New & Notable
Evaluate
9 common risk management failures and how to avoid them
As enterprises rework their business models and strategies to meet various new challenges, risks abound. Here are nine risk management failures to look out for.
Evaluate
Traditional vs. enterprise risk management: How do they differ?
Traditional risk management and enterprise risk management are similar in their aim to mitigate risks that can harm a company. But there are differences between them.
News
Domestic manufacturing policy emphasizes U.S. tech, products
Bringing manufacturing back to the U.S. might be a lofty goal for some products, but companies like Apple are making moves to source some components for products locally.
Evaluate
Top enterprise risk management certifications to consider
Certifications are essential to many careers. Here are some useful enterprise risk management certifications for risk managers, IT professionals and other workers.
Trending Topics
-
CIO Strategy News
Domestic manufacturing policy emphasizes U.S. tech, products
Bringing manufacturing back to the U.S. might be a lofty goal for some products, but companies like Apple are making moves to source some components for products locally.
-
Digital Transformation Manage
Why digital literacy in the workplace is important
Some examples of digital literacy that are necessary for the contemporary workplace are knowing how to use Excel and generative AI. Learn more about why digital literacy matters.
-
Risk Management & Governance Evaluate
9 common risk management failures and how to avoid them
As enterprises rework their business models and strategies to meet various new challenges, risks abound. Here are nine risk management failures to look out for.
-
Apps, Infrastructure and Operations Manage
4 examples of IT department goals
An important consideration for setting IT goals specifically is aligning them with the overall goals of the larger organization. Learn more about how to set IT department goals.
-
Cloud deployment and architecture Manage
A data sovereignty primer for cloud admins
Data sovereignty is a critical part of any cloud deployment that cloud administrators must understand. Implement these best practices to ensure compliance now and in the future.
-
Data security and privacy Get Started
An explanation of encryption
Encryption converts data into code that is only decipherable with the right key. This can be used to protect sensitive information in messages, payments and records.
Sponsored Sites
-
Intelligent Agreement Management
Accelerate revenue, reduce risk and unlock value
Over 1.6 million customers and more than a billion people in over 180 countries use Docusign solutions to accelerate business processes and simplify lives. Using the Docusign IAM platform, companies can create, commit to, and manage agreements with solutions created by the #1 company in e-signature and contract lifecycle management (CLM).
-
Server Buying Considerations
Learn more about key server buying considerations from Dell Technologies and Intel® with an emphasis server design, security, sustainability, automation, AI, and financing flexibility.
-
Collaboration
Increase Productivity with a Scalable Collaboration Solution
Learn how Slack offers significant advantages in scalability, security, platform depth and integrations, engagement, and shared channels are valued by organisations when undertaking digital transformation initiatives.
Find Solutions For Your Project
-
Evaluate
9 common risk management failures and how to avoid them
As enterprises rework their business models and strategies to meet various new challenges, risks abound. Here are nine risk management failures to look out for.
-
Traditional vs. enterprise risk management: How do they differ?
-
Top enterprise risk management certifications to consider
-
Risk prediction models: How they work and their benefits
-
-
Problem Solve
What is vendor risk management (VRM)? A guide for businesses
Vendor risk management identifies, assesses and mitigates risks from third-party vendors to protect companies from data breaches, operational disruptions and compliance violations.
-
A guide to risk registers: Benefits and examples
-
Learn how to harness strategic risk and improve your operations
-
What is risk monitoring? Definition and best practices
-
-
Manage
Why digital literacy in the workplace is important
Some examples of digital literacy that are necessary for the contemporary workplace are knowing how to use Excel and generative AI. Learn more about why digital literacy matters.
-
4 examples of IT department goals
-
12 best practices to keep in mind for SLA compliance
-
What is a compliance audit? (with an example checklist)
-
CIO Basics
-
Get Started
Digital literacy vs. digital fluency: Learn the differences
Business and IT leaders alike need their workers to develop digital capabilities. Here are some terms that can help convey that need.
-
Get Started
An explanation of quantum in computing
Quantum particles have unique behaviors that enable engineers to perform more complex calculations, which could have a significant effect across industries and operations.
-
Get Started
ISO 31000 vs. COSO: Comparing risk management standards
ISO 31000 and the COSO ERM framework are the two most popular risk management standards. Here's what they include and some of their similarities and differences.
Multimedia
-
Get Started
An explanation of quantum in computing
-
-
-
News
View All -
CIO strategy
Domestic manufacturing policy emphasizes U.S. tech, products
Bringing manufacturing back to the U.S. might be a lofty goal for some products, but companies like Apple are making moves to source some components for products locally.
-
Risk management and governance
Federal research funding cuts could slow tech innovation
With massive funding cuts proposed at both federal research agencies and U.S. universities, U.S. R&D investment is poised to fall behind China and the EU.
-
CIO strategy
U.S. pushes back on China, invests in rare earth resources
U.S. officials are increasingly concerned about China's dominance over critical minerals used in advanced technologies.
Search CIO Definitions
- What is a procurement plan?
- What is a quantum circuit? Quantum vs. classical circuit
- What is prescriptive analytics?
- What is the Risk Management Framework (RMF)?
- What is an IT strategic plan (information technology strategic plan)?
- What is financial risk management?
- What is a risk management specialist, and what does one do?
- What is third-party risk management (TPRM)?