Linkedin Facebook Twitter More...         Subscribe Forward to a Peer
August 2015 Volume 4 Issue 3
Mobility and Security in the Digital Age
Is Meeting Regulations Really Enough When It Comes To Security?

By Ron Dinwiddie
Chief Information Officer
Texas Trust Credit Union

Most auditors and examiners you encounter will readily agree that meeting regulations may be the minimum that you should do, but as a responsible senior IT manager you should constantly review and upgrade your security. Maybe this is acceptable in some areas, but how about when it comes to your data and network security? There are many organizations you can join and become part of to help keep your security knowledge up-to-date.

Read More
Redefining UC Mobility: There Are Many Ways To Be Mobile

By Robert Arnold
Principal Analyst, Information and Communication Technologies
Frost & Sullivan

There are many ways employees can be mobile. This article discusses key considerations in developing a comprehensive mobile business communications strategy that addresses the requirements of different users and outfits them with the right set of tools to more effectively complete their business tasks.

Read More
An Interview with Param Bedi, Vice President,
Library and Information Technology
, Bucknell University
By Patricia Stamas-Jacoby
Publications Editor, Events
Frost & Sullivan

Frost & Sullivan recently spoke with Param Bedi, Vice President of Library and Information Technology at Bucknell University, about some of his key digital strategies, initiatives and challenges. Here are some of the insights gleaned from our brief but interesting discussion.

Read More
In This Issue

See All of Our Upcoming eBroadcasts

5 Reasons Enterprises Have Difficulty Implementing
New Technologies

By Jonathan Reichental, Ph.D.
Chief Information Officer
City of Palo Alto

Technology innovation abounds! We live in spectacular times. Change is happening rapidly and in unexpected ways. Market barriers for innovation have been lowered. Got an idea? You can make it happen. Yet, despite all the ebullience, much of our innovation still remains incremental. 

Read More
“Big Data” Analytics in Network Security:
Computational Automation of Security Professionals
By Frank Dickson
Research Director – Information and Network Security Stratecast
Frost & Sullivan

Is the sophistication required to effectively implement selected cyber security defenses becoming increasingly out of reach for mainstream organizations? Tools that historically performed behavior analysis for threat detection, such as an IPS, are too limited in visibility, given the reality of today’s cyber threat landscape.

Read More
In This Issue

Survey Says: Don't Miss Our Next CIO Impact! Event

4th Annual
CIO Impact! 2016:
A Frost & Sullivan Executive MindXchange

December 5 - 7, 2016*
Austin, TX*

Learn More


›› Subscribe Me

›› Contribute to the
CIO Impact! eBulletin

›› Help Shape the Event Agenda

›› CIO Impact!
Market Resources

›› Join the CIO Impact!
Group on LinkedIn

›› Contact Us

 About Frost & Sullivan

›› Event Calendar

›› Integrated Marketing Solutions

›› eBroadcast Calendar

›› Executive MindXchange Chronicles

›› GIL Community Newsletter

›› Competitive Intelligence

›› Medical Technologies

›› Customer Contact

›› New Product Development
& Marketing


›› Click to Subscribe