New & Notable
News
Big tech, UAE make U.S. energy investments to support AI
The Trump administration has pointed to key partnerships, including with the United Arab Emirates and U.S. tech companies, to bolster U.S. power needs to keep up with AI advances.
Get Started
ERM implementation: How to deploy a framework and program
Enterprise risk management helps organizations proactively manage risks. Here's a look at ERM frameworks that can be used and key steps for implementing a program.
Manage
What is a compliance audit? (with an example checklist)
A compliance audit is critical for finding any potential compliance gaps in an organization's operations. Here's what companies can do to prepare for them.
Get Started
How to write a risk appetite statement: Template, examples
A risk appetite statement defines acceptable risk levels for an organization. Here's what it includes and how to create one, with examples and a downloadable template.
Trending Topics
-
CIO Strategy News
U.S. senators offer perspectives on U.S. energy policy
Nuclear energy dominates the discussion among lawmakers and the tech industry as a top potential power source for AI data centers, which consume large amounts of electricity.
-
Digital Transformation Manage
Emerging technologies in construction help manage work, risk
Emerging technologies in construction include AI and digital twins. Read how companies use advanced IT to improve risk analysis, forecasting, and more.
-
Risk Management & Governance Get Started
ERM implementation: How to deploy a framework and program
Enterprise risk management helps organizations proactively manage risks. Here's a look at ERM frameworks that can be used and key steps for implementing a program.
-
Apps, Infrastructure and Operations News
Early-stage tech companies comb through data, software code
Software startups participating in the 2025 MIT Sloan CIO Symposium's Innovation Showcase take on the challenge of picking out the key signals from vast amounts of data.
-
Cloud deployment and architecture Evaluate
Examine the 4 types of edge computing, with examples
Edge computing is popular, but it's not going to benefit every IoT device or workload. Look at the various types of edge computing and examples. Are you ready to push it to the edge?
-
Data security and privacy Get Started
Symmetric vs. asymmetric encryption: Understand key differences
Explore the differences between symmetric vs. asymmetric encryption, including how they work and common algorithms, as well as their pros and cons.
Sponsored Sites
-
Networking
Verizon Private 5G Edge - Enterprise Intelligence
Verizon is leading the development of secure cloud computing power at the edge of the network. Hosting applications at the network edge helps improve response times and performance – enabling the faster collection, processing and analysis of data for better business outcomes, and true Enterprise Intelligence.
-
Artificial Intelligence
Deloitte & Snowflake: Generative AI
-
Sustainability
Strategies for Growing Businesses
Learn how Dell Technologies and Intel® provide cybersecurity, sustainability, cloud, storage and infrastructure solutions to help your growing business achieve breakthrough innovation.
Find Solutions For Your Project
-
Evaluate
The history of quantum computing: A complete timeline
The theories behind quantum computing go back decades, but progress has accelerated in the 2000s. Know the key milestones to get a quick understanding of how quantum developed.
-
What is vendor risk management (VRM)? A guide for businesses
-
A guide to risk registers: Benefits and examples
-
Learn how to harness strategic risk and improve your operations
-
-
Problem Solve
How to attract tech talent in 2025: 7 essentials
In this time of 'the great churn,' finding and keeping great tech talent sounds merely aspirational. Read on for seven methods that work.
-
How quantum computing can improve supply chains
-
What is quantum error correction?
-
Quantum computing in finance: Key use cases
-
-
Manage
What is a compliance audit? (with an example checklist)
A compliance audit is critical for finding any potential compliance gaps in an organization's operations. Here's what companies can do to prepare for them.
-
How to meet IoT compliance standards
-
Compliance stakeholders and how to work with them
-
Key steps to developing a healthy risk culture
-
CIO Basics
-
Get Started
What is the Risk Management Framework (RMF)?
The Risk Management Framework (RMF) is a template and guideline organizations use to identify, eliminate and minimize risks.
-
Get Started
ERM implementation: How to deploy a framework and program
Enterprise risk management helps organizations proactively manage risks. Here's a look at ERM frameworks that can be used and key steps for implementing a program.
-
Get Started
How to write a risk appetite statement: Template, examples
A risk appetite statement defines acceptable risk levels for an organization. Here's what it includes and how to create one, with examples and a downloadable template.
Multimedia
-
News
View All -
CIO strategy
U.S. senators offer perspectives on U.S. energy policy
Nuclear energy dominates the discussion among lawmakers and the tech industry as a top potential power source for AI data centers, which consume large amounts of electricity.
-
CIO strategy
Big tech, UAE make U.S. energy investments to support AI
The Trump administration has pointed to key partnerships, including with the United Arab Emirates and U.S. tech companies, to bolster U.S. power needs to keep up with AI advances.
-
CIO strategy
Policymakers assess nuclear energy for AI data centers
Big tech vendors are recognizing the energy demands of their AI services, causing them to make significant energy investments.
Search CIO Definitions
- What is the Risk Management Framework (RMF)?
- What is an IT strategic plan (information technology strategic plan)?
- What is financial risk management?
- What is a risk management specialist, and what does one do?
- What is third-party risk management (TPRM)?
- What is scenario analysis?
- What is risk acceptance?
- What is fourth-party risk management (FPRM)?