article thumbnail

How Technical Debt Opens the Door to Cyber Attacks—and Steps to Protect Your Small Business

Strategy Driven

Months of investigation by a cyber consulting firm finally determined the source of the vulnerability to Azotrope’s network: a combination printer/fax machine in their testing and QA area that engineers regularly used to fax lunch orders to a local Chinese restaurant. How would your CFO or CIO handle this? An excerpt is below.

Bottom-up 100
article thumbnail

The C-Suite Needs a Chief Entrepreneur

Harvard Business Review

This is not a CTO role or a role that reports to the CEO. You produce growth engines with calculated bets, not “wild-ass gambles.” You do not work for the CEO, or alongside the CTO, CIO, and CFO. The candidate is someone with a passion for taking calculated risks. ” You believe anything is possible.