cio

Results 101 - 125 of 1305Sort Results By: Published Date | Title | Company Name

The Keys to Digital Innovation for CIOs

Published By: Workday UK     Published Date: Apr 25, 2019
Technology is now shaking up the way we work. To help IT leaders navigate the best path forward, we created a digital magazine called CIO Perspectives. Read it for insights and guidance from leaders and visionaries on how to break free from day-to-day tasks and gain a greater perspective. Check it out now.
Tags : 
workday, workforce technology, digital strategy
    
Workday UK

CIO Perspectives Magazine: Digital Transformation

Published By: Workday UK     Published Date: Apr 25, 2019
Technology today is shaking up the way we work. To help IT leaders navigate the best path forward, we created a digital magazine called CIO Perspectives. Read it for insights and guidance from leaders and visionaries on how to break free from day-to-day tasks and gain a greater perspective. Check it out now.
Tags : 
    
Workday UK

The Keys to Digital Innovation for CIOs

Published By: Workday UK     Published Date: Apr 25, 2019
Technology is now shaking up the way we work. To help IT leaders navigate the best path forward, we created a digital magazine called CIO Perspectives. Read it for insights and guidance from leaders and visionaries on how to break free from day-to-day tasks and gain a greater perspective. Check it out now.
Tags : 
    
Workday UK

Scaling Innovation for Growth

Published By: Oracle     Published Date: Apr 25, 2019
In this second Tomorrow Talks, IDC Analyst, Philip Carter, and the Oracle Vice President of Digital Innovation, Neil Sholay, discuss the role of the CIO as the custodian of the innovation pipeline. The two experts talk about the value of managing and measuring the progression of innovation from scoping of idea, to prototyping, to making it to market.
Tags : 
    
Oracle

Der CIO der Zukunft

Published By: Workday DACH     Published Date: Apr 15, 2019
Betrachten wir den Buchstaben „I“ in CIO – „I“ für „Informationen“. Informationen bestimmen alles, was wir tun. Ohne Informationen werden keine Entscheidungen getroffen und ein zielgerichtetes Handeln ist kaum möglich. Die Informationsschnittstelle in einem Unternehmen ist der CIO. Er entwickelt und managt das Konzept, wie Informationen gesammelt, organisiert, gespeichert, verarbeitet und analysiert werden. Da Informationen immer mehr zur Währung der globalen Wirtschaft werden, verändert sich die Rolle des CIO: aufgrund seiner einzigartigen Fähigkeit, Informationen zu verstehen und zu verwalten, gewinnt seine Rolle an strategischer Bedeutung.
Tags : 
belegschafts technologie, digitale strategie
    
Workday DACH

The Keys to Digital Innovation for CIOs

Published By: Workday APAC     Published Date: Apr 11, 2019
Technology today is shaking up the way we work. To help IT leaders navigate the best path forward, we created a digital magazine called CIO Perspectives. Read it for insights and guidance from leaders and visionaries on how to break free from day-to-day tasks and gain a greater perspective. Check it out now.
Tags : 
    
Workday APAC

Privileged Account Management for Dummies

Published By: Group M_IBM Q2'19     Published Date: Apr 11, 2019
The increase in sophisticated, targeted security threats by both external attackers and malicious insiders have made it extremely difficult for organizations to properly protect critical and sensitive information. The task of protecting these assets has only grown harder as IT environments have become more complex and widely distributed across geographic locations and in the cloud. Many recent high-profile breaches have one thing in common: They were accomplished through the compromise of passwords. In many cases, end-user passwords are initially hacked through various social engineering techniques. Then permissions are escalated to gain access to more privileged accounts — the keys to the kingdom. This unauthorized access can easily go undetected for weeks or even months, allowing hackers to see and steal information at their convenience. Unfortunately, many IT users lack a full understanding of how privileged accounts function, as well as the risks associated with their compromise an
Tags : 
    
Group M_IBM Q2'19

AI Momentum, Maturity and Models for Success

Published By: SAS     Published Date: Apr 10, 2019
Durante bastante tiempo, la Inteligencia Artificial ha tenido un atractivo para mejorar los procesos, aumentar la productividad y generar impactos de primera y última generación en las organizaciones. Los avances en datos y analítica han permitido a los primeros en adoptar la IA a nivel mundial en todas las industrias a crecer más allá de los experimentos y los éxitos rápidos, así como a proporcionar ejemplos de éxito con esta tecnología.
Tags : 
    
SAS

BI, Analítica y la nube

Published By: SAS     Published Date: Apr 10, 2019
El cómputo en la nube es una tendencia importante que ofrece ventajas en flexibilidad, escalabilidad y agilidad. Aun así, ha habido un gran despliegue publicitario. La realidad es que, hasta hace poco, la nube ha tardado en despegar para desplegar soluciones de inteligencia empresarial y analítica. Las organizaciones están preocupadas por la seguridad, el rendimiento, la funcionalidad y otros problemas críticos. TDWI Research está experimentando un cambio significativo a medida que las organizaciones muestran voluntad de experimentar con la nube. Este informe expone las experiencias de las organizaciones con la inteligencia de negocios, la analítica y la nube, así como lo que debe tomarse en cuenta respecto a este tipo de plataformas.
Tags : 
    
SAS

Cyber Resilience for Email Technical Deep Dive E-Book

Published By: Mimecast     Published Date: Apr 10, 2019
Email. It’s the number-one business application used by organizations. It’s also the number-one method used to execute cyberattacks, enabling malware delivery, phishing, impersonations, and the spread of threats that are already internal to your organization. In fact, 91 percent of all cyberattacks start with an email. And your organization can’t function for long without email. How many hours of email downtime can your organization comfortably live with? If email isn’t accessible due to an adverse incident like malicious intent, human error or technical failure, your organization would likely suffer. The only way to get ahead of cybercriminals and to holistically protect your business is to adopt a new approach to email security. You need a multidimensional approach that brings together threat protection, adaptability, durability and recoverability in a single cloud-based service. You need to enable these four dimensions to truly provide cyber resilience for your email.
Tags : 
    
Mimecast

The Keys to Digital Innovation for CIOs

Published By: Workday APAC     Published Date: Apr 10, 2019
Technology today is shaking up the way we work. To help IT leaders navigate the best path forward, we created a digital magazine called CIO Perspectives. Read it for insights and guidance from leaders and visionaries on how to break free from day-to-day tasks and gain a greater perspective. Check it out now.
Tags : 
    
Workday APAC

The New Role of the CIO

Published By: Workday APAC     Published Date: Apr 10, 2019
The role of today’s CIO is changing. Read “CIO of the Future” for an important discussion on the skills CIOs need to master to be able to lead in a world of rapidly changing demands.
Tags : 
    
Workday APAC

The New Role of the CIO

Published By: Workday APAC     Published Date: Apr 10, 2019
The role of today’s CIO is changing. Read “CIO of the Future” for an important discussion on the skills CIOs need to master to be able to lead in a world of rapidly changing demands.
Tags : 
    
Workday APAC

The New Role of the CIO

Published By: Workday APAC     Published Date: Apr 10, 2019
The role of today’s CIO is changing. Read “CIO of the Future” for an important discussion on the skills CIOs need to master to be able to lead in a world of rapidly changing demands.
Tags : 
    
Workday APAC

The New Role of the CIO

Published By: Workday APAC     Published Date: Apr 10, 2019
The role of today’s CIO is changing. Read “CIO of the Future” for an important discussion on the skills CIOs need to master to be able to lead in a world of rapidly changing demands.
Tags : 
    
Workday APAC

The New Role of the CIO

Published By: Workday APAC     Published Date: Apr 10, 2019
The role of today’s CIO is changing. Read “CIO of the Future” for an important discussion on the skills CIOs need to master to be able to lead in a world of rapidly changing demands.
Tags : 
    
Workday APAC

Protect Your Patient Data From Insider Threats

Published By: SailPoint Technologies     Published Date: Apr 10, 2019
Did you know 58% of healthcare data breaches are caused by malicious intent or negligence of organizational insiders?* Read this HIMSS Media study to learn where security gaps may exist in your organization and what you can do to reduce risk.
Tags : 
    
SailPoint Technologies

Three Use Cases for Deception Technology in Financial Services

Published By: Illusive Networks     Published Date: Apr 10, 2019
APTs can be particularly harmful to financial service organizations, raising the need for early detection of malicious intruders. This white paper describes three use cases that illustrate how Illusive’s technology provides a nimble, easy-to-manage solution that guards the integrity of SWIFT services, defends legacy, custom, or “untouchable” applications and systems, and helps manage cyber risk during periods of disruptive business change.
Tags : 
cyber security, deception technology, endpoint security, cyber security, threat management, threat protection, illusive networks, endpoint protection, lateral movement, financial services, advanced threat protection, apt, targeted attacks, network security, enterprise security
    
Illusive Networks

Stopping the Attackers You Trust: A deception-based approach to insider threats

Published By: Illusive Networks     Published Date: Apr 10, 2019
Though insider threats are not new, the challenge to get ahead of them has not lessened over the past decade. In this paper you’ll find insights on why detecting and deterring malicious lateral movement is an essential part of an insider threat program, how you can monitor for unauthorized access without eroding employee trust, and how you can expedite the investigation of potential malicious insider activity.
Tags : 
emerging threats, insider threats, malicious insiders, cyber security, deception technology, endpoint security, cyber security, threat management, threat protection, illusive networks, endpoint protection, lateral movement, enterprise security
    
Illusive Networks

Using Deception To Protect Dynamic Business Infrastructure

Published By: Illusive Networks     Published Date: Apr 10, 2019
During periods of rapid growth, your business is especially vulnerable to cyberattacks from both malicious insiders, and external threat actors. Extended periods of IT change and consolidation can open seemingly minor security gaps that can quickly become gaping holes attackers will exploit. This quick read will enrich your internal dialog about how to prepare for elevated risk of high-impact cyberattacks.
Tags : 
m&a, mergers and acquisitions, business infrastructure, external threats, cyber attacks, vulnerability management, business it, it security, network security, cyber risk, deception technology, endpoint security, illusive networks, lateral movement, enterprise security
    
Illusive Networks

Use Cases for Attack Surface Manager

Published By: Illusive Networks     Published Date: Apr 10, 2019
Attack Surface Manager (ASM) gives security teams unprecedented power to easily implement a cyber hygiene program to harden their networks against malicious lateral movement of cyberattackers. This paper provides an overview of common ways that Illusive's customers are using Attack Surface Manager, including fortifying PAM/PIM solutions, detecting insider threats and malicious insider activity, and providing powerful, automated Red Team functions.
Tags : 
attack surface, cyber hygiene, vulnerability management, vulnerabilities, network vulnerability, threat management, vulnerability assessment, network security, privileged access management, identity access management, pam/pim solutions, illusive networks
    
Illusive Networks

Managing the Risk of Post-Breach or “Resident” Attacks: A Ponemon Institute Study

Published By: Illusive Networks     Published Date: Apr 10, 2019
How well-equipped is your organization to stop malicious attackers once they’re inside your network? According to this study of over 600 IT security professionals, almost two-thirds of respondents lack efficient capabilities to detect and investigate “stealth” attackers before serious damage occurs. Download the report to learn the primary obstacles to better threat detection and incident response, how well organizations are hardening their environments against lateral movement, and how cybersecurity budgets are changing to address the reality that attackers will get in.
Tags : 
risk management, it security, ponemon institute, ponemon, cybersecurity, research report, cyber attack, data breach, apt, targeted attacks, threat management, cyber crime, cyber risk, illusive networks
    
Illusive Networks

Workstations HP Z En La Industria De La Construccion Y El Desarrollo De Productos

Published By: HP Inc.     Published Date: Apr 05, 2019
Al ser diseñadas en asociación con clientes globales, las Workstations HP Z están creadas para ofrecer un alto desempeño, gran confiabilidad y facilidad de soporte para cumplir con los exigentes estándares de la industria.
Tags : 
    
HP Inc.

Der CIO der Zukunft

Published By: Workday DACH     Published Date: Apr 04, 2019
xxx
Tags : 
    
Workday DACH

5 Questions to ask your CIO

Published By: Group M_IBM Q2'19     Published Date: Apr 04, 2019
If your bank is like many, it encrypts only a minimum of data. This is because many banks believe, incorrectly, that encrypting all data is unworkably cost- and resource-intensive on any platform. Encrypting piecemeal creates the need to carefully track where you are encrypting, what you are encrypting, and the time and resource costs of these activities.
Tags : 
    
Group M_IBM Q2'19
Start   Previous    1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.