CIOs and CFOs: Can this relationship be saved?

Manage webcast
Michael Krieger, Toby Redshaw, Sean Sloan, Paul Muller
CIOs and CFOs have often been at odds. But lately cloud computing and other changes in IT have made this relationship even rockier. Join this event to hear a CIO and CFO step into the ring to face off on key issues surrounding the IT/Business relationship. They’ll discuss how the IT procurement process is changing, and what the bottom-line impact is for the business at large. Attendees will hear debate on:

* What’s the ideal reporting structure?
* Are CIOs an endangered species?
* How is IT perceived by CXOs and the business units?
* What and who drive technology innovation?
* How do new technologies impact the evolving relationship?

Register now – and bring questions for our panelists to address during the Q&A.
Sep 19 2012
59 mins
CIOs and CFOs: Can this relationship be saved?
CIO CFO cloud BYOD IT trends
Join us for this summit:
More from this community:

IT Governance, Risk and Compliance

  • Live and recorded (3710)
  • Upcoming (96)
  • Date
  • Rating
  • Views
  • Learn about the powerful, new Arcserve Cloud which is a fully-integrated, cloud data protection solution for backup, disaster recovery and long-term retention. It’s offered as a service extension to Arcserve’s Unified Data Protection (UDP) appliance. Also discover technical details of Arcserve UDP, a next-generation data protection solution that leverages global deduplication, encryption, compression, and WAN-optimized replication.
  • An overview of defending against the bad guy, by Tim Grieveson - Chief Cyber Security Strategist for ESP, an ex CIO/CISO himself gives his views and vision based on the HP cyber security risk report.
  • How confident are you about your company’s network security? Most people do not know that their firewall is inadequate.

    Let us show you how you could be in a better position to both understand your current level of preparedness for network attacks and improve areas where your protection measures may be weak.
  • As corporate information technology infrastructure increases in size and complexity, corporations are recognizing the need for a better mechanism for assessing IT's role and alignment to the key corporate initiatives. What began as a series of best practices has evolved into the field known as IT governance.

    IT governance is no longer just a theoretical concept, it is a fundamental business necessity, and an iterative process which requires senior management commitment over the long term in order to see results. By implementing a business risk approach to IT governance corporations can deliver immediate benefits to the entire organization.

    Join Eric Kavanagh, the Bloor Group; Paul Quanrud, TCS; Keith Breidt, BAH; and Yo Delmar, MetricStream; for this educational session as they address some of the key concepts and challenges with IT governance. They will answer as many questions as we can fit in to the 45 minute Q&A, and will provide research materials for you to takeaway.

    If you would like to attend please confirm your position below.
  • How to Align Identity Management and Access Control with Content and Collaboration

    The impetuses for cloud app adoption are still in full force: greater accessibility, elastic licensing, reduced infrastructure and improved business agility, among others, are creating new and exciting ways to reduce IT costs and complexity and meanwhile improve productivity and profitability. While the benefits are clear, technology leadership are still apprehensive due to key considerations around security and access control. Business-critical information now lives outside the traditional corporate perimeter while IT has little visibility and control over the apps and devices being used. Technology leaders and end users alike are seeking simple and secure application access.

    Join us in this session where we explore key trends, challenges and solutions from OneLogin and Dropbox, and how real estate management company Bigos Management has delivered secure and convenient access to their cloud applications to their workforce.In this session, you will learn:

    - Why Identity and Access Management is important today
    - How IAM fits into a broader cloud security program
    - How IAM aligns with File Storage and Collaboration
    - How Bigos Management has successfully leveraged OneLogin and Dropbox in their business
  • The role of the CISO is evolving - and fast. CISOs today must find innovative ways to align with the business and strategize security as a top business asset -- and those that ascend in their role will have the opportunity to play a bigger, more influential role in the years to come. In this webinar hosted by Agari, you will hear Jim Routh, Aetna CISO share real world insights into specific challenges and solutions to approach today's evolving email threats as well as key 2018 CISO research from Chris McClean, Forrester VP of Research.
  • The role of the CISO is evolving - and fast. CISOs today must find innovative ways to align with the business and strategize security as a top business asset -- and those that ascend in their role will have the opportunity to play a bigger, more influential role in the years to come. In this webinar hosted by Agari, you will hear Jim Routh, Aetna CISO share real world insights into specific challenges and solutions to approach today's evolving email threats as well as key 2018 CISO research from Chris McClean, Forrester VP of Research.
  • Cloud computing and DevOps are letting enterprises deploy new software faster than ever. But with development organizations focused on speed, are you achieving time to market at the expense of cyber security?

    Run time application self-protection (RASP) is a new approach to application security that enables production applications to spot and block cyber attacks from within the application itself—without recompiling and without sacrificing performance. Join the webinar to learn:

    How to enable new and legacy applications to protect themselves in as little as 10 minutes
    The four situations where RASP is the best solution
    Why Gartner says RASP is a must-have technology for bi-modal IT
  • When a popular product is launched, a high-stakes race begins between the offense and defense markets to find software vulnerabilities. More and more organizations are seeing that incenting security research with programs like bug bounties are an effective way to find vulnerabilities. Katie Moussouris, Chief Policy Officer of HackerOne, will reveal what the latest research shows and what it means for companies today.

    About the presenter:

    Katie Moussouris is the Chief Policy Officer for HackerOne, a platform provider for coordinated vulnerability response & structured bounty programs. She is a noted authority on vuln disclosure & advises lawmakers, customers, & researchers to legitimize & promote security research & help make the internet safer for everyone. Katie's earlier Microsoft work encompassed industry leading initiatives such as Microsoft's bounty programs & Microsoft Vulnerability Research. She is also a subject matter expert for the US National Body of the International Standards Organization (ISO) in vuln disclosure (29147), vuln handling processes (30111), and secure development (27034). Katie is a visiting scholar with MIT Sloan School, doing research on the vulnerability economy and exploit market. She is a New America Foundation Fellow. Katie is an ex-hacker, ex-Linux developer, and persistent disruptor. Follow her and HackerOne on Twitter http://twitter.com/k8em0 and http://twitter.com/hacker0x01
  • If Anthem, Sony, Home Depot, Target and Neiman Marcus can fall victim to security breaches, so can you. The bad news is - no company is immune, no matter how big or small you are. Without a proper understanding of zero-day threats, companies have no way of exposing the gaps of overhyped security solutions. These threats are very sophisticated and often leveraging previously unknown attack techniques and vulnerabilities.

    Join us for a compelling webcast that will highlight critical insights combating zero-day threats - including the ability to:

    • Track employee traffic at all times, in real time, irrespective of whether they are inside or outside the corporate network
    • Derive intelligent insights and meaningful data for fast corrective action
    • Avoid a strategy based on "alerting" you about infections - without any guarantees you will notice them
    • Implement a comprehensive approach to stopping zero-day threats - based on protection, (inspecting every byte of traffic and automatically blocking threats), detection and remediation
  • Channel
  • Channel profile
  • CIOs and CMOs: Who’s biggest on Big Data? Recorded: Oct 30 2013 58 mins
    Michael Krieger, technology analyst; Toby Redshaw, CIO; Marlene Williamson, CMO; Chris Selland, VP HP Vertica
    Big Data is big business, but increasingly the customer is the CMO and individual lines of business. Where does this leave the CIO and central IT? Join us for the third in our webcast series, and hear a CIO and CMO debate on the battle for budget and relevance in today’s enterprise. When it comes to Big Data in the enterprise, who controls the purse strings, and who’s holding the bag? Tune in to hear debate on such topics as:
    • Who should set the Big Data strategy in the enterprise?
    • How can CIOs maintain security and governance?
    • How can you best leverage data if it’s not all under IT’s control?
    • Strategies and best practices you can take away for your own organization

    Register now, and be sure to bring your questions for our panelist Q&A.
  • Forrester: Automate Your Way to the Pragmatic Cloud Recorded: Apr 17 2013 28 mins
    Glenn O'Donnell, Principal Analyst - Infrastructure & Operations, Forrester Research
    Many enterprise IT organizations are changing their mission from being a provider of IT services to being a broker of IT services. As part of this change, enterprises are deploying private cloud solutions to become more responsive to the business and drive down cost.

    Automation is a key pre-requisite to cloud, and automating operations today can lead to a smooth transition. Where to begin?

    Listen to this 3-step approach, starting with automating tasks, then IT processes, and eventually service delivery. Automate today for a smooth transition to cloud tomorrow.
  • CIOs and CFOs: Does IT matter when you’ve got cloud and SaaS? Recorded: Mar 14 2013 59 mins
    Michael Krieger, technology analyst; Toby Redshaw, CIO; Sean Sloan, CFO; Matt Morgan, VP HP
    Cloud computing and Software as a Service (SaaS) are changing the role of enterprise IT. Join us for the second in our gloves-off CIO-CFO webcast series, and hear a CIO and CFO weigh in on where cloud and SaaS are taking the enterprise. When it comes to cloud services, are CIOs and CFOs at odds, or on the same page? Tune in to hear debate on such topics as:
    •Is this the end of enterprise IT?
    •Can CIOs and CFOs find common cause in the cloud?
    •How can you be SaaS smart?
    •Who should be setting the strategy?
    •How can CIOs thrive in a cloud and SaaS world?

    Register now, and be sure to bring your questions for our panelist Q&A.
  • Rethinking Security: Where Big Data, Operations and Security Connect Recorded: Jan 16 2013 55 mins
    John Kindervag - Principal Analyst: Forrester Research, Michael Callahan - Vice President: HP Software
    The combination of Cloud computing and unprecedented proliferation of mobile devices have fundamentally changed the game for business leaders, accelerating the pace at which new markets, business models and competitive threats emerge and must be addressed. In this special event with Forrester Research, hear how CIOs and their Security teams must "rethink security" in order to enable the business to better serve existing customers while simultaneously capturing new customers and markets.
  • CIOs and CFOs: Can this relationship be saved? Recorded: Sep 19 2012 59 mins
    Michael Krieger, Toby Redshaw, Sean Sloan, Paul Muller
    CIOs and CFOs have often been at odds. But lately cloud computing and other changes in IT have made this relationship even rockier. Join this event to hear a CIO and CFO step into the ring to face off on key issues surrounding the IT/Business relationship. They’ll discuss how the IT procurement process is changing, and what the bottom-line impact is for the business at large. Attendees will hear debate on:

    * What’s the ideal reporting structure?
    * Are CIOs an endangered species?
    * How is IT perceived by CXOs and the business units?
    * What and who drive technology innovation?
    * How do new technologies impact the evolving relationship?

    Register now – and bring questions for our panelists to address during the Q&A.
IT performance, value & innovation for enterprise IT leaders
Find insights CIOs and other IT leaders can use to drive innovation and demonstrate business value in their IT organizations. We’ll look at industry best practices, discuss how to optimize IT performance and explore how trends like cloud, big data and BYOD are changing IT.

Embed in website or blog

Successfully added emails: 0
Remove all
  • Title: CIOs and CFOs: Can this relationship be saved?
  • Live at: Sep 19 2012 6:00 pm
  • Presented by: Michael Krieger, Toby Redshaw, Sean Sloan, Paul Muller
  • From:
Your email has been sent.
or close
You must be logged in to email this