CTO - CIO Management Articles

Security, Disaster Planning, ITSM, Metrics, and Salary Survey

Chief Technology Officer Job Description

The CTO Toolkits News feed is an XML news feed that you can subscribe to and re-publish on your web site or blog. The only requirement that you need to meet is that the feed is included with no modifications and that the links within the feed are retained as is.

Read on Chief Technology Officer Job Description  Order CTO Job Description

The RSS newsfeed is:

CTO RSS Newsfeed CIO and CTO News for the full feed


Issues CIOs face in current IT job Market

Chief Technology Officer Productivity Tools - including CTO job description

CIO and IT managers have staffing issues

I think that the issue is that universities are not focusing on getting US nationals from their home states into IT, AI, and Database advanced degrees. At a recent graduation that we attended over 75% of the advanced degrees went to foreign nationals.  Since that is the case the green card programs are necessary.  What he should do is encourage junior colleges and universities to get more US nationals into those programs. 

If all the in-demand jobs go to green card holders then we will have higher unemployment of US nationals in IT due to individuals in the job market not having the skills required.  At the same time, many of those green card holders will opt to go back to their home countries increasing the skill shortages we have here which will encourage junior colleges and universities to continue to get foreign nationals into the the hi-tech degree programs since those students pay higher tuitions.

CIT staffing issues

 

Order Interview Hiring Guide  Download Interview Guide Selected Pages


Security Breaches Cost CISOs jobs

Even Microsoft CISOs are not exempt from losing jobs after a security breach

When a security breach occurs someone has to pay the price.  Often that is the CSO or the CISO.  In December on the heels of a security breach announcement, Microsoft appointed Igor Tsyganskiy, a relative newcomer to the company, to replace former and longtime CISO Bret Arsenault, who transitioned to an adviser position.

security breach

The report released by the independent Department of Homeland Security (DHS) Cyber Safety Review Board offered an incendiary review of Microsoft's security culture and blamed the company for the attack by the group Storm-0558 that the board said easily could have been avoided.

Data breaches will happen. Security and data breach protection are  a never-ending process and that no CIO or CSO can claim that their data is completely secure.

The sheer number of data breaches reported this year alone has led to security experts dubbing this year as the "Year of the Hack. " What's an organization to do when the major technology companies are admitting they have been breached? With sophisticated malware, advanced attacks and sneaky insiders, security seems like an unattainable goal. Security is everyone's responsibility, from the board of directors, c-level executives such as the CEO, CIO, CFO, down to the front-line employees who actually work daily with sensitive information.

Order Security Manual Template Download Sample


Are security certifications worth the effort

Security Certifications - Why?

The primary reasons they provide value are:

  • Validate the Cybersecurity talents of the individuals, within the limits the the certification.
  • Establish professional credibility of the individual, showing they are in it for the long-haul.
  • Advance the ability to be hired as organizations give preferences to those who have the need experience and taken the time to earn such certifications.
  • Classify the Cybersecurity skills of the individual versus others competing for the same position.
  • Provide networking opportunities for job opportunities as resources that can help when dealing with Cybersecurity issues.
  • Demonstrate that the individual understands standardized Cybersecurity concepts that they learn through specific certification process.

Read on Order Security Manual Template Download sample


Top 10 Security Management Best Practices

Security Management Best Practices - Top 10

Top 10 Security Management Best PracticesA security breache can cause a company's valuable information damaged so that it cannot be undone, and also often leads to significant damage a company's reputation. Top 10 security management best practices are:

  1. Centralize Malware Management 
  2. Establish Boundary Control
  3. Centralize Provisioning and Authorization Management
  4. Implement Acceptable Use Policy
  5. Build Security into Applications Starting in the Design Phase
  6. Understand and implement all compliance and audit requirements
  7. Implement Monitoring and reporting processes
  8. Manage security deployment and infrastructure processes
  9. Implement network and host defenses 
  10. Constantly validate network and system resource integrity 

Read on Order Security Manual Template Download sample


CXO - Chief Experience Officer Role and Job Description

Chief Experience Officer (CXO) is the executive responsible for the overall user experience

The CXO is not only a user experience expert but also a seasoned marketing, brand, and product manager. As the role is transformational, the CXOs is responsible for the adoption of consistent user interfaces across the entire business. As with most senior executive titles, the responsibilities are set by the organization's board of directors or other authority, depending on the organization's legal structure.

CXO Role

Order Chief Experience Officer Job Description