CIOs and CFOs: Can this relationship be saved?

Michael Krieger, Toby Redshaw, Sean Sloan, Paul Muller
CIOs and CFOs have often been at odds. But lately cloud computing and other changes in IT have made this relationship even rockier. Join this event to hear a CIO and CFO step into the ring to face off on key issues surrounding the IT/Business relationship. They’ll discuss how the IT procurement process is changing, and what the bottom-line impact is for the business at large. Attendees will hear debate on:

* What’s the ideal reporting structure?
* Are CIOs an endangered species?
* How is IT perceived by CXOs and the business units?
* What and who drive technology innovation?
* How do new technologies impact the evolving relationship?

Register now – and bring questions for our panelists to address during the Q&A.
Sep 19 2012
59 mins
CIOs and CFOs: Can this relationship be saved?
CIO CFO cloud BYOD IT trends
Join us for this summit:
More from this community:

IT Governance, Risk and Compliance

Webinars and videos

  • Live and recorded (2844)
  • Upcoming (85)
  • Date
  • Rating
  • Views
  • In this webcast we will show:
    1. The Heartbleed vulnerability in detail, how it occurred with examples of how it can be used against your organization
    2. How you can identify your business exposure and what systems are vulnerable
    3. How Tripwire’s solutions work together to help you close the detection, remediation and prevention gaps around Heartbleed
  • Internal audit functions must anticipate and respond to a constant stream of new challenges. Key findings from Protiviti’s latest Internal Audit Capabilities and Needs Survey show that:

    • Social media, mobile applications, cloud computing and security (specifically with regard to the NIST Cybersecurity Framework) are critical areas of concern

    • CAATs and data analysis remain on center stage

    • Fraud management efforts focus more on technology as well as prevention

    • We have to keep pace with a raft of regulatory, rules-making and standards changes”

    • Internal auditors want to take their collaboration with business partners to a new level

    Please join our webinar on focused on assessing the top priorities for internal audit functions.

    CPE credit will be provided to qualifying attendees.
  • We look at why organisations are turning to Data Classification solutions as part of a best practice layered security approach. We will cover:

    •The evolving security environment
    •Drivers for data classification
    •How data classification works in practice
    •Customer success stories

    The session will also include a brief demonstration of Boldon James Classifier.
  • Join us for this short monthly webinar, in which we will provide you with the latest updates and insights into the constantly evolving online threat landscape. Using information sources such as the Symantec Global Intelligence Network, we will help you understand how you can continue to protect your company and your infrastructure.

    The goal is simple: to make the Internet safer to transact business – for you, your customers and everyone else with whom you interact online.
  • David Moule, Manager of IT Security Operations at Allied Irish Bank, discusses how AIB has leveraged Modulo Risk Manager™ to mature their Vulnerability Management process, remedy “on the fly” VM needs, and successfully navigate an internal audit.
  • Now that NIST has published Version 1.0 of the Framework for Improving Critical Infrastructure Cybersecurity, the long awaited CSF, what are the implications for companies? How can the CSF help your business improve its defenses? Cameron camp investigates.
  • Are attacks on your network and users still occurring, despite continuing efforts to stay on top of security? What impact would malware have on your business if it was able to gain internal access and steal sensitive information?

    Without solutions that can disrupt the chain of events that occur during an advanced attack, many businesses are still being infiltrated and losing data every day. This webinar will cover the best practices in disrupting attacks with content security solutions - connected to optimize protection.
    Join this webinar as:
    •You will learn the tactics used by attackers today to infiltrate businesses
    •You will hear about the leading technologies available to disrupt advanced attacks
    •You will walk away with the knowledge to assess your own environment, and optimize your security
    Businesses today face more advanced attacks than we’ve ever seen in the past – and defending against them takes a connected approach which can disrupt the multiple points of infiltration and exfiltration used in the process of a breach. With most attacks seen in the wild using phishing emails to reach their target, a web link or malicious file to deliver a payload, and an outbound stream of communication to exfiltrate data – implementing a Secure Email Gateway, Secure Web Gateway, and Data Loss Prevention technology together will provide a barrier difficult for even the most advanced attacks to overcome.

    Don’t miss this webinar if you have a stake in the security of your most valuable information, or are directly responsible for the implementation of security solutions to protect it. Register now for this 30 minute webinar.
  • As most IT Pros are aware, as of April 8th, 2014, Microsoft will stop releasing security patches for Windows XP. Unfortunately, most folks will not be able to migrate all Windows XP machines by that deadline. How will you limit the security risks posed by these now vulnerable assets? Join us for this webinar outlining practical strategies to help you cover your assets.
    In this session we'll cover:
    The primary attack vectors you need to consider
    Immediate actions you can take to limit the exposure of your XP assets
    Warning signs to watch out for that could signal an attack
    How to closely monitor your vulnerable assets with AlienVault USM
  • In case you did not know it, your SMB is a prime target for cybercriminals. Unfortunately, networks are routinely infiltrated by cybercriminals through blended attacks that exploit unknown vulnerabilities and steal valuable data. Compounding the problem, traditional security solutions were not designed to stop any of the five stages of an advanced targeted attack.

    Learn how new multi-vector virtual execution technology is able to protect your business against today’s blended attacks in this FireEye and Spiceworks webinar.
  • MDM implementations begin by solving the most pressing business problem in a single hub, mostly on-premise. They then expand to another use case, domain, or region, and might evolve to another MDM hub on cloud or in a different country. Whatever the journey might be, how do you tie the different hubs together in a hybrid or federated hub-of-hubs MDM architecture? Come to this session to learn how certain leading companies are solving this conundrum!

    In this webinar, you will learn:
    -What are the initial use cases that dictate MDM
    -How to determine if you should use the same MDM instance or a different one when expanding your use case
    -When to use on-premise versus cloud MDM

    In addition, we will explore examples of companies using hybrid MDM to manage multiple MDM hubs as well as evolving to the holy-grail of MDM architecture: Hub-of-hubs or federated MDM.
  • Channel
  • Channel profile
Up Down
  • CIOs and CMOs: Who’s biggest on Big Data? Recorded: Oct 30 2013 58 mins
    Big Data is big business, but increasingly the customer is the CMO and individual lines of business. Where does this leave the CIO and central IT? Join us for the third in our webcast series, and hear a CIO and CMO debate on the battle for budget and relevance in today’s enterprise. When it comes to Big Data in the enterprise, who controls the purse strings, and who’s holding the bag? Tune in to hear debate on such topics as:
    • Who should set the Big Data strategy in the enterprise?
    • How can CIOs maintain security and governance?
    • How can you best leverage data if it’s not all under IT’s control?
    • Strategies and best practices you can take away for your own organization

    Register now, and be sure to bring your questions for our panelist Q&A.
  • Forrester: Automate Your Way to the Pragmatic Cloud Recorded: Apr 17 2013 28 mins
    Many enterprise IT organizations are changing their mission from being a provider of IT services to being a broker of IT services. As part of this change, enterprises are deploying private cloud solutions to become more responsive to the business and drive down cost.

    Automation is a key pre-requisite to cloud, and automating operations today can lead to a smooth transition. Where to begin?

    Listen to this 3-step approach, starting with automating tasks, then IT processes, and eventually service delivery. Automate today for a smooth transition to cloud tomorrow.
  • CIOs and CFOs: Does IT matter when you’ve got cloud and SaaS? Recorded: Mar 14 2013 59 mins
    Cloud computing and Software as a Service (SaaS) are changing the role of enterprise IT. Join us for the second in our gloves-off CIO-CFO webcast series, and hear a CIO and CFO weigh in on where cloud and SaaS are taking the enterprise. When it comes to cloud services, are CIOs and CFOs at odds, or on the same page? Tune in to hear debate on such topics as:
    •Is this the end of enterprise IT?
    •Can CIOs and CFOs find common cause in the cloud?
    •How can you be SaaS smart?
    •Who should be setting the strategy?
    •How can CIOs thrive in a cloud and SaaS world?

    Register now, and be sure to bring your questions for our panelist Q&A.
  • Rethinking Security: Where Big Data, Operations and Security Connect Recorded: Jan 16 2013 55 mins
    The combination of Cloud computing and unprecedented proliferation of mobile devices have fundamentally changed the game for business leaders, accelerating the pace at which new markets, business models and competitive threats emerge and must be addressed. In this special event with Forrester Research, hear how CIOs and their Security teams must "rethink security" in order to enable the business to better serve existing customers while simultaneously capturing new customers and markets.
  • CIOs and CFOs: Can this relationship be saved? Recorded: Sep 19 2012 59 mins
    CIOs and CFOs have often been at odds. But lately cloud computing and other changes in IT have made this relationship even rockier. Join this event to hear a CIO and CFO step into the ring to face off on key issues surrounding the IT/Business relationship. They’ll discuss how the IT procurement process is changing, and what the bottom-line impact is for the business at large. Attendees will hear debate on:

    * What’s the ideal reporting structure?
    * Are CIOs an endangered species?
    * How is IT perceived by CXOs and the business units?
    * What and who drive technology innovation?
    * How do new technologies impact the evolving relationship?

    Register now – and bring questions for our panelists to address during the Q&A.
IT performance, value & innovation for enterprise IT leaders
Find insights CIOs and other IT leaders can use to drive innovation and demonstrate business value in their IT organizations. We’ll look at industry best practices, discuss how to optimize IT performance and explore how trends like cloud, big data and BYOD are changing IT.
Try a powerful marketing platform for your videos and webinars. Learn more  >

Embed in website or blog

Successfully added emails: 0
Remove all
  • Title: CIOs and CFOs: Can this relationship be saved?
  • Live at: Sep 19 2012 6:00 pm
  • Presented by: Michael Krieger, Toby Redshaw, Sean Sloan, Paul Muller
  • From:
Your email has been sent.
or close
You must be logged in to email this