the weakest links in an organization.
-
Seven steps to enterprise mobility security
In this webcast, analyst Jack Gold provides a plan for CIOs looking to protect endpoints and shore up enterprise mobility security management.
-
BYOD and security: A checklist for mobile democratization, deployment
`Is your organization squarely at the intersection of BYOD and security? In this webcast, analyst Jack Gold provides a checklist for mastering mobile.
-
Iconic shoe company leans on CIO, 'fast data' for better business returns
Red Wing Shoe CFO Ralph Balestriere explains how his CIO and a focus on fast data are helping the business make better decisions and increase returns.
-
A data analytics strategy for boosting business efficiency and revenue
Michael Koukounas, analytics leader at Equifax Inc., on leveraging a data analytic strategy to improve operations and business outcomes.
-
How to build a security roadmap with a cascade approach
Having trouble gaining upper-level support for security plans? In this video, learn how to build a one-page security roadmap with a cascade approach.
-
Guess CIO talks IT job skills and a CIO lesson learned
Guess CIO Michael Relich: 'No one cares what's under the hood; they just want the car to drive.'
-
Guess CIO designs a great iPad app for store buyers
Guess CIO Michael Relich had a change of heart about the iPad as a business tool. The fashion retailer's buying team is glad he did.
-
Architecting the enterprise of the future: CIOs offer a roadmap
At this year's MIT Sloan CIO Symposium, SearchCIO asked several IT leaders to discuss architecting the enterprise of the future.