Remove Fractional CTO Remove Government Remove Infrastructure Remove Technical Advisors
article thumbnail

10 best practices when partnering for strategic skills

CIO

For the more specialized IT needs, there just aren’t enough people to meet the demand,” says Michael Manos, CTO of Dun & Bradstreet. IT leaders must rigorously assess their partners’ talent management and development strategies, build greater trust and transparency into the relationships, and invest in greater partner governance.

article thumbnail

8 top priorities for CIOs in 2023

CIO

As technology projects, budgets, and staffing grew over the past few years, the focus was on speed to market to maximize opportunity, says Troy Gibson, CIO services leader at business and IT advisory firm Centric Consulting. In a modern IT environment, security should be a built-in infrastructure element, not an add-on.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

5 ways to maximize your cloud investment

CIO

Migrating infrastructure and applications to the cloud is never straightforward, and managing ongoing costs can be equally complicated. Refactor your applications to take advantage of web services or serverless capabilities, and re-architect your infrastructure to optimize resource usage,” he says.

Cloud 271
article thumbnail

10 most difficult-to-fill IT roles — and how to address the gap

CIO

The biggest challenge is finding talented team members at the market rate,” says Patrick Isaac, CTO at Accuro Solutions, adding that the current environment demands more intensive recruiting efforts. At Ensono, Lobo has created academies for technical domains such as mainframe computing and cloud, enrolling students based on forecasted needs.

article thumbnail

Internet Two Seeks Chief Cyberinfrastructure Security Officer

CTOvision

Position Summary: The Internet2 Chief Cyberinfrastructure Security Officer (CCSO) is the leader responsible for establishing the cyberinfrastructure security strategy and direction for Internet2′s global infrastructure programs. Responsibilities.

article thumbnail

How Technical Debt Opens the Door to Cyber Attacks—and Steps to Protect Your Small Business

Strategy Driven

Similarly, poor practices that allow a business to incur technical debt open the door to cybersecurity exploits that can bankrupt a business financially or through loss of trust and reputation in the eyes of its customers. ” Balmas advises: “If you can’t stop using fax, segregate the printers, put them on a separate network.”.

article thumbnail

Global Software Architecture Summit 2022 Recap

Apiumhub

He is the author of numerous technical books and videos from O’Reilly, including several books on Microservices, the Software Architecture Fundamentals video series, Enterprise Messaging video series, Java Message Service, 2nd Edition, and a contributing author to 97 Things Every Software Architect Should Know.