article thumbnail

Leadership in Cybersecurity

N2Growth Blog

Identity & Access Management (IAM). Vulnerability Management (VM). Policy & controls development with implementation. Managing enterprise risk tolerance. Security leaders are primarily reporting to the CIO. Data storage. Business Continuity (BC). Cloud enabled solutions – SaaS, IaaS, PaaS.

IAM 187
article thumbnail

How CMOs Can Work with CIOs to Gain Customer Insight

Harvard Business Review

In fact, recent research [PDF] conducted by the CMO Council, suggests that this process should start with the Chief Marketing Officer (CMO) and the Chief Information Officer (CIO). A recent study (also from IBM) indicates that more than 70% of CMOs feel they are underprepared to manage the explosion of data and "lack true insight.".

CIO 8
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Two Cheers for JP Morgan's "Clawbacks"

Harvard Business Review

On the same call, Dimon himself announced that the global supervisor of the London office and head of the firm's retired Chief Investment Office (CIO), Ina Drew , would voluntarily give up the "equivalent to the maximum clawback amount." Drew earned $15.5 million in 2011, including $7.5 in severance according to this year's Proxy Statement.

CIO 12
article thumbnail

The Public/Private Cooperation We Need on Cyber Security

Harvard Business Review

Recent allegations of the theft of top-security information connected to the development of sophisticated weapons and air defense systems have only heightened concerns about the security of the nation''s networks. The first focuses on the concept of enhanced public/private information sharing and developing standards. media companies.

Cooper 8
article thumbnail

Can JP Morgan Transparently Police Itself?

Harvard Business Review

boss, Ina Drew , the former head of their unit in of the bank's, the Chief Investment Office (CIO); and CEO Jamie Dimon, to whom the CIO reported who oversaw the CIO. Such determination is subject to ratification by (and for an award to the CEO would be made by) the [Board's] Compensation & Management Development Committee.

CIO 8
article thumbnail

Medical Systems Hacks Are Scary, but Medical Device Hacks Could Be Even Worse

Harvard Business Review

There are, however, some basic steps that hospital CIOs can take to reduce their risk and protect patients, devices, networks, and data: Assess device cybersecurity during procurement. Assess these risks on par with clinical efficacy. Assess these risks on par with clinical efficacy.

System 8
article thumbnail

Why the Entire C-Suite Needs to Use the Same Metrics for Cyber Risk

Harvard Business Review

The chief information security officer (CISO) or chief information officer (CIO) reports the technical vulnerabilities that his or her team has successfully remediated. The chief risk officer (CRO) looks at the problem in terms of risk transfer and cyber insurance purchased.