Skip to main content
 

officer

Results 126 - 150 of 181Sort Results By: Published Date | Title | Company Name
Published By: Tripwire     Published Date: Jun 30, 2009
Learn about the financial institution safeguards included in the Gramm-Leach-Bliley Act (GLBA) and how your organization can institute an orderly set of compliance steps using an automated configuration audit and control solution.
Tags : 
tripwire, glba, compliance, managers, officers, directors, financial, institutions
    
Tripwire
Published By: IBM     Published Date: Jul 22, 2016
This research report examines the key issues, and provides recommendations for leveraging data and analytics to help procurement drive greater enterprise value. Based on in-depth interviews with two dozen leading Chief Procurement Officers (CPOs), the report outlines pragmatic steps that every procurement organization can take to leverage analytics and improve engagement with suppliers and key business stakeholders across the enterprise.
Tags : 
ibm, commerce, procurement, analytics, procurement analytics, data, big data, procurement organization
    
IBM
Published By: IBM     Published Date: Jan 05, 2017
This research report examines the key issues, and provides recommendations for leveraging data and analytics to help procurement drive greater enterprise value. Based on in-depth interviews with two dozen leading Chief Procurement Officers (CPOs), the report outlines pragmatic steps that every procurement organization can take to leverage analytics and improve engagement with suppliers and key business stakeholders across the enterprise.
Tags : 
ibm, procurement, commerce, procurement analytics
    
IBM
Published By: IBM     Published Date: Aug 06, 2014
As executives witness data’s proven impact on performance and innovation and recognize its strategic significance, they also realize the growing need for a leader whose primary role is to understand and advocate on behalf of data: The Chief Data Officer.
Tags : 
ibm, retail, data, big data, analytics, chief data officer
    
IBM
Published By: IBM     Published Date: Aug 06, 2014
As a precursor to the IBM Global Chief Marketing Officer (CMO) Study to be published later in 2011, the Economist Intelligence Unit, in cooperation with the IBM Institute for Business Value, conducted an online survey of nearly 300 executives to assess which trends are impacting CMOs and how CMOs are responding to today's complex business environment.
Tags : 
ibm, retail, cmo, trends, business environment, innovate
    
IBM
Published By: SyberWorks     Published Date: Oct 21, 2008
Jean Ann Larson, Chief Learning Officer (CLO), and Tawanna Foggs, Educational Systems Coordinator, of William Beaumont Hospitals, talk about their use of the SyberWorks Learning Management System to train and certify hospital employees.
Tags : 
syberworks, learning management system, learning management systems, learning management system, e-learning, elearning, web based training, training management systems
    
SyberWorks
Published By: Symantec     Published Date: Jul 11, 2017
The technology pendulum is always swinging. And chief information security officers must be prepared to swing with it—or get clocked. A look at recent history illustrates the oscillating nature of technology. In the 1980s, IBM mainframes dominated the landscape. In the ’90s, client-server computing came on the scene and data was distributed on personal computers. When the Web assumed predominance, the pendulum started to swing back to a centralized server. Then, just as quickly, mobile took the lead, with apps downloaded to workers’ devices—the new client server. Now, as mobile devices continue to populate the enterprise at a rapid rate, the IT model is changing again—to the provisioning of information on a just-what’s-needed, just-in-time basis from centralized servers consolidated in the cloud. The pendulum continues to swing and IT workloads are moving to the cloud en masse.
Tags : 
cloud, security, data protection, data loss, information security
    
Symantec
Published By: IBM     Published Date: Feb 24, 2015
This paper asks the key questions that IT, legal, records, compliance officers and corporate managers should consider when contemplating an information lifecycle governance solution, and why these elements are critical in addressing e-discovery challenges.
Tags : 
ibm, lifecycle governance, e-discovery, e-discovery challenges, ilg solutions
    
IBM
Published By: IBM     Published Date: Apr 09, 2015
IBM Security, in partnership with the Center for Applied Insights, has launched the 2014 IBM CISO Assessment. Driven by the specter of external attacks and the needs of their own organizations, CISO's are continuing the shift toward a business leadership role that focuses on risk management and taking a more integrated and systemic approach.
Tags : 
ibm, risk management, security risk, security officer, data security
    
IBM
Published By: IBM     Published Date: Apr 04, 2016
The 2015 C-Suite Cybersecurity Study "Securing the C-Suite - Cybersecurity Perspectives from the Boardroom and C-Suite". IBM conducted a survey of over 700 C-Suite executives - excluding the CISO - from 28 countries, across 18 industries - to understand any patterns, as well as any differing or aligning attitudes on cybersecurity. 60 percent of respondents are located in mature markets and 40 percent from emerging markets. Participants spanned traditional C-Suite roles, from CEOs and Board members to CFOs, Chief Risk Officers, CMOs, COOs, CHROs, Chief Compliance Officers and Legal Counsel. This report will cover: C-Suite views of the risks and actors - Is the C-Suite view versus reality aligned? IT and business alignment and collaboration - Who's engaged and who's not? The tone from the top on external collaboration and sharing of incident information. Characteristics of more "Cyber-Secure" companies based on C-Suite responses to what their organization has accomplished
Tags : 
ibm, c-suite study, cybersecurity
    
IBM
Published By: IBM     Published Date: Sep 30, 2016
The 2015 C-Suite Cybersecurity Study "Securing the C-Suite - Cybersecurity Perspectives from the Boardroom and C-Suite". IBM conducted a survey of over 700 C-Suite executives - excluding the CISO - from 28 countries, across 18 industries - to understand any patterns, as well as any differing or aligning attitudes on cybersecurity. 60 percent of respondents are located in mature markets and 40 percent from emerging markets. Participants spanned traditional C-Suite roles, from CEOs and Board members to CFOs, Chief Risk Officers, CMOs, COOs, CHROs, Chief Compliance Officers and Legal Counsel. This report will cover: C-Suite views of the risks and actors - Is the C-Suite view versus reality aligned? IT and business alignment and collaboration - Who's engaged and who's not? The tone from the top on external collaboration and sharing of incident information. Characteristics of more "Cyber-Secure" companies based on C-Suite responses to what their organization has accomplished
Tags : 
ibm, security, maturity, c suite, cybersecurity
    
IBM
Published By: IBM     Published Date: May 01, 2017
If you function like most IT organizations, you've spent the past few years relying on mobile device management (MDM), enterprise mobility management (EMM) and client management tools to get the most out of your enterprise endpoints while limiting the onset of threats you may encounter. In peeling back the onion, you'll find little difference between these conventional tools and strategies in comparison to those that Chief Information Officers (CIOs) and Chief Information Security Officers (CISOs) have employed since the dawn of the modern computing era. Their use has simply become more: Time consuming, with IT trudging through mountains of endpoint data; Inefficient, with limited resources and limitless issues to sort through for opportunities and threats; and Costly, with point solution investments required to address gaps in OS support across available tools. Download this whitepaper to learn how to take advantage of the insights afforded by big data and analytics thereby usher i
Tags : 
ibm, endpoint management, mobile device management, enterprise mobility, os support, it organizations
    
IBM
Published By: IBM     Published Date: Oct 13, 2017
Integrated Threat Management For Dummies, IBM Security Limited Edition, lays the foundation for effective tools and techniques that work together to help counter today’s advanced threats. Regardless of your role in the IT security organization, threat management tools and techniques will influence your job. Your role determines the part you play to effectively manage threats, including those targeting the cloud and your company’s data. If you are a Chief Information Security Officer (CISO) or security manager, this book explains in detail the types of tools you need to effectively prevent, detect, and respond to security incidents. If you’re in general business management, you’ll better understand the risks associated with enterprise computing and the reasons why a comprehensive portfolio of security tools that work well together is so important.
Tags : 
malware prevention, network intrusion prevention, malware protection, ibm, firewall, mutating malware, cyber threats
    
IBM
Published By: Zycus     Published Date: Nov 30, 2009
If the go-go 1990s, with its fast money and flush credit seeking rapid and steep returns, created the demand for "renaissance" Chief Financial Officers ("CFO"), who could manage (and market) both the strategic and financial operations of the enterprise, the more sobering decade that followed led directly to the creation and subsequent rise of the Chief Procurement Officer ("CPO"), who could reduce costs, build internal relationships, and develop strategic suppliers efficiently and effectively.
Tags : 
zycus, cfo, chief financial officer, procurement, chief procurement officer, sourcing companies, sourcing services, sourcing
    
Zycus
Published By: Zycus     Published Date: May 01, 2009
The global recession is taking no prisoners. Neither industry, nor region, nor company-size has provided shelter from its impact. Within the enterprise, few business functions have been unaffected. Yet, as this business downturn continues, the Chief Procurement Officer's ("CPO") agenda and the CEO's agenda have started to converge.
Tags : 
zycus, recession, downturn, procurement, sourcing companies, sourcing services, sourcing, reverse auction
    
Zycus
Published By: SAS     Published Date: Aug 28, 2018
Machine learning systems don’t just extract insights from the data they are fed, as traditional analytics do. They actually change the underlying algorithm based on what they learn from the data. So the “garbage in, garbage out” truism that applies to all analytic pursuits is truer than ever. Few companies are already using AI, but 72 percent of business leaders responding to a PWC survey say it will be fundamental in the future. Now is the time for executives, particularly the chief data officer, to decide on data management strategy, technology and best practices that will be essential for continued success.
Tags : 
    
SAS
Published By: SAS     Published Date: Jan 30, 2019
Machine learning systems don’t just extract insights from the data they are fed, as traditional analytics do. They actually change the underlying algorithm based on what they learn from the data. So the “garbage in, garbage out” truism that applies to all analytic pursuits is truer than ever. Few companies are already using AI, but 72 percent of business leaders responding to a PWC survey say it will be fundamental in the future. Now is the time for executives, particularly the chief data officer, to decide on data management strategy, technology and best practices that will be essential for continued success.
Tags : 
    
SAS
Published By: SAS     Published Date: Mar 20, 2019
What’s on the chief data and analytics officer’s agenda? Defining and driving the data and analytics strategy for the entire organization. Ensuring information reliability. Empowering data-driven decisions across all lines of business. Wringing every last bit of value out of the data. And that’s just Monday. The challenges are many, but so are the opportunities. This e-book is full of resources to help you launch successful data analytics projects, improve data prep and go beyond conventional data governance. Read on to help your organization become truly data-driven with best practices from TDWI, see what an open approach to analytics did for Cox Automotive and Cleveland Clinic, and find out how the latest advances in AI are revolutionizing operations at Volvo Trucks and Mack Trucks.
Tags : 
    
SAS
Published By: SilverSky     Published Date: Apr 16, 2013
A SilverSky study of 200 U.S. chief information officers and senior level security decision-makers were found that nearly all (97 percent) of respondents indicate their confidence level in the cloud has either increased or stayed the same in the past 12 months. The Silver Lining report provides insights into cloud behavior. Download the report now and see how your peers are feeling about moving to the cloud.
Tags : 
study, cloud, adoption, cloud security, cio, it security, virtualization
    
SilverSky
Published By: IBM     Published Date: Oct 10, 2013
"The implications from the 2013 IBM Global Reputational Risk and IT Study are clear. The question is no longer whether IT risks can damage your corporate reputation, but what you can do to effectively prevent and mitigate these risks. Find out what you can do to protect your reputation from IT risks. Read “Six keys to effective reputational and IT risk management” to learn about: · Practical advice and recommendations to help prevent and mitigate the IT risks that most affect reputation · The emerging role of the Chief Digital Officer · How to use social media as a tool for minimizing reputational damage · How your supply chain can put you at increased reputational risk"
Tags : 
reputational management, risk management, it risk management, ibm, ibm global, it risks, protection, branding
    
IBM
Published By: IBM     Published Date: Mar 04, 2014
Download this Whitepaper by Jerry Cuomo, Vice President and Chief Technology Officer, IBM WebSphere, to understand more about how you can leverage JavaScript pervasiveness to simplify radically the life cycle of applications that are interactive, web facing and transactional.
Tags : 
ibm, mobility, mobile applications, mobile app, mobile app development, javascript, apis, app servers
    
IBM
Published By: IBM     Published Date: Aug 08, 2014
As executives witness data’s proven impact on performance and innovation and recognize its strategic significance, they also realize the growing need for a leader whose primary role is to understand and advocate on behalf of data: The Chief Data Officer.
Tags : 
big data, analytics, technology, chief data officer
    
IBM
Published By: Citrix Systems, Inc.     Published Date: Jan 27, 2016
In this exclusive Security Leadership Series eBook, Citrix chief information security officer Stan Black and chief security strategist Kurt Roemer share best practices for leading meaningful security discussions with the board of directors.
Tags : 
citrix, security, data
    
Citrix Systems, Inc.
Published By: Citrix     Published Date: Jul 25, 2014
In this exclusive Security Leadership Series eBook, Citrix chief information security officer Stan Black and chief security strategist Kurt Roemer share security best practices for IT leaders.
Tags : 
    
Citrix
Published By: MapR Technologies     Published Date: Jan 08, 2014
Forrester Research shares seven architectural qualities for evaluating Big Data production platforms. In this webinar guest speaker Mike Gualtieri, Principal Analyst at Forrester, along with experts from MapR and Cisco, will present the following: • The 7 architectural qualities for productionizing Hadoop successfully • Architectural best practices for Big Data applications • The benefits of planning for scale • How Cisco IT is using best practices for their Big Data applications Speakers • Mike Gualtieri, Principal Analyst at Forrester Research • Jack Norris, Chief Marketing Officer at MapR Technologies • Andrew Blaisdell, Product Marketing Manager at Cisco • Sudharshan Seerapu, IT Engineer at Cisco
Tags : 
big data, big data analytics, hadoop, apache hadoop, structured data, unstructured data, business analytics, metadata
    
MapR Technologies
Start   Previous    1 2 3 4 5 6 7 8    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.