Spotlight on CIO Strategies Spotlight on CIO Strategies

CIOs may have the toughest job in corporate Australia.

‘Keeping the lights on’ is no longer enough for many enterprises. CIOs are also responsible for building new, agile platforms, delivering innovative applications rapidly, helping to create new revenue streams and more – while at the same time finding cost efficiencies and locking down business data.

All this against a backdrop of rapidly changing business and IT environments.

How are CIOs adapting their strategies to deal with these changes and increasingly high expectations? What new strategies are they considering or adopting?

iTnews will provide some answers to these questions in this Spotlight, coinciding with the CIO Strategy Summit in Sydney starting on 8 September.

Special thanks to Veeam, which has come on board as the sponsor of this iTnews Spotlight.

Review delays start of ID card procurement

Review delays start of ID card procurement

Procurement for the multibillion-pound UK national biometric identity card scheme will start only once the current Home Office review is completed.
Sarah Arnott Jul 13 2006 2:40PM Hardware
Bangalore improves infrastructure to support IT growth

Bangalore improves infrastructure to support IT growth

Investments in satellite towns and better roads may attract more business
from the UK.
James Murray Jul 5 2006 10:00AM Strategy
Directors ignorant about IT

Directors ignorant about IT

There is a distinct lack of IT competence and knowledge within Australian company boards according to research conducted by local recruitment firm, Talent2.
Staff Writers May 22 2006 11:24AM Training & Development
Debate: Client-side security is a much better way of securing infrastructure than securing the gateway

Debate: Client-side security is a much better way of securing infrastructure than securing the gateway

Paul Goossens Mar 8 2006 5:15PM Security
A marketing strategy is part of the job

A marketing strategy is part of the job

If you want to stay alive and continue to be progressive in this profession, you must be able to create and market your company’s IT security strategy. My suggestions follow.
Randy Sanovic Mar 6 2006 10:02PM Security
Forging a national cyber security strategy

Forging a national cyber security strategy

In the face of growing threats to its cyber assets, America requires a cohesive and comprehensive plan to protect its vital and most sensitive data. Here, one of the leading decision makers in the federal government IT arena coveys overarching priorities for securing the country's cyberspace.
Andy Purdy Mar 6 2006 7:59PM Security
Debate: IP telephony is insecure and cannot be used in an organisation’s infrastructure just yet

Debate: IP telephony is insecure and cannot be used in an organisation’s infrastructure just yet

Tim Keanini Dec 9 2005 5:21PM Security
SANS list shows hacker strategy shift

SANS list shows hacker strategy shift

Cyber-criminals have switched targets, the latest edition of the SANS Top 20 reported this week.
Frank Washkuch Nov 23 2005 2:53PM Security
Tactics, strategy and the CSO

Tactics, strategy and the CSO

Mary Ann Oct 21 2005 3:55PM Security
Developing a patch and vulnerability management strategy

Developing a patch and vulnerability management strategy

In the first two quarters of 2005 more than 3,780 software vulnerabilities were reported, leaving a wide range of system components and software open to exploits. With the popular operating systems often the key target of worm and virus writers, the majority of businesses are left open to attacks.
Alan Bentley Oct 20 2005 11:03AM Security
Half of companies have no data leakage strategy

Half of companies have no data leakage strategy

Nearly half of companies do not have a strategy to deal with data leakage and information management, according to a new study.
René Millman Sep 8 2005 4:36PM Security
Make mobility a part of your strategy

Make mobility a part of your strategy

Staff Writers Jun 21 2005 10:48AM Security
Hackers batter critical U.K. infrastructure

Hackers batter critical U.K. infrastructure

300 UK government departments and businesses are being targeted by specifically engineered viral attacks.
David Quainton Jun 16 2005 4:04PM Security
APEC ponders infrastructure security

APEC ponders infrastructure security

Asia-Pacific Economic Cooperation regional leaders will in future discuss the security of IT systems that control critical infrastructure such as power, water and airports across the region.
Staff Writers Jun 8 2005 4:14PM Security
Air Force CIO heading for private sector

Air Force CIO heading for private sector

U.S. Air Force CIO John Gilligan, who recently oversaw a contract consolidation effort with Microsoft to improve the Air Force's security, plans to leave for the private sector May 10.
Marcia Savage May 3 2005 9:53PM Security
UK critical infrastructure under threat

UK critical infrastructure under threat

The National Infrastructure Security Co-ordination Centre (NICSS) is need of a shake-up in order to protect the UK's critical infrastructure, according to a Labour peer.
René Millman Apr 28 2005 10:39AM Security
Firms fall short in cybercrime strategy

Firms fall short in cybercrime strategy

Companies do not know how to handle cybercrime properly and criminals are let off the hook as a result, an expert has claimed.
David Quainton Apr 27 2005 10:32PM Security
Drive ICT success from the top: study

Drive ICT success from the top: study

Effective management of ICT investments was a key factor to success, according to a new Australian study.
Vivienne Fisher Apr 21 2005 3:55PM Strategy
Homeland Security CIO resigns

Homeland Security CIO resigns

Department of Homeland Security CIO Steven Cooper has resigned and will leave the agency at the end of the month.
Marcia Savage Apr 7 2005 7:30PM Security
Moat and castle still top security strategy

Moat and castle still top security strategy

Many companies still rely on a "moat and castle" approach to network security, according to a survey of CISOs by Preventsys and Qualys.
Marcia Savage Mar 8 2005 7:28PM Security

Log In

  |  Forgot your password?