Remove Enterprise Remove Programming Remove Security Remove Vendor Management
article thumbnail

Key considerations to cancer institute’s gen AI deployment

CIO

The governance group developed a training program for employees who wanted to use gen AI, and created privacy and security policies. While GPT4DFCI isn’t allowed to be used for clinical purposes, as the governance committee has stipulated, it’s been reviewed by the privacy and information security teams for safety and efficacy.

article thumbnail

3 key roles for driving digital success

CIO

Others who believe the term digital transformation is watered down take a more cynical tack, viewing it as a phrase leaders use to garner support for technology investments and vendors use to sell their newest capabilities. Product leaders are most responsible for a digital transformation initiative’s scope, priorities, and change management.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

10 best practices when partnering for strategic skills

CIO

Enterprise CIOs have always been at a disadvantage competing with tech firms for skilled IT pros, but accelerated transformation efforts and an AI gold rush have significantly intensified the talent war, prompting CIOs to increasingly turn to outside firms for help. AIOps platforms are one relatively new driver of such partnerships. “We,

article thumbnail

10 cloud strategy questions every IT leader must answer

CIO

Companies may have had highly detailed migration or execution plans, but many failed to develop a point of view on the role of cloud in the enterprise. If you ask someone, they’ll often recite a list of a dozen potential benefits of cloud — lower costs, better security, greater agility, and so on,” says Smith.

Strategy 357
article thumbnail

Leadership in Cybersecurity

N2Growth Blog

Defining the position of the lead security person in an enterprise can be a challenging and sometimes confusing task. There are various job titles such as; Chief Security Officer (CSO), Chief Risk Officer, Chief Information Security Officer (CISO), V.P., IT Security, V.P., Vendor management.

Security 100
article thumbnail

Cybersecurity Snapshot: Log4j Anniversary, CI/CD Risks, Infostealers, Email Attacks, OT Security

Tenable

It was at around this time last year that the discovery of the zero-day Log4Shell vulnerability in the ubiquitous Log4j open source component sent shockwaves through the worlds of IT and cybersecurity. . 2 - OWASP’s top 10 CI/CD security risks. For more information: “ Implementing Phishing-resistent MFA ” (U.S.

article thumbnail

How to succeed as a fractional CIO

CIO

A fractional CIO is a technology leader hired on a temporary or part-time basis, explains Peter Kirkwood, corporate strategy leader at management consulting and strategy advisory firm Zinnov. Other responsibilities may include addressing digital transformation initiatives, guiding application development, and identifying security issues.