article thumbnail

8 data strategy mistakes to avoid

CIO

“Organizations often get services and applications up and running without having put stewardship in place,” says Marc Johnson, CISO and senior advisor at Impact Advisors, a healthcare management consulting firm. If not, the results can include poor data quality, lack of consistency, and noncompliance with regulations, among other issues.

Strategy 339
article thumbnail

8 tips for cultivating a winning IT culture

CIO

Long-term success is generally the result of leaders who make a committed effort to connect directly with their teams, rather than simply issuing memos, edicts, and other top-down commands. Projects that really excite our teams.” Caldas has no doubt that technology is a key differentiator. “We

Culture 358
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

Trending Sources

article thumbnail

6 generative AI hazards IT leaders should avoid

CIO

Microsoft called the poll an error and promised to investigate, but it already seems to clearly breach several of the company’s own principles of responsible AI usage , such as inform people that they’re interacting with an AI system, and guidelines for human-AI interaction. This distinction is vital.”

article thumbnail

CIOs grapple with the ethics of implementing AI

CIO

What they are finding is that the line between advancing technologically and ensuring AI doesn’t result in detrimental outcomes is thin. This team establishes the company’s risk tolerance, acceptable use cases and restrictions, and applicable disclosures. We continue to iterate and evolve our policy, but it is still in development.

article thumbnail

Cybersecurity Snapshot: NSA Picks Top Cloud Security Practices, while CNCF Looks at How Cloud Native Can Facilitate AI Adoption

Tenable

and New Zealand, comes about a month after these same agencies published a joint advisory about Volt Typhoon aimed at IT and OT security teams. and other countries want critical infrastructure leaders to take concrete steps to protect their organizations from Volt Typhoon , a hacking group backed by the Chinese government.

article thumbnail

Technical Health Isn’t Optional

O'Reilly Media - Ideas

We asked the CTOs how the companies prepared themselves for both old and new vulnerabilities. The key is being proactive, as Shashank Kaul, CTO of Webjet, noted. This proactive approach reflects an important shift from older reactive approaches to security, in which you deploy software and hope nothing bad happens.

article thumbnail

Software Development Life Cycle?—?The Ultimate Guide [2020]

Codegiant

Software Development Life Cycle?—?The The Ultimate Guide [2020] [link] The software development life cycle is about producing high-quality software promptly. And your team needs to follow the software development life cycle steps to achieve that. It’s also essential that your team adheres to the proper SDLC model.