New & Notable
Get Started
Risk prediction models: How they work and their benefits
Accurate risk prediction models can aid risk management efforts in organizations. Here's a look at how risk models work and the business benefits they provide.
Get Started
How to create a risk management plan: Template, key steps
A risk management plan provides a framework for managing business risks. Here's what it includes and how to develop one, plus a downloadable plan template.
Manage
12 best practices to keep in mind for SLA compliance
SLAs outline the criteria for acceptable performance from a service provider. Learn best practices CIOs and IT leaders should follow when creating an SLA with a service provider.
News
U.S. pushes back on China, invests in rare earth resources
U.S. officials are increasingly concerned about China's dominance over critical minerals used in advanced technologies.
Trending Topics
-
CIO Strategy News
U.S. pushes back on China, invests in rare earth resources
U.S. officials are increasingly concerned about China's dominance over critical minerals used in advanced technologies.
-
Digital Transformation Manage
Emerging technologies in construction help manage work, risk
Emerging technologies in construction include AI and digital twins. Read how companies use advanced IT to improve risk analysis, forecasting, and more.
-
Risk Management & Governance Get Started
Risk prediction models: How they work and their benefits
Accurate risk prediction models can aid risk management efforts in organizations. Here's a look at how risk models work and the business benefits they provide.
-
Apps, Infrastructure and Operations Evaluate
Help desk vs. service desk: What's the difference?
Help desks deliver tactical, immediate technical support for specific issues, while service desks offer strategic, comprehensive management of business services.
-
Cloud deployment and architecture Manage
Demystify the cloud and edge computing relationship
Edge computing remains primarily on-prem, but evolving technologies like 5G might enable some workloads to migrate to shared hosting models, creating a hybrid computing ecosystem.
-
Data security and privacy Get Started
An explanation of data breaches
Data breaches can be intentional or accidental and come in various forms, but all types have the potential to cause considerable harm to individuals and organizations.
Sponsored Sites
-
Artificial Intelligence
Intel & Red Hat: Leading the way in Enterprise AI
Combining Intel’s silicon experience with Red Hat’s software innovation to enable AI-driven hybrid multi-cloud solutions.
-
Sustainability
Strategies for Growing Businesses
Learn how Dell Technologies and Intel® provide cybersecurity, sustainability, cloud, storage and infrastructure solutions to help your growing business achieve breakthrough innovation.
-
Collaboration
Increase Productivity with a Scalable Collaboration Solution
Learn how Slack offers significant advantages in scalability, security, platform depth and integrations, engagement, and shared channels are valued by organisations when undertaking digital transformation initiatives.
Find Solutions For Your Project
-
Evaluate
Risk prediction models: How they work and their benefits
Accurate risk prediction models can aid risk management efforts in organizations. Here's a look at how risk models work and the business benefits they provide.
-
12 top enterprise risk management trends in 2025
-
Help desk vs. service desk: What's the difference?
-
The history of quantum computing: A complete timeline
-
-
Problem Solve
A guide to risk registers: Benefits and examples
Risk registers document, prioritize and track an organization's risk, providing organizations with a holistic view of risk and a ready way to communicate their risk strategies.
-
Learn how to harness strategic risk and improve your operations
-
What is risk monitoring? Definition and best practices
-
How to attract tech talent in 2025: 7 essentials
-
-
Manage
12 best practices to keep in mind for SLA compliance
SLAs outline the criteria for acceptable performance from a service provider. Learn best practices CIOs and IT leaders should follow when creating an SLA with a service provider.
-
What is a compliance audit? (with an example checklist)
-
How to meet IoT compliance standards
-
Compliance stakeholders and how to work with them
-
CIO Basics
-
Get Started
Risk prediction models: How they work and their benefits
Accurate risk prediction models can aid risk management efforts in organizations. Here's a look at how risk models work and the business benefits they provide.
-
Get Started
How to create a risk management plan: Template, key steps
A risk management plan provides a framework for managing business risks. Here's what it includes and how to develop one, plus a downloadable plan template.
-
Get Started
What is a procurement plan?
A procurement plan -- also called a procurement management plan -- is a document that is used to manage the process of finding and selecting a vendor.
Multimedia
-
News
View All -
CIO strategy
U.S. pushes back on China, invests in rare earth resources
U.S. officials are increasingly concerned about China's dominance over critical minerals used in advanced technologies.
-
CIO strategy
Tariffs could hamper U.S. manufacturing growth
The Trump administration's fluctuating position on tariffs is creating pricing unpredictability for U.S. businesses and manufacturers.
-
CIO strategy
In an FTC antitrust win, Meta could face divestitures
The FTC argues that Meta acquired Instagram and WhatsApp to eliminate competition in social media networks. If the FTC wins its case, Meta could be forced to sell those products.
Search CIO Definitions
- What is a procurement plan?
- What is a quantum circuit? Quantum vs. classical circuit
- What is prescriptive analytics?
- What is the Risk Management Framework (RMF)?
- What is an IT strategic plan (information technology strategic plan)?
- What is financial risk management?
- What is a risk management specialist, and what does one do?
- What is third-party risk management (TPRM)?