article thumbnail

Leadership in Cybersecurity

N2Growth Blog

This creates financially inefficient security architectures with increased vulnerabilities.Couple the above list of security initiatives with the below statements about the environments that security leaders are placed into, and you quickly realize a practical yet manageable shift is needed. This increases security spending costs.

IAM 187
article thumbnail

How CMOs Can Work with CIOs to Gain Customer Insight

Harvard Business Review

In fact, recent research [PDF] conducted by the CMO Council, suggests that this process should start with the Chief Marketing Officer (CMO) and the Chief Information Officer (CIO). A recent study (also from IBM) indicates that more than 70% of CMOs feel they are underprepared to manage the explosion of data and "lack true insight.".

CIO 8
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

CFOs Don’t Worry Enough About Cyber Risk

Harvard Business Review

By becoming an active member of the security team, rather than just a passive observer, the CFO, along with the CEO and the rest of the C-suite, can significantly reduce revenue leakage through a more focused and effective cyber security technology portfolio. And the most effective partnerships involve weekly cyber exposure reviews.

CFO 9
article thumbnail

The Public/Private Cooperation We Need on Cyber Security

Harvard Business Review

The second is crafting a cybersecurity framework that addresses risks across government and industry — and to do so quickly. The National Institute of Standards and Technology (NIST) wants a preliminary framework in place by the end of this summer, with a final set of guidelines ready to go in February 2014.

Cooper 8
article thumbnail

More Training Won’t Reduce Your Cyber Risk

Harvard Business Review

But all too often organizations’ approach to mitigating that risk — other than taking the wise step of ensuring that they have the state-of-the art technological protection in place — is more training. The human is indeed the weakest link in cybersecurity. It won’t suffice.

article thumbnail

Is Anyone Really Responsible for Your Company's Data Security?

Harvard Business Review

But when I put the question to top management, well, they''re busy — not their problem, that''s for sure — and they refer me to the chief information officer or the chief technology officer. This is a management failure, not a technological problem. Why Your CEO Is a Security Risk. But security?

article thumbnail

Who’s Managing Your Company’s Network Effects?

Harvard Business Review

Much as war is too important to be left to the generals, the business of network effects is too valuable to be entrusted to the CMOs and CIOs. But managing network effects as technology byproducts is a bit like treating cars as extensions of internal combustion engines; technically accurate, yes, but missing the larger purposes and points.