Leadership
Explore Articles
-
Making the Most of Cloud-Enabled Enterprise Mobility
In Summary Who: IT leaders from PwC, Jackson Hewitt Tax Service, EQT and Critical Systems What: Discussing the business results…
-
Rewriting the IT Rules
In Summary who: Kim Cary, CISO, Pepperdine University what: Cary oversees information security for the school’s 8,500 students and 2,000…
-
The New Normal: Proceed with Caution
If you believe what many economists are now saying, we have emerged from a prolonged economic malaise and the United…
-
Is it Time for Bring Your Own Technology?
Most of the organizations I have worked with for the past 40 years had rules about what technology could be…
-
How To Take Charge of Project Management
Effective project management is an essential career skill for any CIO. Whether it’s overseeing an IT project for internal or…
-
How to Present The IT Story
We feel your pain. You need to make a major presentation to your organization – which includes everyone from your…
-
Employers Beware: Tech Talent Poaching Up in 2011
A recent study by IT job search specialist Dice found more than half (54 percent) of hiring managers and recruiters…
-
Endpoint Security Takes Center Stage
Endpoint security is a major priority for IT decision-makers, according to a report released March 1, 2011, by IBM. The…