Curt Cooper: Humility and Receptiveness Are Key to Successful IT Leadership
When IT leaders fail to seek the input and expertise of their staff, they may struggle to adopt best strategies or retain talented employees. IT leaders should show their teams how their contributions support organizational goals and continually seek feedback on...
Ashley Bard: Effective Communication Is Key to Aligning IT with the Business
A centralized view of IT projects, for example in a service managementdashboard, can help IT better align with business priorities. IT leaders can also leverage the data in these dashboards to raise the baron the customer service they provide. "As an organization, you...
Workfront: 9 Experts on How to Align IT’s Work to Company Strategy
The book includes insights from the following experts: Ashley Bard, AdventHealth, IT Director, Enterprise Care Navigation and Telehealth Technologies, Read the article >> Curt Cooper, Radiology Partners, IT Director and Service Leader, Networking and Physical...
Konrad Fellmann: Trust Is Not Enough. You Have to Verify
Konrad Fellmann, Cubic,Chief Information Security Officer Vendor questionnaires about security practices should require written explanations of securitypractices so that you can make judgements about whether the people responding to thosequestions actually know what...
Arvin Verma: Vendor Risk Assessments Must Be Actionable
Arvin Verma, Various Fortune 500, for and not for profit organizations, Cybersecurity Thought Leader inVendor/Supply Chain Risk Design customized questionnaires so that vendors’ answers map directly back to their capabilities and certifications. These documentshelp...
Alex Golbin: Continuous Monitoring Is Central to Effective Risk Management
Alex Golbin, IHS Markit, Global Head of Risk Assessments Effective supply chain risk management depends on a complete vendor inventory, with a risk rating methodology to identify an inherent risk profile for every single relationship. It requires having a risk...
Steven Parker: The Growing Challenge of Managing Supply Chain Risk
Steven Parker, TBC Corporation, Chief Information Security Officer Once a vendor is brought on board and the business relationship begins, there must be periodic reviews of that vendor, there mustbe continuous monitoring of its public-facing IT infrastructure. There...
Lakshmi Hanspal: Supply Chain Relationships Are Strategic to the Business
Lakshmi Hanspal, Box, Global Chief Information Security Officer Vendor evaluation typically involves many stakeholders, including the business owner trying to bring a third party into the environment, procurement or sourcing, legal,security or the trust office, and...
Keith Donnelly: Look at the Weakest Links in the Supply Chain
Keith Donnelly, Fintech Solutions Provider, Vice President, Global Head of Risk & Compliance Vendor cyber risk evaluation must include a basic security scan using a security tool that identifies the vulnerabilities of assets visible onthe public internet and rates...
Deneen DeFiore: Move from Risk Assessment to Dynamic Risk Management
Deneen DeFiore, United Airlines, Vice President & Chief Information Security Officer All vendors should be categorized based on the services they provide and their criticality to the company, and then assessed on their ability to fulfill operational and security...