Latest from todayFeatureWhat is data governance? Best practices for managing data assetsData governance defines roles, responsibilities, and processes for ensuring accountability for and ownership of data assets across the enterprise.By Thor Olavsrud Mar 24, 202310 minsIT Governance FrameworksBig DataData MiningFeatureThe essential check list for effective data democratization By Maria Korolov and Alex Korolov Jan 20, 2023CIOData Center ManagementDatabase AdministrationBrandPostThree Keys to Protecting the Corporate Network in the Era of Hybrid Work By Chris Pullam Jan 18, 2023Data and Information SecurityNews AnalysisNutanix acquisition rumors highlight need for managing vendor riskBy Peter Sayer Dec 19, 2022Mergers and AcquisitionsRisk ManagementVendor ManagementFeatureIT leaders’ top 12 takeaways from 2022By Mary Pratt Dec 19, 2022HiringDigital TransformationIT StrategyFeatureThe new CIO security priority: Your software supply chainBy Mary Branscombe Nov 03, 2022Software DeploymentApplication SecuritySecurity PracticesTip4 methods to help CIOs manage cyber stressBy Joanne Carew Sep 22, 2022Identity Management SolutionsChange ManagementFeatureHow a new tech-based Swedish payments authority will fight grant fraudBy Karin Lindstru00f6m Jul 20, 2022CIOGovernmentFraudNewsOracle to launch two sovereign cloud regions for the European UnionBy Anirban Ghoshal Jul 13, 2022Government ITGovernmentCloud Management Articles FeatureThe 10 biggest issues IT faces todayEconomic, market, and worldwide turbulence continue to reshape the CIO agenda as priorities shift mid-year.By Mary Pratt Jun 13, 2022 CIOIT SkillsDigital TransformationOpinion5 challenges for securing the futureEveryone has a role in cybersecurity today; working together to address these challenges will materially reduce risk.By Thornton May Jun 02, 2022 Security PracticesSecurityBrandPostSponsored by HPEDisruption Doesnu2019t Make an Appointment. A Guide for Handling the Unwelcome Knock. Here are some best practices to steer your immediate actions and near-term responses when disruption comes calling.By Lois Boliek May 11, 2022 IT LeadershipSecurityNewsDid SAP spy on its employees, German union asksThe service sector union Ver.di has made public an internal data leak at SAP. Sensitive information from the workforce is said to have been widely accessible.By Martin Bayer Apr 21, 2022 Data PrivacyEnterprise ApplicationsSecurityFeatureState of the CIO, 2022: Focus turns to IT fundamentalsCIOs are once again walking a tightrope between innovation and operational excellence—this time, buoyed by strong LOB alliances and a lingering pandemic glow.By Beth Stackpole Mar 21, 2022 CIODigital TransformationInnovationBrandPostSponsored by HPECan Security Really Be Open Source?By Sunil James Feb 25, 2022 Zero TrustIT LeadershipSecurityFeature3 areas where AIops excels u2014 and 2 where it still falls shortAIops speeds IT discovery and troubleshooting, but it isnu2019t magic. And operations staff must still prepare the data for machine learning and manually solve some issues. By Robert Scheier Jan 21, 2022 Machine LearningArtificial IntelligenceIT OperationsFeature8 top priorities for CIOs in 20222022 promises to be both exciting and challenging for IT leaders. To get the most value from IT in the year ahead, tech chiefs should focus on the following key initiatives.By John Edwards Jan 18, 2022 HiringDigital TransformationIT StrategyFeatureTop 7 challenges IT leaders will face in 2022Facilitating hybrid working environments and ensuring a skills match for future success top the list of tough, ongoing issues IT leaders must navigate this year. By Paul Heltzel Jan 11, 2022 HiringIT SkillsDigital TransformationBrandPostSponsored by NTTFive Critical Ways to Prepare for a Better Security Environment in 2022Many enterprises are asking themselves how to level up their security tactics in 2022…and how to prepare their environments for so many major changes. A vital part of the answer for many organizations—Zero Trust. Jan 07, 2022 SecurityOpinion4 trends disrupting managed infrastructure servicesAs providers adapt their go-to-market strategies, customers must plan ahead. By Greg Hall Dec 07, 2021 Managed IT ServicesOracleSAPBrandPostSponsored by HPE7 Steps to Defend Your Enterprise Data from RansomwareBy Avi Raichel Dec 06, 2021 Data ManagementIT LeadershipSecurity Show more Show less View all Upcoming Events 09/May Summit FutureIT Toronto: Building the Digital Enterprise with Cloud, AI and Security May 09, 2023 Toronto, Ontario CyberattacksCybercrimeSecurity 11/May Summit FutureIT Canada: Building the Digital Enterprise with Cloud, AI and Security May 11, 2023 Virtual CyberattacksCybercrimeSecurity VIEW ALL EVENTS Resources Whitepaper Customer experience – Measuring the real returns on surprise and delight This paper shares expert insights on how to align the organisation around customer experience goals and how to choose and champion the right CX projects for investment returns. The post Customer experience – Measuring the real returns on surprise and delight appeared first on Whitepaper Repository. By Thoughtworks 25 Aug 2022 CRM Systems IT Governance Frameworks IT Strategy Whitepaper Using Advanced AIOps to Enable Autonomous IT For Proactive Intelligence and Predictive Analytics By HCL Technologies 07 Jul 2022 Artificial Intelligence Infrastructure Management Software Deployment Whitepaper How Advanced AIOps Enables Autonomous IT For Proactive Intelligence and Predictive Analytics By HCL Technologies 07 Jul 2022 Artificial Intelligence Infrastructure Management IT Governance Frameworks View all Podcasts Podcasts The C-level Strategic Guide for CIAM investment What is customer identity and access management (CIAM) and why is it essential to your business? Simply put, if your customers don’t feel secure using your products or accessing your websites, they won’t sign up or share information. Join us as we explore the business challenges around CIAM, how to assess where you fall on the CIAM Maturity Curve, and how to move ahead. 0 episode Identity and Access Management Ep. 04 Episode 4: Adding Intelligence to Your CIAM Strategy 25 May 2021 20 mins Okta Identity and Access Management Security Ep. 03 Episode 3: You've Passed CIAM 101 — Now It's Time to Automate 12 May 2021 15 mins Okta Identity and Access Management Security Explore a topic Analytics Careers Cloud Computing Enterprise Applications IT Leadership IT Management IT Operations Industry Artificial Intelligence Data Management Data Center Vendors and Providers Networking Software Development Business Operations View all topics All topics Close Analytics Careers Cloud Computing Enterprise Applications IT Leadership IT Management IT Operations Industry Artificial Intelligence Data Management Data Center Vendors and Providers Networking Software Development Business Operations Emerging Technology Digital Transformation IT Strategy Innovation Diversity and Inclusion Project Management Show me morePopularArticlesPodcasts Feature The RACI matrix: Your blueprint for project success By Bob Kantor Sep 14, 2022 IT Governance FrameworksProject Management ToolsIT Leadership How-To What is an SLA? Best practices for service-level agreements By Stephanie Overby, Lynn Greiner and Lauren Gibbons Paul Jul 05, 2017 Technology IndustryIT StrategyOutsourcing Feature The 10 most in-demand tech jobs for 2023 — and how to hire for them By Sarah K. White Jan 06, 202310 mins IT JobsStaff ManagementCareers podcast CIO Leadership Live with George Eapen, Group Chief Information Officer at Petrofac Feb 07, 202318 mins CIO Leadership Live podcast CIO Leadership Live with Marc Hale, Chief Technology Officer, AIA NZ Feb 07, 202321 mins CIO Leadership Live podcast Why IT professionalism matters to BCS CEO Rashik Parmar Feb 05, 202331 mins CIO Leadership Live