CIOs and CMOs: Who’s biggest on Big Data?

Michael Krieger, technology analyst; Toby Redshaw, CIO; Marlene Williamson, CMO; Chris Selland, VP HP Vertica
Big Data is big business, but increasingly the customer is the CMO and individual lines of business. Where does this leave the CIO and central IT? Join us for the third in our webcast series, and hear a CIO and CMO debate on the battle for budget and relevance in today’s enterprise. When it comes to Big Data in the enterprise, who controls the purse strings, and who’s holding the bag? Tune in to hear debate on such topics as:
• Who should set the Big Data strategy in the enterprise?
• How can CIOs maintain security and governance?
• How can you best leverage data if it’s not all under IT’s control?
• Strategies and best practices you can take away for your own organization

Register now, and be sure to bring your questions for our panelist Q&A.
Oct 30 2013
58 mins
CIOs and CMOs: Who’s biggest on Big Data?
big data marketing LOB CIO CMO HP
Join us for this summit:
More from this community:

IT Governance, Risk and Compliance

Webinars and videos

  • Live and recorded (2855)
  • Upcoming (88)
  • Date
  • Rating
  • Views
  • You are invited to register for our upcoming COSO webinar, COSO 2013: Mapping Controls to Principles. Transitioning to the New COSO Framework is top of mind for many organizations. How do you get started? How do you map controls to principles or vice versa? What are some of the preliminary findings organizations are seeing as they head down the path to implement the framework?

    Please submit top-of-mind questions during the webinar registration process.

    CPE credits will be provided to qualifying attendees.
  • *On this webcast we're giving away a pass to our partner event: the Chicago Cyber Incident Response Summit, between June 21-23, 2014*

    Let’s face it, there’s unrelenting pressure on IT to enable competitive advantage through new technology and use of data assets‒-but the business is driving initiatives that can push sensitive production data into more and more exposed areas. The key question is ‘How can you enable the business to be agile AND take a more proactive, programmatic approach to security at the same time?’ With the advanced threats that are pervasive today, it’s becoming increasingly dangerous for organizations to deploy new technologies and processes, and then reactively address the implications for data security in the ecosystem. You need a blueprint to reverse this trend in your organization.

    In this webinar, William Stewart, Senior Vice President of Booz Allen Hamilton and Jeff Lunglhofer, Principal of Booz Allen Hamilton–a leading management technology and consulting firm driving strategic innovation for clients–will discuss the top trends in cyber threat mitigation, data privacy, data governance, and data security, with Mark Bower, VP Product Management and Solutions Architecture at Voltage Security.

    Attend this webinar to learn more about how to:
    •Increase responsiveness and security in your IT environment and architecture
    •Fight pervasive threats from inside and outside attack with data-centric technologies
    •Raise your organization’s overall data privacy, compliance, and security profile
    •Implement a new data de-identification framework across production, test & dev, and analytics use cases
    •Proactively enable critical business initiatives
    --Can't attend live? Register below to receive a link to the recorded webcast.
  • This webinar is presented by McAfee and Intel to help customers understand their Data Protection solution from McAfee and to get the most business value out of their Intel based endpoints. Products that apply to this webcast include McAfee Complete Data Protection Suites, featuring Endpoint Encryption, and EPO Deep Command to extend the reach of your IT department to lower your total cost of ownership. The webinar will include a special highlight on Intel® Core™ vPro™ Processors and associated technologies that increase productivity and hardware-assisted security in the enterprise. This webcast is provided as a 35-40 minute overview and includes 5-10 minutes of Q & A.

    Join this webinar on Data Protection and learn about:
    • The key features of Data Protection and how it can provide you with the security you need
    • Use cases on utilizing the synergy between Intel® vPro™ and McAfee Data Protection technologies to reduce your overall TCO
    • How you can extend the reach of your IT team with the ability to remotely wake up or even power on PC’s, remediate “disabled” endpoints and remotely reset pre-boot passwords
    • How to securely manage your endpoints from a single console while simultaneously providing self-service features for your end-users
  • Modulo Director of Technical Services John Ambra walks Risk Manager users through the latest version 8.4, and answers user questions at the end.
  • Mobile workers are increasingly demanding access to mission-critical data and apps from personal smart phones, tablets and laptops. However, co-mingling of personal and business data and apps on mobile devices creates risk of business data loss and introduction of malware. What are the risks and what technologies can businesses deploy to enable productivity while protecting from these threats ?

    •Learn about the risks introduced when personal and business data and apps co-mingle on mobile devices
    •Learn about available technologies and technology trends to address these risks.

    Join Dell to understand the risks introduced when personal and business data co-mingle on mobile devices and technologies to consider to protect corporate data.
  • Forty-four states, DC and four territories have adopted the Common Core State Standards (CCSS). This means that school districts across the country are planning for 100% online assessments during the 2014-2015 school year. One of the most important conditions needed for being able to administer online assessments is network infrastructure readiness.
    Attend this 30-minute webinar and join Gavin Lee, Senior K-12 Business Development Manager at Juniper Networks, to discuss the critical network must-haves that all school districts should consider when looking to deploy a robust and supportable network. You will also receive practical guidance on how to get the most out of your network infrastructure and how to best prepare for the CCCSS assessments:
    • Consortia network infrastructure
    • Wired and wireless network capabilities
    • Robust network security
    • Network support readiness
    • Juniper Networks network infrastructure readiness resources
  • Jack Madden converses with James Rendell to get the CA perspective on Enterprise Mobility Management’s (EMM) future potential. EMM must not for get BYOD but also go beyond it into Mobile App Management (MAM) and find ways to keep users personal information and employers information separated and find a way to embrace the Internet of Things.
  • Jack Madden discusses Enterprise Mobility with Arun Bhattacharya to get the CA perspective on the way it should be. This means going beyond BYOD and MDM, and embracing MAM, MEM, MCM, and IoT. For many companies, finding the balance between employers and users privacy and security has been a problematic issues.
  • Heartbleed is not an exploit you want to ignore as an IT professional. It exposes passwords and cryptographic keys, and requires not only that you patch OpenSSL for each of the services using the OpenSSL library, but also that you replace the private keys and certificates so that attackers won’t be able to use any of the data compromised by the vulnerability. The simplicity of the exploit makes it powerful. It appears that over a half million websites are vulnerable.
    In this session we'll cover:
    What you need to know about the Heartbleed vulvnerability
    How to detect it using AlienVault USM
    How to investigate successful Heartbleed exploits
  • In this webcast we will show:
    1. The Heartbleed vulnerability in detail, how it occurred with examples of how it can be used against your organization
    2. How you can identify your business exposure and what systems are vulnerable
    3. How Tripwire’s solutions work together to help you close the detection, remediation and prevention gaps around Heartbleed
  • Channel
  • Channel profile
Up Down
  • CIOs and CMOs: Who’s biggest on Big Data? Recorded: Oct 30 2013 58 mins
    Big Data is big business, but increasingly the customer is the CMO and individual lines of business. Where does this leave the CIO and central IT? Join us for the third in our webcast series, and hear a CIO and CMO debate on the battle for budget and relevance in today’s enterprise. When it comes to Big Data in the enterprise, who controls the purse strings, and who’s holding the bag? Tune in to hear debate on such topics as:
    • Who should set the Big Data strategy in the enterprise?
    • How can CIOs maintain security and governance?
    • How can you best leverage data if it’s not all under IT’s control?
    • Strategies and best practices you can take away for your own organization

    Register now, and be sure to bring your questions for our panelist Q&A.
  • Forrester: Automate Your Way to the Pragmatic Cloud Recorded: Apr 17 2013 28 mins
    Many enterprise IT organizations are changing their mission from being a provider of IT services to being a broker of IT services. As part of this change, enterprises are deploying private cloud solutions to become more responsive to the business and drive down cost.

    Automation is a key pre-requisite to cloud, and automating operations today can lead to a smooth transition. Where to begin?

    Listen to this 3-step approach, starting with automating tasks, then IT processes, and eventually service delivery. Automate today for a smooth transition to cloud tomorrow.
  • CIOs and CFOs: Does IT matter when you’ve got cloud and SaaS? Recorded: Mar 14 2013 59 mins
    Cloud computing and Software as a Service (SaaS) are changing the role of enterprise IT. Join us for the second in our gloves-off CIO-CFO webcast series, and hear a CIO and CFO weigh in on where cloud and SaaS are taking the enterprise. When it comes to cloud services, are CIOs and CFOs at odds, or on the same page? Tune in to hear debate on such topics as:
    •Is this the end of enterprise IT?
    •Can CIOs and CFOs find common cause in the cloud?
    •How can you be SaaS smart?
    •Who should be setting the strategy?
    •How can CIOs thrive in a cloud and SaaS world?

    Register now, and be sure to bring your questions for our panelist Q&A.
  • Rethinking Security: Where Big Data, Operations and Security Connect Recorded: Jan 16 2013 55 mins
    The combination of Cloud computing and unprecedented proliferation of mobile devices have fundamentally changed the game for business leaders, accelerating the pace at which new markets, business models and competitive threats emerge and must be addressed. In this special event with Forrester Research, hear how CIOs and their Security teams must "rethink security" in order to enable the business to better serve existing customers while simultaneously capturing new customers and markets.
  • CIOs and CFOs: Can this relationship be saved? Recorded: Sep 19 2012 59 mins
    CIOs and CFOs have often been at odds. But lately cloud computing and other changes in IT have made this relationship even rockier. Join this event to hear a CIO and CFO step into the ring to face off on key issues surrounding the IT/Business relationship. They’ll discuss how the IT procurement process is changing, and what the bottom-line impact is for the business at large. Attendees will hear debate on:

    * What’s the ideal reporting structure?
    * Are CIOs an endangered species?
    * How is IT perceived by CXOs and the business units?
    * What and who drive technology innovation?
    * How do new technologies impact the evolving relationship?

    Register now – and bring questions for our panelists to address during the Q&A.
IT performance, value & innovation for enterprise IT leaders
Find insights CIOs and other IT leaders can use to drive innovation and demonstrate business value in their IT organizations. We’ll look at industry best practices, discuss how to optimize IT performance and explore how trends like cloud, big data and BYOD are changing IT.
Try a powerful marketing platform for your videos and webinars. Learn more  >

Embed in website or blog

Successfully added emails: 0
Remove all
  • Title: CIOs and CMOs: Who’s biggest on Big Data?
  • Live at: Oct 30 2013 6:00 pm
  • Presented by: Michael Krieger, technology analyst; Toby Redshaw, CIO; Marlene Williamson, CMO; Chris Selland, VP HP Vertica
  • From:
Your email has been sent.
or close
You must be logged in to email this