New & Notable
Get Started
ERM implementation: How to deploy a framework and program
Enterprise risk management helps organizations proactively manage risks. Here's a look at ERM frameworks that can be used and key steps for implementing a program.
Manage
What is a compliance audit? (with an example checklist)
A compliance audit is critical for finding any potential compliance gaps in an organization's operations. Here's what companies can do to prepare for them.
Get Started
How to write a risk appetite statement: Template, examples
A risk appetite statement defines acceptable risk levels for an organization. Here's what it includes and how to create one, with examples and a downloadable template.
News
Policymakers assess nuclear energy for AI data centers
Big tech vendors are recognizing the energy demands of their AI services, causing them to make significant energy investments.
Trending Topics
-
CIO Strategy News
Policymakers assess nuclear energy for AI data centers
Big tech vendors are recognizing the energy demands of their AI services, causing them to make significant energy investments.
-
Digital Transformation Manage
Emerging technologies in construction help manage work, risk
Emerging technologies in construction include AI and digital twins. Read how companies use advanced IT to improve risk analysis, forecasting, and more.
-
Risk Management & Governance Manage
What is a compliance audit? (with an example checklist)
A compliance audit is critical for finding any potential compliance gaps in an organization's operations. Here's what companies can do to prepare for them.
-
Apps, Infrastructure and Operations News
Early-stage tech companies comb through data, software code
Software startups participating in the 2025 MIT Sloan CIO Symposium's Innovation Showcase take on the challenge of picking out the key signals from vast amounts of data.
-
Cloud deployment and architecture Evaluate
Examine the 4 types of edge computing, with examples
Edge computing is popular, but it's not going to benefit every IoT device or workload. Look at the various types of edge computing and examples. Are you ready to push it to the edge?
-
Data security and privacy Get Started
Symmetric vs. asymmetric encryption: Understand key differences
Explore the differences between symmetric vs. asymmetric encryption, including how they work and common algorithms, as well as their pros and cons.
Sponsored Sites
-
Security
One Identity | Integrated Cybersecurity for all Your Identities
Learn how One Identity provides integrated cybersecurity solutions, delivering a truly unified identity platform and streamlining management across on-premises and cloud resources.
-
Server Buying Considerations
Learn more about key server buying considerations from Dell Technologies and Intel® with an emphasis server design, security, sustainability, automation, AI, and financing flexibility.
-
Storage
Benefit From the Power of Consolidated Storage
Learn how a consolidated approach to storage can modernize your storage which will increase efficiency and can decrease costs.
Find Solutions For Your Project
-
Evaluate
The history of quantum computing: A complete timeline
The theories behind quantum computing go back decades, but progress has accelerated in the 2000s. Know the key milestones to get a quick understanding of how quantum developed.
-
What is vendor risk management (VRM)? A guide for businesses
-
A guide to risk registers: Benefits and examples
-
Learn how to harness strategic risk and improve your operations
-
-
Problem Solve
How to attract tech talent in 2025: 7 essentials
In this time of 'the great churn,' finding and keeping great tech talent sounds merely aspirational. Read on for seven methods that work.
-
How quantum computing can improve supply chains
-
What is quantum error correction?
-
Quantum computing in finance: Key use cases
-
-
Manage
What is a compliance audit? (with an example checklist)
A compliance audit is critical for finding any potential compliance gaps in an organization's operations. Here's what companies can do to prepare for them.
-
How to meet IoT compliance standards
-
Compliance stakeholders and how to work with them
-
Key steps to developing a healthy risk culture
-
CIO Basics
-
Get Started
How to write a risk appetite statement: Template, examples
A risk appetite statement defines acceptable risk levels for an organization. Here's what it includes and how to create one, with examples and a downloadable template.
-
Get Started
What is an IT strategic plan (information technology strategic plan)?
An IT strategic plan is a document that details the comprehensive technology-enabled business management processes an organization uses to guide operations.
-
Get Started
What is financial risk management?
Financial risk management is the continuous process of recognizing, evaluating and mitigating potential threats to an individual's or organization's financial health.
Multimedia
-
News
View All -
CIO strategy
Policymakers assess nuclear energy for AI data centers
Big tech vendors are recognizing the energy demands of their AI services, causing them to make significant energy investments.
-
CIO strategy
U.S. will need policy to navigate EU rules
Protecting U.S. tech companies from the EU's regulatory regime will present a challenge to U.S. officials, who have pursued antitrust cases against big tech.
-
CIO strategy
FTC sends message with Synopsys, Ansys divestiture order
To prevent the creation of a monopoly in software tools used to design semiconductors, the FTC wants the two companies to divest assets before merging.
Search CIO Definitions
- What is an IT strategic plan (information technology strategic plan)?
- What is financial risk management?
- What is a risk management specialist, and what does one do?
- What is third-party risk management (TPRM)?
- What is scenario analysis?
- What is risk acceptance?
- What is fourth-party risk management (FPRM)?
- What is a compliance framework?