Remove Intelligence Remove Market Intelligence Remove Security
article thumbnail

Can you have too many security tools?

CIO

A member of your organization’s security team reads about a new kind of security tool and brings it to the CISO’s attention, who decides that it’s a good investment. The CISO sees a new kind of security threat that requires a different security tool. A colleague recommends a security tool she says is indispensable.

Security 468
article thumbnail

Global AI regulations: Beyond the U.S. and Europe

CIO

China follows the EU, with additional focus on national security In March 2024 the Peoples Republic of China (PRC) published a draft Artificial Intelligence Law, and a translated version became available in early May. The UAE provides a similar model to China, although less prescriptive regarding national security.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Security team management: Top 4 findings from discussions with CISOs

CIO

Most large businesses have a security team. But what, exactly, does that security team look like? And is it optimized in each of these respects to maximize the organization’s security posture? We learned, for example, that very few organizations have just a single security team. How is it structured? Most have several.

Security 459
article thumbnail

Need a security road map? Ditch the ad hoc measurement

CIO

CISOs can only know the performance and maturity of their security program by actively measuring it themselves; after all, to measure is to know. With proactive measurement, CISOs will confirm how well their security program performs, better understand its preparedness against relevant threats, and highlight gaps that require improvement.

Security 418
article thumbnail

The evolving role of security and IT in DR and incident response

CIO

However, as ecommerce has proliferated, security threats have increased, elevating cybersecurity to a board-level concern. This has resulted in some overlaps between security standards and frameworks and IT, which, if not managed effectively, can ruin the company’s ability to respond.

Security 416
article thumbnail

Bridging the IT skills gap, Part 1: Assessing current strategies and introducing GenAI as a unified solution

CIO

However, without proper governance and oversight, this can lead to inconsistencies, security vulnerabilities, and technical debt. International Data Corporation (IDC) is the premier global provider of market intelligence, advisory services, and events for the technology markets. Contact us today to learn more.

IT 467
article thumbnail

CIO metrics are failing digital transformation; it’s time to radically rethink success

CIO

The remaining five metrics, including uptime and availability, cost control, operational efficiency, compliance, and security, are deeply rooted in traditional IT priorities. International Data Corporation (IDC) is the premier global provider of market intelligence, advisory services, and events for the technology markets.