Industry Expert

Cloud cybersecurity best practices for CISOs and CIOs

With the cloud now widely adopted, many still appear to be unaware of the vulnerabilities they’re encountering and the steps to take to prevent them. Amit...

Reclaiming data privacy: Empowering users in the age of social media

Kaus Phaltankar, CEO and Co-founder of Caveonix, believes that the lack of privacy concern in the US is because most consumers aren’t aware of how their personal data is being used across social...

Eleven steps to develop an effective ransomware response

Anthony Giandomenico, VP Global Security Consulting, Proactive and Reactive Services, Fortinet, and Aamir Lakhani, Global Security Strategist and Researcher, Fortinet, offer a checklist which suggests how...

The changing role of the CIO: Is 2023 the year of the Chief Data Officer?

Rich Murr, CIO, Epicor, says there’s a long list of table stake expectations for CIO – but increasingly the role is becoming all about the data. Today’s CIO must be more business focused than ever....

Three practices for data protection in the cloud

Rick Vanover, Senior Director of Product Strategy at Veeam, discusses the rapid growth of modern data usage and the requirement of enterprises to utilize as well as protect data. The Global DataSphere is...

Mission control: The evolution of the CIO role

The transformation of the CIO role is undeniable as we continue to witness a shift in the responsibilities that have been thrust upon them, especially since the pandemic. Arthur Hu, SVP and Global CIO at Lenovo,...

Browse our latest issue

Intelligent CIO North America

View Magazine Archive